Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TM-720: remove ssm command monitoring from nomis #8764

Merged
merged 1 commit into from
Nov 22, 2024

Conversation

drobinson-moj
Copy link
Contributor

Removing this monitoring - going to add via baseline across all accounts

@drobinson-moj drobinson-moj requested review from a team as code owners November 22, 2024 15:49
@github-actions github-actions bot added the environments-repository Used to exclude PRs from this repo in our Slack PR update label Nov 22, 2024
Copy link
Contributor

Trivy Scan Success

Show Output ```hcl

Trivy will check the following folders:
terraform/environments/analytical-platform-compute
terraform/environments/nomis


Running Trivy in terraform/environments/analytical-platform-compute
2024-11-22T15:52:19Z INFO [vulndb] Need to update DB
2024-11-22T15:52:19Z INFO [vulndb] Downloading vulnerability DB...
2024-11-22T15:52:19Z INFO [vulndb] Downloading artifact... repo="public.ecr.aws/aquasecurity/trivy-db:2"
2024-11-22T15:52:21Z INFO [vulndb] Artifact successfully downloaded repo="public.ecr.aws/aquasecurity/trivy-db:2"
2024-11-22T15:52:21Z INFO [vuln] Vulnerability scanning is enabled
2024-11-22T15:52:21Z INFO [misconfig] Misconfiguration scanning is enabled
2024-11-22T15:52:21Z INFO [misconfig] Need to update the built-in checks
2024-11-22T15:52:21Z INFO [misconfig] Downloading the built-in checks...
160.25 KiB / 160.25 KiB [------------------------------------------------------] 100.00% ? p/s 100ms2024-11-22T15:52:21Z INFO [secret] Secret scanning is enabled
2024-11-22T15:52:21Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-22T15:52:21Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-22T15:52:22Z INFO [terraform scanner] Scanning root module file_path="."
2024-11-22T15:52:22Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2024-11-22T15:52:22Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.transit_gateway_routes" value="cty.NilVal"
2024-11-22T15:52:27Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.eks.aws_ec2_tag.cluster_primary_security_group" value="cty.NilVal"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="2 errors occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="2 errors occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.eks.module.eks_managed_node_group["general"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["general"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["general"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks_cluster_logs_kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement.content.dynamic.condition block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks_cluster_logs_kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement.content.dynamic.condition block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["airflow-high-memory"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.eks.module.eks_managed_node_group["general"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["general"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.eks.module.eks_managed_node_group["general"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:29Z INFO [terraform executor] Ignore finding rule="aws-ec2-no-public-egress-sgr" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/node_groups.tf:247"
2024-11-22T15:52:29Z INFO [terraform executor] Ignore finding rule="aws-eks-no-public-cluster-access-to-cidr" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/main.tf:52"
2024-11-22T15:52:29Z INFO [terraform executor] Ignore finding rule="aws-eks-no-public-cluster-access" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/main.tf:51"
2024-11-22T15:52:31Z INFO Number of language-specific files num=0
2024-11-22T15:52:31Z INFO Detected config files num=14
trivy_exitcode=0


Running Trivy in terraform/environments/nomis
2024-11-22T15:52:31Z INFO [vuln] Vulnerability scanning is enabled
2024-11-22T15:52:31Z INFO [misconfig] Misconfiguration scanning is enabled
2024-11-22T15:52:31Z INFO [secret] Secret scanning is enabled
2024-11-22T15:52:31Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-22T15:52:31Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-22T15:52:33Z INFO [terraform scanner] Scanning root module file_path="."
