Simple terraform resource "aws_cloudwatch_log_metric_filter" generates many findings #7319
-
Hello ! I just add a simple aws_cloudwatch_log_metric_filter in my application in order to create a alarm when the "FAILED" pattern is found in my log :
This new ressource generates many new findings about non existing log metric filters and alarms, for example :
The global security of my aws account is managed by another team in another code repo, so I excluded all these findings. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hey @rod2a, You can use kics-github-action as part of a GitHub Actions workflow in your repo. This allows you to configure the For reference, you can check how it's used in the KICS repository here: The kics-github-action README provides more details on available input variables, which you can customize to fine-tune your scans. Hope this helps! Let me know if you need further clarification. |
Beta Was this translation helpful? Give feedback.
Hey @rod2a,
You can use kics-github-action as part of a GitHub Actions workflow in your repo. This allows you to configure the
exclude-queries
option to filter out specific findings in your repository.For reference, you can check how it's used in the KICS repository here:
🔗 Example of exclude-queries in KICS repo
The kics-github-action README provides more details on available input variables, which you can customize to fine-tune your scans.
Hope this helps! Let me know if you need further clarification.