AHA is an incident management & communication framework to provide real-time alert customers when there are active AWS event(s). For customers with AWS Organizations, customers can get aggregated active account level events of all the accounts in the Organization. Customers not using AWS Organizations still benefit alerting at the account level.
Added .gitignore containing ignore rules for terraform and for generated file lambda_function.zip during terraform plan/apply.
Added missing count expression in Terraform_DEPLOY_AHA.tf for resource "aws_s3_bucket_acl" "AHA-S3Bucket-PrimaryRegion"
Fixed for_each condition for aha_secondary_region to have proper empty value if secondary_region is not set on dynamic replica value in resource "aws_secretsmanager_secret" "AssumeRoleArn"
Updated source_code_hash variable on both Lambda Functions to use the newly available value of output_base64sha256 from datasource on the archive_file resource instead of the filebase64sha256 terraform function.
Please Note: This PR would also PR-32 on this repo.
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.
Description of changes:
.gitignore
containing ignore rules for terraform and for generated filelambda_function.zip
during terraform plan/apply.count
expression inTerraform_DEPLOY_AHA.tf
forresource "aws_s3_bucket_acl" "AHA-S3Bucket-PrimaryRegion"
for_each
condition foraha_secondary_region
to have proper empty value if secondary_region is not set on dynamicreplica
value inresource "aws_secretsmanager_secret" "AssumeRoleArn"
source_code_hash
variable on both Lambda Functions to use the newly available value ofoutput_base64sha256
from datasource on the archive_file resource instead of thefilebase64sha256
terraform function.Please Note: This PR would also PR-32 on this repo.
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.