-
Notifications
You must be signed in to change notification settings - Fork 1
fix: use null_resource to create Lambda ZIP file before Lambda functi… #305
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
bc9e362
to
3cc6fc0
Compare
Open in Overmind ↗🟢 Change SignalsRoutine 🟢 🔥 RisksPotential Processing Delays Due to Lambda Event Source Mapping Configuration Potential Performance Issues with Lambda Function Configuration Potential Misconfiguration of CloudWatch Alarm Due to Lack of Historical Data 🟣 Expected ChangesNote No expected changes found. 🟠 Unmapped Changes+ cloudwatch-alarm › module.scenarios[0].module.message_size_breach[0].aws_cloudwatch_metric_alarm.lambda_errors--- current
+++ proposed
@@ -0,0 +1,36 @@
+type: cloudwatch-alarm
+id: github.com/overmindtech/terraform-example.cloudwatch-alarm.module.scenarios[0].module.message_size_breach[0].aws_cloudwatch_metric_alarm.lambda_errors
+attributes:
+ actions_enabled: true
+ alarm_actions: null
+ alarm_description: This alarm monitors Lambda function errors
+ alarm_name: lambda-errors-terraform-example
+ arn: (known after apply)
+ comparison_operator: GreaterThanThreshold
+ datapoints_to_alarm: null
+ dimensions:
+ FunctionName: image-processor-terraform-example
+ evaluate_low_sample_count_percentiles: (known after apply)
+ evaluation_periods: 2
+ extended_statistic: null
+ id: (known after apply)
+ insufficient_data_actions: null
+ metric_name: Errors
+ namespace: AWS/Lambda
+ ok_actions: null
+ period: 60
+ statistic: Sum
+ tags:
+ Environment: terraform-example
+ Name: Lambda Errors Alarm
+ Scenario: Message Size Breach
+ tags_all:
+ Environment: terraform-example
+ Name: Lambda Errors Alarm
+ Scenario: Message Size Breach
+ terraform_address: module.scenarios[0].module.message_size_breach[0].aws_cloudwatch_metric_alarm.lambda_errors
+ terraform_name: module.scenarios[0].module.message_size_breach[0].aws_cloudwatch_metric_alarm.lambda_errors
+ threshold: 5
+ threshold_metric_id: null
+ treat_missing_data: missing
+ unit: null
+ aws_lambda_event_source_mapping › module.scenarios[0].module.message_size_breach[0].aws_lambda_event_source_mapping.sqs_trigger--- current
+++ proposed
@@ -0,0 +1,33 @@
+type: aws_lambda_event_source_mapping
+id: github.com/overmindtech/terraform-example.aws_lambda_event_source_mapping.module.scenarios[0].module.message_size_breach[0].aws_lambda_event_source_mapping.sqs_trigger
+attributes:
+ amazon_managed_kafka_event_source_config: (known after apply)
+ arn: (known after apply)
+ batch_size: 10
+ bisect_batch_on_function_error: null
+ enabled: true
+ event_source_arn: arn:aws:sqs:eu-west-2:540044833068:image-processing-terraform-example
+ function_arn: (known after apply)
+ function_name: (known after apply)
+ function_response_types: null
+ id: (known after apply)
+ kms_key_arn: null
+ last_modified: (known after apply)
+ last_processing_result: (known after apply)
+ maximum_batching_window_in_seconds: 5
+ maximum_record_age_in_seconds: (known after apply)
+ maximum_retry_attempts: 3
+ parallelization_factor: (known after apply)
+ queues: null
+ self_managed_kafka_event_source_config: (known after apply)
+ starting_position: null
+ starting_position_timestamp: null
+ state: (known after apply)
+ state_transition_reason: (known after apply)
+ tags: null
+ tags_all: (known after apply)
+ terraform_address: module.scenarios[0].module.message_size_breach[0].aws_lambda_event_source_mapping.sqs_trigger
+ terraform_name: module.scenarios[0].module.message_size_breach[0].aws_lambda_event_source_mapping.sqs_trigger
+ topics: null
+ tumbling_window_in_seconds: null
+ uuid: (known after apply)
+ aws_lambda_function › module.scenarios[0].module.message_size_breach[0].aws_lambda_function.image_processor--- current
+++ proposed
@@ -0,0 +1,51 @@
+type: aws_lambda_function
+id: github.com/overmindtech/terraform-example.aws_lambda_function.module.scenarios[0].module.message_size_breach[0].aws_lambda_function.image_processor
+attributes:
+ architectures: (known after apply)
+ arn: (known after apply)
+ code_sha256: (known after apply)
+ code_signing_config_arn: null
+ description: null
+ ephemeral_storage: (known after apply)
+ filename: modules/scenarios/message-size-breach/lambda_function.zip
+ function_name: image-processor-terraform-example
+ handler: lambda_function.lambda_handler
+ id: (known after apply)
+ image_uri: null
+ invoke_arn: (known after apply)
+ kms_key_arn: null
+ last_modified: (known after apply)
+ layers: null
+ logging_config: (known after apply)
+ memory_size: 1024
+ package_type: Zip
+ publish: false
+ qualified_arn: (known after apply)
+ qualified_invoke_arn: (known after apply)
+ replace_security_groups_on_destroy: null
+ replacement_security_group_ids: null
+ reserved_concurrent_executions: -1
+ role: arn:aws:iam::540044833068:role/image-processor-lambda-role-terraform-example
+ runtime: python3.9
+ s3_bucket: null
+ s3_key: null
+ s3_object_version: null
+ signing_job_arn: (known after apply)
+ signing_profile_version_arn: (known after apply)
+ skip_destroy: false
+ source_code_hash: rrn+1CWcexaae0keBGoEcCpBmkcaNmgEH2ENhWA4OMM=
+ source_code_size: (known after apply)
+ tags:
+ Environment: terraform-example
+ Name: Image Processor
+ Scenario: Message Size Breach
+ tags_all:
+ Environment: terraform-example
+ Name: Image Processor
+ Scenario: Message Size Breach
+ terraform_address: module.scenarios[0].module.message_size_breach[0].aws_lambda_function.image_processor
+ terraform_name: module.scenarios[0].module.message_size_breach[0].aws_lambda_function.image_processor
+ timeout: 180
+ timeouts: null
+ tracing_config: (known after apply)
+ version: (known after apply)
💥 Blast RadiusItems Edges |
…on creation