-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy patheventbridge.tf
More file actions
82 lines (71 loc) · 2.22 KB
/
eventbridge.tf
File metadata and controls
82 lines (71 loc) · 2.22 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
resource "aws_cloudwatch_event_bus" "everything" {
name = "${var.api_name}-${terraform.workspace}"
}
resource "aws_cloudwatch_event_rule" "everything" {
name = "${var.api_name}-capture-everything-${terraform.workspace}"
description = "I really want everything"
event_bus_name = aws_cloudwatch_event_bus.everything.name
event_pattern = jsonencode({
"account": [data.aws_caller_identity.current.account_id]
})
}
resource "aws_cloudwatch_event_target" "firehose" {
event_bus_name = aws_cloudwatch_event_bus.everything.name
rule = aws_cloudwatch_event_rule.everything.name
#target_id = "ToFirehose"
arn = aws_kinesis_firehose_delivery_stream.firehose.arn
role_arn = aws_iam_role.eventbridge_delivery_role.arn
dead_letter_config {
arn = "arn:aws:sqs:${data.aws_region.current.region}:${data.aws_caller_identity.current.account_id}:SQS_QUEUE_NAME"
}
}
resource "aws_iam_role" "eventbridge_delivery_role" {
name_prefix = "${var.api_name}-eb-delivery-${terraform.workspace}"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "events.amazonaws.com"
}
}
]
})
}
resource "aws_iam_role_policy" "eventbridge_delivery_role_policy" {
name_prefix = "${var.api_name}-eventbridge-delivery-role-policy-${terraform.workspace}"
role = aws_iam_role.eventbridge_delivery_role.id
policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Effect = "Allow"
Action = [
"firehose:PutRecord",
]
Resource = [aws_kinesis_firehose_delivery_stream.firehose.arn]
}
]
})
}
# Expanded Firehose IAM role to allow more actions
resource "aws_iam_role_policy" "eventbridge_delivery_role_extended_policy" {
name_prefix = "${var.api_name}-firehose-extended-policy-${terraform.workspace}"
role = aws_iam_role.eventbridge_delivery_role.id
policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Effect = "Allow"
Action = [
"logs:PutLogEvents",
"logs:CreateLogGroup",
"logs:CreateLogStream"
]
Resource = ["*"]
}
]
})
}