You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_additional_lambda_role_policy_arns"></a> [additional\_lambda\_role\_policy\_arns](#input\_additional\_lambda\_role\_policy\_arns)| List of policies ARNs to attach to the lambda |`list(string)`|`[]`| no |
191
192
| <aname="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name)| Name of the bucket to put the file in. Alternatively, an S3 access point ARN can be specified. |`string`|`""`| no |
193
+
| <aname="input_cloudwatch_log_kms_key_id"></a> [cloudwatch\_log\_kms\_key\_id](#input\_cloudwatch\_log\_kms\_key\_id)| The ARN for the KMS encryption key. |`string`|`null`| no |
194
+
| <aname="input_cloudwatch_log_retention_in_days"></a> [cloudwatch\_log\_retention\_in\_days](#input\_cloudwatch\_log\_retention\_in\_days)| Retention day for cloudwatch log group |`number`|`90`| no |
192
195
| <aname="input_compressed_local_file_dir"></a> [compressed\_local\_file\_dir](#input\_compressed\_local\_file\_dir)| A path to the directory to store plan time generated local files |`string`|`""`| no |
193
196
| <aname="input_config_file_name"></a> [config\_file\_name](#input\_config\_file\_name)| The name of the file var.plaintext\_params will be written to as json |`string`|`"config.json"`| no |
194
197
| <aname="input_dead_letter_target_arn"></a> [dead\_letter\_target\_arn](#input\_dead\_letter\_target\_arn)| Dead letter queue configuration that specifies the queue or topic where Lambda sends asynchronous events when they fail processing. |`string`|`null`| no |
@@ -208,7 +211,6 @@ module "lambda_from_local" {
208
211
| <aname="input_plaintext_params"></a> [plaintext\_params](#input\_plaintext\_params)| Lambda@Edge does not support env vars, so it is a common pattern to exchange Env vars for values read from a config file.<br> ! PLAINTEXT<pre>const config = JSON.parse(readFileSync('./config.json'))<br> const someConfigValue = config.SomeKey</pre> |`map(string)`|`{}`| no |
209
212
| <aname="input_prefix"></a> [prefix](#input\_prefix)| The prefix name of customer to be displayed in AWS console and resource |`string`| n/a | yes |
210
213
| <aname="input_reserved_concurrent_executions"></a> [reserved\_concurrent\_executions](#input\_reserved\_concurrent\_executions)| (Optional) Amount of reserved concurrent executions for this lambda function. A value of 0 disables lambda from being triggered and -1 removes any concurrency limitations. Defaults to Unreserved Concurrency Limits -1. See Managing Concurrency |`number`|`-1`| no |
211
-
| <aname="input_retention_in_days"></a> [retention\_in\_days](#input\_retention\_in\_days)| Retention day for cloudwatch log group |`number`|`30`| no |
212
214
| <aname="input_runtime"></a> [runtime](#input\_runtime)| The runtime of the lambda function |`string`| n/a | yes |
213
215
| <aname="input_source_code_dir"></a> [source\_code\_dir](#input\_source\_code\_dir)| An absolute path to the directory containing the code to upload to lambda |`string`|`""`| no |
214
216
| <aname="input_ssm_params"></a> [ssm\_params](#input\_ssm\_params)| Lambda@Edge does not support env vars, so it is a common pattern to exchange Env vars for SSM params.<br> ! SECRET<br><br> you would have lookups in SSM, like:<br> `const someEnvValue = await ssmClient.getParameter({ Name: 'SOME_SSM_PARAM_NAME', WithDecryption: true })`|`map(string)`|`{}`| no |
0 commit comments