@@ -22,7 +22,7 @@ data "aws_cloudwatch_log_group" "cloudtrail" {
22
22
}
23
23
24
24
resource "aws_cloudwatch_log_metric_filter" "main" {
25
- for_each = {for rule in local . alerts : rule . name => rule }
25
+ for_each = { for rule in local . alerts : rule . name => rule }
26
26
27
27
name = each. value . name
28
28
pattern = each. value . pattern
@@ -36,7 +36,7 @@ resource "aws_cloudwatch_log_metric_filter" "main" {
36
36
}
37
37
38
38
resource "aws_cloudwatch_metric_alarm" "main" {
39
- for_each = {for rule in local . alerts : rule . name => rule }
39
+ for_each = { for rule in local . alerts : rule . name => rule }
40
40
41
41
alarm_name = " ${ each . value . name } Alarm"
42
42
metric_name = " ${ each . value . name } Count"
@@ -84,7 +84,7 @@ data "aws_iam_policy_document" "kms" {
84
84
actions = [" kms:*" ]
85
85
86
86
principals {
87
- type = " AWS"
87
+ type = " AWS"
88
88
identifiers = [
89
89
" arn:aws:iam::${ data . aws_caller_identity . current . account_id } :root" ,
90
90
]
@@ -94,7 +94,7 @@ data "aws_iam_policy_document" "kms" {
94
94
statement {
95
95
sid = " CloudwatchUsage"
96
96
resources = [" *" ]
97
- actions = [
97
+ actions = [
98
98
" kms:Decrypt" ,
99
99
" kms:GenerateDataKey*"
100
100
]
@@ -134,9 +134,9 @@ module "chatbot_role" {
134
134
135
135
source = " github.com/geekcell/terraform-aws-iam-role?ref=v1"
136
136
137
- name = " ${ var . prefix } -chatbot-cloudtrail-alerts"
138
- description = " Role for AWS Chatbot to read CloudWatch alerts."
139
- policy_arns = [" arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess" ]
137
+ name = " ${ var . prefix } -chatbot-cloudtrail-alerts"
138
+ description = " Role for AWS Chatbot to read CloudWatch alerts."
139
+ policy_arns = [" arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess" ]
140
140
assume_roles = {
141
141
" Service" : {
142
142
identifiers = [" chatbot.amazonaws.com" ]
0 commit comments