Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
aws-to-slack
Advanced tools
Readme
Forward AWS CloudWatch Alarms and other notifications from Amazon SNS to Slack.
AWS-to-Slack is a Lambda function written in Node.js that forwards alarms and notifications to a dedicated Slack channel. It self-hosted in your own AWS environment and doesn't have any 3rd party dependencies other than the Google Charts API for rendering CloudWatch metrics.
Supported notification formats:
Additional formats will be added; Pull Requests are welcome!
Ready to try it for yourself? Installation into your own AWS environment is as
simple as pressing the button below (for installation outside of us-east-1
see details below):
The Lambda function communicates with Slack through a Slack webhook webhook. Note that you can either create an app, or a custom integration > Incoming webhook (easier, will only let you add a webhook)
Note that the AWS region will be the region from which you launch the CloudFormation wizard, which will also scope the resources (SNS, etc.) to that region.
Launch the CloudFormation Stack by using our preconfigured CloudFormation template or by simply pressing the following button:
Region | Launch Stack |
---|---|
us-east-1 | |
us-east-2 | |
us-west-1 | |
us-west-2 | |
ap-northeast-1 | |
ap-northeast-2 | |
ap-south-1 | |
ap-southeast-1 | |
ap-southeast-2 | |
ca-central-1 | |
eu-central-1 | |
eu-west-1 | |
eu-west-2 | |
eu-west-3 | |
sa-east-1 |
Afterwards
Click "Next" and on the following page name your new stack and paste the webhook URL from before into the "HookUrl" field. You can also configure a different channel to post to if wanted.
Click "Next" again, complete the stack setup on the following pages and finally launch your stack.
Before the Lambda function will actually do anything you need to subscribe it to actual CloudWatch alarms and other SNS triggers. Open up the AWS Lambda, switch to the "Triggers" tab and subscribe for all events you're interested in.
CodeBuild integration was suggested by ericcj and is based on the Medium post Monitor your AWS CodeBuilds via Lambda and Slack by Randy Findley.
To enable CodeBuild notifications add a new CloudWatch Event Rule, choose CodeBuild
as source and CodeBuild Build State Change as type. As Target select the aws-to-slack
Lambda. You can leave all other settings as is. Once your rule is created all CodeBuild
build state events will be forwarded to your Slack channel.
You want to contribute? That's awesome! 🎉
Check out our issues page for some ideas how to contribute and a list of open tasks. There're plenty of notification formats that still need to be supported.
The repository comes with a very simple Makefile
to build the CloudFormation
stack yourself. Simply run
make deps
make package
To generate a new release.zip
in the build
folder. Upload this zip to your
AWS Lambda function and you're good to go.
FAQs
Forward AWS Notification Messages to Slack
The npm package aws-to-slack receives a total of 7 weekly downloads. As such, aws-to-slack popularity was classified as not popular.
We found that aws-to-slack demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.