@@ -956,21 +956,21 @@ def deploy_central_cloudwatch_observability(event):
956956 search_iam_role = iam .check_iam_role_exists (cloudwatch .CROSS_ACCOUNT_ROLE_NAME )
957957 if search_iam_role [0 ] is False :
958958 LOGGER .info (
959- f"CloudWatch observability access manager cross-account role not found, creating { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role..."
959+ f"CloudWatch observability access manager cross-account role not found, creating { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } ..."
960960 )
961961 if DRY_RUN is False :
962962 xacct_role = iam .create_role (cloudwatch .CROSS_ACCOUNT_ROLE_NAME , cloudwatch .CROSS_ACCOUNT_TRUST_POLICY , SOLUTION_NAME )
963963 xacct_role_arn = xacct_role ["Role" ]["Arn" ]
964- LIVE_RUN_DATA ["OAMCrossAccountRoleCreate " ] = f"Created { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role"
964+ LIVE_RUN_DATA [f"OAMCrossAccountRoleCreate_ { bedrock_account } " ] = f"Created { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } "
965965 CFN_RESPONSE_DATA ["deployment_info" ]["action_count" ] += 1
966966 CFN_RESPONSE_DATA ["deployment_info" ]["resources_deployed" ] += 1
967967 LOGGER .info (f"Created { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role" )
968968 # add cross account role state table record
969969 add_state_table_record ("iam" , "implemented" , "cross account sharing role" , "role" , xacct_role_arn , bedrock_account , iam .get_iam_global_region (), cloudwatch .CROSS_ACCOUNT_ROLE_NAME )
970970 else :
971- DRY_RUN_DATA ["OAMCrossAccountRoleCreate " ] = f"DRY_RUN: Create { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role"
971+ DRY_RUN_DATA [f"OAMCrossAccountRoleCreate_ { bedrock_account } " ] = f"DRY_RUN: Create { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } "
972972 else :
973- LOGGER .info (f"CloudWatch observability access manager cross-account role found: { cloudwatch . CROSS_ACCOUNT_ROLE_NAME } " )
973+ LOGGER .info (f"CloudWatch observability access manager { cloudwatch . CROSS_ACCOUNT_ROLE_NAME } cross-account role found in { bedrock_account } " )
974974 xacct_role_arn = search_iam_role [1 ]
975975 # add cross account role state table record
976976 add_state_table_record ("iam" , "implemented" , "cross account sharing role" , "role" , xacct_role_arn , bedrock_account , iam .get_iam_global_region (), cloudwatch .CROSS_ACCOUNT_ROLE_NAME )
@@ -984,19 +984,19 @@ def deploy_central_cloudwatch_observability(event):
984984 for policy_arn in cross_account_policies :
985985 search_attached_policies = iam .check_iam_policy_attached (cloudwatch .CROSS_ACCOUNT_ROLE_NAME , policy_arn )
986986 if search_attached_policies is False :
987- LOGGER .info (f"Attaching { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role..." )
987+ LOGGER .info (f"Attaching { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } ..." )
988988 if DRY_RUN is False :
989989 iam .attach_policy (cloudwatch .CROSS_ACCOUNT_ROLE_NAME , policy_arn )
990990 LIVE_RUN_DATA [
991- "OAMCrossAccountRolePolicyAttach "
991+ f"OAMCrossAccountRolePolicyAttach_ { bedrock_account } "
992992 ] = f"Attached { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role"
993993 CFN_RESPONSE_DATA ["deployment_info" ]["action_count" ] += 1
994994 CFN_RESPONSE_DATA ["deployment_info" ]["configuration_changes" ] += 1
995- LOGGER .info (f"Attached { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role" )
995+ LOGGER .info (f"Attached { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } " )
996996 else :
997997 DRY_RUN_DATA [
998- "OAMCrossAccountRolePolicyAttach "
999- ] = f"DRY_RUN: Attach { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role"
998+ f"OAMCrossAccountRolePolicyAttach_ { bedrock_account } "
999+ ] = f"DRY_RUN: Attach { policy_arn } policy to { cloudwatch .CROSS_ACCOUNT_ROLE_NAME } IAM role in { bedrock_account } "
10001000
10011001 # 5e) OAM link in bedrock account
10021002 cloudwatch .CWOAM_CLIENT = sts .assume_role (bedrock_account , sts .CONFIGURATION_ROLE , "oam" , bedrock_region )
@@ -1005,17 +1005,17 @@ def deploy_central_cloudwatch_observability(event):
10051005 if DRY_RUN is False :
10061006 LOGGER .info ("CloudWatch observability access manager link not found, creating..." )
10071007 oam_link_arn = cloudwatch .create_oam_link (oam_sink_arn )
1008- LIVE_RUN_DATA ["OAMLinkCreate " ] = "Created CloudWatch observability access manager link"
1008+ LIVE_RUN_DATA [f"OAMLinkCreate_ { bedrock_account } " ] = f "Created CloudWatch observability access manager link in { bedrock_account } "
10091009 CFN_RESPONSE_DATA ["deployment_info" ]["action_count" ] += 1
10101010 CFN_RESPONSE_DATA ["deployment_info" ]["resources_deployed" ] += 1
10111011 LOGGER .info ("Created CloudWatch observability access manager link" )
10121012 # add OAM link state table record
10131013 add_state_table_record ("oam" , "implemented" , "oam link" , "link" , oam_link_arn , bedrock_account , bedrock_region , "oam_link" )
10141014 else :
10151015 LOGGER .info ("DRY_RUN: CloudWatch observability access manager link not found, creating..." )
1016- DRY_RUN_DATA ["OAMLinkCreate " ] = "DRY_RUN: Create CloudWatch observability access manager link"
1016+ DRY_RUN_DATA [f"OAMLinkCreate_ { bedrock_account } " ] = f "DRY_RUN: Create CloudWatch observability access manager link in { bedrock_account } "
10171017 else :
1018- LOGGER .info ("CloudWatch observability access manager link found" )
1018+ LOGGER .info (f "CloudWatch observability access manager link found in { bedrock_account } " )
10191019 oam_link_arn = search_oam_link [1 ]
10201020 # add OAM link state table record
10211021 add_state_table_record ("oam" , "implemented" , "oam link" , "link" , oam_link_arn , bedrock_account , bedrock_region , "oam_link" )
0 commit comments