You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+44-40Lines changed: 44 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,24 +17,25 @@
17
17
-[Configuring an Email](#configuring-an-email)
18
18
-[Creating a Amazon EventBridge Ingestion ARN](#creating-a-amazon-eventbridge-ingestion-arn)
19
19
-[Deployment Options](#deployment-options)
20
+
-[Using AWS Health Delegated Administrator with AHA](#using-aws-health-delegated-administrator-with-aha)
20
21
-[CloudFormation](#cloudformation)
21
-
-[AHA Without AWS Organizations using CloudFormation](#aha-without-aws-organizations-using-cloudformation)
22
-
-[Prerequisites](#prerequisites)
23
-
-[Deployment](#deployment)
24
-
-[AHA With AWS Organizations on Management Account using CloudFormation](#aha-with-aws-organizations-on-management-account-using-cloudformation)
25
-
-[Prerequisites](#prerequisites-1)
26
-
-[Deployment](#deployment-1)
27
-
-[AHA With AWS Organizations on Member Account using CloudFormation](#aha-with-aws-organizations-on-member-account-using-cloudformation)
28
-
-[Prerequisites](#prerequisites-2)
29
-
-[Deployment](#deployment-2)
22
+
-[AHA Without AWS Organizations using CloudFormation](#aha-without-aws-organizations-using-cloudformation)
23
+
-[Prerequisites](#prerequisites)
24
+
-[Deployment](#deployment)
25
+
-[AHA With AWS Organizations on Management Account using CloudFormation](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation)
26
+
-[Prerequisites](#prerequisites-1)
27
+
-[Deployment](#deployment-1)
28
+
-[AHA With AWS Organizations on Member Account using CloudFormation](#aha-with-aws-organizations-on-member-account-using-cloudformation)
29
+
-[Prerequisites](#prerequisites-2)
30
+
-[Deployment](#deployment-2)
30
31
-[Terraform](#terraform)
31
-
-[AHA Without AWS Organizations using Terraform](#aha-without-aws-organizations-using-terraform)
-[AHA WITH AWS Organizations on Management Account using Terraform](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)
-[Updating using CloudFormation](#updating-using-cloudformation)
39
40
-[Updating using Terraform](#updating-using-terraform)
40
41
-[New Features](#new-features)
@@ -45,8 +46,7 @@ AWS Health Aware (AHA) is an automated notification tool for sending well-format
45
46
46
47
# What's New
47
48
48
-
Release 2.2 introduces an updated schema for Health events delivered to an EventBridge bus. This allows simplified matching of events which you can then consume with other AWS services or SaaS solutions.
49
-
Read more about the [new feature and how to filter events using EventBridge](https://github.com/aws-samples/aws-health-aware/blob/main/new_aha_event_schema.md).
49
+
Release 2.3 introduces runtime performance improvements, terraform updates, allows use of Slack Workflow 2.0 webhooks (triggers), general fixes and documentation updates.
50
50
51
51
# Architecture
52
52
@@ -142,29 +142,29 @@ AHA can send to multiple endpoints (webhook URLs, Email or EventBridge). To use
142
142
4. Give your Event bus a name and **click***Create*.
143
143
5. For the deployment we will need the *Name* of the Event bus **(not the ARN, e.g. aha-eb01)**.
144
144
145
+
# Deployment Options
146
+
145
147
## Using AWS Health Delegated Administrator with AHA
146
148
147
-
On 2023-07-27, AWS Health released the Delegated Admin feature. Using this feature, you can deploy AHA in a Member Account without added permissions in the Org Management account.
149
+
>NOTE: For users with company restrictions of use/deployment of resources in the organization management account.
150
+
>
151
+
>On 2023-07-27, AWS Health released the [Delegated Administrator feature](https://docs.aws.amazon.com/health/latest/ug/delegated-administrator-organizational-view.html). By enabling an account as a delegated administrator, you can use AHA in Organization Mode without the need to create and assume the management account IAM role.
