https://github.com/jeshan/aws-pipeline-errors-to-telegram
Sends CodeBuild and CodePipeline errors to Telegram
https://github.com/jeshan/aws-pipeline-errors-to-telegram
cloudformation sceptre telegram-bot
Last synced: about 1 month ago
JSON representation
Sends CodeBuild and CodePipeline errors to Telegram
- Host: GitHub
- URL: https://github.com/jeshan/aws-pipeline-errors-to-telegram
- Owner: jeshan
- License: bsd-2-clause
- Created: 2019-04-22T10:02:10.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2019-04-22T15:56:35.000Z (about 6 years ago)
- Last Synced: 2025-03-08T08:45:13.978Z (about 2 months ago)
- Topics: cloudformation, sceptre, telegram-bot
- Language: Python
- Size: 39.1 KB
- Stars: 2
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# aws-pipeline-errors-to-telegram
Sends you codebuild and codepipeline deployment failures to a (private) Telegram group.

If needed, you can create a virtual env with `pipenv install`
The build process generates boilerplate configuration with `python generate-config.py`.
Deploy this in all regions in one go with:
`sceptre launch -y app`
This includes a deployment pipeline on AWS. Or deploy the pipeline manually with this button:
You will need a telegram bot token and a telegram group (chat) id. Define them in us-east-1 as follows:
```bash
aws ssm put-parameter --name bot-token --type SecureString --value $YOUR_TOKEN --region us-east-1
aws ssm put-parameter --name /pipeline-errors-to-telegram/chat-id --type String --value $YOUR_CHAT_ID --region us-east-1
sceptre launch -y app
```## Adding private sceptre configuration
To generate sceptre configuration for a private environment, you can run something like:
`python generate-config.py production`You have the ability to provide sceptre with the necessary configuration and credentials that you will want to keep private.
Read the buildspec for this, in particular:
`aws s3 sync s3://${PRIVATE_BUCKET}/github.com/$REPO/master .`You can place your private sceptre configuration at that location in a private bucket and they will be pulled on build.
There's a script available to send these files to S3: Edit your private bucket in `upload-private-config.sh` and run it.
You need to create the role so that your deployment pipeline has permissions to deploy. run `python put-target-deployment-roles.py`
Add the target account number in `config/app/${ENV}/config.yaml`.
Then, run the pipeline. That's all what's needed for sceptre to work.