|
| 1 | +#!/usr/bin/env python3 |
| 2 | +import argparse |
| 3 | +import boto3 |
| 4 | +import json |
| 5 | +from concurrent.futures import ThreadPoolExecutor, as_completed |
| 6 | +import threading |
| 7 | + |
| 8 | +# Thread-local storage for progress tracking |
| 9 | +thread_local = threading.local() |
| 10 | + |
| 11 | + |
| 12 | +def get_log_group_resource_policies_count(logs_client): |
| 13 | + """Get count of log group resource policies.""" |
| 14 | + try: |
| 15 | + response = logs_client.describe_resource_policies() |
| 16 | + return len(response.get('resourcePolicies', [])) |
| 17 | + except Exception as e: |
| 18 | + print(f"Error getting resource policies: {e}") |
| 19 | + return 0 |
| 20 | + |
| 21 | + |
| 22 | +def get_log_groups_filters(logs_client): |
| 23 | + """Fetch all log groups and return the subscription filters.""" |
| 24 | + paginator = logs_client.get_paginator('describe_log_groups') |
| 25 | + log_groups_with_two_filters = [] |
| 26 | + |
| 27 | + for page in paginator.paginate(): |
| 28 | + for log_group in page['logGroups']: |
| 29 | + log_group_name = log_group['logGroupName'] |
| 30 | + |
| 31 | + try: |
| 32 | + response = logs_client.describe_subscription_filters( |
| 33 | + logGroupName=log_group_name |
| 34 | + ) |
| 35 | + |
| 36 | + log_groups_with_two_filters.append({ |
| 37 | + 'logGroupName': log_group_name, |
| 38 | + 'filters': response['subscriptionFilters'] |
| 39 | + }) |
| 40 | + |
| 41 | + except Exception as e: |
| 42 | + print(f"Error getting filters for {log_group_name}: {e}") |
| 43 | + |
| 44 | + return log_groups_with_two_filters |
| 45 | + |
| 46 | + |
| 47 | +def get_active_accounts(): |
| 48 | + """Get all active accounts from AWS Organizations.""" |
| 49 | + print("Fetching active accounts from AWS Organizations...") |
| 50 | + org_client = boto3.client('organizations') |
| 51 | + paginator = org_client.get_paginator('list_accounts') |
| 52 | + |
| 53 | + active_accounts = [] |
| 54 | + for page in paginator.paginate(): |
| 55 | + for account in page['Accounts']: |
| 56 | + if account['Status'] == 'ACTIVE': |
| 57 | + active_accounts.append({ |
| 58 | + 'Id': account['Id'], |
| 59 | + 'Name': account['Name'] |
| 60 | + }) |
| 61 | + |
| 62 | + print(f"Found {len(active_accounts)} active accounts") |
| 63 | + return active_accounts |
| 64 | + |
| 65 | + |
| 66 | +def assume_role_and_get_logs_client(account_id, role_name, region): |
| 67 | + """Assume role in target account and return logs client.""" |
| 68 | + sts_client = boto3.client('sts') |
| 69 | + |
| 70 | + role_arn = f"arn:aws:iam::{account_id}:role/{role_name}" |
| 71 | + response = sts_client.assume_role( |
| 72 | + RoleArn=role_arn, |
| 73 | + RoleSessionName=f"LogGroupsCheck-{account_id}" |
| 74 | + ) |
| 75 | + |
| 76 | + credentials = response['Credentials'] |
| 77 | + return boto3.client( |
| 78 | + 'logs', |
| 79 | + region_name=region, |
| 80 | + aws_access_key_id=credentials['AccessKeyId'], |
| 81 | + aws_secret_access_key=credentials['SecretAccessKey'], |
| 82 | + aws_session_token=credentials['SessionToken'] |
| 83 | + ) |
| 84 | + |
| 85 | + |
| 86 | +def process_account(account, role_name, region): |
| 87 | + """Process a single account in a specific region and return results.""" |
| 88 | + account_id = account['Id'] |
| 89 | + account_name = account['Name'] |
| 90 | + |
| 91 | + print(f"Processing: {account_name} ({account_id}) in {region}") |
| 92 | + |
| 93 | + try: |
| 94 | + logs_client = assume_role_and_get_logs_client(account_id, role_name, region) |
| 95 | + print(f" {account_name} ({region}): Assumed role successfully, checking log groups...") |
| 96 | + |
| 97 | + log_groups = get_log_groups_filters(logs_client) |
| 98 | + resource_policies_count = get_log_group_resource_policies_count(logs_client) |
| 99 | + |
| 100 | + # count log groups that have two subscription filters |
| 101 | + log_groups_with_two_filters_count = sum(1 for log_group in log_groups if len(log_group['filters']) == 2) |
| 102 | + |
| 103 | + print(f" {account_name} ({region}): Found {log_groups_with_two_filters_count} log groups with 2 subscription filters") |
| 104 | + print(f" {account_name} ({region}): Found {resource_policies_count} log group resource policies") |
| 105 | + |
| 106 | + return { |
