Skip to content

Commit 72fef4e

Browse files
Added tag to iam policy
1 parent 304da2a commit 72fef4e

File tree

8 files changed

+15
-0
lines changed

8 files changed

+15
-0
lines changed

aws/cloudtrail/cloudtrail.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ resource "aws_iam_policy" "iam_policy" {
8888
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {
8989
BUCKET_NAME = local.bucket_name
9090
})
91+
tags = var.aws_resource_tags
9192
}
9293

9394
resource "aws_iam_role_policy_attachment" "source-role-policy-attach" {

aws/cloudwatchlogsforwarder/cloudwatchlogsforwarder.tf

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ resource "aws_iam_policy" "lambda_sqs_policy" {
4949
policy = templatefile("${path.module}/templates/lambda_sqs.tmpl", {
5050
DEAD_LETTER_QUEUE_ARN = aws_sqs_queue.sqs_queue.arn
5151
})
52+
tags = var.aws_resource_tags
5253
}
5354

5455
resource "aws_iam_role_policy_attachment" "lambda_sqs_policy_attachment" {
@@ -61,6 +62,7 @@ resource "aws_iam_policy" "create_logs_policy" {
6162
policy = templatefile("${path.module}/templates/lambda_logs.tmpl", {
6263
LOG_GROUP_ARN = aws_cloudwatch_log_group.cloudwatch_log_group.arn
6364
})
65+
tags = var.aws_resource_tags
6466
}
6567

6668
resource "aws_iam_role_policy_attachment" "create_logs_policy_attachment" {
@@ -73,6 +75,7 @@ resource "aws_iam_policy" "invoke_lambda_policy" {
7375
policy = templatefile("${path.module}/templates/invoke_lambda.tmpl", {
7476
LAMBDA_ARN = aws_lambda_function.process_dead_letter_queue_lambda.arn
7577
})
78+
tags = var.aws_resource_tags
7679
}
7780

7881
resource "aws_iam_role_policy_attachment" "invoke_lambda_policy_attachment" {

aws/cloudwatchmetrics/cloudwatchmetrics.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ resource "aws_iam_policy" "iam_policy" {
2727

2828
name = "SumoLogicCloudWatchMetricsSource-${random_string.aws_random.id}"
2929
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {})
30+
tags = var.aws_resource_tags
3031
}
3132

3233
resource "aws_iam_role_policy_attachment" "policy_attachment" {

aws/elasticloadbalancing/elb.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ resource "aws_iam_policy" "iam_policy" {
7575
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {
7676
BUCKET_NAME = local.bucket_name
7777
})
78+
tags = var.aws_resource_tags
7879
}
7980

8081
resource "aws_iam_role_policy_attachment" "source-role-policy-attach" {

aws/elb/elb.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ resource "aws_iam_policy" "iam_policy" {
7575
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {
7676
BUCKET_NAME = local.bucket_name
7777
})
78+
tags = var.aws_resource_tags
7879
}
7980

8081
resource "aws_iam_role_policy_attachment" "source-role-policy-attach" {

aws/kinesisfirehoseforlogs/kinesisfirehoseforlogs.tf

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,13 +67,15 @@ resource "aws_iam_policy" "firehose_s3_upload_policy" {
6767
BUCKET_NAME = local.bucket_name
6868
ARN = local.arn_map[local.aws_region]
6969
})
70+
tags = var.aws_resource_tags
7071
}
7172

7273
resource "aws_iam_policy" "firehose_delivery_policy" {
7374
policy = templatefile("${path.module}/templates/firehose_delivery_policy.tmpl", {
7475
KINESIS_LOG_GROUP_ARN = aws_cloudwatch_log_group.log_group.arn
7576
KINESIS_FIREHOSE_ARN = aws_kinesis_firehose_delivery_stream.logs_delivery_stream.arn
7677
})
78+
tags = var.aws_resource_tags
7779
}
7880

7981
resource "aws_iam_role_policy_attachment" "firehose_policy_attach" {
@@ -101,6 +103,7 @@ resource "aws_iam_policy" "logs_policy" {
101103
AWS_ACCOUNT = local.aws_account_id
102104
ROLE_NAME = aws_iam_role.logs_role.name
103105
})
106+
tags = var.aws_resource_tags
104107
}
105108

106109
resource "aws_iam_role_policy_attachment" "logs_policy_attach" {

aws/kinesisfirehoseformetrics/kinesisfirehoseformetrics.tf

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,13 +67,15 @@ resource "aws_iam_policy" "firehose_s3_upload_policy" {
6767
BUCKET_NAME = local.bucket_name
6868
ARN = local.arn_map[local.aws_region]
6969
})
70+
tags = var.aws_resource_tags
7071
}
7172

7273
resource "aws_iam_policy" "firehose_delivery_policy" {
7374
policy = templatefile("${path.module}/templates/firehose_delivery_policy.tmpl", {
7475
KINESIS_LOG_GROUP_ARN = aws_cloudwatch_log_group.log_group.arn
7576
KINESIS_FIREHOSE_ARN = aws_kinesis_firehose_delivery_stream.metrics_delivery_stream.arn
7677
})
78+
tags = var.aws_resource_tags
7779
}
7880

7981
resource "aws_iam_role_policy_attachment" "firehose_policy_attach" {
@@ -99,6 +101,7 @@ resource "aws_iam_policy" "metrics_policy" {
99101
AWS_ACCOUNT = local.aws_account_id
100102
ROLE_NAME = aws_iam_role.metrics_role.name
101103
})
104+
tags = var.aws_resource_tags
102105
}
103106

104107
resource "aws_iam_role_policy_attachment" "metrics_policy_attach" {
@@ -178,6 +181,7 @@ resource "aws_iam_policy" "iam_policy" {
178181

179182
name = "SumoLogicCloudWatchMetricsSource-${random_string.aws_random.id}"
180183
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {})
184+
tags = var.aws_resource_tags
181185
}
182186

183187
resource "aws_iam_role_policy_attachment" "policy_attachment" {

aws/rootcause/rootcause.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ resource "aws_iam_policy" "iam_policy" {
2727

2828
name = "SumoLogicCloudWatchMetricsSource-${random_string.aws_random.id}"
2929
policy = templatefile("${path.module}/templates/sumologic_source_policy.tmpl", {})
30+
tags = var.aws_resource_tags
3031
}
3132

3233
resource "aws_iam_role_policy_attachment" "source-role-policy-attach" {

0 commit comments

Comments
 (0)