2024-11-22T15:52:33Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_backup_plan.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_backup_selection.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_cloudwatch_log_group.route53" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_cloudwatch_log_group.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_cloudwatch_log_metric_filter.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_cloudwatch_metric_alarm.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_iam_policy.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_iam_role.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_iam_service_linked_role.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_key_pair.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_kms_grant.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_lb_target_group.instance" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_lb_target_group_attachment.instance" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_oam_link.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_oam_sink.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_oam_sink_policy.monitoring_account_oam_sink_policy" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_query_log.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_record.core_network_services" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_record.core_vpc" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_record.self" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_resolver_endpoint.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_resolver_rule.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_resolver_rule_association.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_route53_zone.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_secretsmanager_secret.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_secretsmanager_secret_version.fixed" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_security_group.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_security_group_rule.route53_resolver" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_security_group_rule.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_sns_topic.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_sns_topic_subscription.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_ssm_association.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_ssm_document.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_ssm_parameter.fixed" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.aws_ssm_parameter.placeholder" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.data.aws_iam_policy_document.assume_role" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.data.aws_iam_policy_document.secretsmanager_secret_policy" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.data.aws_iam_policy_document.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.acm_certificate" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.cloudwatch_dashboard" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.ec2_autoscaling_group" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.ec2_instance" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.efs" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.fsx_windows" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.lb" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.lb_listener" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.s3_bucket" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.random_password.secrets" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.random_password.this" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.bastion_linux[0].aws_s3_object.user_public_keys" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.bastion_linux[0].data.aws_subnet.local_account" value="cty.NilVal"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:33Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.environment.data.aws_route53_zone.core_network_services" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.environment.data.aws_route53_zone.core_vpc" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.environment.data.aws_subnet.this" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.environment.data.aws_subnets.this" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.bastion_linux[0].aws_s3_object.user_public_keys" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.baseline.module.bastion_linux[0].data.aws_subnet.local_account" value="cty.NilVal"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z ERROR [terraform evaluator] Failed to expand dynamic block. block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:36Z INFO [terraform executor] Ignore finding rule="aws-s3-encryption-customer-key" range="github.com/ministryofjustice/modernisation-platform-terraform-bastion-linux?ref=836db079348a2b40d59bd9cb953111e8ad61aec1/github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=7b2b75c178f855d8c48d3bda4ac53df782288c02/main.tf:141-151"
2024-11-22T15:52:36Z INFO [terraform executor] Ignore finding rule="aws-s3-encryption-customer-key" range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v8.1.0/main.tf:150-160"
2024-11-22T15:52:36Z INFO Number of language-specific files num=0
2024-11-22T15:52:36Z INFO Detected config files num=3
trivy_exitcode=0

</details> #### `Checkov Scan` Failed
<details><summary>Show Output</summary>

```hcl

*****************************

Checkov will check the following folders:
terraform/environments/analytical-platform-compute
terraform/environments/nomis

*****************************

Running Checkov in terraform/environments/analytical-platform-compute
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
