aws∕lambda‒s3‒bucket‒provisioning - dicomgrid/pt-modules GitHub Wiki
Usage
To use this module in your Terraform, refer to the below module example:
module "aws_lambda_s3_bucket_provisioning" {
source = "git::https://github.com/dicomgrid/pt-modules.git?ref=null"
# See inputs below for additional required parameters
}
Attributes
Requirements
Name | Version |
---|---|
terraform | >= 1.0.9 |
aws | ~> 4.47.0 |
Providers
Name | Version |
---|---|
aws.ambra_storage1_account | ~> 4.47.0 |
aws.primary | ~> 4.47.0 |
Modules
No modules.
Resources
Inputs
Name | Description | Type | Default | Required |
---|---|---|---|---|
access_logging | n/a | bool |
true |
no |
ambra_storage1_account | AWS account ID for PHR/Orphan storage | string |
"" |
no |
ambra_storage_accounts | A list of Ambra/Intelerad storage accounts for imaging data | set(string) |
[] |
no |
aws_region | AWS region | string |
"" |
no |
environment | Ambra code environment | string |
"" |
no |
instance_role | n/a | string |
"" |
no |
lambda_execution_role_name | n/a | string |
"s3-bucket-provisioning-lambda-execution-role" |
no |
max_buckets_per_account | The maximum number of S3 buckets in a given AWS account | number |
750 |
no |
object_expiration | n/a | number |
14 |
no |
primary_account | n/a | string |
"" |
no |
s3objectmanager_policy_name | adding follow 3 variables the rare occasion where the lambda will exist on the same acct(different regions). this will allow for the creation of different policies that will limit scope of allowed roles to assume | string |
"s3ObjectManager" |
no |
services_instance_profile_name | n/a | string |
"s3-bucket-provisioning-instance-profile" |
no |
timeout | n/a | string |
"60" |
no |
Outputs
No outputs.