Skip to content

Commit 9d66c1d

Browse files
committed
making lambda summary message accurate
1 parent 4e07da5 commit 9d66c1d

File tree

1 file changed

+12
-12
lines changed
  • aws_sra_examples/solutions/genai/bedrock_org/lambda/src

1 file changed

+12
-12
lines changed

aws_sra_examples/solutions/genai/bedrock_org/lambda/src/app.py

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -956,21 +956,21 @@ def deploy_central_cloudwatch_observability(event):
956956
search_iam_role = iam.check_iam_role_exists(cloudwatch.CROSS_ACCOUNT_ROLE_NAME)
957957
if search_iam_role[0] is False:
958958
LOGGER.info(
959-
f"CloudWatch observability access manager cross-account role not found, creating {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role..."
959+
f"CloudWatch observability access manager cross-account role not found, creating {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}..."
960960
)
961961
if DRY_RUN is False:
962962
xacct_role = iam.create_role(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, cloudwatch.CROSS_ACCOUNT_TRUST_POLICY, SOLUTION_NAME)
963963
xacct_role_arn = xacct_role["Role"]["Arn"]
964-
LIVE_RUN_DATA["OAMCrossAccountRoleCreate"] = f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
964+
LIVE_RUN_DATA[f"OAMCrossAccountRoleCreate_{bedrock_account}"] = f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
965965
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
966966
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
967967
LOGGER.info(f"Created {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
968968
# add cross account role state table record
969969
add_state_table_record("iam", "implemented", "cross account sharing role", "role", xacct_role_arn, bedrock_account, iam.get_iam_global_region(), cloudwatch.CROSS_ACCOUNT_ROLE_NAME)
970970
else:
971-
DRY_RUN_DATA["OAMCrossAccountRoleCreate"] = f"DRY_RUN: Create {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
971+
DRY_RUN_DATA[f"OAMCrossAccountRoleCreate_{bedrock_account}"] = f"DRY_RUN: Create {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
972972
else:
973-
LOGGER.info(f"CloudWatch observability access manager cross-account role found: {cloudwatch.CROSS_ACCOUNT_ROLE_NAME}")
973+
LOGGER.info(f"CloudWatch observability access manager {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} cross-account role found in {bedrock_account}")
974974
xacct_role_arn = search_iam_role[1]
975975
# add cross account role state table record
976976
add_state_table_record("iam", "implemented", "cross account sharing role", "role", xacct_role_arn, bedrock_account, iam.get_iam_global_region(), cloudwatch.CROSS_ACCOUNT_ROLE_NAME)
@@ -984,19 +984,19 @@ def deploy_central_cloudwatch_observability(event):
984984
for policy_arn in cross_account_policies:
985985
search_attached_policies = iam.check_iam_policy_attached(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, policy_arn)
986986
if search_attached_policies is False:
987-
LOGGER.info(f"Attaching {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role...")
987+
LOGGER.info(f"Attaching {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}...")
988988
if DRY_RUN is False:
989989
iam.attach_policy(cloudwatch.CROSS_ACCOUNT_ROLE_NAME, policy_arn)
990990
LIVE_RUN_DATA[
991-
"OAMCrossAccountRolePolicyAttach"
991+
f"OAMCrossAccountRolePolicyAttach_{bedrock_account}"
992992
] = f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
993993
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
994994
CFN_RESPONSE_DATA["deployment_info"]["configuration_changes"] += 1
995-
LOGGER.info(f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role")
995+
LOGGER.info(f"Attached {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}")
996996
else:
997997
DRY_RUN_DATA[
998-
"OAMCrossAccountRolePolicyAttach"
999-
] = f"DRY_RUN: Attach {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role"
998+
f"OAMCrossAccountRolePolicyAttach_{bedrock_account}"
999+
] = f"DRY_RUN: Attach {policy_arn} policy to {cloudwatch.CROSS_ACCOUNT_ROLE_NAME} IAM role in {bedrock_account}"
10001000

10011001
# 5e) OAM link in bedrock account
10021002
cloudwatch.CWOAM_CLIENT = sts.assume_role(bedrock_account, sts.CONFIGURATION_ROLE, "oam", bedrock_region)
@@ -1005,17 +1005,17 @@ def deploy_central_cloudwatch_observability(event):
10051005
if DRY_RUN is False:
10061006
LOGGER.info("CloudWatch observability access manager link not found, creating...")
10071007
oam_link_arn = cloudwatch.create_oam_link(oam_sink_arn)
1008-
LIVE_RUN_DATA["OAMLinkCreate"] = "Created CloudWatch observability access manager link"
1008+
LIVE_RUN_DATA[f"OAMLinkCreate_{bedrock_account}"] = f"Created CloudWatch observability access manager link in {bedrock_account}"
10091009
CFN_RESPONSE_DATA["deployment_info"]["action_count"] += 1
10101010
CFN_RESPONSE_DATA["deployment_info"]["resources_deployed"] += 1
10111011
LOGGER.info("Created CloudWatch observability access manager link")
10121012
# add OAM link state table record
10131013
add_state_table_record("oam", "implemented", "oam link", "link", oam_link_arn, bedrock_account, bedrock_region, "oam_link")
10141014
else:
10151015
LOGGER.info("DRY_RUN: CloudWatch observability access manager link not found, creating...")
1016-
DRY_RUN_DATA["OAMLinkCreate"] = "DRY_RUN: Create CloudWatch observability access manager link"
1016+
DRY_RUN_DATA[f"OAMLinkCreate_{bedrock_account}"] = f"DRY_RUN: Create CloudWatch observability access manager link in {bedrock_account}"
10171017
else:
1018-
LOGGER.info("CloudWatch observability access manager link found")
1018+
LOGGER.info(f"CloudWatch observability access manager link found in {bedrock_account}")
10191019
oam_link_arn = search_oam_link[1]
10201020
# add OAM link state table record
10211021
add_state_table_record("oam", "implemented", "oam link", "link", oam_link_arn, bedrock_account, bedrock_region, "oam_link")

0 commit comments

Comments
 (0)