forked from PokaInc/rds-events-to-cloudwatch
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtemplate.yml
85 lines (77 loc) · 2.18 KB
/
template.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
Transform: AWS::Serverless-2016-10-31
Parameters:
Environment:
Type: String
Resources:
RdsEventToCloudWatch:
Type: AWS::Serverless::Function
Properties:
Runtime: python3.9
CodeUri: src/
Handler: rds_event.send_to_cloudwatch
Role: !GetAtt RdsEventToCloudWatchRole.Arn
Timeout: 30
Environment:
Variables:
RDS_EVENT_LOG_GROUP: !Ref RdsEventLogGroup
Events:
SnsEvent:
Type: SNS
Properties:
Topic: !Ref RdsEventTopic
RdsEventLogGroup:
Type: AWS::Logs::LogGroup
DeletionPolicy: Retain
UpdateReplacePolicy: Retain
RdsEventToCloudWatchRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Statement:
- Effect: Allow
Principal:
Service:
- lambda.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: RdsEventLogGroupAccess
PolicyDocument:
Version: "2012-10-17"
Statement:
- Effect: "Allow"
Action:
- logs:PutLogEvents
- logs:DescribeLogStreams
Resource: !GetAtt RdsEventLogGroup.Arn
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
RdsEventTopic:
Type: AWS::SNS::Topic
Properties:
TopicName: !Sub "${Environment}-${AWS::StackName}"
RdsEventTopicPolicy:
Type: AWS::SNS::TopicPolicy
Properties:
PolicyDocument:
Version: "2012-10-17"
Statement:
- Sid: AWSRDSEvents
Effect: Allow
Principal: "*"
Action: sns:Publish
Resource: !Ref RdsEventTopic
Condition:
ArnLike:
AWS:SourceArn: !Sub "arn:aws:rds:${AWS::Region}:${AWS::AccountId}:*"
Topics:
- !Ref RdsEventTopic
RdsEventSubscription:
Type: AWS::RDS::EventSubscription
DependsOn: RdsEventTopicPolicy
Properties:
SnsTopicArn: !Ref RdsEventTopic
Outputs:
RdsEventLogGroup:
Value: !Ref RdsEventLogGroup
Export:
Name: !Sub "${Environment}-rds-events-to-cloudwatch:RdsEventLogGroup"