You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:07:52Z INFO [db] Need to update DB
2024-08-20T15:07:52Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:07:54Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:07:54Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:07:54Z INFO Need to update the built-in policies
2024-08-20T15:07:54Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:07:54Z INFO [secret] Secret scanning is enabled
2024-08-20T15:07:54Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:07:54Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:07:55Z INFO Number of language-specific files num=0
2024-08-20T15:07:55Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:07:52Z INFO [db] Need to update DB
2024-08-20T15:07:52Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:07:54Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:07:54Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:07:54Z INFO Need to update the built-in policies
2024-08-20T15:07:54Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:07:54Z INFO [secret] Secret scanning is enabled
2024-08-20T15:07:54Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:07:54Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:07:55Z INFO Number of language-specific files num=02024-08-20T15:07:55Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:14:10Z INFO [db] Need to update DB
2024-08-20T15:14:10Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:14:12Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:14:12Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:14:12Z INFO Need to update the built-in policies
2024-08-20T15:14:12Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:14:13Z INFO [secret] Secret scanning is enabled
2024-08-20T15:14:13Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:14:13Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:14:13Z INFO Number of language-specific files num=0
2024-08-20T15:14:13Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:14:10Z INFO [db] Need to update DB
2024-08-20T15:14:10Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:14:12Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:14:12Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:14:12Z INFO Need to update the built-in policies
2024-08-20T15:14:12Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:14:13Z INFO [secret] Secret scanning is enabled
2024-08-20T15:14:13Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:14:13Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:14:13Z INFO Number of language-specific files num=02024-08-20T15:14:13Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:17:28Z INFO [db] Need to update DB
2024-08-20T15:17:28Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:17:30Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:17:30Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:17:30Z INFO Need to update the built-in policies
2024-08-20T15:17:30Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:17:30Z INFO [secret] Secret scanning is enabled
2024-08-20T15:17:30Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:17:30Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:17:31Z INFO Number of language-specific files num=0
2024-08-20T15:17:31Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Failed
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/pagerduty/member-services-integrations.tf line 2597:2597:name="${each.key}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:17:28Z INFO [db] Need to update DB
2024-08-20T15:17:28Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:17:30Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:17:30Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:17:30Z INFO Need to update the built-in policies
2024-08-20T15:17:30Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:17:30Z INFO [secret] Secret scanning is enabled
2024-08-20T15:17:30Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:17:30Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:17:31Z INFO Number of language-specific files num=02024-08-20T15:17:31Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:21:37Z INFO [db] Need to update DB
2024-08-20T15:21:37Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:21:39Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:21:39Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:21:39Z INFO Need to update the built-in policies
2024-08-20T15:21:39Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:21:39Z INFO [secret] Secret scanning is enabled
2024-08-20T15:21:39Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:21:39Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:21:40Z INFO Number of language-specific files num=0
2024-08-20T15:21:40Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Failed
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/pagerduty/member-services-integrations.tf line 2597:2597:name="${each.key}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:21:37Z INFO [db] Need to update DB
2024-08-20T15:21:37Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:21:39Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:21:39Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:21:39Z INFO Need to update the built-in policies
2024-08-20T15:21:39Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:21:39Z INFO [secret] Secret scanning is enabled
2024-08-20T15:21:39Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:21:39Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:21:40Z INFO Number of language-specific files num=02024-08-20T15:21:40Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:28:22Z INFO [db] Need to update DB
2024-08-20T15:28:22Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:28:25Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:28:25Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:28:25Z INFO Need to update the built-in policies
2024-08-20T15:28:25Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:28:25Z INFO [secret] Secret scanning is enabled
2024-08-20T15:28:25Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:28:25Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:28:25Z INFO Number of language-specific files num=0
2024-08-20T15:28:25Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Failed
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/pagerduty/member-services-integrations.tf line 2597:2597:name="${each.key}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:28:22Z INFO [db] Need to update DB
2024-08-20T15:28:22Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:28:25Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:28:25Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:28:25Z INFO Need to update the built-in policies
2024-08-20T15:28:25Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:28:25Z INFO [secret] Secret scanning is enabled
2024-08-20T15:28:25Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:28:25Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:28:25Z INFO Number of language-specific files num=02024-08-20T15:28:25Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:32:31Z INFO [db] Need to update DB
2024-08-20T15:32:31Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:32:33Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:32:33Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:32:33Z INFO Need to update the built-in policies
2024-08-20T15:32:33Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:32:33Z INFO [secret] Secret scanning is enabled
2024-08-20T15:32:33Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:32:33Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:32:34Z INFO Number of language-specific files num=0
2024-08-20T15:32:34Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Failed
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/pagerduty/member-services-integrations.tf line 2597:2597:name="${each.key}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:32:31Z INFO [db] Need to update DB
2024-08-20T15:32:31Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:32:33Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:32:33Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:32:33Z INFO Need to update the built-in policies
2024-08-20T15:32:33Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:32:33Z INFO [secret] Secret scanning is enabled
2024-08-20T15:32:33Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:32:33Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:32:34Z INFO Number of language-specific files num=02024-08-20T15:32:34Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-08-20T15:56:48Z INFO [db] Need to update DB
2024-08-20T15:56:48Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-20T15:56:50Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:56:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:56:50Z INFO Need to update the built-in policies
2024-08-20T15:56:50Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-20T15:56:51Z INFO [secret] Secret scanning is enabled
2024-08-20T15:56:51Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:56:51Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-20T15:56:51Z INFO Number of language-specific files num=0
2024-08-20T15:56:51Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 27, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-08-20T15:56:48Z INFO [db] Need to update DB
2024-08-20T15:56:48Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-20T15:56:50Z INFO [vuln] Vulnerability scanning is enabled
2024-08-20T15:56:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-20T15:56:50Z INFO Need to update the built-in policies
2024-08-20T15:56:50Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-20T15:56:51Z INFO [secret] Secret scanning is enabled
2024-08-20T15:56:51Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-20T15:56:51Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-20T15:56:51Z INFO Number of language-specific files num=02024-08-20T15:56:51Z INFO Detected config files num=3trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
A reference to the issue / Description of it
Refactoring pagerduty integrations to allow users to more quickly understand where/what is alarm(ing)
How does this PR fix the problem?
Start making changes in CSR env and will tie in to sns topic changes in mod-platform-environments repo
How has this been tested?
Please describe the tests that you ran and provide instructions to reproduce.
Initially just want the terraform to work and see the services etc. being created in the PagerDuty backend
Deployment Plan / Instructions
Will this deployment impact the platform and / or services on it?
No
Checklist (check
x
in[ ]
of list items)Additional comments (if any)
{Please write here}