AWSConfigRemediation-EnableRedshiftClusterAuditLogging
Description
The AWSConfigRemediation-EnableRedshiftClusterAuditLogging
runbook
enables audit logging for the Amazon Redshift cluster you specify.
Document type
Automation
Owner
Amazon
Platforms
Databases
Parameters
-
AutomationAssumeRole
Type: String
Description: (Required) The Amazon Resource Name (ARN) of the Amazon Identity and Access Management (IAM) role that allows Systems Manager Automation to perform the actions on your behalf.
-
BucketName
Type: String
Description: (Required) The name of the Amazon Simple Storage Service (Amazon S3) bucket you want to upload logs to.
-
ClusterIdentifier
Type: String
Description: (Required) The unique identifier of the cluster you want to enable audit logging on.
-
S3KeyPrefix
Type: String
Description: (Optional) The Amazon S3 key prefix (subfolder) you want to upload logs to.
Required IAM permissions
The AutomationAssumeRole
parameter requires the following actions to
use the runbook successfully.
-
ssm:StartAutomationExecution
-
ssm:GetAutomationExecution
-
redshift:DescribeLoggingStatus
-
redshift:EnableLogging
-
s3:GetBucketAcl
-
s3:PutObject
Document Steps
-
aws:branch
- Branches based on whether a value was specified for theS3KeyPrefix
parameter. -
aws:executeAwsApi
- Enables audit logging on the cluster specified in theClusterIdentifier
parameter. -
aws:assertAwsResourceProperty
- Verifies audit logging was enabled on the cluster.