-
Notifications
You must be signed in to change notification settings - Fork 87
/
Copy pathCloudWatchAutoAlarms-S3.yaml
executable file
·58 lines (55 loc) · 1.79 KB
/
CloudWatchAutoAlarms-S3.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
Description: S3 Bucket for Cross-Account deployment of amazon-cloudwatch-auto-alarms Lambda function
AWSTemplateFormatVersion: '2010-09-09'
Resources:
LambdaDeploymentBucket:
Type: "AWS::S3::Bucket"
Properties:
BucketName: !Sub "cloudwatch-auto-alarms-${AWS::AccountId}-${AWS::Region}"
VersioningConfiguration:
Status: Enabled
LifecycleConfiguration:
Rules:
- Id: DeleteRule
Status: Enabled
ExpirationInDays: '90'
LambdaDeploymentBucketPolicy:
Type: "AWS::S3::BucketPolicy"
Properties:
Bucket: !Ref LambdaDeploymentBucket
PolicyDocument:
Version: '2012-10-17'
Id: SSEAndSSLPolicy
Statement:
- Sid: DenyInsecureConnections
Effect: Deny
Principal: "*"
Action: s3:*
Resource:
- !Join
- ''
- - Fn::GetAtt: [LambdaDeploymentBucket, Arn]
- '/*'
Condition:
Bool:
aws:SecureTransport: 'false'
- Sid: DenyS3PublicObjectACL
Effect: Deny
Principal: "*"
Action: s3:PutObjectAcl
Resource:
- !Join
- ''
- - Fn::GetAtt: [LambdaDeploymentBucket, Arn]
- '/*'
Condition:
StringEqualsIgnoreCaseIfExists:
s3:x-amz-acl:
- public-read
- public-read-write
- authenticated-read
Outputs:
LambdaDeploymentBucketName:
Value: !Ref LambdaDeploymentBucket
Description: "Lambda S3 deployment bucket name for deployment support of amazon-cloudwatch-auto-alarms lambda function"
Export:
Name: !Sub "amazon-cloudwatch-auto-alarms-bucket-name"