-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🎉 Add documentation about the role creation #1
base: master
Are you sure you want to change the base?
Conversation
data "aws_iam_policy_document" "EXAMPLE_NAME" { | ||
statement { | ||
actions = ["logs:CreateLogGroup"] | ||
resources = ["arn:aws:logs:${data.aws_region.name}:${data.aws_caller_identity.current.account_id}:*"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be data.aws_region.current.name
(missing .current
)
|
||
statement { | ||
actions = ["logs:CreateLogStream", "logs:PutLogEvents"] | ||
resources = ["arn:aws:logs:${data.aws_region.name}:${data.aws_caller_identity.current.account_id}:log-group:/aws/lambda/EXAMPLE_NAME:*"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same here
@@ -0,0 +1,57 @@ | |||
# Role | |||
|
|||
Currently you manually need to create a role for the Lambda to execute as. If you are using [Terraform](https://www.terraform.io) you can use the setup below: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not anymore, but I think it's nice to still have this file? 🤔
No description provided.