From 65297aec8a7ff358197d0483223999412fcb1ecc Mon Sep 17 00:00:00 2001 From: Khai Do <3697686+zaro0508@users.noreply.github.com> Date: Tue, 30 Apr 2024 14:59:48 -0700 Subject: [PATCH] Remove obsolete template (#412) This cloudformation cloudwatch template was only used by organizations-infra but has been remove by PR https://github.com/Sage-Bionetworks-IT/organizations-infra/pull/1127 --- templates/Cloudwatch/cloudwatch-log.yaml | 66 ------------------------ 1 file changed, 66 deletions(-) delete mode 100644 templates/Cloudwatch/cloudwatch-log.yaml diff --git a/templates/Cloudwatch/cloudwatch-log.yaml b/templates/Cloudwatch/cloudwatch-log.yaml deleted file mode 100644 index dfabb28..0000000 --- a/templates/Cloudwatch/cloudwatch-log.yaml +++ /dev/null @@ -1,66 +0,0 @@ -Description: Setup cloudwatch logs -AWSTemplateFormatVersion: 2010-09-09 -Parameters: - LogGroupName: - Type: String - Description: >- - The cloudwatch log group name (i.e. /aws/myapp/tomcat/server.log) - RetentionInDays: - Type: Number - Description: >- - The number of days to retain the log events in the specified log group. Possible values are: - 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. - Default: 90 - MinValue: 1 - MaxValue: 3653 -Resources: - LogGroup: - Type: "AWS::Logs::LogGroup" - Properties: - LogGroupName: !Ref LogGroupName - RetentionInDays: !Ref RetentionInDays - LogPolicy: - Type: "AWS::IAM::ManagedPolicy" - Properties: - PolicyDocument: - Version: 2012-10-17 - Statement: - - Sid: AWSCloudTrailCreateLogStream - Effect: Allow - Action: - - 'logs:CreateLogStream' - Resource: - - !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:${LogGroup}:log-stream:${AWS::AccountId}_CloudTrail_${AWS::Region}*' - - Sid: AWSCloudTrailPutLogEvents - Effect: Allow - Action: - - 'logs:PutLogEvents' - Resource: - - !Sub 'arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:${LogGroup}:log-stream:${AWS::AccountId}_CloudTrail_${AWS::Region}*' - LogRole: - Type: "AWS::IAM::Role" - Properties: - AssumeRolePolicyDocument: - Version: "2012-10-17" - Statement: - - - Effect: "Allow" - Principal: - Service: - - "cloudtrail.amazonaws.com" - Action: - - "sts:AssumeRole" - Path: "/" - ManagedPolicyArns: - - !Ref LogPolicy -Outputs: - LogGroupArn: - Description: Log group ARN - Value: !GetAtt LogGroup.Arn - Export: - Name: !Sub '${AWS::Region}-${AWS::StackName}-LogGroupArn' - LogRoleArn: - Description: Log role ARN - Value: !GetAtt LogRole.Arn - Export: - Name: !Sub '${AWS::Region}-${AWS::StackName}-LogRoleArn'