@aws-solutions-constructs/aws-lambda-kinesisstreams 2.51.0 → 2.52.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (99) hide show
  1. package/.eslintignore +2 -0
  2. package/.jsii +49 -4
  3. package/integ.config.json +7 -0
  4. package/lib/index.js +1 -1
  5. package/package.json +9 -8
  6. package/test/integ.lamkin-existingLambda.js +5 -2
  7. package/test/integ.lamkin-existingLambda.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  8. package/test/integ.lamkin-existingLambda.js.snapshot/cdk.out +1 -0
  9. package/test/integ.lamkin-existingLambda.js.snapshot/integ.json +12 -0
  10. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.assets.json +32 -0
  11. package/test/integ.lamkin-existingLambda.js.snapshot/lamkin-existingLambda.template.json +229 -0
  12. package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.assets.json +19 -0
  13. package/test/integ.lamkin-existingLambda.js.snapshot/lamkinexistingLambdaIntegDefaultTestDeployAssertD62E9419.template.json +36 -0
  14. package/test/integ.lamkin-existingLambda.js.snapshot/manifest.json +143 -0
  15. package/test/integ.lamkin-existingLambda.js.snapshot/tree.json +412 -0
  16. package/test/integ.lamkin-existingStream.js +5 -2
  17. package/test/integ.lamkin-existingStream.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  18. package/test/integ.lamkin-existingStream.js.snapshot/cdk.out +1 -0
  19. package/test/integ.lamkin-existingStream.js.snapshot/integ.json +12 -0
  20. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.assets.json +32 -0
  21. package/test/integ.lamkin-existingStream.js.snapshot/lamkin-existingStream.template.json +231 -0
  22. package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.assets.json +19 -0
  23. package/test/integ.lamkin-existingStream.js.snapshot/lamkinexistingStreamIntegDefaultTestDeployAssert2681B9A2.template.json +36 -0
  24. package/test/integ.lamkin-existingStream.js.snapshot/manifest.json +143 -0
  25. package/test/integ.lamkin-existingStream.js.snapshot/tree.json +414 -0
  26. package/test/integ.lamkin-existingStreamWithCmk.js +5 -2
  27. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  28. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/cdk.out +1 -0
  29. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/integ.json +12 -0
  30. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.assets.json +32 -0
  31. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkin-existingStreamWithCmk.template.json +285 -0
  32. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.assets.json +19 -0
  33. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/lamkinexistingStreamWithCmkIntegDefaultTestDeployAssert6EDF4045.template.json +36 -0
  34. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/manifest.json +149 -0
  35. package/test/integ.lamkin-existingStreamWithCmk.js.snapshot/tree.json +484 -0
  36. package/test/integ.lamkin-existingVpc.js +6 -2
  37. package/test/integ.lamkin-existingVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  38. package/test/integ.lamkin-existingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  39. package/test/integ.lamkin-existingVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  40. package/test/integ.lamkin-existingVpc.js.snapshot/cdk.out +1 -0
  41. package/test/integ.lamkin-existingVpc.js.snapshot/integ.json +12 -0
  42. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.assets.json +45 -0
  43. package/test/integ.lamkin-existingVpc.js.snapshot/lamkin-existingVpc.template.json +1040 -0
  44. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.assets.json +19 -0
  45. package/test/integ.lamkin-existingVpc.js.snapshot/lamkinexistingVpcIntegDefaultTestDeployAssertB97E47BA.template.json +36 -0
  46. package/test/integ.lamkin-existingVpc.js.snapshot/manifest.json +341 -0
  47. package/test/integ.lamkin-existingVpc.js.snapshot/tree.json +1463 -0
  48. package/test/integ.lamkin-newStreamFromProps.js +5 -2
  49. package/test/integ.lamkin-newStreamFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  50. package/test/integ.lamkin-newStreamFromProps.js.snapshot/cdk.out +1 -0
  51. package/test/integ.lamkin-newStreamFromProps.js.snapshot/integ.json +12 -0
  52. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.assets.json +32 -0
