Skip to content

Commit 23d794e

Browse files
author
Sanja Kosier
committed
remove depricated inline policy; use new resource instead
1 parent 5606c28 commit 23d794e

File tree

1 file changed

+7
-6
lines changed
  • modules/integrations/cloud-logs

1 file changed

+7
-6
lines changed

modules/integrations/cloud-logs/main.tf

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ data "sysdig_secure_tenant_external_id" "external_id" {}
2727
locals {
2828
account_id_hash = substr(md5(data.aws_caller_identity.current.account_id), 0, 4)
2929
role_name = "${var.name}-${random_id.suffix.hex}-${local.account_id_hash}"
30-
3130
bucket_arn = regex("^([^/]+)", var.folder_arn)[0]
3231
}
3332

@@ -43,12 +42,14 @@ resource "random_id" "suffix" {
4342
resource "aws_iam_role" "cloudlogs_s3_access" {
4443
name = local.role_name
4544
tags = var.tags
46-
4745
assume_role_policy = data.aws_iam_policy_document.assume_cloudlogs_s3_access_role.json
48-
inline_policy {
49-
name = "cloudlogs_s3_access_policy"
50-
policy = data.aws_iam_policy_document.cloudlogs_s3_access.json
51-
}
46+
}
47+
48+
// AWS IAM Role Policy that will be used by CloudIngestion to access the CloudTrail-associated s3 bucket
49+
resource "aws_iam_role_policy" "cloudlogs_s3_access_policy" {
50+
name = "cloudlogs_s3_access_policy"
51+
role = aws_iam_role.cloudlogs_s3_access.name
52+
policy = data.aws_iam_policy_document.cloudlogs_s3_access.json
5253
}
5354

5455
# IAM Policy Document used for the assume role policy

0 commit comments

Comments
 (0)