Configuration in this directory creates AWS Step Function and IAM role with large variety of supported AWS Service integrations and custom policies.
Note: You probably don't need to set custom/additional policies but use service_integrations
only.
To run this example you need to execute:
$ terraform init
$ terraform plan
$ terraform apply
Note that this example may create resources which cost money. Run terraform destroy
when you don't need these resources.
Name | Version |
---|---|
terraform | >= 0.13.1 |
aws | >= 3.27 |
null | >= 2 |
random | >= 2 |
Name | Version |
---|---|
aws | >= 3.27 |
null | >= 2 |
random | >= 2 |
Name | Source | Version |
---|---|---|
disabled_step_function | ../../ | n/a |
lambda_function | terraform-aws-modules/lambda/aws | ~> 2.0 |
step_function | ../../ | n/a |
step_function_with_existing_log_group | ../../ | n/a |
Name | Type |
---|---|
aws_cloudwatch_log_group.external | resource |
aws_sqs_queue.queue | resource |
null_resource.download_package | resource |
random_pet.this | resource |
No inputs.
Name | Description |
---|---|
role_arn | The ARN of the IAM role created for the State Machine |
role_name | The name of the IAM role created for the State Machine |
state_machine_arn | The ARN of the State Machine |
state_machine_creation_date | The date the State Machine was created |
state_machine_id | The ARN of the State Machine |
state_machine_status | The current status of the State Machine |