2024-11-22 15:52:38,970 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/cloudwatch/aws//modules/log-group:5.6.1 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,970 [MainThread  ] [WARNI]  Failed to download module ministryofjustice/observability-platform-tenant/aws:1.2.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,970 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/eks/aws:20.29.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,970 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/eks/aws//modules/karpenter:20.29.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,970 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/kms/aws:3.1.1 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/route53/aws//modules/zones:4.1.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/secrets-manager/aws:1.3.1 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/s3-bucket/aws:4.2.2 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/rds/aws:6.10.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/vpc/aws//modules/vpc-endpoints:5.15.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/eks-pod-identity/aws:1.7.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,971 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/vpc/aws:5.15.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/managed-service-prometheus/aws:3.0.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks:5.48.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/iam/aws//modules/iam-github-oidc-role:5.48.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/iam/aws//modules/iam-assumable-role:5.48.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/security-group/aws:5.2.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:38,972 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/iam/aws//modules/iam-policy:5.48.0 (for external modules, the --download-external-modules flag is required)
2024-11-22 15:52:40,936 [MainThread  ] [WARNI]  Failed updating attribute for key: zones.${local.environment_configuration.route53_zone} and value {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'} forvertex attributes {'__end_line__': 16, '__resolved__': [], '__start_line__': 1, 'source': ['terraform-aws-modules/route53/aws//modules/zones'], 'tags': ['${merge(jsondecode(data.http.environments_file.response_body).tags,{\'is-production\': ${substr(terraform.workspace,length(analytical-platform-compute),length(terraform.workspace)) == "-production"}},{\'environment-name\': \'${terraform.workspace}\'},{\'source-code\': \'https://github.com/ministryofjustice/modernisation-platform-environments\'})}'], 'version': ['4.1.0'], 'zones': {'${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}}, 'zones.${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}, 'zones.${local.environment_configuration.route53_zone}.comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}. Falling back to explicitly setting it.Exception - Parse error at 1:7 near token $ ($)
2024-11-22 15:52:41,184 [MainThread  ] [WARNI]  Failed updating attribute for key: zones.${local.environment_configuration.route53_zone} and value {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'} forvertex attributes {'__end_line__': 16, '__resolved__': [], '__start_line__': 1, 'source': ['terraform-aws-modules/route53/aws//modules/zones'], 'tags': ['${merge(jsondecode(data.http.environments_file.response_body).tags,{\'is-production\': ${substr(terraform.workspace,length(analytical-platform-compute),length(terraform.workspace)) == "-production"}},{\'environment-name\': \'${terraform.workspace}\'},{\'source-code\': \'https://github.com/ministryofjustice/modernisation-platform-environments\'})}'], 'version': ['4.1.0'], 'zones': {'${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}}, 'zones.${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}, 'zones.${local.environment_configuration.route53_zone}.comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}. Falling back to explicitly setting it.Exception - Parse error at 1:7 near token $ ($)
2024-11-22 15:52:41,323 [MainThread  ] [WARNI]  Failed updating attribute for key: zones.${local.environment_configuration.route53_zone} and value {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'} forvertex attributes {'__end_line__': 16, '__resolved__': [], '__start_line__': 1, 'source': ['terraform-aws-modules/route53/aws//modules/zones'], 'tags': ['${merge(jsondecode(data.http.environments_file.response_body).tags,{\'is-production\': ${substr(terraform.workspace,length(analytical-platform-compute),length(terraform.workspace)) == "-production"}},{\'environment-name\': \'${terraform.workspace}\'},{\'source-code\': \'https://github.com/ministryofjustice/modernisation-platform-environments\'})}'], 'version': ['4.1.0'], 'zones': {'${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}}, 'zones.${local.environment_configuration.route53_zone}': {'comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}, 'zones.${local.environment_configuration.route53_zone}.comment': '${trimprefix(terraform.workspace,"${var.networking[0].application}-")}_configurations[${trimprefix(terraform.workspace,"${var.networking[0].application}-")}]'}. Falling back to explicitly setting it.Exception - Parse error at 1:7 near token $ ($)
terraform scan results:

Passed checks: 144, Failed checks: 0, Skipped checks: 148


checkov_exitcode=0

*****************************

Running Checkov in terraform/environments/nomis
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
2024-11-22 15:52:48,176 [MainThread  ] [WARNI]  Failed updating attribute for key: secretsmanager_secrets./ec2/.ssh and value {'recovery_window_in_days': 7} forvertex attributes {'secretsmanager_secrets': {'/ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}}, 'secretsmanager_secrets./ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}, 'secretsmanager_secrets./ec2/.ssh.recovery_window_in_days': 7, 'secretsmanager_secrets./ec2/.ssh.secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user': {'description': 'Private key for ec2-user key pair'}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user.description': 'Private key for ec2-user key pair'}. Falling back to explicitly setting it.Exception - Parse error at 1:24 near token / (SORT_DIRECTION)