  53. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkin-newStreamFromProps.template.json +231 -0
  54. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.assets.json +19 -0
  55. package/test/integ.lamkin-newStreamFromProps.js.snapshot/lamkinnewStreamFromPropsIntegDefaultTestDeployAssertC2946F34.template.json +36 -0
  56. package/test/integ.lamkin-newStreamFromProps.js.snapshot/manifest.json +143 -0
  57. package/test/integ.lamkin-newStreamFromProps.js.snapshot/tree.json +414 -0
  58. package/test/integ.lamkin-newVpc.js +6 -2
  59. package/test/integ.lamkin-newVpc.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  60. package/test/integ.lamkin-newVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  61. package/test/integ.lamkin-newVpc.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  62. package/test/integ.lamkin-newVpc.js.snapshot/cdk.out +1 -0
  63. package/test/integ.lamkin-newVpc.js.snapshot/integ.json +12 -0
  64. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.assets.json +45 -0
  65. package/test/integ.lamkin-newVpc.js.snapshot/lamkin-newVpc.template.json +756 -0
  66. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.assets.json +19 -0
  67. package/test/integ.lamkin-newVpc.js.snapshot/lamkinnewVpcIntegDefaultTestDeployAssert16AC3D59.template.json +36 -0
  68. package/test/integ.lamkin-newVpc.js.snapshot/manifest.json +245 -0
  69. package/test/integ.lamkin-newVpc.js.snapshot/tree.json +1051 -0
  70. package/test/integ.lamkin-newVpcFromProps.js +6 -2
  71. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  72. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/__entrypoint__.js +1 -0
  73. package/test/integ.lamkin-newVpcFromProps.js.snapshot/asset.dd5711540f04e06aa955d7f4862fc04e8cdea464cb590dae91ed2976bb78098e/index.js +1 -0
  74. package/test/integ.lamkin-newVpcFromProps.js.snapshot/cdk.out +1 -0
  75. package/test/integ.lamkin-newVpcFromProps.js.snapshot/integ.json +12 -0
  76. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.assets.json +45 -0
  77. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkin-newVpcFromProps.template.json +692 -0
  78. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.assets.json +19 -0
  79. package/test/integ.lamkin-newVpcFromProps.js.snapshot/lamkinnewVpcFromPropsIntegDefaultTestDeployAssert95FE0487.template.json +36 -0
  80. package/test/integ.lamkin-newVpcFromProps.js.snapshot/manifest.json +227 -0
  81. package/test/integ.lamkin-newVpcFromProps.js.snapshot/tree.json +946 -0
  82. package/test/integ.lamkin-noArguments.js +5 -2
  83. package/test/integ.lamkin-noArguments.js.snapshot/asset.c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf/index.mjs +15 -0
  84. package/test/integ.lamkin-noArguments.js.snapshot/cdk.out +1 -0
  85. package/test/integ.lamkin-noArguments.js.snapshot/integ.json +12 -0
  86. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.assets.json +32 -0
  87. package/test/integ.lamkin-noArguments.js.snapshot/lamkin-noArguments.template.json +229 -0
  88. package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.assets.json +19 -0
  89. package/test/integ.lamkin-noArguments.js.snapshot/lamkinnoArgumentsIntegDefaultTestDeployAssertC0CED4B2.template.json +36 -0
  90. package/test/integ.lamkin-noArguments.js.snapshot/manifest.json +143 -0
  91. package/test/integ.lamkin-noArguments.js.snapshot/tree.json +412 -0
  92. package/test/integ.lamkin-existingLambda.expected.json +0 -229
  93. package/test/integ.lamkin-existingStream.expected.json +0 -231
  94. package/test/integ.lamkin-existingStreamWithCmk.expected.json +0 -297
  95. package/test/integ.lamkin-existingVpc.expected.json +0 -1065
  96. package/test/integ.lamkin-newStreamFromProps.expected.json +0 -231
  97. package/test/integ.lamkin-newVpc.expected.json +0 -671
  98. package/test/integ.lamkin-newVpcFromProps.expected.json +0 -557
  99. package/test/integ.lamkin-noArguments.expected.json +0 -229
@@ -1,557 +0,0 @@
1
- {
2
- "Resources": {
3
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3": {
4
- "Type": "AWS::IAM::Role",
5
- "Properties": {
6
- "AssumeRolePolicyDocument": {
7
- "Statement": [
8
- {
9
- "Action": "sts:AssumeRole",
10
- "Effect": "Allow",
11
- "Principal": {
12
