Skip to content

Commit 8e40ce7

Browse files
author
Sanja Kosier
committed
remove depricated inline policy; use new resource instead
1 parent 5606c28 commit 8e40ce7

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

modules/integrations/cloud-logs/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ No modules.
3131
|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|------|
3232
| [random_id.suffix](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/id) | resource |
3333
| [aws_iam_role.cloudlogs_s3_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
34+
| [aws_iam_role_policy.cloudlogs_s3_access_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
3435
| [aws_iam_policy_document.assume_cloudlogs_s3_access_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
3536
| [aws_iam_policy_document.cloudlogs_s3_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
3637
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |

modules/integrations/cloud-logs/main.tf

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ data "sysdig_secure_tenant_external_id" "external_id" {}
2727
locals {
2828
account_id_hash = substr(md5(data.aws_caller_identity.current.account_id), 0, 4)
2929
role_name = "${var.name}-${random_id.suffix.hex}-${local.account_id_hash}"
30-
3130
bucket_arn = regex("^([^/]+)", var.folder_arn)[0]
3231
}
3332

@@ -43,12 +42,14 @@ resource "random_id" "suffix" {
4342
resource "aws_iam_role" "cloudlogs_s3_access" {
4443
name = local.role_name
4544
tags = var.tags
46-
4745
assume_role_policy = data.aws_iam_policy_document.assume_cloudlogs_s3_access_role.json
48-
inline_policy {
49-
name = "cloudlogs_s3_access_policy"
50-
policy = data.aws_iam_policy_document.cloudlogs_s3_access.json
51-
}
46+
}
47+
48+
// AWS IAM Role Policy that will be used by CloudIngestion to access the CloudTrail-associated s3 bucket
49+
resource "aws_iam_role_policy" "cloudlogs_s3_access_policy" {
50+
name = "cloudlogs_s3_access_policy"
51+
role = aws_iam_role.cloudlogs_s3_access.name
52+
policy = data.aws_iam_policy_document.cloudlogs_s3_access.json
5253
}
5354

5455
# IAM Policy Document used for the assume role policy

0 commit comments

Comments
 (0)