File tree Expand file tree Collapse file tree 18 files changed +68
-44
lines changed
evaluators/sns-sqs-lambda
scheduled-task-instrumented Expand file tree Collapse file tree 18 files changed +68
-44
lines changed Original file line number Diff line number Diff line change @@ -36,5 +36,5 @@ No modules.
36
36
37
37
| Name | Description |
38
38
| ------| -------------|
39
- | <a name =" output_centralized_log_group_arn " ></a > [ centralized\_ log\_ group\_ arn ] ( #output\_ centralized\_ log\_ group\_ arn ) | The ARN of the centralized log group |
39
+ | <a name =" output_centralized_log_group_name " ></a > [ centralized\_ log\_ group\_ name ] ( #output\_ centralized\_ log\_ group\_ name ) | The name of the centralized log group |
40
40
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
Original file line number Diff line number Diff line change 1
1
locals {
2
- log_group_name = " ${ var . project } -${ var . venue } -inititator -centralized-log-group"
2
+ log_group_name = " ${ var . project } -${ var . venue } -initiator -centralized-log-group"
3
3
tags = {
4
4
Venue = " dev"
5
5
ServiceArea = " cs"
Original file line number Diff line number Diff line change 1
1
resource "aws_cloudwatch_log_group" "centralized_log_group" {
2
- name = " /aws/lambda /${ local . log_group_name } "
2
+ name = " /unity/log /${ local . log_group_name } "
3
3
retention_in_days = 14
4
4
tags = local. tags
5
5
}
Original file line number Diff line number Diff line change 1
- output "centralized_log_group_arn " {
2
- description = " The ARN of the centralized log group"
3
- value = aws_cloudwatch_log_group. centralized_log_group . arn
1
+ output "centralized_log_group_name " {
2
+ description = " The name of the centralized log group"
3
+ value = aws_cloudwatch_log_group. centralized_log_group . name
4
4
}
Original file line number Diff line number Diff line change @@ -27,14 +27,14 @@ No modules.
27
27
28
28
| Name | Type |
29
29
| ------| ------|
30
- | [ aws_cloudwatch_log_group.evaluator_lambda_log_group] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group ) | resource |
31
30
| [ aws_iam_policy.evaluator_lambda_policy] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
32
31
| [ aws_iam_role.evaluator_lambda_iam_role] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
33
32
| [ aws_iam_role_policy_attachment.aws_xray_write_only_access] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
34
33
| [ aws_iam_role_policy_attachment.lambda_base_policy_attachment] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
35
34
| [ aws_iam_role_policy_attachment.lambda_policy_attachment] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
36
35
| [ aws_lambda_event_source_mapping.evaluator_queue_event_source_mapping] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_event_source_mapping ) | resource |
37
36
| [ aws_lambda_function.evaluator_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function ) | resource |
37
+ | [ aws_lambda_function_event_invoke_config.invoke_config] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function_event_invoke_config ) | resource |
38
38
| [ aws_s3_object.lambda_package] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_object ) | resource |
39
39
| [ aws_sns_topic.evaluator_topic] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic ) | resource |
40
40
| [ aws_sns_topic_policy.evaluator_topic_policy] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_policy ) | resource |
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ resource "aws_s3_object" "lambda_package" {
18
18
}
19
19
20
20
resource "aws_lambda_function" "evaluator_lambda" {
21
- depends_on = [aws_s3_object . lambda_package , aws_cloudwatch_log_group . evaluator_lambda_log_group ]
21
+ depends_on = [aws_s3_object . lambda_package ]
22
22
function_name = local. function_name
23
23
s3_bucket = var. code_bucket
24
24
s3_key = " ${ var . evaluator_name } -${ jsondecode (data. local_file . version . content ). version } -lambda.zip"
@@ -31,11 +31,17 @@ resource "aws_lambda_function" "evaluator_lambda" {
31
31
tracing_config {
32
32
mode = " Active"
33
33
}
34
+
35
+ logging_config {
36
+ log_format = " Text"
37
+ log_group = " /unity/log/${ var . project } -${ var . venue } -initiator-centralized-log-group"
38
+ }
34
39
}
35
40
36
- resource "aws_cloudwatch_log_group" "evaluator_lambda_log_group" {
37
- name = " /aws/lambda/${ local . function_name } "
38
- retention_in_days = 14
41
+ resource "aws_lambda_function_event_invoke_config" "invoke_config" {
42
+ function_name = aws_lambda_function. evaluator_lambda . function_name
43
+ maximum_event_age_in_seconds = 21600
44
+ maximum_retry_attempts = 0
39
45
}
40
46
41
47
resource "aws_iam_role" "evaluator_lambda_iam_role" {
Original file line number Diff line number Diff line change @@ -26,7 +26,6 @@ No modules.
