|
5 | 5 | # The region part of the LogGroup ARN is then replaced with a wildcard (*) so Lambda@Edge is able to log in every region |
6 | 6 | log_group_arn_regional = try(data.aws_cloudwatch_log_group.lambda[0].arn, aws_cloudwatch_log_group.lambda[0].arn, "") |
7 | 7 | log_group_name = try(data.aws_cloudwatch_log_group.lambda[0].name, aws_cloudwatch_log_group.lambda[0].name, "") |
8 | | - log_group_arn = local.create_role && var.lambda_at_edge ? format("arn:%s:%s:%s:%s:%s", data.aws_arn.log_group_arn[0].partition, data.aws_arn.log_group_arn[0].service, "*", data.aws_arn.log_group_arn[0].account, data.aws_arn.log_group_arn[0].resource) : local.log_group_arn_regional |
| 8 | + log_group_arn = local.create_role && var.lambda_at_edge ? format("arn:%s:%s:%s:%s:%s", data.aws_arn.log_group_arn[0].partition, data.aws_arn.log_group_arn[0].service, var.lambda_at_edge_logs_all_regions?"*":"us-east-1", data.aws_arn.log_group_arn[0].account, data.aws_arn.log_group_arn[0].resource) : local.log_group_arn_regional |
9 | 9 |
|
10 | 10 | # Defaulting to "*" (an invalid character for an IAM Role name) will cause an error when |
11 | 11 | # attempting to plan if the role_name and function_name are not set. This is a workaround |
|
0 commit comments