Skip to content

Commit 231eb48

Browse files
authored
Merge pull request #396 from dmitchsplunk/main
Fixed logs permissions in lambda workshop
2 parents 27f6aad + 0779b1a commit 231eb48

File tree

2 files changed

+44
-0
lines changed

2 files changed

+44
-0
lines changed

workshop/lambda/auto/main.tf

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,28 @@ resource "aws_iam_role_policy_attachment" "lambda_kinesis_execution" {
3131
policy_arn = "arn:aws:iam::aws:policy/AmazonKinesisFullAccess"
3232
}
3333

34+
resource "aws_iam_policy" "lambda_cloudwatch_logs" {
35+
name = "LambdaCloudWatchLogsCustomPolicy"
36+
policy = jsonencode({
37+
"Version": "2012-10-17",
38+
"Statement": [
39+
{
40+
"Effect": "Allow",
41+
"Action": [
42+
"logs:CreateLogStream",
43+
"logs:PutLogEvents"
44+
],
45+
"Resource": "*"
46+
}
47+
]
48+
})
49+
}
50+
51+
resource "aws_iam_role_policy_attachment" "lambda_cloudwatch_logs_attachment" {
52+
role = aws_iam_role.lambda_kinesis.name
53+
policy_arn = aws_iam_policy.lambda_cloudwatch_logs.arn
54+
}
55+
3456
# Create S3 Bucket, Ownership, ACL
3557
resource "aws_s3_bucket" "lambda_bucket" {
3658
bucket = "${var.prefix}-lambda-code"

workshop/lambda/manual/main.tf

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,28 @@ resource "aws_iam_role_policy_attachment" "lambda_kinesis_execution" {
3131
policy_arn = "arn:aws:iam::aws:policy/AmazonKinesisFullAccess"
3232
}
3333

34+
resource "aws_iam_policy" "lambda_cloudwatch_logs" {
35+
name = "LambdaCloudWatchLogsCustomPolicy"
36+
policy = jsonencode({
37+
"Version": "2012-10-17",
38+
"Statement": [
39+
{
40+
"Effect": "Allow",
41+
"Action": [
42+
"logs:CreateLogStream",
43+
"logs:PutLogEvents"
44+
],
45+
"Resource": "*"
46+
}
47+
]
48+
})
49+
}
50+
51+
resource "aws_iam_role_policy_attachment" "lambda_cloudwatch_logs_attachment" {
52+
role = aws_iam_role.lambda_kinesis.name
53+
policy_arn = aws_iam_policy.lambda_cloudwatch_logs.arn
54+
}
55+
3456
# Create S3 Bucket, Ownership, ACL
3557
resource "aws_s3_bucket" "lambda_bucket" {
3658
bucket = "${var.prefix}-lambda-code"

0 commit comments

Comments
 (0)