Skip to content

Commit ce79010

Browse files
authored
Merge pull request #101 from aws-samples/updates/docs
Merge release 2.3 notes, doc updates for delegated admin, exclude account ids +
2 parents ad8fcb8 + 7580059 commit ce79010

File tree

2 files changed

+46
-40
lines changed

2 files changed

+46
-40
lines changed

ExcludeAccountIDs(sample).csv

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
000000000000
2+
111111111111

README.md

Lines changed: 44 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -17,24 +17,25 @@
1717
- [Configuring an Email](#configuring-an-email)
1818
- [Creating a Amazon EventBridge Ingestion ARN](#creating-a-amazon-eventbridge-ingestion-arn)
1919
- [Deployment Options](#deployment-options)
20+
- [Using AWS Health Delegated Administrator with AHA](#using-aws-health-delegated-administrator-with-aha)
2021
- [CloudFormation](#cloudformation)
21-
- [AHA Without AWS Organizations using CloudFormation](#aha-without-aws-organizations-using-cloudformation)
22-
- [Prerequisites](#prerequisites)
23-
- [Deployment](#deployment)
24-
- [AHA With AWS Organizations on Management Account using CloudFormation](#aha-with-aws-organizations-on-management-account-using-cloudformation)
25-
- [Prerequisites](#prerequisites-1)
26-
- [Deployment](#deployment-1)
27-
- [AHA With AWS Organizations on Member Account using CloudFormation](#aha-with-aws-organizations-on-member-account-using-cloudformation)
28-
- [Prerequisites](#prerequisites-2)
29-
- [Deployment](#deployment-2)
22+
- [AHA Without AWS Organizations using CloudFormation](#aha-without-aws-organizations-using-cloudformation)
23+
- [Prerequisites](#prerequisites)
24+
- [Deployment](#deployment)
25+
- [AHA With AWS Organizations on Management Account using CloudFormation](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation)
26+
- [Prerequisites](#prerequisites-1)
27+
- [Deployment](#deployment-1)
28+
- [AHA With AWS Organizations on Member Account using CloudFormation](#aha-with-aws-organizations-on-member-account-using-cloudformation)
29+
- [Prerequisites](#prerequisites-2)
30+
- [Deployment](#deployment-2)
3031
- [Terraform](#terraform)
31-
- [AHA Without AWS Organizations using Terraform](#aha-without-aws-organizations-using-terraform)
32-
- [Prerequisites](#prerequisites-3)
33-
- [Deployment - Terraform](#deployment---terraform)
34-
- [AHA WITH AWS Organizations on Management Account using Terraform](#aha-with-aws-organizations-on-management-account-using-terraform)
35-
- [Deployment - Terraform](#deployment---terraform-1)
36-
- [AHA WITH AWS Organizations on Member Account using Terraform](#aha-with-aws-organizations-on-member-account-using-terraform)
37-
- [Deployment - Terraform](#deployment---terraform-2)
32+
- [AHA Without AWS Organizations using Terraform](#aha-without-aws-organizations-using-terraform)
33+
- [Prerequisites](#prerequisites-3)
34+
- [Deployment - Terraform](#deployment---terraform)
35+
- [AHA WITH AWS Organizations on Management Account using Terraform](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)
36+
- [Deployment - Terraform](#deployment---terraform-1)
37+
- [AHA WITH AWS Organizations on Member Account using Terraform](#aha-with-aws-organizations-on-member-account-using-terraform)
38+
- [Deployment - Terraform](#deployment---terraform-2)
3839
- [Updating using CloudFormation](#updating-using-cloudformation)
3940
- [Updating using Terraform](#updating-using-terraform)
4041
- [New Features](#new-features)
@@ -45,8 +46,7 @@ AWS Health Aware (AHA) is an automated notification tool for sending well-format
4546

