@@ -72,7 +72,7 @@ resource "aws_iam_policy" "api_logs_subscription_policy" {
7272 ]
7373 Resource = [
7474 " arn:aws:logs:${ var . aws_region } :${ var . immunisation_account_id } :log-group:/aws/vendedlogs/${ aws_apigatewayv2_api . service_api . id } /${ var . sub_environment } :*" ,
75- " arn:aws:logs:eu-west-2:693466633220 :destination:api_gateway_log_destination"
75+ " arn:aws:logs:${ var . aws_region } : ${ var . csoc_account_id } :destination:api_gateway_log_destination"
7676 ]
7777 }
7878 ]
@@ -84,10 +84,6 @@ resource "aws_iam_role_policy_attachment" "api_logs_subscription_policy" {
8484 policy_arn = aws_iam_policy. api_logs_subscription_policy . arn
8585}
8686
87- # TODO un-hardcode the region
88- # e.g.
89- # "logs.${data.aws_region.current.region}.amazonaws.com"
90-
9187resource "aws_iam_role" "api_logs_subscription_role" {
9288 name = " ${ var . short_prefix } -api-logs-subscription-role"
9389 assume_role_policy = jsonencode ({
@@ -96,7 +92,7 @@ resource "aws_iam_role" "api_logs_subscription_role" {
9692 Effect = " Allow" ,
9793 Sid = " " ,
9894 Principal = {
99- Service = " logs.eu-west-2 .amazonaws.com"
95+ Service = " logs.${ var . aws_region } .amazonaws.com"
10096 },
10197 Action = " sts:AssumeRole"
10298 }]
@@ -107,6 +103,6 @@ resource "aws_cloudwatch_log_subscription_filter" "api_logs_subscription_logfilt
107103 name = " ${ var . short_prefix } -api-logs-subscription-logfilter"
108104 log_group_name = aws_cloudwatch_log_group. api_access_log . name
109105 filter_pattern = " "
110- destination_arn = " arn:aws:logs:eu-west-2:693466633220 :destination:api_gateway_log_destination"
106+ destination_arn = " arn:aws:logs:${ var . aws_region } : ${ var . csoc_account_id } :destination:api_gateway_log_destination"
111107 role_arn = aws_iam_role. api_logs_subscription_role . arn
112108}
0 commit comments