Skip to content

Commit 3de6457

Browse files
committed
update filter to filter_name
1 parent ed998e0 commit 3de6457

File tree

1 file changed

+6
-13
lines changed
  • aws_sra_examples/solutions/genai/bedrock_org/lambda/src

1 file changed

+6
-13
lines changed

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -735,14 +735,14 @@ def deploy_metric_filters_and_alarms(region, accounts, resource_properties):
735735
if region not in filter_regions:
736736
LOGGER.info(f"{filter_name} filter not requested for {region}. Skipping...")
737737
continue
738-
LOGGER.info(f"Raw filter pattern: {CLOUDWATCH_METRIC_FILTERS[filter]}")
739-
if "BUCKET_NAME_PLACEHOLDER" in CLOUDWATCH_METRIC_FILTERS[filter]:
738+
LOGGER.info(f"Raw filter pattern: {CLOUDWATCH_METRIC_FILTERS[filter_name]}")
739+
if "BUCKET_NAME_PLACEHOLDER" in CLOUDWATCH_METRIC_FILTERS[filter_name]:
740740
LOGGER.info(f"{filter_name} filter parameter: 'BUCKET_NAME_PLACEHOLDER' found. Updating with bucket info...")
741-
filter_pattern = build_s3_metric_filter_pattern(filter_params["bucket_names"], CLOUDWATCH_METRIC_FILTERS[filter])
742-
elif "INPUT_PATH" in CLOUDWATCH_METRIC_FILTERS[filter]:
743-
filter_pattern = CLOUDWATCH_METRIC_FILTERS[filter].replace("<INPUT_PATH>", filter_params["input_path"])
741+
filter_pattern = build_s3_metric_filter_pattern(filter_params["bucket_names"], CLOUDWATCH_METRIC_FILTERS[filter_name])
742+
elif "INPUT_PATH" in CLOUDWATCH_METRIC_FILTERS[filter_name]:
743+
filter_pattern = CLOUDWATCH_METRIC_FILTERS[filter_name].replace("<INPUT_PATH>", filter_params["input_path"])
744744
else:
745-
filter_pattern = CLOUDWATCH_METRIC_FILTERS[filter]
745+
filter_pattern = CLOUDWATCH_METRIC_FILTERS[filter_name]
746746
LOGGER.info(f"{filter_name} filter pattern: {filter_pattern}")
747747

748748
for acct in accounts:
@@ -901,7 +901,6 @@ def deploy_central_cloudwatch_observability(event):
901901
oam_sink_arn = cloudwatch.create_oam_sink(cloudwatch.SINK_NAME)
902902
LOGGER.info(f"CloudWatch observability access manager sink created: {oam_sink_arn}")
903903
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
904-
# LOGGER.info(f"DEBUG deploy_central_cloudwatch_observability - create_oam_sink: action count increased to {CFN_RESPONSE_DATA["deployment_info"]["action_count"]}")
905904
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
906905
LIVE_RUN_DATA["OAMSinkCreate"] = "Created CloudWatch observability access manager sink"
907906
# add OAM sink state table record
@@ -977,8 +976,6 @@ def deploy_central_cloudwatch_observability(event):
977976
xacct_role_arn = xacct_role["Role"]["Arn"]
978977
LIVE_RUN_DATA[f"OAMCrossAccountRoleCreate_{bedrock_account}"] = f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
979978
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
980-
# LOGGER.info(f"DEBUG deploy_central_cloudwatch_observability - create_role: action count increased to {CFN_RESPONSE_DATA["deployment_info"]["action_count"]}")
981-
982979
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
983980
LOGGER.info(f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
984981
# add cross account role state table record
@@ -1007,7 +1004,6 @@ def deploy_central_cloudwatch_observability(event):
10071004
f"OamXacctRolePolicyAttach_{policy_arn.split("/")[1]}_{bedrock_account}"
10081005
] = f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
10091006
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
1010-
# LOGGER.info(f"DEBUG deploy_central_cloudwatch_observability - attach_policy: action count increased to {CFN_RESPONSE_DATA["deployment_info"]["action_count"]}")
10111007

10121008
CFN_RESPONSE_DATA["deployment_info"]["configuration_changes"] += 1
10131009
LOGGER.info(f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}")
@@ -1025,7 +1021,6 @@ def deploy_central_cloudwatch_observability(event):
10251021
oam_link_arn = cloudwatch.create_oam_link(oam_sink_arn)
10261022
LIVE_RUN_DATA[f"OAMLinkCreate_{bedrock_account}_{bedrock_region}"] = f"Created CloudWatch observability access manager link in {bedrock_account} in {bedrock_region}"
10271023
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
1028-
# LOGGER.info(f"DEBUG deploy_central_cloudwatch_observability - create_oam_link: action count increased to {CFN_RESPONSE_DATA["deployment_info"]["action_count"]}")
10291024

10301025
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
10311026
LOGGER.info("Created CloudWatch observability access manager link")
@@ -1051,8 +1046,6 @@ def deploy_cloudwatch_dashboard(event):
10511046

10521047
cloudwatch_dashboard = build_cloudwatch_dashboard(CLOUDWATCH_DASHBOARD, SOLUTION_NAME, central_observability_params["bedrock_accounts"], central_observability_params["regions"])
10531048
cloudwatch.CLOUDWATCH_CLIENT = sts.assume_role(ssm_params.SRA_SECURITY_ACCT, sts.CONFIGURATION_ROLE, "cloudwatch", sts.HOME_REGION)
1054-
# sra-bedrock-filter-prompt-injection-metric template ["sra-bedrock-org"]["widgets"][0]["properties"]["metrics"][2]
1055-
# sra-bedrock-filter-sensitive-info-metric template ["sra-bedrock-org"]["widgets"][0]["properties"]["metrics"][3]
10561049

10571050
search_dashboard = cloudwatch.find_dashboard(SOLUTION_NAME)
10581051
if search_dashboard[0] is False:

0 commit comments

Comments
 (0)