Skip to content

Commit 3fec5a1

Browse files
committed
add tracing; update permissions
1 parent de15f9c commit 3fec5a1

File tree

2 files changed

+22
-9
lines changed

2 files changed

+22
-9
lines changed

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/sra_cloudwatch.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ def find_metric_filter(self, log_group_name: str, filter_name: str) -> bool:
6868
if error.response["Error"]["Code"] == "ResourceNotFoundException":
6969
return False
7070
else:
71-
self.LOGGER.info(self.UNEXPECTED)
71+
self.LOGGER.info(f"{self.UNEXPECTED} error finding metric filter: {error}")
7272
raise ValueError("Unexpected error executing Lambda function. Review CloudWatch logs for details.") from None
7373

7474
def create_metric_filter(

aws_sra_examples/solutions/genai/bedrock_org/templates/sra-bedrock-org-main.yaml

Lines changed: 21 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,9 @@ Resources:
443443
- 'iam:CreateRole'
444444
- 'iam:DeleteRole'
445445
- 'iam:TagRole'
446-
Resource: '*'
446+
Resource:
447+
- !Sub 'arn:${AWS::Partition}:iam::${AWS::AccountId}:role/CloudWatch-CrossAccountSharingRole'
448+
- !Sub 'arn:${AWS::Partition}:iam::${AWS::AccountId}:role/${pSRASolutionName}-lambda'
447449
PolicyName: !Sub '${pSRASolutionName}-iam-policy'
448450
- PolicyDocument:
449451
Version: '2012-10-17'
@@ -458,7 +460,7 @@ Resources:
458460
- 'kms:GenerateDataKey'
459461
- 'kms:ScheduleKeyDeletion'
460462
- 'kms:TagResource'
461-
Resource: '*'
463+
Resource: '*' # required because of CreateKey operation
462464
PolicyName: !Sub '${pSRASolutionName}-kms-policy'
463465
- PolicyDocument:
464466
Version: '2012-10-17'
@@ -475,7 +477,8 @@ Resources:
475477
- 'lambda:CreateAlias'
476478
- 'lambda:UpdateFunctionCode'
477479
- 'lambda:RemovePermission'
478-
Resource: '*'
480+
Resource:
481+
- !Sub 'arn:${AWS::Partition}:lambda:${AWS::Region}:${AWS::AccountId}:function:${pSRASolutionName}'
479482
PolicyName: !Sub '${pSRASolutionName}-lambda-policy'
480483
- PolicyDocument:
481484
Version: '2012-10-17'
@@ -488,8 +491,11 @@ Resources:
488491
- 'logs:DescribeMetricFilters'
489492
- 'logs:TagResource'
490493
- 'logs:Link'
491-
Resource: '*'
492-
# arn:aws:logs:<HOME REGION>:<MGMT ACCOUNT>:log-group:*
494+
Resource:
495+
- !Sub 'arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:metric-filter:*'
496+
- !Sub 'arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:log-group:*:log-stream:*'
497+
# - !Sub 'arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:metric-filter:sra-bedrock-filter-service-changes'
498+
# - !Sub 'arn:${AWS::Partition}:logs:${AWS::Region}:${AWS::AccountId}:metric-filter:sra-bedrock-filter-bucket-changes'
493499
PolicyName: !Sub '${pSRASolutionName}-logs-policy'
494500
- PolicyDocument:
495501
Version: '2012-10-17'
@@ -501,7 +507,10 @@ Resources:
501507
- 'cloudwatch:DeleteAlarms'
502508
- 'cloudwatch:TagResource'
503509
- 'cloudwatch:Link'
504-
Resource: '*'
510+
Resource: '*'
511+
# - !Sub 'arn:${AWS::Partition}:cloudwatch:${AWS::Region}:${AWS::AccountId}:alarm:*'
512+
# - !Sub 'arn:${AWS::Partition}:cloudwatch:${AWS::Region}:${AWS::AccountId}:alarm:sra-bedrock-filter-service-changes-alarm'
513+
# - !Sub 'arn:${AWS::Partition}:cloudwatch:${AWS::Region}:${AWS::AccountId}:alarm:sra-bedrock-filter-bucket-changes-alarm'
505514
PolicyName: !Sub '${pSRASolutionName}-cloudwatch-policy'
506515
- PolicyDocument:
507516
Version: '2012-10-17'
@@ -512,7 +521,9 @@ Resources:
512521
- 'oam:CreateLink'
513522
- 'oam:DeleteLink'
514523
- 'oam:TagResource'
515-
Resource: '*'
524+
Resource:
525+
- !Sub 'arn:${AWS::Partition}:oam:${AWS::Region}:${AWS::AccountId}:link/*'
526+
- !Sub 'arn:${AWS::Partition}:oam:${AWS::Region}:${AWS::AccountId}:/ListLinks*'
516527
PolicyName: !Sub '${pSRASolutionName}-oam-policy'
517528
- PolicyDocument:
518529
Version: '2012-10-17'
@@ -542,7 +553,9 @@ Resources:
542553
- 'sns:SetTopicAttributes'
543554
- 'sns:TagResource'
544555
- 'sns:Publish'
545-
Resource: '*'
556+
Resource:
557+
- !Sub 'arn:${AWS::Partition}:sns:${AWS::Region}:${AWS::AccountId}:${pSRASolutionName}-configuration'
558+
- !Sub 'arn:${AWS::Partition}:sns:${AWS::Region}:${AWS::AccountId}:${pSRASolutionName}-alarms'
546559
PolicyName: !Sub '${pSRASolutionName}-sns-policy'
547560
- PolicyDocument:
548561
Version: '2012-10-17'

0 commit comments

Comments
 (0)