Improve Slack alert quality: person, tags, noise reduction#120
Merged
Alexanderamiri merged 2 commits intomainfrom Mar 31, 2026
Merged
Improve Slack alert quality: person, tags, noise reduction#120Alexanderamiri merged 2 commits intomainfrom
Alexanderamiri merged 2 commits intomainfrom
Conversation
- Show GitHub actor name in "By:" line and source line instead of just the CI role name (e.g. "Alexanderamiri via javabin-ci-infra (CI/CD)") - Pass tags to deletion and modification alerts (previously only on creation) - Consolidate related deletion events on same resource (DeleteBucket, DeleteBucketWebsite, DeleteBucketPublicAccessBlock → single alert) - Suppress SecurityHub/GuardDuty findings for resources recently managed by CI (10-minute window) to avoid noise from intentional changes - Unify footer functions: replace context_footer with _build_footer so IAM changes and console logins also show actor info
Terraform Plan🚧 Changes detected — Plan: 0 to add, 2 to change, 0 to destroy. Plan outputLLM ReviewRisk: 🟢 LOW Routine Lambda function updates with source code hash changes for securityhub_summary and slack_alert functions.
|
Terraform Plan🚧 Changes detected — Plan: 0 to add, 2 to change, 0 to destroy. Plan outputLLM ReviewRisk: 🟢 LOW Routine Lambda function updates for securityhub_summary and slack_alert with code hash changes.
|
Alexanderamiri
added a commit
that referenced
this pull request
May 9, 2026
## Summary - **Show person in alerts**: "By: Alexanderamiri via javabin-ci-infra (CI/CD)" instead of just "javabin-ci-infra (CI/CD)". Also adds "— by Alexanderamiri" to the source line. The data was already parsed from the session name but never displayed. - **Tags on all alert types**: Deletion and modification alerts now show tags (team, service, created-by, commit, etc.) — previously only creation alerts did. - **Consolidate deletion noise**: Multiple Delete* events on the same resource within 5 minutes (e.g. DeleteBucketWebsite + DeleteBucket + DeleteBucketPublicAccessBlock) now produce only one alert instead of three. - **Suppress CI-triggered security findings**: SecurityHub and GuardDuty findings for resources recently created/modified/deleted by CI (10-minute window) are suppressed. This prevents noise like "S3 should block public access" firing because CI just deleted a bucket. - **Unified footer**: Replaced `context_footer` with `_build_footer` everywhere so IAM changes and console logins also show actor info. ## Test plan - [ ] Merge and let CI deploy the updated lambda - [ ] Trigger a CI change that creates/modifies/deletes a resource - [ ] Verify Slack alert shows person name in "By:" line and source line - [ ] Verify tags appear in deletion/modification alerts - [ ] Verify only one alert fires for multi-step deletions (e.g. S3 bucket) - [ ] Verify no SecurityHub/GuardDuty noise for the CI-managed resource
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
context_footerwith_build_footereverywhere so IAM changes and console logins also show actor info.Test plan