fluidasserts.cloud.aws.redshift module

AWS cloud checks (Redshift).

fluidasserts.cloud.aws.redshift.has_encryption_disabled(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters has encryption disabled.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Returns

  • OPEN if there are clusters with encryption disabled.

  • UNKNOWN on errors.

  • CLOSED otherwise.

Return type

fluidasserts.Result

fluidasserts.cloud.aws.redshift.has_public_clusters(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters are publicly accessible.

Parameters
  • key_id (str) – AWS Key Id

  • secret (str) – AWS Key Secret

Return type

tuple

fluidasserts.cloud.aws.redshift.is_audit_logging_disabled(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters have audit logging disabled.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Return type

tuple

fluidasserts.cloud.aws.redshift.is_not_upgrade_allowed(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters have version upgrading disabled.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Return type

tuple

fluidasserts.cloud.aws.redshift.is_user_activity_logging_disabled(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters does not log user activity.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Return type

tuple

fluidasserts.cloud.aws.redshift.not_requires_ssl(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters do not require use of SSL.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Return type

tuple

fluidasserts.cloud.aws.redshift.uses_default_kms_key(key_id, secret, session_token=None, retry=True)

Check if Redshift clusters use default KMS key for encryption.

Parameters
  • key_id (str) – AWS Key Id.

  • secret (str) – AWS Key Secret.

Return type

tuple