File tree Expand file tree Collapse file tree 4 files changed +49
-1
lines changed Expand file tree Collapse file tree 4 files changed +49
-1
lines changed Original file line number Diff line number Diff line change @@ -7,18 +7,27 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [ Unreleased]
9
9
10
+ ## [ 0.8.1] - 2020-12-08
11
+ ### Changed
12
+ - Policy is missing for streaming logs to cloudwatch #388
13
+
10
14
## [ 0.8.0] - 2020-12-08
11
15
12
16
### Changed
17
+
13
18
- Examples upgraded to Terraform 13 (#372 )
14
19
### Added
20
+
15
21
- Streaming runner logs to cloudwatch #375
16
22
17
23
## [ 0.7.0] - 2020-12-04
24
+
18
25
### Changed
26
+
19
27
- Small clarifications in the README #368 @lrytz
20
28
21
29
### Added
30
+
22
31
- Allow operator to pass in a list of managed IAM policy ARNs for the runner role #361 @jpalomaki
23
32
- expand options for sourcing lambda to include S3 #292 @eky5006
24
33
@@ -96,7 +105,8 @@ terraform import module.runners.module.webhook.aws_cloudwatch_log_group.webhook
96
105
97
106
- First release.
98
107
99
- [ unreleased ] : https://github.com/philips-labs/terraform-aws-github-runner/compare/v0.8.0..HEAD
108
+ [ unreleased ] : https://github.com/philips-labs/terraform-aws-github-runner/compare/v0.8.1..HEAD
109
+ [ 0.8.1 ] : https://github.com/philips-labs/terraform-aws-github-runner/releases/tag/v0.8.0..v0.8.1
100
110
[ 0.8.0 ] : https://github.com/philips-labs/terraform-aws-github-runner/releases/tag/v0.7.0..v0.8.0
101
111
[ 0.7.0 ] : https://github.com/philips-labs/terraform-aws-github-runner/releases/tag/v0.6.0..v0.7.0
102
112
[ 0.6.0 ] : https://github.com/philips-labs/terraform-aws-github-runner/releases/tag/v0.5.0..v0.6.0
Original file line number Diff line number Diff line change @@ -18,3 +18,14 @@ resource "aws_cloudwatch_log_group" "runners" {
18
18
retention_in_days = var. logging_retention_in_days
19
19
tags = local. tags
20
20
}
21
+
22
+ resource "aws_iam_role_policy" "cloudwatch" {
23
+ count = var. enable_ssm_on_runners ? 1 : 0
24
+ name = " CloudWatchLogginAndMetrics"
25
+ role = aws_iam_role. runner . name
26
+ policy = templatefile (" ${ path . module } /policies/instance-cloudwatch-policy.json" ,
27
+ {
28
+ ssm_parameter_arn = aws_ssm_parameter.cloudwatch_agent_config_runner[0 ].arn
29
+ }
30
+ )
31
+ }
Original file line number Diff line number Diff line change @@ -45,3 +45,5 @@ resource "aws_iam_role_policy_attachment" "managed_policies" {
45
45
role = aws_iam_role. runner . name
46
46
policy_arn = element (var. runner_iam_role_managed_policy_arns , count. index )
47
47
}
48
+
49
+ // see also logging.tf for logging and metrics policies
Original file line number Diff line number Diff line change
1
+ {
2
+ "Version" : " 2012-10-17" ,
3
+ "Statement" : [
4
+ {
5
+ "Effect" : " Allow" ,
6
+ "Action" : [
7
+ " cloudwatch:PutMetricData" ,
8
+ " ec2:DescribeVolumes" ,
9
+ " ec2:DescribeTags" ,
10
+ " logs:PutLogEvents" ,
11
+ " logs:DescribeLogStreams" ,
12
+ " logs:DescribeLogGroups" ,
13
+ " logs:CreateLogStream"
14
+ ],
15
+ "Resource" : " *"
16
+ },
17
+ {
18
+ "Effect" : " Allow" ,
19
+ "Action" : [
20
+ " ssm:GetParameter"
21
+ ],
22
+ "Resource" : " ${ssm_parameter_arn}/*"
23
+ }
24
+ ]
25
+ }
You can’t perform that action at this time.
0 commit comments