File tree Expand file tree Collapse file tree
infrastructure/stacks/api-layer Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -53,6 +53,7 @@ data "aws_iam_policy_document" "assumed_role_permissions_boundary" {
5353 # Kinesis Firehose - Lambda writing audit data
5454 " firehose:PutRecord" ,
5555 " firehose:PutRecordBatch" ,
56+ " kinesis:*" ,
5657
5758 # X-Ray - Lambda tracing
5859 " xray:PutTraceSegments" ,
Original file line number Diff line number Diff line change @@ -224,15 +224,15 @@ resource "aws_iam_role_policy" "kinesis_firehose_logs_policy" {
224224 " logs:CreateLogStream" ,
225225 " logs:PutLogEvents"
226226 ],
227- Resource = " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/${ module . eligibility_audit_firehose_delivery_stream . firehose_stream_name } :log-stream:*"
227+ Resource = " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/${ local . firehose_stream_name } :log-stream:*"
228228 },
229229 {
230230 Effect = " Allow" ,
231231 Action = [
232232 " logs:DescribeLogGroups" ,
233233 " logs:DescribeLogStreams"
234234 ],
235- Resource = " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/${ module . eligibility_audit_firehose_delivery_stream . firehose_stream_name } "
235+ Resource = " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/${ local . firehose_stream_name } "
236236 }
237237 ]
238238 })
Original file line number Diff line number Diff line change @@ -11,4 +11,11 @@ module "eligibility_audit_firehose_delivery_stream" {
1111 firehose_cloud_watch_log_stream = aws_cloudwatch_log_stream. firehose_audit_stream . name
1212 eligibility_lambda_role_arn = aws_iam_role. eligibility_lambda_role . arn
1313 kinesis_source_stream_arn = aws_kinesis_stream. kinesis_source_stream . arn
14+
15+ depends_on = [
16+ aws_iam_role_policy . kinesis_firehose_read_policy ,
17+ aws_iam_role_policy . firehose_kinesis_source_kms_policy ,
18+ aws_iam_role_policy . kinesis_firehose_s3_write_policy ,
19+ aws_iam_role_policy . kinesis_firehose_logs_policy ,
20+ ]
1421}
Original file line number Diff line number Diff line change @@ -10,6 +10,8 @@ locals {
1010 data . aws_ssm_parameter . mtls_api_ca_cert . value
1111 ])
1212
13+ firehose_stream_name = " ${ terraform . workspace == " default" ? " " : " ${ terraform . workspace } -" } ${ var . project_name } -${ var . environment } -audit_stream_to_s3"
14+
1315 # Toggle for deploying WAF resources in the current environment
1416 # True when var.environment is contained in var.waf_enabled_environments
1517 waf_enabled = contains (var. waf_enabled_environments , var. environment )
You can’t perform that action at this time.
0 commit comments