Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion codebundles/aws-cloudwatch-overused-ec2/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check For Overutilized Ec2 Instances
[Documentation] Fetches CloudWatch metrics for a list of EC2 instances and raises issues if they're over-utilized based on a configurable threshold.
[Tags] cloudwatch metrics ec2 utilization
[Tags] cloudwatch metrics ec2 utilization data:config
${now}= RW.CLI.String To Datetime 0h
${past_time}= RW.CLI.String To Datetime 3h
${util_metrics}= RW.CLI.Run Cli
Expand Down Expand Up @@ -92,3 +92,4 @@ Suite Initialization
Set Suite Variable
... ${AWS_ASSUME_ROLE_CMD}
... role_json=$(AWS_ACCESS_KEY_ID=$${aws_access_key_id.key} AWS_SECRET_ACCESS_KEY=$${aws_secret_access_key.key} AWS_DEFAULT_REGION=${AWS_DEFAULT_REGION} aws sts assume-role --role-arn $${aws_role_arn.key} --role-session-name ${aws_assume_role_name.key}) && AWS_DEFAULT_REGION=${AWS_DEFAULT_REGION} AWS_ACCESS_KEY_ID=$(echo $role_json | jq -r '.Credentials.AccessKeyId') AWS_SECRET_ACCESS_KEY=$(echo $role_json | jq -r '.Credentials.SecretAccessKey') AWS_SESSION_TOKEN=$(echo $role_json | jq -r '.Credentials.SessionToken')

6 changes: 3 additions & 3 deletions codebundles/aws-eks-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check EKS Fargate Cluster Health Status in AWS Region `${AWS_REGION}`
[Documentation] This script checks the health status of an Amazon EKS Fargate cluster.
[Tags] EKS Fargate Cluster Health AWS Kubernetes Pods Nodes access:read-only
[Tags] EKS Fargate Cluster Health AWS Kubernetes Pods Nodes access:read-only data:config
${process}= RW.CLI.Run Bash File check_eks_fargate_cluster_health_status.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand All @@ -37,7 +37,7 @@ Check EKS Fargate Cluster Health Status in AWS Region `${AWS_REGION}`

Check Amazon EKS Cluster Health Status in AWS Region `${AWS_REGION}`
[Documentation] This script checks the health status of an Amazon EKS cluster.
[Tags] EKS Cluster Health AWS Kubernetes Pods Nodes access:read-only
[Tags] EKS Cluster Health AWS Kubernetes Pods Nodes access:read-only data:config
${process}= RW.CLI.Run Bash File check_eks_cluster_health.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand All @@ -56,7 +56,7 @@ Check Amazon EKS Cluster Health Status in AWS Region `${AWS_REGION}`

Monitor EKS Cluster Health in AWS Region `${AWS_REGION}`
[Documentation] This bash script is designed to monitor the health and status of an Amazon EKS cluster.
[Tags] AWS EKS Fargate Bash Script Node Health access:read-only
[Tags] AWS EKS Fargate Bash Script Node Health access:read-only data:config
${process}= RW.CLI.Run Bash File list_eks_fargate_metrics.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down
3 changes: 2 additions & 1 deletion codebundles/aws-eks-health/sli.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check Amazon EKS Cluster Health Status in AWS Region `${AWS_REGION}`
[Documentation] This script checks the health status of an Amazon EKS cluster.
[Tags] EKS Cluster Health AWS Kubernetes Pods Nodes
[Tags] EKS Cluster Health AWS Kubernetes Pods Nodes data:config
${process}= RW.CLI.Run Bash File check_eks_cluster_health.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down Expand Up @@ -60,3 +60,4 @@ Suite Initialization
... &{env}
... AWS_REGION=${AWS_REGION}


3 changes: 2 additions & 1 deletion codebundles/aws-eks-node-reboot/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check EKS Nodegroup Status in `${EKS_CLUSTER_NAME}`
[Documentation] Performs a check on a given cluster's nodegroup, raising an issue if the status of the nodegroup is not healthy.
[Tags] aws eks node group status access:read-only
[Tags] aws eks node group status access:read-only data:config
${node_state}= RW.CLI.Run Cli
... cmd=${AWS_ASSUME_ROLE_CMD} aws eks describe-nodegroup --cluster-name ${EKS_CLUSTER_NAME} --nodegroup-name ${EKS_NODEGROUP} --output json
... target_service=${AWS_SERVICE}
Expand Down Expand Up @@ -98,3 +98,4 @@ Suite Initialization
Set Suite Variable
... ${AWS_ASSUME_ROLE_CMD}
... role_json=$(AWS_ACCESS_KEY_ID=$${aws_access_key_id.key} AWS_SECRET_ACCESS_KEY=$${aws_secret_access_key.key} AWS_DEFAULT_REGION=${AWS_DEFAULT_REGION} aws sts assume-role --role-arn $${aws_role_arn.key} --role-session-name $${aws_assume_role_name.key}) && AWS_DEFAULT_REGION=${AWS_DEFAULT_REGION} AWS_ACCESS_KEY_ID=$(echo $role_json | jq -r '.Credentials.AccessKeyId') AWS_SECRET_ACCESS_KEY=$(echo $role_json | jq -r '.Credentials.SecretAccessKey') AWS_SESSION_TOKEN=$(echo $role_json | jq -r '.Credentials.SessionToken')

