Skip to content

Commit

Permalink
provider/aws: Doc cloudwatch SNS and lambda perms
Browse files Browse the repository at this point in the history
Documentation for `aws_cloudwatch_event_target` to warn that in order to be

able to have your AWS Lambda function or SNS topic invoked by a CloudWatch

Events rule, you must setup the right permissions

using `aws_lambda_permission` or `aws_sns_topic.policy`
  • Loading branch information
keymon authored and stack72 committed Apr 6, 2016
1 parent 84b913b commit ad761f3
Showing 1 changed file with 6 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -46,11 +46,16 @@ resource "aws_kinesis_stream" "test_stream" {
## Argument Reference

-> **Note:** `input` and `input_path` are mutually exclusive options.
-> **Note:** In order to be able to have your AWS Lambda function or
SNS topic invoked by a CloudWatch Events rule, you must setup the right permissions
using [`aws_lambda_permission`](https://www.terraform.io/docs/providers/aws/r/lambda_permission.html)
or [`aws_sns_topic.policy`](https://www.terraform.io/docs/providers/aws/r/sns_topic.html#policy).
More info here [here](http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/EventsResourceBasedPermissions.html).

The following arguments are supported:

* `rule` - (Required) The name of the rule you want to add targets to.
* `target_id` - (Optional) The unique target assignment ID. If missing, will generate a random, unique id.
* `target_id` - (Optional) The unique target assignment ID. If missing, will generate a random, unique id.
* `arn` - (Required) The Amazon Resource Name (ARN) associated of the target.
* `input` - (Optional) Valid JSON text passed to the target.
* `input_path` - (Optional) The value of the [JSONPath](http://goessner.net/articles/JsonPath/)
Expand Down

0 comments on commit ad761f3

Please sign in to comment.