2024-11-22 15:52:49,982 [MainThread  ] [WARNI]  Failed updating attribute for key: ssm_parameters./oam and value {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'} forvertex attributes {'ssm_parameters': {'/azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, '/oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}}, 'ssm_parameters./azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, 'ssm_parameters./azure.parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}, 'ssm_parameters./azure.parameters.sas_token': {'description': 'database backup storage account read-only sas token'}, 'ssm_parameters./azure.parameters.sas_token.description': 'database backup storage account read-only sas token', 'ssm_parameters./oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'ssm_parameters./oam.parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}', 'ssm_parameters.account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'ssm_parameters.account.parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'ssm_parameters.account.parameters.ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}, 'ssm_parameters.account.parameters.ids.description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'ssm_parameters.account.parameters.ids.value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})', 'ssm_parameters.account.postfix': '_', 'ssm_parameters.cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}, 'ssm_parameters.cloud-watch-config.parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'ssm_parameters.cloud-watch-config.parameters.windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}, 'ssm_parameters.cloud-watch-config.parameters.windows.description': 'cloud watch agent config for windows managed by baseline module', 'ssm_parameters.cloud-watch-config.parameters.windows.file': './templates/cloud_watch_windows.json', 'ssm_parameters.cloud-watch-config.parameters.windows.type': 'String', 'ssm_parameters.cloud-watch-config.postfix': '-'}. Falling back to explicitly setting it.Exception - Parse error at 1:16 near token / (SORT_DIRECTION)
2024-11-22 15:52:54,455 [MainThread  ] [WARNI]  Failed updating attribute for key: secretsmanager_secrets./ec2/.ssh and value {'recovery_window_in_days': 7} forvertex attributes {'secretsmanager_secrets': {'/ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}}, 'secretsmanager_secrets./ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}, 'secretsmanager_secrets./ec2/.ssh.recovery_window_in_days': 7, 'secretsmanager_secrets./ec2/.ssh.secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user': {'description': 'Private key for ec2-user key pair'}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user.description': 'Private key for ec2-user key pair'}. Falling back to explicitly setting it.Exception - Parse error at 1:24 near token / (SORT_DIRECTION)
2024-11-22 15:52:54,549 [MainThread  ] [WARNI]  Failed updating attribute for key: ssm_parameters./oam and value {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'} forvertex attributes {'ssm_parameters': {'/azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, '/oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}}, 'ssm_parameters./azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, 'ssm_parameters./azure.parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}, 'ssm_parameters./azure.parameters.sas_token': {'description': 'database backup storage account read-only sas token'}, 'ssm_parameters./azure.parameters.sas_token.description': 'database backup storage account read-only sas token', 'ssm_parameters./oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'ssm_parameters./oam.parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}', 'ssm_parameters.account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'ssm_parameters.account.parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'ssm_parameters.account.parameters.ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}, 'ssm_parameters.account.parameters.ids.description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'ssm_parameters.account.parameters.ids.value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})', 'ssm_parameters.account.postfix': '_', 'ssm_parameters.cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}, 'ssm_parameters.cloud-watch-config.parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'ssm_parameters.cloud-watch-config.parameters.windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}, 'ssm_parameters.cloud-watch-config.parameters.windows.description': 'cloud watch agent config for windows managed by baseline module', 'ssm_parameters.cloud-watch-config.parameters.windows.file': './templates/cloud_watch_windows.json', 'ssm_parameters.cloud-watch-config.parameters.windows.type': 'String', 'ssm_parameters.cloud-watch-config.postfix': '-'}. Falling back to explicitly setting it.Exception - Parse error at 1:16 near token / (SORT_DIRECTION)
2024-11-22 15:52:56,239 [MainThread  ] [WARNI]  Failed updating attribute for key: secretsmanager_secrets./ec2/.ssh and value {'recovery_window_in_days': 7} forvertex attributes {'secretsmanager_secrets': {'/ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}}, 'secretsmanager_secrets./ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}, 'secretsmanager_secrets./ec2/.ssh.recovery_window_in_days': 7, 'secretsmanager_secrets./ec2/.ssh.secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user': {'description': 'Private key for ec2-user key pair'}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user.description': 'Private key for ec2-user key pair'}. Falling back to explicitly setting it.Exception - Parse error at 1:24 near token / (SORT_DIRECTION)
