diff --git a/templates/akto-mirroring-template.yaml b/templates/akto-mirroring-template.yaml index 844e40d..5026c93 100644 --- a/templates/akto-mirroring-template.yaml +++ b/templates/akto-mirroring-template.yaml @@ -932,7 +932,30 @@ Resources: var failedEnis = []; await createTrafficMirrorSessionForLBsAndTargetGroup(successEnis, failedEnis) console.log("Mirroring session created for ", JSON.stringify(successEnis)) - console.log("failed ENIs ", JSON.stringify(failedEnis)) + console.log("failed ENIs ", JSON.stringify(failedEnis)); + var responseData = {}; + responseData['successEnis'] = JSON.stringify(successEnis); + responseData['failedEnis'] = JSON.stringify(failedEnis); + + console.log("starting to invoke lambda") + + var invokeSaveCollectionNamesLambdaParams = { + FunctionName: saveCollectionNamesLambdaArn, + InvocationType: 'RequestResponse', + LogType: 'Tail' , + Payload: JSON.stringify(responseData) + } + console.log("starting to invoke lambda with params", invokeSaveCollectionNamesLambdaParams) + var lambda = new aws.Lambda(); + + lambda.invoke(invokeSaveCollectionNamesLambdaParams, function(err, data) { + if (err) console.log("finished invoke lambda err", err, err.stack); + else console.log("finished invoke lambda data", data); + }); + + console.log("finished invoke lambda"); + console.log(await wait20()); + } async function diff --git a/templates/akto-setup.yaml b/templates/akto-setup.yaml index 99d5018..a58e832 100644 --- a/templates/akto-setup.yaml +++ b/templates/akto-setup.yaml @@ -931,7 +931,29 @@ Resources: var failedEnis = []; await createTrafficMirrorSessionForLBsAndTargetGroup(successEnis, failedEnis) console.log("Mirroring session created for ", JSON.stringify(successEnis)) - console.log("failed ENIs ", JSON.stringify(failedEnis)) + console.log("failed ENIs ", JSON.stringify(failedEnis)); + var responseData = {}; + responseData['successEnis'] = JSON.stringify(successEnis); + responseData['failedEnis'] = JSON.stringify(failedEnis); + + console.log("starting to invoke lambda") + + var invokeSaveCollectionNamesLambdaParams = { + FunctionName: saveCollectionNamesLambdaArn, + InvocationType: 'RequestResponse', + LogType: 'Tail' , + Payload: JSON.stringify(responseData) + } + console.log("starting to invoke lambda with params", invokeSaveCollectionNamesLambdaParams) + var lambda = new aws.Lambda(); + + lambda.invoke(invokeSaveCollectionNamesLambdaParams, function(err, data) { + if (err) console.log("finished invoke lambda err", err, err.stack); + else console.log("finished invoke lambda data", data); + }); + + console.log("finished invoke lambda"); + console.log(await wait20()); } async function @@ -1175,7 +1197,7 @@ Resources: VolumeSize: '50' Encrypted: true MetadataOptions: - HttpTokens: required + HttpTokens: required UserData: Fn::Base64: Fn::Join: @@ -1476,6 +1498,7 @@ Resources: - Ref: AktoDashboardSecurityGroup MetadataOptions: HttpTokens: required + HttpPutResponseHopLimit: 2 BlockDeviceMappings: - DeviceName: "/dev/xvda" Ebs: @@ -1504,8 +1527,9 @@ Resources: - sudo chmod 700 cf-deploy-akto - "./cf-deploy-akto < <(echo 'test')" - sudo echo >> ~/akto/infra/docker-dashboard.env - - sudo echo AKTO_MONGO_CONN=mongodb://$AKTO_MONGO_CONN:27017/admini >> - ~/akto/infra/docker-dashboard.env + - sudo echo AKTO_MONGO_CONN=mongodb://$AKTO_MONGO_CONN:27017/admini >> ~/akto/infra/docker-dashboard.env + - Fn::Sub: sudo echo AWS_REGION=${AWS::Region} >> ~/akto/infra/docker-dashboard.env + - Fn::Sub: sudo echo AWS_DEFAULT_REGION=${AWS::Region} >> ~/akto/infra/docker-dashboard.env - curl -fsSL 'https://raw.githubusercontent.com/akto-api-security/infra/feature/segregation_2/cf-deploy-akto-start' > cf-deploy-akto-start - sudo chmod 700 cf-deploy-akto-start - "./cf-deploy-akto-start < <(echo 'test')"