standard
turbot/aws_compliance

Pipeline: Test detect and correct RDS DB instances with public access enabled

Test the disable public access action for RDS DB instances with public access enabled.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run aws_compliance.pipeline.test_detect_and_correct_rds_db_instances_with_public_access_enabled

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = aws_compliance.pipeline.test_detect_and_correct_rds_db_instances_with_public_access_enabled
}

Params

NameTypeRequiredDescriptionDefault
region
string
YesThe AWS region where the VPC will be created.us-east-1
conn
connection.aws
YesName of the AWS connection to be used for any authenticated actions.connection.aws.default
db_instance_identifier
string
YesA unique identifier for the DB instance.flowpipe-rds-db-instance-c0bb3143-040f-8acf-78b3-0de577d3f9f5
db_instance_class
string
YesThe compute and memory capacity of the DB instance.db.t3.micro
engine
string
YesThe database engine to use (e.g., mysql, postgres).mysql
master_username
string
YesThe username for the master user of the database.admin123
master_user_password
string
YesThe password for the master user of the database.fp214cc361-2510-e2bb-5161-01f9b00a34c9
allocated_storage
number
YesThe amount of storage in GB to allocate for the database.20
db_name
string
YesThe name of the database created in the RDS instance.flowpipe123
backup_retention_period
number
YesThe number of days to retain automated backups.1
cidr_block
string
YesThe CIDR block for the VPC.10.0.0.0/16

Outputs

NameDescription
query_output_result_after_remediation
resultResult of action verification.

Tags

folder = Tests