From b4c4a46cc67106b1e82bd1e9c0d90640849b6ac4 Mon Sep 17 00:00:00 2001 From: Toni de la Fuente Date: Tue, 23 Apr 2019 11:32:56 -0400 Subject: [PATCH] Fixed issue #315 --- checks/check_extra712 | 2 +- checks/check_extra741 | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/checks/check_extra712 b/checks/check_extra712 index 641e03ef..60e71566 100644 --- a/checks/check_extra712 +++ b/checks/check_extra712 @@ -22,7 +22,7 @@ extra712(){ textInfo "just looking if IAM Macie related permissions exist. " MACIE_IAM_ROLES_CREATED=$($AWSCLI iam list-roles $PROFILE_OPT --query 'Roles[*].Arn'|grep AWSMacieServiceCustomer|wc -l) if [[ $MACIE_IAM_ROLES_CREATED -eq 2 ]];then - textPass "Macie related IAM roles exist, so it might be enabled. Check it out manually." + textPass "Macie related IAM roles exist so it might be enabled. Check it out manually." else textFail "No Macie related IAM roles found. It is most likely not to be enabled" fi diff --git a/checks/check_extra741 b/checks/check_extra741 index f689bc18..2bf05f1a 100644 --- a/checks/check_extra741 +++ b/checks/check_extra741 @@ -17,7 +17,7 @@ CHECK_TYPE_extra741="EXTRA" CHECK_ALTERNATE_check741="extra741" extra741(){ - textInfo "Looking for keys in EC2 User Data in instances across all regions... (max 100 instances per region, use -m to increase it) " + textInfo "Looking for keys in EC2 User Data in instances across all regions... (max 100 instances per region use -m to increase it) " for regx in $REGIONS; do LIST_OF_EC2_INSTANCES=$($AWSCLI ec2 describe-instances $PROFILE_OPT --region $regx --query Reservations[*].Instances[*].InstanceId --output text --max-items $MAXITEMS | grep -v None) if [[ $LIST_OF_EC2_INSTANCES ]];then