4647
# What's New
4748

48-
Release 2.2 introduces an updated schema for Health events delivered to an EventBridge bus. This allows simplified matching of events which you can then consume with other AWS services or SaaS solutions.
49-
Read more about the [new feature and how to filter events using EventBridge](https://github.com/aws-samples/aws-health-aware/blob/main/new_aha_event_schema.md).
49+
Release 2.3 introduces runtime performance improvements, terraform updates, allows use of Slack Workflow 2.0 webhooks (triggers), general fixes and documentation updates.
5050

5151
# Architecture
5252

@@ -142,29 +142,29 @@ AHA can send to multiple endpoints (webhook URLs, Email or EventBridge). To use
142142
4. Give your Event bus a name and **click** *Create*.
143143
5. For the deployment we will need the *Name* of the Event bus **(not the ARN, e.g. aha-eb01)**.
144144

145+
# Deployment Options
146+
145147
## Using AWS Health Delegated Administrator with AHA
146148

147-
On 2023-07-27, AWS Health released the Delegated Admin feature. Using this feature, you can deploy AHA in a Member Account without added permissions in the Org Management account.
149+
>NOTE: For users with company restrictions of use/deployment of resources in the organization management account.
150+
>
151+
>On 2023-07-27, AWS Health released the [Delegated Administrator feature](https://docs.aws.amazon.com/health/latest/ug/delegated-administrator-organizational-view.html). By enabling an account as a delegated administrator, you can use AHA in Organization Mode without the need to create and assume the management account IAM role.
148152
149153
To enable this feature:
150-
1. Know the AWS Account ID of the Member Account you want to enable as a delegated administrator for AWS Health (e.g. 123456789012)
154+
1. Know the AWS Account ID of your AWS account you want to enable as a delegated administrator for AWS Health (e.g. 123456789012)
151155
1. In the Org Management Account, run the command `aws organizations register-delegated-administrator --account-id ACCOUNT_ID --service-principal health.amazonaws.com` replacing ACCOUNT_ID with the ID of your Member Account
152-
1. Deploy AHA in the Member Account using the steps for
153-
2. [AHA for users who ARE using AWS Organizations (CloudFormation)](#aha-with-aws-organizations-on-management-account-using-cloudformation)
154-
2. [AHA for users who ARE using AWS Organizations (Terraform)](#aha-with-aws-organizations-using-terraform)
155-
156-
157-
Read more: https://docs.aws.amazon.com/health/latest/ug/delegated-administrator-organizational-view.html
156+
1. Deploy AHA in your deletegated administrator account using the steps for:
158157

159-
# Deployment Options
158+
1. [AHA for users who ARE using AWS Organizations (CloudFormation)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation)
159+
1. [AHA for users who ARE using AWS Organizations (Terraform)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)
160160

161161
## CloudFormation
162162
There are 3 available ways to deploy AHA, all are done via the same CloudFormation template to make deployment as easy as possible.
163163

164164
The 3 deployment methods for AHA are:
165165

166166
1. [**AHA for users WITHOUT AWS Organizations**](#aha-without-aws-organizations-using-cloudformation): Users NOT using AWS Organizations.
167-
2. [**AHA for users WITH AWS Organizations (Management Account)**](#aha-with-aws-organizations-on-management-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in the top-level management account.
167+
2. [**AHA for users WITH AWS Organizations (Management Account)**](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in the top-level management account.
168168
3. [**AHA for users WITH AWS Organizations (Member Account)**](#aha-with-aws-organizations-on-member-account-using-cloudformation): Users who ARE using AWS Organizations and deploying in a member account in the organization to assume a role in the top-level management account.
169169