3 changes: 2 additions & 1 deletion codebundles/aws-elasticache-redis-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Scan AWS Elasticache Redis Status in AWS Region `${AWS_REGION}`
[Documentation] Checks the high level metrics and status of the elasticache redis instances in the region.
[Tags] AWS Elasticache configuration endpoint configuration access:read-only
[Tags] AWS Elasticache configuration endpoint configuration access:read-only data:config
${process}= RW.CLI.Run Bash File analyze_aws_elasticache_redis_metrics.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down Expand Up @@ -73,3 +73,4 @@ Suite Initialization
Set Suite Variable
... &{env}
... AWS_REGION=${AWS_REGION}

2 changes: 1 addition & 1 deletion codebundles/aws-elasticache-redis-health/sli.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Scan ElastiCaches in AWS Region `${AWS_REGION}`
[Documentation] Performs a broad health scan of all Elasticache instances in the region.
[Tags] bash script AWS Elasticache Health
[Tags] bash script AWS Elasticache Health data:config
${process}= RW.CLI.Run Bash File redis_status_scan.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down
7 changes: 4 additions & 3 deletions codebundles/aws-lambda-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
List Lambda Versions and Runtimes in AWS Region `${AWS_REGION}`
[Documentation] This script is designed to list all the versions and runtimes of a specified AWS Lambda function.
[Tags] AWS Lambda Versions Runtimes access:read-only
[Tags] AWS Lambda Versions Runtimes access:read-only data:config
${process}= RW.CLI.Run Bash File list_lambda_runtimes.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand All @@ -28,7 +28,7 @@ List Lambda Versions and Runtimes in AWS Region `${AWS_REGION}`

Analyze AWS Lambda Invocation Errors in Region `${AWS_REGION}`
[Documentation] This bash script is designed to analyze AWS Lambda Invocation Errors for a specified function within a specified region.
[Tags] AWS Lambda Error Analysis Invocation Errors CloudWatch Logs access:read-only
[Tags] AWS Lambda Error Analysis Invocation Errors CloudWatch Logs access:read-only data:logs-regexp
${process}= RW.CLI.Run Bash File analyze_lambda_invocation_errors.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand All @@ -47,7 +47,7 @@ Analyze AWS Lambda Invocation Errors in Region `${AWS_REGION}`

Monitor AWS Lambda Performance Metrics in AWS Region `${AWS_REGION}`
[Documentation] This script is a bash utility for AWS Lambda functions the lists their notable metrics.
[Tags] AWS Lambda CloudWatch Logs Metrics access:read-only
[Tags] AWS Lambda CloudWatch Logs Metrics access:read-only data:config
${process}= RW.CLI.Run Bash File monitor_aws_lambda_performance_metrics.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down Expand Up @@ -84,3 +84,4 @@ Suite Initialization
Set Suite Variable
... &{env}
... AWS_REGION=${AWS_REGION}

3 changes: 2 additions & 1 deletion codebundles/aws-lambda-health/sli.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Analyze AWS Lambda Invocation Errors in Region `${AWS_REGION}`
[Documentation] This bash script is designed to analyze AWS Lambda Invocation Errors for a specified function within a specified region.
[Tags] AWS Lambda Error Analysis Invocation Errors CloudWatch Logs
[Tags] AWS Lambda Error Analysis Invocation Errors CloudWatch Logs data:logs-regexp
${process}= RW.CLI.Run Bash File analyze_lambda_invocation_errors.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down Expand Up @@ -59,3 +59,4 @@ Suite Initialization
Set Suite Variable
... &{env}
... AWS_REGION=${AWS_REGION}