- "Service": "lambda.amazonaws.com"
13
- }
14
- }
15
- ],
16
- "Version": "2012-10-17"
17
- },
18
- "Policies": [
19
- {
20
- "PolicyDocument": {
21
- "Statement": [
22
- {
23
- "Action": [
24
- "logs:CreateLogGroup",
25
- "logs:CreateLogStream",
26
- "logs:PutLogEvents"
27
- ],
28
- "Effect": "Allow",
29
- "Resource": {
30
- "Fn::Join": [
31
- "",
32
- [
33
- "arn:",
34
- {
35
- "Ref": "AWS::Partition"
36
- },
37
- ":logs:",
38
- {
39
- "Ref": "AWS::Region"
40
- },
41
- ":",
42
- {
43
- "Ref": "AWS::AccountId"
44
- },
45
- ":log-group:/aws/lambda/*"
46
- ]
47
- ]
48
- }
49
- }
50
- ],
51
- "Version": "2012-10-17"
52
- },
53
- "PolicyName": "LambdaFunctionServiceRolePolicy"
54
- }
55
- ]
56
- }
57
- },
58
- "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043": {
59
- "Type": "AWS::IAM::Policy",
60
- "Properties": {
61
- "PolicyDocument": {
62
- "Statement": [
63
- {
64
- "Action": [
65
- "ec2:CreateNetworkInterface",
66
- "ec2:DescribeNetworkInterfaces",
67
- "ec2:DeleteNetworkInterface",
68
- "ec2:AssignPrivateIpAddresses",
69
- "ec2:UnassignPrivateIpAddresses"
70
- ],
71
- "Effect": "Allow",
72
- "Resource": "*"
73
- },
74
- {
75
- "Action": [
76
- "xray:PutTraceSegments",
77
- "xray:PutTelemetryRecords"
78
- ],
79
- "Effect": "Allow",
80
- "Resource": "*"
81
- },
82
- {
83
- "Action": [
84
- "kinesis:ListShards",
85
- "kinesis:PutRecord",
86
- "kinesis:PutRecords"
87
- ],
88
- "Effect": "Allow",
89
- "Resource": {
90
- "Fn::GetAtt": [
91
- "testlambdakinesisstreamsKinesisStream11A82116",
92
- "Arn"
93
- ]
94
- }
95
- }
96
- ],
97
- "Version": "2012-10-17"
98
- },
99
- "PolicyName": "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043",
100
- "Roles": [
101
- {
102
- "Ref": "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3"
103
- }
104
- ]
105
- },
106
- "Metadata": {
107
- "cfn_nag": {
108
- "rules_to_suppress": [
109
- {
110
- "id": "W12",
111
- "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC."
112
- }
113
- ]
114
- }
115
- }
116
- },
117
- "testlambdakinesisstreamsReplaceDefaultSecurityGroupsecuritygroupFB22266C": {
118
- "Type": "AWS::EC2::SecurityGroup",
119
- "Properties": {
120
- "GroupDescription": "lamkin-newVpcFromProps/test-lambda-kinesisstreams/ReplaceDefaultSecurityGroup-security-group",
121
- "SecurityGroupEgress": [
122
- {
123
- "CidrIp": "0.0.0.0/0",
124
- "Description": "Allow all outbound traffic by default",
125
- "IpProtocol": "-1"
126
- }
127
- ],
128
- "VpcId": {
129
- "Ref": "Vpc8378EB38"
130
- }
131
- },
132
- "Metadata": {
133
- "cfn_nag": {
134
- "rules_to_suppress": [
135
- {
136
- "id": "W5",
137
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
138
- },
139
- {
140
- "id": "W40",
141
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
142
- }
143
- ]
144
- }
145
- }
146
- },
147
- "testlambdakinesisstreamsLambdaFunction4348B6E4": {
148
- "Type": "AWS::Lambda::Function",
149
- "Properties": {
150
- "Code": {
151
- "S3Bucket": {
152
- "Fn::Sub": "cdk-hnb659fds-assets-${AWS::AccountId}-${AWS::Region}"
153
- },
154
- "S3Key": "c7dc0cc1b24bda1d2a5345f61897eee32184906649fdb1de93853c512e129dbf.zip"
155
- },
156
- "Environment": {
157
- "Variables": {
158
- "KINESIS_DATASTREAM_NAME": {
159
- "Ref": "testlambdakinesisstreamsKinesisStream11A82116"
160
- }
161
- }
162
- },
163
- "Handler": "index.handler",
164
- "Role": {
165
- "Fn::GetAtt": [
166
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3",
167
- "Arn"
168
- ]
169
- },
170
- "Runtime": "nodejs18.x",
171
- "TracingConfig": {
172
- "Mode": "Active"
173
- },
174
- "VpcConfig": {
175
- "SecurityGroupIds": [
176
- {
177
- "Fn::GetAtt": [
178
- "testlambdakinesisstreamsReplaceDefaultSecurityGroupsecuritygroupFB22266C",
179
- "GroupId"
180
- ]
181
- }
182
- ],
183
- "SubnetIds": [
184
- {
185
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
186
- }
187
- ]
188
- }
189
- },
190
- "DependsOn": [
191
- "testlambdakinesisstreamsLambdaFunctionServiceRoleDefaultPolicyED972043",
192
- "testlambdakinesisstreamsLambdaFunctionServiceRole95206CF3",
193
- "VpcisolatedSubnet1RouteTableAssociationD259E31A"
194
- ],
195
- "Metadata": {
196
- "cfn_nag": {
197
- "rules_to_suppress": [
198
- {
199
- "id": "W58",
200
- "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions."