2024-11-22 15:52:56,331 [MainThread  ] [WARNI]  Failed updating attribute for key: ssm_parameters./oam and value {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'} forvertex attributes {'ssm_parameters': {'/azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, '/oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}}, 'ssm_parameters./azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, 'ssm_parameters./azure.parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}, 'ssm_parameters./azure.parameters.sas_token': {'description': 'database backup storage account read-only sas token'}, 'ssm_parameters./azure.parameters.sas_token.description': 'database backup storage account read-only sas token', 'ssm_parameters./oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'ssm_parameters./oam.parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}', 'ssm_parameters.account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'ssm_parameters.account.parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'ssm_parameters.account.parameters.ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}, 'ssm_parameters.account.parameters.ids.description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'ssm_parameters.account.parameters.ids.value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})', 'ssm_parameters.account.postfix': '_', 'ssm_parameters.cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}, 'ssm_parameters.cloud-watch-config.parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'ssm_parameters.cloud-watch-config.parameters.windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}, 'ssm_parameters.cloud-watch-config.parameters.windows.description': 'cloud watch agent config for windows managed by baseline module', 'ssm_parameters.cloud-watch-config.parameters.windows.file': './templates/cloud_watch_windows.json', 'ssm_parameters.cloud-watch-config.parameters.windows.type': 'String', 'ssm_parameters.cloud-watch-config.postfix': '-'}. Falling back to explicitly setting it.Exception - Parse error at 1:16 near token / (SORT_DIRECTION)
2024-11-22 15:52:58,037 [MainThread  ] [WARNI]  Failed updating attribute for key: secretsmanager_secrets./ec2/.ssh and value {'recovery_window_in_days': 7} forvertex attributes {'secretsmanager_secrets': {'/ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}}, 'secretsmanager_secrets./ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}, 'secretsmanager_secrets./ec2/.ssh.recovery_window_in_days': 7, 'secretsmanager_secrets./ec2/.ssh.secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user': {'description': 'Private key for ec2-user key pair'}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user.description': 'Private key for ec2-user key pair'}. Falling back to explicitly setting it.Exception - Parse error at 1:24 near token / (SORT_DIRECTION)
2024-11-22 15:52:58,129 [MainThread  ] [WARNI]  Failed updating attribute for key: ssm_parameters./oam and value {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'} forvertex attributes {'ssm_parameters': {'/azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, '/oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}}, 'ssm_parameters./azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, 'ssm_parameters./azure.parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}, 'ssm_parameters./azure.parameters.sas_token': {'description': 'database backup storage account read-only sas token'}, 'ssm_parameters./azure.parameters.sas_token.description': 'database backup storage account read-only sas token', 'ssm_parameters./oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'ssm_parameters./oam.parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}', 'ssm_parameters.account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'ssm_parameters.account.parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'ssm_parameters.account.parameters.ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}, 'ssm_parameters.account.parameters.ids.description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'ssm_parameters.account.parameters.ids.value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})', 'ssm_parameters.account.postfix': '_', 'ssm_parameters.cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}, 'ssm_parameters.cloud-watch-config.parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'ssm_parameters.cloud-watch-config.parameters.windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}, 'ssm_parameters.cloud-watch-config.parameters.windows.description': 'cloud watch agent config for windows managed by baseline module', 'ssm_parameters.cloud-watch-config.parameters.windows.file': './templates/cloud_watch_windows.json', 'ssm_parameters.cloud-watch-config.parameters.windows.type': 'String', 'ssm_parameters.cloud-watch-config.postfix': '-'}. Falling back to explicitly setting it.Exception - Parse error at 1:16 near token / (SORT_DIRECTION)
2024-11-22 15:52:59,816 [MainThread  ] [WARNI]  Failed updating attribute for key: secretsmanager_secrets./ec2/.ssh and value {'recovery_window_in_days': 7} forvertex attributes {'secretsmanager_secrets': {'/ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}}, 'secretsmanager_secrets./ec2/.ssh': {'recovery_window_in_days': 7, 'secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}}, 'secretsmanager_secrets./ec2/.ssh.recovery_window_in_days': 7, 'secretsmanager_secrets./ec2/.ssh.secrets': {'ec2-user': {'description': 'Private key for ec2-user key pair'}}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user': {'description': 'Private key for ec2-user key pair'}, 'secretsmanager_secrets./ec2/.ssh.secrets.ec2-user.description': 'Private key for ec2-user key pair'}. Falling back to explicitly setting it.Exception - Parse error at 1:24 near token / (SORT_DIRECTION)