2 changes: 1 addition & 1 deletion codebundles/aws-s3-bucket-storage-report/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check AWS S3 Bucket Storage Utilization
[Documentation] This script checks and displays the storage utilization of a specified AWS S3 bucket. It uses the AWS CLI to list all objects in the bucket recursively, displaying the results in a human-readable format and providing a summary of the total storage used.
[Tags] Amazon Web Services AWS S3
[Tags] Amazon Web Services AWS S3 data:config
${process}= RW.CLI.Run Bash File check_aws_s3_bucket_storage_utilization.sh
... env=${env}
... secret__AWS_ACCESS_KEY_ID=${AWS_ACCESS_KEY_ID}
Expand Down
17 changes: 9 additions & 8 deletions codebundles/azure-acr-health/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Suite Setup Suite Initialization

Check Network Configuration for ACR `${ACR_NAME}` In Resource Group `${AZ_RESOURCE_GROUP}`
[Documentation] Analyze network access rules, private endpoints, firewall settings, and connectivity.
[Tags] access:read-only ACR Azure Network Security Connectivity
[Tags] access:read-only ACR Azure Network Security Connectivity data:config
${network_config}= RW.CLI.Run Bash File
... bash_file=acr_network_config.sh
... env=${env}
Expand Down Expand Up @@ -54,7 +54,7 @@ Check Network Configuration for ACR `${ACR_NAME}` In Resource Group `${AZ_RESOUR

Check DNS & TLS Reachability for Registry `${ACR_NAME}`
[Documentation] Verifies DNS resolution and HTTPS/TLS for ACR endpoint.
[Tags] access:read-only ACR Azure DNS TLS Connectivity Health
[Tags] access:read-only ACR Azure DNS TLS Connectivity Health data:config
${dns_tls}= RW.CLI.Run Bash File
... bash_file=acr_reachability.sh
... env=${env}
Expand All @@ -79,7 +79,7 @@ Check DNS & TLS Reachability for Registry `${ACR_NAME}`

Check ACR Login & Authentication for Registry `${ACR_NAME}`
[Documentation] Attempts az acr login and docker login using intended workload identity.
[Tags] access:read-only ACR Azure Login Auth Connectivity Health
[Tags] access:read-only ACR Azure Login Auth Connectivity Health data:config
${login}= RW.CLI.Run Bash File
... bash_file=acr_authentication.sh
... env=${env}
Expand Down Expand Up @@ -113,7 +113,7 @@ Check ACR Login & Authentication for Registry `${ACR_NAME}`

Check ACR SKU and Usage Metrics for Registry `${ACR_NAME}`
[Documentation] Analyzes ACR SKU configuration, usage limits, and provides recommendations.
[Tags] access:read-only ACR Azure SKU Usage Health
[Tags] access:read-only ACR Azure SKU Usage Health data:config
${sku_usage}= RW.CLI.Run Bash File
... bash_file=acr_usage_sku.sh
... env=${env}
Expand Down Expand Up @@ -147,7 +147,7 @@ Check ACR SKU and Usage Metrics for Registry `${ACR_NAME}`

Check ACR Storage Utilization for Registry `${ACR_NAME}`
[Documentation] Comprehensive analysis of ACR storage usage, repository sizes, and cleanup recommendations.
[Tags] access:read-only ACR Azure Storage Utilization Health
[Tags] access:read-only ACR Azure Storage Utilization Health data:config
${storage_util}= RW.CLI.Run Bash File
... bash_file=acr_storage_utilization.sh
... env=${env}
Expand Down Expand Up @@ -183,7 +183,7 @@ Check ACR Storage Utilization for Registry `${ACR_NAME}`

Analyze ACR Pull/Push Success Ratio for Registry `${ACR_NAME}`
[Documentation] Analyzes pull and push operation success rates using Azure Monitor metrics and Log Analytics.
[Tags] access:read-only ACR Azure Pull Push Metrics Health
[Tags] access:read-only ACR Azure Pull Push Metrics Health data:config
${pull_push_ratio}= RW.CLI.Run Bash File
... bash_file=acr_pull_push_ratio.sh
... env=${env}
Expand Down Expand Up @@ -220,7 +220,7 @@ Analyze ACR Pull/Push Success Ratio for Registry `${ACR_NAME}`

Check ACR Repository Event Failures for Registry `${ACR_NAME}`
[Documentation] Queries Log Analytics for recent failed pushes/pulls and repo errors.
[Tags] access:read-only ACR Azure Events Health
[Tags] access:read-only ACR Azure Events Health data:logs-regexp
${repo_events}= RW.CLI.Run Bash File
... bash_file=acr_events.sh
... env=${env}
Expand All @@ -247,7 +247,7 @@ Check ACR Security Configuration and RBAC for Registry `${ACR_NAME}`
[Documentation] Comprehensive security analysis of ACR including RBAC assignments, admin user status,
... network access rules, private endpoints, and authentication methods. Identifies security
... misconfigurations and provides recommendations for hardening the registry.
[Tags] acr security rbac authentication network
[Tags] acr security rbac authentication network data:config
${security_analysis}= RW.CLI.Run Bash File
... bash_file=acr_rbac_security.sh
... env=${env}
Expand Down Expand Up @@ -327,3 +327,4 @@ Suite Initialization
RW.CLI.Run Cli
... cmd=az account set --subscription ${AZURE_SUBSCRIPTION_ID}
... include_in_history=false

12 changes: 6 additions & 6 deletions codebundles/azure-acr-health/sli.robot
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Check ACR Reachability for Registry `${ACR_NAME}`
[Documentation] Checks if the ACR endpoint is reachable.
[Tags] ACR Azure Reachability Health
[Tags] ACR Azure Reachability Health data:config
${reachability}= RW.CLI.Run Bash File
... bash_file=acr_reachability.sh
... env=${env}
Expand All @@ -36,7 +36,7 @@ Check ACR Reachability for Registry `${ACR_NAME}`

Check ACR Usage SKU Metric for Registry `${ACR_NAME}`
[Documentation] Checks the SKU and usage limits for the ACR.
[Tags] ACR Azure SKU Health
[Tags] ACR Azure SKU Health data:config
${sku}= RW.CLI.Run Bash File
... bash_file=acr_usage_sku.sh
... env=${env}
Expand All @@ -54,7 +54,7 @@ Check ACR Usage SKU Metric for Registry `${ACR_NAME}`

Check ACR Pull/Push Success Ratio for Registry `${ACR_NAME}`
[Documentation] Checks the success rate of image pull and push operations.
[Tags] ACR Azure PullPush Health
[Tags] ACR Azure PullPush Health data:config
${ratio}= RW.CLI.Run Bash File
... bash_file=acr_pull_push_ratio.sh
... env=${env}
Expand All @@ -72,7 +72,7 @@ Check ACR Pull/Push Success Ratio for Registry `${ACR_NAME}`

Check ACR Storage Utilization for Registry `${ACR_NAME}`
[Documentation] Checks the storage usage of the ACR.
[Tags] ACR Azure Storage Health
[Tags] ACR Azure Storage Health data:config
${storage}= RW.CLI.Run Bash File
... bash_file=acr_storage_utilization.sh
... env=${env}
Expand All @@ -95,7 +95,7 @@ Check ACR Storage Utilization for Registry `${ACR_NAME}`

Check ACR Network Configuration for Registry `${ACR_NAME}`
[Documentation] Checks network access rules, private endpoints, and connectivity.
[Tags] ACR Azure Network Health
[Tags] ACR Azure Network Health data:config
${network}= RW.CLI.Run Bash File
... bash_file=acr_network_config.sh
... env=${env}
Expand All @@ -120,7 +120,7 @@ Check ACR Network Configuration for Registry `${ACR_NAME}`

Check ACR Security Configuration
[Documentation] Analyzes ACR security configuration including RBAC, admin user settings, network access, and authentication methods.
[Tags] ACR Azure Security RBAC SLI
[Tags] ACR Azure Security RBAC SLI data:config

TRY
${security_result}= RW.CLI.Run Bash File
Expand Down
2 changes: 1 addition & 1 deletion codebundles/azure-acr-image-sync/runbook.robot
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Suite Setup Suite Initialization
*** Tasks ***
Sync Container Images into Azure Container Registry `${ACR_REGISTRY}`
[Documentation] Synchronizes the latest container images into an ACR repository
[Tags] azure acr registry runwhen
[Tags] azure acr registry runwhen data:config
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Operational sync task incorrectly tagged as data collection

Low Severity

The Sync Container Images into Azure Container Registry task is tagged with data:config, but it's an operational task that modifies state by synchronizing/pushing container images into ACR. The PR's own tagging rules state that operational tasks which modify state (rather than collecting data) are excluded from data tagging. This task's documentation explicitly says it "Synchronizes the latest container images into an ACR repository," which is a write operation, not a data collection task.

Fix in Cursor Fix in Web

${az_acr_image_sync}= RW.CLI.Run Bash File
... bash_file=acr_sync_images.sh
... env=${env}
Expand Down
2 changes: 1 addition & 1 deletion codebundles/azure-acr-image-sync/sli.robot
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ Import Docker Secrets
*** Tasks ***
Count Outdated Images in Azure Container Registry `${ACR_REGISTRY}`
[Documentation] Counts the number of images that need updating in ACR from the upstream source.
[Tags] azure acr registry runwhen
[Tags] azure acr registry runwhen data:config
${az_acr_image_check}= RW.CLI.Run Bash File
... bash_file=check_for_image_updates.sh
... env=${env}
Expand Down
Loading