201
- },
202
- {
203
- "id": "W89",
204
- "reason": "This is not a rule for the general case, just for specific use cases/industries"
205
- },
206
- {
207
- "id": "W92",
208
- "reason": "Impossible for us to define the correct concurrency for clients"
209
- }
210
- ]
211
- }
212
- }
213
- },
214
- "testlambdakinesisstreamsKinesisStream11A82116": {
215
- "Type": "AWS::Kinesis::Stream",
216
- "Properties": {
217
- "RetentionPeriodHours": 24,
218
- "ShardCount": 1,
219
- "StreamEncryption": {
220
- "EncryptionType": "KMS",
221
- "KeyId": "alias/aws/kinesis"
222
- }
223
- }
224
- },
225
- "testlambdakinesisstreamsKinesisStreamGetRecordsIteratorAgeAlarmC4A0FF00": {
226
- "Type": "AWS::CloudWatch::Alarm",
227
- "Properties": {
228
- "AlarmDescription": "Consumer Record Processing Falling Behind, there is risk for data loss due to record expiration.",
229
- "ComparisonOperator": "GreaterThanOrEqualToThreshold",
230
- "EvaluationPeriods": 1,
231
- "MetricName": "GetRecords.IteratorAgeMilliseconds",
232
- "Namespace": "AWS/Kinesis",
233
- "Period": 300,
234
- "Statistic": "Maximum",
235
- "Threshold": 43200000
236
- }
237
- },
238
- "testlambdakinesisstreamsKinesisStreamReadProvisionedThroughputExceededAlarm9732E188": {
239
- "Type": "AWS::CloudWatch::Alarm",
240
- "Properties": {
241
- "AlarmDescription": "Consumer Application is Reading at a Slower Rate Than Expected.",
242
- "ComparisonOperator": "GreaterThanThreshold",
243
- "EvaluationPeriods": 1,
244
- "MetricName": "ReadProvisionedThroughputExceeded",
245
- "Namespace": "AWS/Kinesis",
246
- "Period": 300,
247
- "Statistic": "Average",
248
- "Threshold": 0
249
- }
250
- },
251
- "Vpc8378EB38": {
252
- "Type": "AWS::EC2::VPC",
253
- "Properties": {
254
- "CidrBlock": "10.0.0.0/16",
255
- "EnableDnsHostnames": true,
256
- "EnableDnsSupport": true,
257
- "InstanceTenancy": "default",
258
- "Tags": [
259
- {
260
- "Key": "Name",
261
- "Value": "lamkin-newVpcFromProps/Vpc"
262
- }
263
- ]
264
- }
265
- },
266
- "VpcisolatedSubnet1SubnetE62B1B9B": {
267
- "Type": "AWS::EC2::Subnet",
268
- "Properties": {
269
- "AvailabilityZone": "test-region-1a",
270
- "CidrBlock": "10.0.0.0/18",
271
- "MapPublicIpOnLaunch": false,
272
- "Tags": [
273
- {
274
- "Key": "aws-cdk:subnet-name",
275
- "Value": "isolated"
276
- },
277
- {
278
- "Key": "aws-cdk:subnet-type",
279
- "Value": "Isolated"
280
- },
281
- {
282
- "Key": "Name",
283
- "Value": "lamkin-newVpcFromProps/Vpc/isolatedSubnet1"
284
- }
285
- ],
286
- "VpcId": {
287
- "Ref": "Vpc8378EB38"
288
- }
289
- }
290
- },
291
- "VpcisolatedSubnet1RouteTableE442650B": {
292
- "Type": "AWS::EC2::RouteTable",
293
- "Properties": {
294
- "Tags": [
295
- {
296
- "Key": "Name",
297
- "Value": "lamkin-newVpcFromProps/Vpc/isolatedSubnet1"