170170
## AHA Without AWS Organizations using CloudFormation
@@ -188,7 +188,7 @@ The 3 deployment methods for AHA are:
188188
5. In the *CloudFormation* console **click** *Create stack > With new resources (standard)*.
189189
6. Under *Template Source* **click** *Upload a template file* and **click** *Choose file* and select `CFN_DEPLOY_AHA.yml` **Click** *Next*.
190190
- In *Stack name* type a stack name (i.e. AHA-Deployment).
191-
- In *AWSOrganizationsEnabled* leave it set to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-account-using-cloudformation) or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-cloudformation)
191+
- In *AWSOrganizationsEnabled* leave it set to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-cloudformation) or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-cloudformation)
192192
- In *AWSHealthEventType* select whether you want to receive *all* event types or *only* issues.
193193
- In *S3Bucket* type ***just*** the bucket name of the S3 bucket used in step 3 (e.g. my-aha-bucket).
194194
- In *S3Key* type ***just*** the name of the .zip file you created in Step 2 (e.g. aha-v1.8.zip).
@@ -203,11 +203,11 @@ The 3 deployment methods for AHA are:
203203
9. Scroll to the bottom and **click** the *checkbox* and **click** *Create stack*.
204204
10. Wait until *Status* changes to *CREATE_COMPLETE* (roughly 2-4 minutes or if deploying in a secondary region, it can take up to 30 minutes).
205205

206-
## AHA With AWS Organizations on Management Account using CloudFormation
206+
## AHA With AWS Organizations on Management or Delegated Administrator Account using CloudFormation
207207

208208
### Prerequisites
209209

210-
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
210+
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
211211
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
212212
3. Have access to deploy Cloudformation Templates with the following resources: AWS IAM policies, Amazon DynamoDB Tables, AWS Lambda, Amazon EventBridge and AWS Secrets Manager in the **AWS Organizations Master Account**.
213213
4. If using Multi-Region, you must deploy the following 2 CloudFormation templates to allow the Stackset deployment to deploy resources **even if you have full administrator privileges, you still need to follow these steps**.
@@ -247,7 +247,7 @@ See: [Using AWS Health Delegated Administrator with AHA](#using-aws-health-deleg
247247

248248
### Prerequisites
249249

250-
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
250+
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
251251
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
252252
3. Have access to deploy Cloudformation Templates with the following resource: AWS IAM policies in the **AWS Organizations Master Account**.
253253
4. If using Multi-Region, you must deploy the following 2 CloudFormation templates in the **Member Account** to allow the Stackset deployment to deploy resources **even if you have full administrator privileges, you still need to follow these steps**.
@@ -299,7 +299,7 @@ There are 3 available ways to deploy AHA, all are done via the same Terraform te
299299
The 3 deployment methods for AHA are:
300300

301301
1. [**AHA for users NOT using AWS Organizations using Terraform**](#aha-without-aws-organizations-using-terraform): Users NOT using AWS Organizations.
302-
2. [**AHA for users WITH AWS Organizations using Terraform (Management Account)**](#aha-with-aws-organizations-on-management-account-using-terraform): Users who ARE using AWS Organizations and deploying in the top-level management account.
302+
2. [**AHA for users WITH AWS Organizations using Terraform (Management Account)**](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform): Users who ARE using AWS Organizations and deploying in the top-level management account.
303303
3. [**AHA for users WITH AWS Organizations using Terraform (Member Account)**](#aha-with-aws-organizations-on-member-account-using-terraform): Users who ARE using AWS Organizations and deploying in a member account in the organization to assume a role in the top-level management account.
304304