26
26
27
27
| Name | Type |
28
28
| ------| ------|
29
- | [ aws_cloudwatch_log_group.initiator_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group ) | resource |
30
29
| [ aws_iam_policy.initiator_lambda_policy] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
31
30
| [ aws_iam_role.initiator_lambda_iam_role] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
32
31
| [ aws_iam_role_policy_attachment.aws_xray_write_only_access] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
@@ -35,6 +34,7 @@ No modules.
35
34
| [ aws_iam_role_policy_attachment.lambda_sns_policy_attachment] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
36
35
| [ aws_lambda_event_source_mapping.initiator_queue_event_source_mapping] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_event_source_mapping ) | resource |
37
36
| [ aws_lambda_function.initiator_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function ) | resource |
37
+ | [ aws_lambda_function_event_invoke_config.invoke_config] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function_event_invoke_config ) | resource |
38
38
| [ aws_s3_object.lambda_package] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_object ) | resource |
39
39
| [ aws_sns_topic.initiator_topic] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic ) | resource |
40
40
| [ aws_sns_topic_subscription.initiator_subscription] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription ) | resource |
Original file line number Diff line number Diff line change 1
1
locals {
2
- function_name = " ${ var . project } -${ var . venue } -inititator "
2
+ function_name = " ${ var . project } -${ var . venue } -initiator "
3
3
tags = {
4
4
Venue = " dev"
5
5
ServiceArea = " cs"
Original file line number Diff line number Diff line change @@ -18,8 +18,8 @@ resource "aws_s3_object" "lambda_package" {
18
18
}
19
19
20
20
resource "aws_lambda_function" "initiator_lambda" {
21
- depends_on = [aws_s3_object . lambda_package , aws_cloudwatch_log_group . initiator_lambda ]
22
- function_name = " ${ var . project } -${ var . venue } -inititator "
21
+ depends_on = [aws_s3_object . lambda_package ]
22
+ function_name = " ${ var . project } -${ var . venue } -initiator "
23
23
s3_bucket = var. code_bucket
24
24
s3_key = " unity_initiator-${ jsondecode (data. local_file . version . content ). version } -lambda.zip"
25
25
handler = " unity_initiator.cloud.lambda_handler.lambda_handler_initiator"
@@ -37,13 +37,18 @@ resource "aws_lambda_function" "initiator_lambda" {
37
37
mode = " Active"
38
38
}
39
39
40
+ logging_config {
41
+ log_format = " Text"
42
+ log_group = " /unity/log/${ var . project } -${ var . venue } -initiator-centralized-log-group"
43
+ }
44
+
40
45
tags = local. tags
41
46
}
42
47
43
- resource "aws_cloudwatch_log_group " "initiator_lambda " {
44
- name = " /aws/lambda/ ${ var . project } - ${ var . venue } -inititator "
45
- retention_in_days = 14
46
- tags = local . tags
48
+ resource "aws_lambda_function_event_invoke_config " "invoke_config " {
49
+ function_name = aws_lambda_function . initiator_lambda . function_name
50
+ maximum_event_age_in_seconds = 21600
51
+ maximum_retry_attempts = 0
47
52
}
48
53
49
54
resource "aws_iam_role" "initiator_lambda_iam_role" {
Original file line number Diff line number Diff line change @@ -27,7 +27,6 @@ No modules.
27
27
28
28
| Name | Type |
29
29
| ------| ------|
30
- | [ aws_cloudwatch_log_group.cmr_query_lambda_log_group] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group ) | resource |
31
30
| [ aws_dynamodb_table.cmr_table] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table ) | resource |
32
31
| [ aws_iam_policy.dynamodb_crud_policy] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
33
32
| [ aws_iam_policy.scheduler] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy ) | resource |
@@ -39,6 +38,7 @@ No modules.
39
38
| [ aws_iam_role_policy_attachment.lambda_sns_policy_attachment] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
40
39
| [ aws_iam_role_policy_attachment.scheduler] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment ) | resource |
41
40
| [ aws_lambda_function.cmr_query_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function ) | resource |
41
+ | [ aws_lambda_function_event_invoke_config.invoke_config] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function_event_invoke_config ) | resource |
42
42
| [ aws_s3_object.lambda_package] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_object ) | resource |
43
43
| [ aws_scheduler_schedule.run_cmr_query] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/scheduler_schedule ) | resource |
44
44
| [ null_resource.build_lambda_package] ( https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource ) | resource |
You can’t perform that action at this time.
0 commit comments