npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

cloudflare-security-events

v0.1.31

Published

Deliver Cloudflare logs to Google Cloud Security Command Center

Downloads

100

Readme

Cloudflare Security Events

Extend your security view from the edge.

Automatic Installation

Quickstart

Open in Cloud Shell

IAM Permissions

Google Cloud Security Command Center makes use of organization and project-level IAM permissions. As such, the person who deploys this integration will need to have the Organization Admin role.

.env.yml

If you run into errors, the cause is most like your permissions scope. Fix these by modifying .env.yml:

cd cloudflare-security-events/deployment
vim .env.yml

Unless otherwise specified during onboarding, .env.yml looks inside the project (PROJECT_ID) for the BigQuery table and Cloud Storage bucket:

// default settings – cloudflare_logs.camiliame_logs must be under active-incline-183216 for this to work
PROJECT_ID: active-incline-183216
GCLOUD_ORG: '1065635207347'
CREDENTIALS: ./scc_key.json
BUCKET_NAME: cloudflare-logs-bucket
BQ_DATASET: cloudflare_dataset.events_table
SERVICE_ACCOUNT: gcp-gcp-admin
BASE_DIR: /usr/local/scc-serverless
DEPLOYMENT_DIR: /usr/local/scc-serverless/deployment

You can reassign environment variables to be project-specific like this:

BQ_DATASET: some-project-200019.cloudflare_logs.some_table

Manual Installation & API

Note: if you don't have Logpush setup to stream logs in Google Cloud Storage, reach out to your customer success manager or go here if you know what you're doing: https://dash.cloudflare.com?analytics

Open Google Cloud Shell and clone this repository, then set Cloudshell to the project you use to store Cloudflare logs

gcloud config set project MY_PROJECT

Enter project directory and install dependencies:

cd cloudflare-security-events
npm install

Enable the necessary Cloud APIs to run the Cloudflare integration

cfse enableAPIs

Set Environment Variables and rewrite deployment files

cfse setEnv

Get service account key. Service Account will be created for you if necessary

cfse getServiceAcctKey

Deploy integration

cfse deploy

Test Configuration

cfse scc post