298
- }
299
- ],
300
- "VpcId": {
301
- "Ref": "Vpc8378EB38"
302
- }
303
- }
304
- },
305
- "VpcisolatedSubnet1RouteTableAssociationD259E31A": {
306
- "Type": "AWS::EC2::SubnetRouteTableAssociation",
307
- "Properties": {
308
- "RouteTableId": {
309
- "Ref": "VpcisolatedSubnet1RouteTableE442650B"
310
- },
311
- "SubnetId": {
312
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
313
- }
314
- }
315
- },
316
- "VpcFlowLogIAMRole6A475D41": {
317
- "Type": "AWS::IAM::Role",
318
- "Properties": {
319
- "AssumeRolePolicyDocument": {
320
- "Statement": [
321
- {
322
- "Action": "sts:AssumeRole",
323
- "Effect": "Allow",
324
- "Principal": {
325
- "Service": "vpc-flow-logs.amazonaws.com"
326
- }
327
- }
328
- ],
329
- "Version": "2012-10-17"
330
- },
331
- "Tags": [
332
- {
333
- "Key": "Name",
334
- "Value": "lamkin-newVpcFromProps/Vpc/FlowLog"
335
- }
336
- ]
337
- }
338
- },
339
- "VpcFlowLogIAMRoleDefaultPolicy406FB995": {
340
- "Type": "AWS::IAM::Policy",
341
- "Properties": {
342
- "PolicyDocument": {
343
- "Statement": [
344
- {
345
- "Action": [
346
- "logs:CreateLogStream",
347
- "logs:PutLogEvents",
348
- "logs:DescribeLogStreams"
349
- ],
350
- "Effect": "Allow",
351
- "Resource": {
352
- "Fn::GetAtt": [
353
- "VpcFlowLogLogGroup7B5C56B9",
354
- "Arn"
355
- ]
356
- }
357
- },
358
- {
359
- "Action": "iam:PassRole",
360
- "Effect": "Allow",
361
- "Resource": {
362
- "Fn::GetAtt": [
363
- "VpcFlowLogIAMRole6A475D41",
364
- "Arn"
365
- ]
366
- }
367
- }
368
- ],
369
- "Version": "2012-10-17"
370
- },
371
- "PolicyName": "VpcFlowLogIAMRoleDefaultPolicy406FB995",
372
- "Roles": [
373
- {
374
- "Ref": "VpcFlowLogIAMRole6A475D41"
375
- }
376
- ]
377
- }
378
- },
379
- "VpcFlowLogLogGroup7B5C56B9": {
380
- "Type": "AWS::Logs::LogGroup",
381
- "Properties": {
382
- "RetentionInDays": 731,
383
- "Tags": [
384
- {
385
- "Key": "Name",
386
- "Value": "lamkin-newVpcFromProps/Vpc/FlowLog"
387
- }
388
- ]
389
- },
390
- "UpdateReplacePolicy": "Retain",
391
- "DeletionPolicy": "Retain",
392
- "Metadata": {
393
- "cfn_nag": {
394
- "rules_to_suppress": [
395
- {
396
- "id": "W84",
397
- "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)"
398
- }
399
- ]
400
- }
401
- }
402
- },
403
- "VpcFlowLog8FF33A73": {
404
- "Type": "AWS::EC2::FlowLog",
405
- "Properties": {
406
- "DeliverLogsPermissionArn": {
407
- "Fn::GetAtt": [
408
- "VpcFlowLogIAMRole6A475D41",
409
- "Arn"
410
- ]
411
- },
412
- "LogDestinationType": "cloud-watch-logs",
413
- "LogGroupName": {
414
- "Ref": "VpcFlowLogLogGroup7B5C56B9"
415
- },
416
- "ResourceId": {
417
- "Ref": "Vpc8378EB38"
418
- },
419
- "ResourceType": "VPC",
420
- "Tags": [
421
- {
422
- "Key": "Name",
423
- "Value": "lamkin-newVpcFromProps/Vpc/FlowLog"
424
- }