148
152
149
153
To enable this feature:
150
-
1. Know the AWS Account ID of the Member Account you want to enable as a delegated administrator for AWS Health (e.g. 123456789012)
154
+
1. Know the AWS Account ID of your AWS account you want to enable as a delegated administrator for AWS Health (e.g. 123456789012)
151
155
1. In the Org Management Account, run the command `aws organizations register-delegated-administrator --account-id ACCOUNT_ID --service-principal health.amazonaws.com` replacing ACCOUNT_ID with the ID of your Member Account
152
-
1. Deploy AHA in the Member Account using the steps for
153
-
2.[AHA for users who ARE using AWS Organizations (CloudFormation)](#aha-with-aws-organizations-on-management-account-using-cloudformation)
154
-
2.[AHA for users who ARE using AWS Organizations (Terraform)](#aha-with-aws-organizations-using-terraform)
1. Deploy AHA in your deletegated administrator account using the steps for:
158
157
159
-
# Deployment Options
158
+
1.[AHA for users who ARE using AWS Organizations (CloudFormation)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation)
159
+
1.[AHA for users who ARE using AWS Organizations (Terraform)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)
160
160
161
161
## CloudFormation
162
162
There are 3 available ways to deploy AHA, all are done via the same CloudFormation template to make deployment as easy as possible.
163
163
164
164
The 3 deployment methods for AHA are:
165
165
166
166
1.[**AHA for users WITHOUT AWS Organizations**](#aha-without-aws-organizations-using-cloudformation): Users NOT using AWS Organizations.
167
-
2.[**AHA for users WITH AWS Organizations (Management Account)**](#aha-with-aws-organizations-on-management-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in the top-level management account.
167
+
2.[**AHA for users WITH AWS Organizations (Management Account)**](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in the top-level management account.
168
168
3.[**AHA for users WITH AWS Organizations (Member Account)**](#aha-with-aws-organizations-on-member-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in a member account in the organization to assume a role in the top-level management account.
169
169
170
170
## AHA Without AWS Organizations using CloudFormation
@@ -188,7 +188,7 @@ The 3 deployment methods for AHA are:
188
188
5. In the *CloudFormation* console **click***Create stack > With new resources (standard)*.
189
189
6. Under *Template Source***click***Upload a template file* and **click***Choose file* and select `CFN_DEPLOY_AHA.yml`**Click***Next*.
190
190
- In *Stack name* type a stack name (i.e. AHA-Deployment).
191
-
- In *AWSOrganizationsEnabled* leave it set to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-account-using-cloudformation) or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-cloudformation)
191
+
- In *AWSOrganizationsEnabled* leave it set to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation) or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-cloudformation)
192
192
- In *AWSHealthEventType* select whether you want to receive *all* event types or *only* issues.
193
193
- In *S3Bucket* type ***just*** the bucket name of the S3 bucket used in step 3 (e.g. my-aha-bucket).
194
194
- In *S3Key* type ***just*** the name of the .zip file you created in Step 2 (e.g. aha-v1.8.zip).
@@ -203,11 +203,11 @@ The 3 deployment methods for AHA are:
203
203
9. Scroll to the bottom and **click** the *checkbox* and **click***Create stack*.
204
204
10. Wait until *Status* changes to *CREATE_COMPLETE* (roughly 2-4 minutes or if deploying in a secondary region, it can take up to 30 minutes).
205
205
206
-
## AHA With AWS Organizations on Management Account using CloudFormation
206
+
## AHA With AWS Organizations on Management or Delegated Administrator Account using CloudFormation
207
207
208
208
### Prerequisites
209
209
210
-
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
210
+
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
211
211
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
212
212
3. Have access to deploy Cloudformation Templates with the following resources: AWS IAM policies, Amazon DynamoDB Tables, AWS Lambda, Amazon EventBridge and AWS Secrets Manager in the **AWS Organizations Master Account**.
213
213
4. If using Multi-Region, you must deploy the following 2 CloudFormation templates to allow the Stackset deployment to deploy resources **even if you have full administrator privileges, you still need to follow these steps**.
@@ -247,7 +247,7 @@ See: [Using AWS Health Delegated Administrator with AHA](#using-aws-health-deleg
247
247
248
248
### Prerequisites
249
249
250
-
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
250
+
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
251
251
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
252
252
3. Have access to deploy Cloudformation Templates with the following resource: AWS IAM policies in the **AWS Organizations Master Account**.
253
253
4. If using Multi-Region, you must deploy the following 2 CloudFormation templates in the **Member Account** to allow the Stackset deployment to deploy resources **even if you have full administrator privileges, you still need to follow these steps**.
@@ -299,7 +299,7 @@ There are 3 available ways to deploy AHA, all are done via the same Terraform te
299
299
The 3 deployment methods for AHA are:
300
300
301
301
1.[**AHA for users NOT using AWS Organizations using Terraform**](#aha-without-aws-organizations-using-terraform): Users NOT using AWS Organizations.