305305
## AHA Without AWS Organizations using Terraform
@@ -321,7 +321,7 @@ $ cd aws-health-aware/terraform/Terraform_DEPLOY_AHA
321321
2. Update parameters file **terraform.tfvars** as below
322322
- *aha_primary_region* - change to region where you want to deploy AHA solution
323323
- *aha_secondary_region* - Required if needed to deploy in AHA solution in multiple regions, change to another region (Secondary) where you want to deploy AHA solution, Otherwise leave to default empty value.
324-
- *AWSOrganizationsEnabled* - Leave it to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-account-using-terraform)] or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-terraform)
324+
- *AWSOrganizationsEnabled* - Leave it to default which is `No`. If you do have AWS Organizations enabled and you want to aggregate across all your accounts, you should be following the steps for [AHA for users who ARE using AWS Organizations (Management Account)](#aha-with-aws-organizations-on-management-or-delegated-administrator-account-using-terraform)] or [AHA for users WITH AWS Organizations (Member Account)](#aha-with-aws-organizations-on-member-account-using-terraform)
325325
- *AWSHealthEventType* - select whether you want to receive *all* event types or *only* issues.
326326
- *Communications Channels* section - enter the URLs, Emails and/or ARN of the endpoints you configured previously.
327327
- *Email Setup* section - enter the From and To Email addresses as well as the Email subject. If you aren't configuring email, just leave it as is.
@@ -337,9 +337,9 @@ $ terraform plan
337337
$ terraform apply
338338
```
339339

340-
## AHA WITH AWS Organizations on Management Account using Terraform
340+
## AHA with AWS Organizations on Management or Delegated Administrator Account using Terraform
341341

342-
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
342+
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
343343
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
344344

345345
**NOTE: ** For Multi region deployment, DynamoDB table will be created with PAY_PER_REQUEST billing mode insted of PROVISIONED due to limitation with terraform.
@@ -376,7 +376,7 @@ $ terraform apply
376376
> Note: On 2023-07-27, AWS Health released the Delegated Admin feature which enables AHA deployments in member accounts without the extra steps below.
377377
See: [Using AWS Health Delegated Administrator with AHA](#using-aws-health-delegated-administrator-with-aha)
378378

379-
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view-in-health-console.html) from the console, so that you can aggregate all Personal Health Dashboard (PHD) events for all accounts in your AWS Organization.
379+
1. [Enable Health Organizational View](https://docs.aws.amazon.com/health/latest/ug/enable-organizational-view.html) from the console or CLI, so that you can aggregate Health events for all accounts in your AWS Organization.
380380
2. Have at least 1 [endpoint](#configuring-an-endpoint) configured (you can have multiple)
381381

382382
**NOTE: ** For Multi region deployment, DynamoDB table will be created with PAY_PER_REQUEST billing mode insted of PROVISIONED due to limitation with terraform.
@@ -446,6 +446,8 @@ $ terraform apply
446446
**If for some reason, you still have issues after updating, you can easily just delete the stack and redeploy. The infrastructure can be destroyed and rebuilt within minutes through Terraform.**
447447

448448
# New Features
449+
*Release 2.2*
450+
449451
We are happy to announce the launch of new enhancements to AHA. Please try them out and keep sending us your feedback!
450452
1. A revised schema for AHA events sent to EventBridge which enables new filtering and routing options. See the [new AHA event schema readme](new_aha_event_schema.md) for more detail.
451453
2. Multi-region deployment option
@@ -461,6 +463,8 @@ We are happy to announce the launch of new enhancements to AHA. Please try them
461463
* If for whatever reason you need to update the Webhook URL; just update the CloudFormation or terraform Template with the new Webhook URL.
462464
* If you are expecting an event and it did not show up it may be an oddly formed event. Take a look at *CloudWatch > Log groups* and search for the name of your Lambda function. See what the error is and reach out to us [email](mailto:aha-builders@amazon.com) for help.
463465
* If for any errors related to duplicate secrets during deployment, try deleting manually and redeploy the solution. Example command to delete SlackChannelID secret in us-east-1 region.
464-
```
465-
$ aws secretsmanager delete-secret --secret-id SlackChannelID --force-delete-without-recovery --region us-east-1
466-
```
466+
```
467+
$ aws secretsmanager delete-secret --secret-id SlackChannelID --force-delete-without-recovery --region us-east-1
468+
```
469+
* If you want to Exclude certain accounts from notifications, confirm your exlcusions file matches the format of the [sample ExcludeAccountIDs.csv file](ExcludeAccountIDs(sample).csv) with one account ID per line with no trailing commas (trailing commas indicate a null cell).
470+
* If your accounts listed in the CSV file are not excluded, check the CloudWatch log group for the AHA Lambda function for the message "Key filename is not a .csv file" as an indicator of any issues with your file.

0 commit comments

Comments
 (0)