After careful consideration, the CloudHealth product team has decided to end-of-life AWS Config Items reporting. Specifically, the AWS Config event tracking (Reports > Governance > AWS Config) and per resource config event mapping on the AWS Config tab of the asset details pages (Assets > By Service > AWS > EC2 > Instances > [Resource-Id]) are being impacted. These reports will be removed from the platform on March 25, 2020. AWS Config Rules and Evaluation Results reporting will remain unaffected.
Based on an extensive analysis, we determined that due to low feature adoption and limited value-add for our customers, it would benefit the vast majority of our users to free up the engineering resources committed to the upkeep of these reports. As a result, our engineering resources will shift focus to expanding and improving our compliance reporting based on Config Rules and Evaluation Results.
Please reach out to aws-config-deprecation@groups.vmware.com for any questions or concerns regarding this announcement.
We’re in the process of upgrading the logic to verify bucket public accessibility through AWS. There is an additional permission that you need to add to your IAM policy associated with our assumed role:
s3:GetBucketPolicyStatus
Learn more about updating AWS account policies in this Help Center article.
As previously announced, we added support for collecting EC2 disk and memory metrics pushed by the CloudWatch agent to any of the following custom Namespaces:
CWAgent
System/Linux
System/Windows
This week, we made it more useful by adding support for collecting EC2 disk and memory metrics pushed by PERL scripts to any of the aforementioned custom Namespaces. You can enable this integration by selecting the appropriate Namespaces on the CloudHealth Account Setup Page.
Once an account has Namespaces, the data will appear in CloudHealth for use in functionality such as EC2 Rightsizing. If you haven’t already been using our CloudWatch integration, you’ll also need to enable the CloudWatch integration and provide the following IAM permissions to our assumed role:
cloudwatch:GetMetricData
cloudwatch:ListMetrics
Learn more about the custom CloudWatch Namespaces integration in this Help Center article.