302
-
2.[**AHA for users WITH AWS Organizations using Terraform (Management Account)**](#aha-with-aws-organizations-on-management-account-using-terraform): Users who ARE using AWS Organizations and deploying in the top-level management account.
302
+
2.[**AHA for users WITH AWS Organizations using Terraform (Management Account)**](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform): Users who ARE using AWS Organizations and deploying in the top-level management account.
303
303
3.[**AHA for users WITH AWS Organizations using Terraform (Member Account)**](#aha-with-aws-organizations-on-member-account-using-terraform): Users who ARE using AWS Organizations and deploying in a member account in the organization to assume a role in the top-level management account.
304
304
305
305
## AHA Without AWS Organizations using Terraform
@@ -321,7 +321,7 @@ $ cd aws-health-aware/terraform/Terraform_DEPLOY_AHA
321
321
2. Update parameters file **terraform.tfvars** as below
322
322
-*aha_primary_region* - change to region where you want to deploy AHA solution
323
323
-*aha_secondary_region* - Required if needed to deploy in AHA solution in multiple regions, change to another region (Secondary) where you want to deploy AHA solution, Otherwise leave to default empty value.
324
-
-*AWSOrganizationsEnabled* - Leave it to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-account-using-terraform)] or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-terraform)
324
+
-*AWSOrganizationsEnabled* - Leave it to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)] or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-terraform)
325
325
-*AWSHealthEventType* - select whether you want to receive *all* event types or *only* issues.
326
326
-*Communications Channels* section - enter the URLs, Emails and/or ARN of the endpoints you configured previously.
327
327
-*Email Setup* section - enter the From and To Email addresses as well as the Email subject. If you aren't configuring email, just leave it as is.
@@ -337,9 +337,9 @@ $ terraform plan
337
337
$ terraform apply
338
338
```
339
339
340
-
## AHA WITH AWS Organizations on Management Account using Terraform
340
+
## AHA with AWS Organizations on Management or Delegated Administrator Account using Terraform
341
341
342
-
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
342
+
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
343
343
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
344
344
345
345
**NOTE: ** For Multi region deployment, DynamoDB table will be created with PAY_PER_REQUEST billing mode insted of PROVISIONED due to limitation with terraform.
@@ -376,7 +376,7 @@ $ terraform apply
376
376
> Note: On 2023-07-27, AWS Health released the Delegated Admin feature which enables AHA deployments in member accounts without the extra steps below.
377
377
See: [Using AWS Health Delegated Administrator with AHA](#using-aws-health-delegated-administrator-with-aha)
378
378
379
-
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
379
+
1.[Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
380
380
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
381
381
382
382
**NOTE: ** For Multi region deployment, DynamoDB table will be created with PAY_PER_REQUEST billing mode insted of PROVISIONED due to limitation with terraform.
@@ -446,6 +446,8 @@ $ terraform apply
446
446
**If for some reason, you still have issues after updating, you can easily just delete the stack and redeploy. The infrastructure can be destroyed and rebuilt within minutes through Terraform.**
447
447
448
448
# New Features
449
+
*Release 2.2*
450
+
449
451
We are happy to announce the launch of new enhancements to AHA. Please try them out and keep sending us your feedback!
450
452
1. A revised schema for AHA events sent to EventBridge which enables new filtering and routing options. See the [new AHA event schema readme](new_aha_event_schema.md) for more detail.
451
453
2. Multi-region deployment option
@@ -461,6 +463,8 @@ We are happy to announce the launch of new enhancements to AHA. Please try them
461
463
* If for whatever reason you need to update the Webhook URL; just update the CloudFormation or terraform Template with the new Webhook URL.
462
464
* If you are expecting an event and it did not show up it may be an oddly formed event. Take a look at *CloudWatch > Log groups* and search for the name of your Lambda function. See what the error is and reach out to us [email](mailto:aha-builders@amazon.com) for help.
463
465
* If for any errors related to duplicate secrets during deployment, try deleting manually and redeploy the solution. Example command to delete SlackChannelID secret in us-east-1 region.
* If you want to Exclude certain accounts from notifications, confirm your exlcusions file matches the format of the [sample ExcludeAccountIDs.csv file](ExcludeAccountIDs(sample).csv) with one account ID per line with no trailing commas (trailing commas indicate a null cell).
470
+
* If your accounts listed in the CSV file are not excluded, check the CloudWatch log group for the AHA Lambda function for the message "Key filename is not a .csv file" as an indicator of any issues with your file.
0 commit comments