2024-11-22 15:52:59,910 [MainThread  ] [WARNI]  Failed updating attribute for key: ssm_parameters./oam and value {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'} forvertex attributes {'ssm_parameters': {'/azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, '/oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}}, 'ssm_parameters./azure': {'parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}}, 'ssm_parameters./azure.parameters': {'sas_token': {'description': 'database backup storage account read-only sas token'}}, 'ssm_parameters./azure.parameters.sas_token': {'description': 'database backup storage account read-only sas token'}, 'ssm_parameters./azure.parameters.sas_token.description': 'database backup storage account read-only sas token', 'ssm_parameters./oam': {'parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}'}, 'ssm_parameters./oam.parameters': '{for oam_link in coalesce(${merge({\'cloudwatch_metric_alarms_default_actions\': \'pagerduty\', \'cloudwatch_metric_oam_links\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'cloudwatch_metric_oam_links_ssm_parameters\': \'hmpps-oem-${trimprefix(terraform.workspace,"${var.networking[0].application}-")}\', \'db_backup_bucket_name\': \'nomis-db-backup-bucket\', \'enable_backup_plan_daily_and_weekly\': True, \'enable_business_unit_kms_cmks\': True, \'enable_ec2_cloud_watch_agent\': True, \'enable_ec2_oracle_enterprise_managed_server\': True, \'enable_ec2_self_provision\': True, \'enable_ec2_session_manager_cloudwatch_logs\': True, \'enable_ec2_ssm_agent_update\': True, \'enable_ec2_user_keypair\': True, \'enable_hmpps_domain\': True, \'enable_image_builder\': True, \'enable_s3_bucket\': True, \'enable_s3_db_backup_bucket\': True, \'enable_s3_software_bucket\': True, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': \'azure-fixngo-domain\'}, \'s3_iam_policies\': \'EC2S3BucketWriteAndDeleteAccessPolicy\', \'software_bucket_name\': \'ec2-image-builder-nomis\'},[\'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\', \'\'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-preproduction\'}}}}, \'production\': {\'options\': {\'cloudwatch_log_groups_retention_in_days\': 90, \'route53_resolver_rules\': {\'outbound-data-and-private-subnets\': [\'azure-fixngo-domain\', \'infra-int-domain\']}, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-production\'}}}}, \'test\': {\'options\': {\'enable_observability_platform_monitoring\': True, \'sns_topics\': {\'pagerduty_integrations\': {\'pagerduty\': \'nomis-test\'}}}}}["local.environment"]}"\'])},[]) : oam_link => {\'description\': \'oam sink_identifier to use in aws_oam_link resource\'}}', 'ssm_parameters.account': {'parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'postfix': '_'}, 'ssm_parameters.account.parameters': {'ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}}, 'ssm_parameters.account.parameters.ids': {'description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})'}, 'ssm_parameters.account.parameters.ids.description': 'Selected modernisation platform AWS account IDs managed by baseline module', 'ssm_parameters.account.parameters.ids.value': 'jsonencode({for key , value in ${module.environment} : key :> value if contains(local.account_names_for_account_ids_ssm_parameter,key)})', 'ssm_parameters.account.postfix': '_', 'ssm_parameters.cloud-watch-config': {'parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'postfix': '-'}, 'ssm_parameters.cloud-watch-config.parameters': {'windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}}, 'ssm_parameters.cloud-watch-config.parameters.windows': {'description': 'cloud watch agent config for windows managed by baseline module', 'file': './templates/cloud_watch_windows.json', 'type': 'String'}, 'ssm_parameters.cloud-watch-config.parameters.windows.description': 'cloud watch agent config for windows managed by baseline module', 'ssm_parameters.cloud-watch-config.parameters.windows.file': './templates/cloud_watch_windows.json', 'ssm_parameters.cloud-watch-config.parameters.windows.type': 'String', 'ssm_parameters.cloud-watch-config.postfix': '-'}. Falling back to explicitly setting it.Exception - Parse error at 1:16 near token / (SORT_DIRECTION)
terraform scan results:

Passed checks: 166, Failed checks: 8, Skipped checks: 18

Check: CKV_AWS_115: "Ensure that AWS Lambda function is configured for function-level concurrent execution limit"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-aws-lambda-function-is-configured-for-function-level-concurrent-execution-limit

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_173: "Check encryption settings for Lambda environmental variable"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-serverless-policies/bc-aws-serverless-5

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_116: "Ensure that AWS Lambda function is configured for a Dead Letter Queue(DLQ)"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-aws-lambda-function-is-configured-for-a-dead-letter-queue-dlq

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_50: "X-Ray tracing is enabled for Lambda"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-serverless-policies/bc-aws-serverless-4

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-272

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_117: "Ensure that AWS Lambda function is configured inside a VPC"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_lambda_function.alarm_scheduler
	File: /../../modules/schedule_alarms_lambda/main.tf:8-27
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-aws-lambda-function-is-configured-inside-a-vpc-1

		8  | resource "aws_lambda_function" "alarm_scheduler" {
		9  |   filename         = "${path.module}/lambda/alarm_scheduler.zip"
		10 |   function_name    = var.lambda_function_name
		11 |   architectures    = ["arm64"]
		12 |   role             = aws_iam_role.lambda_exec.arn
		13 |   runtime          = "python3.12"