425
- ],
426
- "TrafficType": "ALL"
427
- }
428
- },
429
- "VpcKINESISSTREAMSC07D91B5": {
430
- "Type": "AWS::EC2::VPCEndpoint",
431
- "Properties": {
432
- "PrivateDnsEnabled": true,
433
- "SecurityGroupIds": [
434
- {
435
- "Fn::GetAtt": [
436
- "lamkinnewVpcFromPropsKINESISSTREAMSsecuritygroup10DC8B01",
437
- "GroupId"
438
- ]
439
- }
440
- ],
441
- "ServiceName": {
442
- "Fn::Join": [
443
- "",
444
- [
445
- "com.amazonaws.",
446
- {
447
- "Ref": "AWS::Region"
448
- },
449
- ".kinesis-streams"
450
- ]
451
- ]
452
- },
453
- "SubnetIds": [
454
- {
455
- "Ref": "VpcisolatedSubnet1SubnetE62B1B9B"
456
- }
457
- ],
458
- "VpcEndpointType": "Interface",
459
- "VpcId": {
460
- "Ref": "Vpc8378EB38"
461
- }
462
- }
463
- },
464
- "lamkinnewVpcFromPropsKINESISSTREAMSsecuritygroup10DC8B01": {
465
- "Type": "AWS::EC2::SecurityGroup",
466
- "Properties": {
467
- "GroupDescription": "lamkin-newVpcFromProps/lamkin-newVpcFromProps-KINESIS_STREAMS-security-group",
468
- "SecurityGroupEgress": [
469
- {
470
- "CidrIp": "0.0.0.0/0",
471
- "Description": "Allow all outbound traffic by default",
472
- "IpProtocol": "-1"
473
- }
474
- ],
475
- "SecurityGroupIngress": [
476
- {
477
- "CidrIp": {
478
- "Fn::GetAtt": [
479
- "Vpc8378EB38",
480
- "CidrBlock"
481
- ]
482
- },
483
- "Description": {
484
- "Fn::Join": [
485
- "",
486
- [
487
- "from ",
488
- {
489
- "Fn::GetAtt": [
490
- "Vpc8378EB38",
491
- "CidrBlock"
492
- ]
493
- },
494
- ":443"
495
- ]
496
- ]
497
- },
498
- "FromPort": 443,
499
- "IpProtocol": "tcp",
500
- "ToPort": 443
501
- }
502
- ],
503
- "VpcId": {
504
- "Ref": "Vpc8378EB38"
505
- }
506
- },
507
- "Metadata": {
508
- "cfn_nag": {
509
- "rules_to_suppress": [
510
- {
511
- "id": "W5",
512
- "reason": "Egress of 0.0.0.0/0 is default and generally considered OK"
513
- },
514
- {
515
- "id": "W40",
516
- "reason": "Egress IPProtocol of -1 is default and generally considered OK"
517
- }
518
- ]
519
- }
520
- }
521
- }
522
- },
523
- "Parameters": {
524
- "BootstrapVersion": {
525
- "Type": "AWS::SSM::Parameter::Value<String>",
526
- "Default": "/cdk-bootstrap/hnb659fds/version",
527
- "Description": "Version of the CDK Bootstrap resources in this environment, automatically retrieved from SSM Parameter Store. [cdk:skip]"
528
- }
529
- },
530
- "Rules": {
531
- "CheckBootstrapVersion": {
532
- "Assertions": [
533
- {
534
- "Assert": {
535
- "Fn::Not": [
536
- {
537
- "Fn::Contains": [
538
- [
539
- "1",
540
- "2",
541
- "3",
542
- "4",
543
- "5"
544
- ],
545
- {
546
- "Ref": "BootstrapVersion"
547
- }
548
- ]
549
- }
550
- ]
551
- },
552
- "AssertDescription": "CDK bootstrap stack version 6 required. Please run 'cdk bootstrap' with a recent version of the CDK CLI."
553
- }
554
- ]
555
- }
556
- }
557
- }