Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SST adds unwanted CloudWatch Subscription Filter #3746

Closed
bram-l opened this issue Apr 16, 2024 · 2 comments
Closed

SST adds unwanted CloudWatch Subscription Filter #3746

bram-l opened this issue Apr 16, 2024 · 2 comments

Comments

@bram-l
Copy link

bram-l commented Apr 16, 2024

We have noticed that CloudWatch Log Groups for Lambda functions deployed with SST (V2) have a Subscription Filter that seems
to forward logs to an external account:

$ aws logs describe-subscription-filters --log-group-name "/aws/lambda/***"

{
    "subscriptionFilters": [
        {
            "filterName": "sst#***#***#***#***",
            "logGroupName": "/aws/lambda/***",
            "filterPattern": "?\"Invoke Error\" ?\"Error: Runtime exited\" ?\"Task timed out after\" ?\"\tERROR\t\" ?\"[ERROR]\"",
            "destinationArn": "arn:aws:logs:eu-west-1:226609089145:destination:sst#***#***#***#***",
            "distribution": "ByLogStream",
            "creationTime": 1710931935292
        }
    ]
}

This has raised security concerns as the 226609089145 account is not ours. I see it referenced in other places in the SST repos, so I'd assume it's owned by the team maintaining SST. Even though a very specific filter pattern is being used, it does include application error logs which might contain sensitive information.

Could you please share what this is used for, and more importantly, how can we disable this behaviour?

@jayair
Copy link
Contributor

jayair commented Apr 16, 2024

Did you enable the SST Console? https://docs.sst.dev/console#how-it-works

@bram-l
Copy link
Author

bram-l commented Apr 17, 2024

Thanks @jayair! I wasn't aware, but Indeed somebody had signed up for SST Console granting this permission..

@bram-l bram-l closed this as completed Apr 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants