CloudWatch Rule Events
Jets supports CloudWatch Event Rules. This allows you to have a Lambda function run when there’s a change to AWS resources. Here’s an extensive list of supported Event Types.
Example
Generate code.
jets generate:event security --trigger rule --method detect_security_group_changes
It looks something like this.
An example might be getting notified when an unwanted security group port gets opened.
app/events/security_event.rb
class SecurityEvent < ApplicationEvent
rule_event(
description: "Checks for security group changes",
detail_type: ["AWS API Call via CloudTrail"],
detail: {
event_source: ["ec2.amazonaws.com"],
event_name: [
"AuthorizeSecurityGroupIngress",
"AuthorizeSecurityGroupEgress",
"RevokeSecurityGroupIngress",
"RevokeSecurityGroupEgress",
"CreateSecurityGroup",
"DeleteSecurityGroup"
]
}
)
def detect_security_group_changes
puts "event: #{JSON.dump(event)}" # event is available
# your logic
end
end
The rule_event
declaration creates an AWS::Events::Rule
and sets the event_pattern
attributes. The description
property is treated specially and is added as a property to the AWS::Events::Rule structure appropriately.
Note, events for security group changes come from CloudTrail and currently take about 15 minutes to be delivered. Here’s what the event rule looks like in the CloudWatch console:
Here’s an example from the CloudWatch log when the Lambda function runs:
Complete Form
If you need more control, and you can also set any properties of the AWS::Events::Rule by passing a hash. Here’s another example that detects when an instance goes into stopping state.
class SecurityEvent < ApplicationEvent
rule_event(
description: "Detects when instance stops",
event_pattern: {
source: ["aws.ec2"],
detail_type: ["EC2 Instance State-change Notification"],
detail: {
state: ["stopping"],
}
}
)
def instance_stopping
puts "event #{JSON.dump(event)}" # event is available
# logic goes here
end
end
This pattern of watching CloudWatch events can be used for things like automatically closing security group ports that get unintentionally opened. CloudWatch Events opens up a world of possibilities.
Tailing Logs
It helps to tail the logs and watch the event as it comes through.
jets logs -f -n security_event-instance_stopping
Multiple Events Support
Registering multiple events to the same Lambda function is supported. Add multiple rule_event
declarations above the method definition. Example:
class SecurityEvent < ApplicationEvent
rule_event(
source: ["aws.ec2"],
detail_type: ["EC2 Instance State-change Notification"],
detail: {
state: ["stopping"],
}
)
rule_event(
detail_type: ["AWS API Call via CloudTrail"],
detail: {
userIdentity: {
type: ["Root"]
}
}
)
rate "10 hours"
def handle_some_logic
puts "event: #{JSON.dump(event)}" # event is available
# logic goes here
end
end
Notice in the above example that you can even mix in the rate
declaration with the Lambda function. Underneath the hood rate
delegates to the rule_event
method.