null_resource.named_test_resource (local-exec): Executing: ["/bin/sh" "-c" "aws auditmanager list-assessment-frameworks --framework-type Standard --output json --profile default --region us-east-1 > /tmp/tests/aws_auditmanager_framework/terraform/test/output.json"]
null_resource.named_test_resource (local-exec): usage:
null_resource.named_test_resource (local-exec): Note: AWS CLI version 2, the latest major version of the AWS CLI, is now stable and recommended for general use. For more information, see the AWS CLI version 2 installation instructions at: https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html
[ ] aws_dms_replication_instance -- The required role is not set properly
Error: creating DMS Replication Instance: AccessDeniedFault: The IAM Role arn:aws:iam::260848201234:role/dms-vpc-role is not configured properly. with aws_dms_replication_instance.named_test_resource,
on variables.tf line 50, in resource "aws_dms_replication_instance" "named_test_resource":
50: resource "aws_dms_replication_instance" "named_test_resource" {
[ ] aws_ec2_launch_template -- Probable TF fix
Error: creating License Manager License Configuration (turbottest57179): AccessDeniedException: Service role not found. Consult setup procedures in License Manager User Guide and create the required role for the service.
[ ] aws_eks_addon_version
[ ] aws_elastic_beanstalk_environment -- Error: creating Elastic Beanstalk Environment (turbottest58694): InvalidParameterValue: No Solution Stack named '64bit Amazon Linux 2 v3.6.3 running Go 1' found. status code: 400, request id: 703adfdb-9338-491d-b074-47ff6577cdb8. with aws_elastic_beanstalk_environment.named_test_resource, on variables.tf line 136,
[ ] aws_glue_crawler -- (TF change to check to provide IAM role permission)
Error: creating Glue Crawler (turbottest51441): InvalidInputException: User: arn:aws:sts::260848201234:assumed-role/turbottest51441/AWS-Crawler is not authorized to perform: dynamodb:DescribeTable on resource: arn:aws:dynamodb:us-east-1:260848201234:table/turbottest51441 because no identity-based policy allows the dynamodb:DescribeTable action (Service: AmazonDynamoDBv2; Status Code: 400; Error Code: AccessDeniedException; Request ID: LLLKVRVK6IR4DGOE83B18HK5CFVV4KQNSO5AEMVJF66Q9ASUAAJG; Proxy: null)
Error running command 'AWS guardduty create-sample-findings --region
us-east-1 --detector-id c4c3ae727a86e9b670315fed5db7f402 --finding-types
Backdoor:EC2/DenialOfService.Tcp': exit status 127. Output: /bin/sh: AWS:
command not found,
looks like the command is no more working
command = "AWS guardduty create-sample-findings --region ${var.aws_region} --detector-id ${aws_guardduty_detector.named_test_resource.id} --finding-types Backdoor:EC2/DenialOfService.Tcp"
[ ] aws_guardduty_member - (Revisit the test queries)
Describe the bug A clear and concise description of what the bug is.
Look into following integration test to rectify continuous failures
Note: Update AWS CLI version 2
[ ] aws_auditmanager_assessment -- (Check the CLI command update)
[ ] aws_auditmanager_framework --
[ ] aws_dms_replication_instance -- The required role is not set properly
[ ] aws_ec2_launch_template -- Probable TF fix
[ ] aws_eks_addon_version
[ ] aws_elastic_beanstalk_environment -- Error: creating Elastic Beanstalk Environment (turbottest58694): InvalidParameterValue: No Solution Stack named '64bit Amazon Linux 2 v3.6.3 running Go 1' found. status code: 400, request id: 703adfdb-9338-491d-b074-47ff6577cdb8. with aws_elastic_beanstalk_environment.named_test_resource, on variables.tf line 136,
[ ] aws_glue_crawler -- (TF change to check to provide IAM role permission)
Error: creating Glue Crawler (turbottest51441): InvalidInputException: User: arn:aws:sts::260848201234:assumed-role/turbottest51441/AWS-Crawler is not authorized to perform: dynamodb:DescribeTable on resource: arn:aws:dynamodb:us-east-1:260848201234:table/turbottest51441 because no identity-based policy allows the dynamodb:DescribeTable action (Service: AmazonDynamoDBv2; Status Code: 400; Error Code: AccessDeniedException; Request ID: LLLKVRVK6IR4DGOE83B18HK5CFVV4KQNSO5AEMVJF66Q9ASUAAJG; Proxy: null)
[ ] aws_guardduty_finding - (CLI Update + TF change)
[ ] aws_guardduty_member - (Revisit the test queries)
[ ] aws_iam_access_advisor -- (TF Change)
[ ] aws_organizations_account
[ ] aws_rds_db_cluster -- Revisit the TF & queries (test-get-query.sql & test-hydrate-query.sql) innodb_buffer_pool_load_now parameter
Steampipe version (
steampipe -v
) Example: v0.3.0Plugin version (
steampipe plugin list
) Example: v0.5.0To reproduce Steps to reproduce the behavior (please include relevant code and/or commands).
Expected behavior A clear and concise description of what you expected to happen.
Additional context Add any other context about the problem here.