Skip to content

Commit 0b85c25

Browse files
committed
CCM-9868: Adding subfilter to lambda module
1 parent dba4deb commit 0b85c25

22 files changed

+91
-5
lines changed

infrastructure/terraform/components/app/module_backend_api.tf

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,4 +21,7 @@ module "backend_api" {
2121
enable_letters = var.enable_letters
2222
enable_proofing = var.enable_proofing
2323
letter_suppliers = var.letter_suppliers
24+
destination_arn = "arn:aws:logs:${var.region}:${var.observability_account_id}:destination:nhs-notify-main-acct-firehose-logs"
25+
subscription_role_arn = local.acct.log_subscription_role_arn
26+
2427
}

infrastructure/terraform/modules/backend-api/cloudwatch_log_group_api_gateway_access.tf

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,3 +2,11 @@ resource "aws_cloudwatch_log_group" "api_gateway_access" {
22
name = "/aws/api-gateway/${aws_api_gateway_rest_api.main.id}/${var.environment}/access-logs"
33
retention_in_days = var.log_retention_in_days
44
}
5+
6+
resource "aws_cloudwatch_log_subscription_filter" "api_gateway_access" {
7+
name = replace(aws_cloudwatch_log_group.api_gateway_access.name, "/", "-")
8+
log_group_name = aws_cloudwatch_log_group.api_gateway_access.name
9+
filter_pattern = ""
10+
destination_arn = var.destination_arn
11+
role_arn = var.subscription_role_arn
12+
}

infrastructure/terraform/modules/backend-api/cloudwatch_log_group_api_gateway_execution.tf

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,11 @@ resource "aws_cloudwatch_log_group" "api_gateway_execution" {
55
)
66
retention_in_days = var.log_retention_in_days
77
}
8+
9+
resource "aws_cloudwatch_log_subscription_filter" "api_gateway_execution" {
10+
name = replace(aws_cloudwatch_log_group.api_gateway_execution.name, "/", "-")
11+
log_group_name = aws_cloudwatch_log_group.api_gateway_execution.name
12+
filter_pattern = ""
13+
destination_arn = var.destination_arn
14+
role_arn = var.subscription_role_arn
15+
}

infrastructure/terraform/modules/backend-api/module_authorizer_lambda.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ module "authorizer_lambda" {
1919
USER_POOL_ID = var.cognito_config["USER_POOL_ID"],
2020
USER_POOL_CLIENT_ID = var.cognito_config["USER_POOL_CLIENT_ID"],
2121
}
22+
destination_arn = var.destination_arn
23+
subscription_role_arn = var.subscription_role_arn
2224
}
2325

2426
module "authorizer_build" {

infrastructure/terraform/modules/backend-api/module_create_letter_template_lambda.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ module "create_letter_template_lambda" {
1616
environment_variables = local.backend_lambda_environment_variables
1717

1818
execution_role_policy_document = data.aws_iam_policy_document.create_letter_template_lambda_policy.json
19+
destination_arn = var.destination_arn
20+
subscription_role_arn = var.subscription_role_arn
1921
}
2022

2123
data "aws_iam_policy_document" "create_letter_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_create_template_lambda.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ module "create_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.create_template_lambda_policy.json
18+
destination_arn = var.destination_arn
19+
subscription_role_arn = var.subscription_role_arn
1820
}
1921

2022
data "aws_iam_policy_document" "create_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_delete_template_lambda.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ module "delete_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.delete_template_lambda_policy.json
18+
destination_arn = var.destination_arn
19+
subscription_role_arn = var.subscription_role_arn
1820
}
1921

2022
data "aws_iam_policy_document" "delete_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_get_template_lambda.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ module "get_template_lambda" {
1515
environment_variables = local.backend_lambda_environment_variables
1616

1717
execution_role_policy_document = data.aws_iam_policy_document.get_template_lambda_policy.json
18+
destination_arn = var.destination_arn
19+
subscription_role_arn = var.subscription_role_arn
1820
}
1921

2022
data "aws_iam_policy_document" "get_template_lambda_policy" {

infrastructure/terraform/modules/backend-api/module_lambda_copy_scanned_object_to_internal.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ module "lambda_copy_scanned_object_to_internal" {
1111
source_code_hash = module.build_template_lambda.zips[local.backend_lambda_entrypoints.copy_scanned_object_to_internal].base64sha256
1212

1313
environment_variables = local.backend_lambda_environment_variables
14+
destination_arn = var.destination_arn
15+
subscription_role_arn = var.subscription_role_arn
1416
}
1517

1618
data "aws_iam_policy_document" "copy_scanned_object_to_internal" {

infrastructure/terraform/modules/backend-api/module_lambda_delete_failed_scanned_object.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ module "lambda_delete_failed_scanned_object" {
1010
log_retention_in_days = var.log_retention_in_days
1111
source_code_hash = module.build_template_lambda.zips[local.backend_lambda_entrypoints.delete_failed_scanned_object].base64sha256
1212
environment_variables = local.backend_lambda_environment_variables
13+
destination_arn = var.destination_arn
14+
subscription_role_arn = var.subscription_role_arn
1315
}
1416

1517
data "aws_iam_policy_document" "delete_failed_scanned_object" {

0 commit comments

Comments
 (0)