| 107 | + 'accountId': account_id, |
| 108 | + 'accountName': account_name, |
| 109 | + 'region': region, |
| 110 | + 'resourcePoliciesCount': resource_policies_count, |
| 111 | + 'logGroupsWithTwoFiltersCount': log_groups_with_two_filters_count, |
| 112 | + 'logGroups': log_groups |
| 113 | + } |
| 114 | + |
| 115 | + except Exception as e: |
| 116 | + print(f" {account_name} ({region}): Error - {e}") |
| 117 | + return None |
| 118 | + |
| 119 | + |
| 120 | +def main(): |
| 121 | + parser = argparse.ArgumentParser( |
| 122 | + prog='log-groups-check', |
| 123 | + usage='%(prog)s [options]', |
| 124 | + description='Check for log groups with exactly 2 subscription filters across AWS accounts' |
| 125 | + ) |
| 126 | + parser.add_argument('-r', '--role-to-assume', |
| 127 | + help="Role to assume in each account") |
| 128 | + parser.add_argument('-p', '--accel-prefix', |
| 129 | + default='ASEA', help="Accelerator Prefix") |
| 130 | + parser.add_argument('--regions', nargs='+', |
| 131 | + default=['ca-central-1'], help="AWS regions to check") |
| 132 | + parser.add_argument('--max-workers', type=int, default=10, |
| 133 | + help="Maximum number of parallel workers") |
| 134 | + parser.add_argument('-o', '--output-file', default='log-groups-results.json', |
| 135 | + help="Output JSON file path") |
| 136 | + |
| 137 | + args = parser.parse_args() |
| 138 | + |
| 139 | + role_name = args.role_to_assume if args.role_to_assume else f"{args.accel_prefix}-PipelineRole" |
| 140 | + regions = args.regions |
| 141 | + max_workers = args.max_workers |
| 142 | + |
| 143 | + accounts = get_active_accounts() |
| 144 | + all_results = [] |
| 145 | + |
| 146 | + # Create account-region combinations |
| 147 | + account_region_pairs = [(account, region) for account in accounts for region in regions] |
| 148 | + |
| 149 | + print(f"\nProcessing {len(accounts)} accounts across {len(regions)} regions ({len(account_region_pairs)} total combinations) with {max_workers} parallel workers...") |
| 150 | + |
| 151 | + with ThreadPoolExecutor(max_workers=max_workers) as executor: |
| 152 | + # Submit all account-region processing tasks |
| 153 | + future_to_pair = { |
| 154 | + executor.submit(process_account, account, role_name, region): (account, region) |
| 155 | + for account, region in account_region_pairs |
| 156 | + } |
| 157 | + |
| 158 | + # Collect results as they complete |
| 159 | + for future in as_completed(future_to_pair): |
| 160 | + try: |
| 161 | + result = future.result() |
| 162 | + except Exception as e: |
| 163 | + account, region = future_to_pair[future] |
| 164 | + print(f" {account['Name']} ({region}): Failed to process - {e}") |
| 165 | + result = None |
| 166 | + if result: |
| 167 | + all_results.append(result) |
| 168 | + |
| 169 | + # Save results to JSON file |
| 170 | + with open(args.output_file, 'w') as f: |
| 171 | + json.dump(all_results, f, indent=2) |
| 172 | + |
| 173 | + # Final report |
| 174 | + total_log_groups = sum(len(result['logGroups']) for result in all_results) |
| 175 | + total_resource_policies = sum(result['resourcePoliciesCount'] for result in all_results) |
| 176 | + print("\nProcessing complete!") |
| 177 | + print(f"Results saved to: {args.output_file}") |
| 178 | + print(f"\nFinal Report: {total_log_groups} log groups across {len(all_results)} account-region combinations") |
| 179 | + print(f"Total resource policies: {total_resource_policies}") |
| 180 | + print("=" * 80) |
| 181 | + |
| 182 | + for result in all_results: |
| 183 | + if result['logGroupsWithTwoFiltersCount'] > 0 or result['resourcePoliciesCount'] > 8: |
| 184 | + print(f"\nAccount: {result['accountName']} ({result['accountId']}) - Region: {result['region']}") |
| 185 | + print(f"Resource policies: {result['resourcePoliciesCount']}") |
| 186 | + print(f"Log Groups with 2 filters: {result['logGroupsWithTwoFiltersCount']}") |
| 187 | + |
| 188 | + for lg in result['logGroups']: |
| 189 | + if len(lg['filters']) >= 2: |
| 190 | + print(f" • {lg['logGroupName']}") |
| 191 | + for i, filter_info in enumerate(lg['filters'], 1): |
| 192 | + print(f" Filter {i}: {filter_info['filterName']} -> {filter_info['destinationArn']}") |
| 193 | + |
| 194 | + |
| 195 | +if __name__ == "__main__": |
| 196 | + main() |
0 commit comments