Skip to content

Commit

Permalink
Adds Cloudwatch logs policy to executor role
Browse files Browse the repository at this point in the history
  • Loading branch information
bobthemighty committed Mar 31, 2022
1 parent 4a5bc5e commit a17ac37
Show file tree
Hide file tree
Showing 3 changed files with 28 additions and 0 deletions.
19 changes: 19 additions & 0 deletions infra/cloudwatch.tf
@@ -0,0 +1,19 @@
locals {
log_group_arn = "arn:aws:logs:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:log-group:/aws/lambda/${var.lambda_function_name}:*"
}

data aws_iam_policy_document cloudwatch_logs {
statement {
sid = "createLogGroup"

actions = [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents"
]

resources = [local.log_group_arn]

}

}
3 changes: 3 additions & 0 deletions infra/data.tf
@@ -0,0 +1,3 @@
data "aws_caller_identity" "current" {}

data "aws_region" "current" {}
6 changes: 6 additions & 0 deletions infra/lambda.tf
Expand Up @@ -31,4 +31,10 @@ data aws_iam_policy_document assumption_policy {
resource aws_iam_role iam_for_lambda {
name = "${var.lambda_function_name}-executor"
assume_role_policy = data.aws_iam_policy_document.assumption_policy.json


inline_policy {
name = "allow-cloudwatch-logs"
policy = data.aws_iam_policy_document.cloudwatch_logs.json
}
}

0 comments on commit a17ac37

Please sign in to comment.