		14 |   handler          = "alarm_scheduler.lambda_handler"
		15 |   source_code_hash = data.archive_file.lambda_function_payload.output_base64sha256
		16 |   timeout          = 10
		17 | 
		18 |   environment {
		19 |     variables = {
		20 |       LOG_LEVEL       = var.lambda_log_level
		21 |       SPECIFIC_ALARMS = tostring(join(",", var.alarm_list))
		22 |       ALARM_PATTERNS  = tostring(join(",", var.alarm_patterns))
		23 |     }
		24 |   }
		25 | 
		26 |   tags = var.tags
		27 | }

Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_cloudwatch_log_group.execution_logs
	File: /../../modules/schedule_alarms_lambda/main.tf:29-34
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

		29 | resource "aws_cloudwatch_log_group" "execution_logs" {
		30 |   name              = format("/aws/lambda/%s", var.lambda_function_name)
		31 |   retention_in_days = 7
		32 | 
		33 |   tags = var.tags
		34 | }

Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
	FAILED for resource: module.baseline.module.schedule_alarms_lambda.aws_cloudwatch_log_group.execution_logs
	File: /../../modules/schedule_alarms_lambda/main.tf:29-34
	Calling File: /../../modules/baseline/schedule_alarms_lambda.tf:1-20
	Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

		29 | resource "aws_cloudwatch_log_group" "execution_logs" {
		30 |   name              = format("/aws/lambda/%s", var.lambda_function_name)
		31 |   retention_in_days = 7
		32 | 
		33 |   tags = var.tags
		34 | }


checkov_exitcode=1

CTFLint Scan Success

Show Output
*****************************

Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version: 0.9.1)
tflint will check the following folders:
terraform/environments/analytical-platform-compute
terraform/environments/nomis

*****************************

Running tflint in terraform/environments/analytical-platform-compute
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

*****************************

Running tflint in terraform/environments/nomis
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

Trivy Scan Success

Show Output
*****************************

Trivy will check the following folders:
terraform/environments/analytical-platform-compute
terraform/environments/nomis

*****************************

Running Trivy in terraform/environments/analytical-platform-compute
2024-11-22T15:52:19Z	INFO	[vulndb] Need to update DB
2024-11-22T15:52:19Z	INFO	[vulndb] Downloading vulnerability DB...
2024-11-22T15:52:19Z	INFO	[vulndb] Downloading artifact...	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2024-11-22T15:52:21Z	INFO	[vulndb] Artifact successfully downloaded	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2024-11-22T15:52:21Z	INFO	[vuln] Vulnerability scanning is enabled
2024-11-22T15:52:21Z	INFO	[misconfig] Misconfiguration scanning is enabled
2024-11-22T15:52:21Z	INFO	[misconfig] Need to update the built-in checks
2024-11-22T15:52:21Z	INFO	[misconfig] Downloading the built-in checks...
160.25 KiB / 160.25 KiB [------------------------------------------------------] 100.00% ? p/s 100ms2024-11-22T15:52:21Z	INFO	[secret] Secret scanning is enabled
2024-11-22T15:52:21Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-22T15:52:21Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-22T15:52:22Z	INFO	[terraform scanner] Scanning root module	file_path="."
2024-11-22T15:52:22Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2024-11-22T15:52:22Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.transit_gateway_routes" value="cty.NilVal"
2024-11-22T15:52:27Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.eks.aws_ec2_tag.cluster_primary_security_group" value="cty.NilVal"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="2 errors occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="2 errors occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks_cluster_logs_kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement.content.dynamic.condition block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks_cluster_logs_kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement.content.dynamic.condition block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.kms.data.aws_iam_policy_document.this[0]" err="1 error occurred:\n\t* invalid for-each in data.aws_iam_policy_document.this[0].dynamic.statement block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"airflow-high-memory\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:28Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.eks.module.eks_managed_node_group[\"general\"].aws_launch_template.this[0]" err="1 error occurred:\n\t* invalid for-each in aws_launch_template.this[0].dynamic.block_device_mappings block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:29Z	INFO	[terraform executor] Ignore finding	rule="aws-ec2-no-public-egress-sgr" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/node_groups.tf:247"
2024-11-22T15:52:29Z	INFO	[terraform executor] Ignore finding	rule="aws-eks-no-public-cluster-access-to-cidr" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/main.tf:52"
2024-11-22T15:52:29Z	INFO	[terraform executor] Ignore finding	rule="aws-eks-no-public-cluster-access" range="git::https:/github.com/terraform-aws-modules/terraform-aws-eks?ref=97a08c8aff5dbf51a86b4c8cd88a858336cd0208/main.tf:51"
2024-11-22T15:52:31Z	INFO	Number of language-specific files	num=0
2024-11-22T15:52:31Z	INFO	Detected config files	num=14
trivy_exitcode=0

*****************************

Running Trivy in terraform/environments/nomis
2024-11-22T15:52:31Z	INFO	[vuln] Vulnerability scanning is enabled
2024-11-22T15:52:31Z	INFO	[misconfig] Misconfiguration scanning is enabled
2024-11-22T15:52:31Z	INFO	[secret] Secret scanning is enabled
2024-11-22T15:52:31Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-11-22T15:52:31Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2024-11-22T15:52:33Z	INFO	[terraform scanner] Scanning root module	file_path="."
