Skip to content

feat: add blue-green deployment configuration #43

feat: add blue-green deployment configuration

feat: add blue-green deployment configuration #43

Triggered via pull request September 26, 2025 02:50
Status Failure
Total duration 45s
Artifacts

pr.yml

on: pull_request
terraform-format-test  /  Terraform Format Check
4s
terraform-format-test / Terraform Format Check
terraform-docs  /  docs
11s
terraform-docs / docs
tfscan  /  checkov-action
19s
tfscan / checkov-action
Fit to window
Zoom out
Zoom in

Annotations

10 errors
tfscan / checkov-action: rds_cluster/main.tf#L34
CKV_AWS_149: "Ensure that Secrets Manager secret is encrypted using KMS CMK"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_327: "Ensure RDS Clusters are encrypted using KMS CMKs"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_162: "Ensure RDS cluster has IAM authentication enabled"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_324: "Ensure that RDS Cluster log capture is enabled"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_313: "Ensure RDS cluster configured to copy tags to snapshots"
tfscan / checkov-action: ecs_task_security_group.tf#L1
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
tfscan / checkov-action: ecs_task_definitions.tf#L24
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_66: "Ensure that CloudWatch Log Group specifies retention days"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"