2024-11-22T15:52:33Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_backup_plan.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_backup_selection.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_cloudwatch_log_group.route53" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_cloudwatch_log_group.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_cloudwatch_log_metric_filter.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_cloudwatch_metric_alarm.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_iam_policy.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_iam_role.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_iam_role_policy_attachment.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_iam_service_linked_role.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_key_pair.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_kms_grant.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_lb_target_group.instance" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_lb_target_group_attachment.instance" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_oam_link.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_oam_sink.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_oam_sink_policy.monitoring_account_oam_sink_policy" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_query_log.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_record.core_network_services" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_record.core_vpc" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_record.self" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_resolver_endpoint.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_resolver_rule.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_resolver_rule_association.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_route53_zone.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_secretsmanager_secret.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_secretsmanager_secret_version.fixed" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_security_group.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_security_group_rule.route53_resolver" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_security_group_rule.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_sns_topic.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_sns_topic_subscription.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_ssm_association.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_ssm_document.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_ssm_parameter.fixed" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.aws_ssm_parameter.placeholder" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.data.aws_iam_policy_document.assume_role" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.data.aws_iam_policy_document.secretsmanager_secret_policy" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.data.aws_iam_policy_document.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.acm_certificate" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.cloudwatch_dashboard" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.ec2_autoscaling_group" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.ec2_instance" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.efs" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.fsx_windows" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.lb" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.lb_listener" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.s3_bucket" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.random_password.secrets" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.random_password.this" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.bastion_linux[0].aws_s3_object.user_public_keys" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.bastion_linux[0].data.aws_subnet.local_account" value="cty.NilVal"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:33Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.environment.data.aws_route53_zone.core_network_services" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.environment.data.aws_route53_zone.core_vpc" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.environment.data.aws_subnet.this" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.environment.data.aws_subnets.this" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.bastion_linux[0].aws_s3_object.user_public_keys" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.baseline.module.bastion_linux[0].data.aws_subnet.local_account" value="cty.NilVal"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].aws_autoscaling_group.bastion_linux_daily" err="1 error occurred:\n\t* invalid for-each in aws_autoscaling_group.bastion_linux_daily.dynamic.tag block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:34Z	ERROR	[terraform evaluator] Failed to expand dynamic block.	block="module.baseline.module.bastion_linux[0].module.s3-bucket.aws_s3_bucket_lifecycle_configuration.default" err="1 error occurred:\n\t* invalid for-each in aws_s3_bucket_lifecycle_configuration.default.dynamic.rule block: cannot use a cty.NilVal value in for_each. An iterable collection is required\n\n"
2024-11-22T15:52:36Z	INFO	[terraform executor] Ignore finding	rule="aws-s3-encryption-customer-key" range="github.com/ministryofjustice/modernisation-platform-terraform-bastion-linux?ref=836db079348a2b40d59bd9cb953111e8ad61aec1/github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=7b2b75c178f855d8c48d3bda4ac53df782288c02/main.tf:141-151"
2024-11-22T15:52:36Z	INFO	[terraform executor] Ignore finding	rule="aws-s3-encryption-customer-key" range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v8.1.0/main.tf:150-160"
2024-11-22T15:52:36Z	INFO	Number of language-specific files	num=0
2024-11-22T15:52:36Z	INFO	Detected config files	num=3
trivy_exitcode=0

Copy link

@davekentmoj davekentmoj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@drobinson-moj drobinson-moj merged commit b8119fc into main Nov 22, 2024
15 of 16 checks passed
@drobinson-moj drobinson-moj deleted the TM-720/remove-ssm-monitoring-from-nomis branch November 22, 2024 16:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
environments-repository Used to exclude PRs from this repo in our Slack PR update
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants