From bea41c1f0bc21fe0600e4f0cec2c88b81190527e Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 18:15:16 -0600 Subject: [PATCH 01/15] fix gluesync on k8s deployment --- CHANGELOG.md | 4 ++++ k8s-readwrite.tf | 10 +++++++++- 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index a1e5a54..b240371 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.2] - 2025-02-24 +### Fixed +- Fix gluesync on k8s deployment + ## [7.9.1] - 2025-01-14 ### Added - Added Splunk env for segrigatting logs for each environment. diff --git a/k8s-readwrite.tf b/k8s-readwrite.tf index 0692c42..80a2a63 100644 --- a/k8s-readwrite.tf +++ b/k8s-readwrite.tf @@ -201,6 +201,14 @@ resource "kubernetes_deployment_v1" "apiary_hms_readwrite" { name = "HIVE_METASTORE_LOG_LEVEL" value = var.hms_log_level } + env { + name = "ENABLE_GLUESYNC" + value = var.enable_gluesync + } + env { + name = "GLUE_PREFIX" + value = local.gluedb_prefix + } env { name = "RANGER_SERVICE_NAME" value = "${local.instance_alias}-metastore" @@ -393,4 +401,4 @@ resource "kubernetes_pod_disruption_budget_v1" "hms_readwrite" { max_unavailable = var.hms_rw_k8s_pdb_settings.max_unavailable != null ? var.hms_rw_k8s_pdb_settings.max_unavailable : "1" min_available = var.hms_rw_k8s_pdb_settings.min_available != null ? var.hms_rw_k8s_pdb_settings.min_available : null } -} \ No newline at end of file +} From 4be0d742e79e864f8fb27305d676dc60866f3b06 Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 19:57:25 -0600 Subject: [PATCH 02/15] create lf resource --- lf.tf | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 lf.tf diff --git a/lf.tf b/lf.tf new file mode 100644 index 0000000..724e8a9 --- /dev/null +++ b/lf.tf @@ -0,0 +1,10 @@ +/** + * Copyright (C) 2018-2025 Expedia, Inc. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + */ + +resource "aws_lakeformation_resource" "apiary_data_bucket" { + for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket_arn } + arn = bucket_arn +} From 904a04907da3a356ac05065cfd2ae4e28e67f26f Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 20:01:23 -0600 Subject: [PATCH 03/15] enable hybrid access --- lf.tf | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/lf.tf b/lf.tf index 724e8a9..a8101fc 100644 --- a/lf.tf +++ b/lf.tf @@ -5,6 +5,7 @@ */ resource "aws_lakeformation_resource" "apiary_data_bucket" { - for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket_arn } - arn = bucket_arn + for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket_arn } + arn = bucket_arn + hybrid_access_enabled = true } From 6b01a3a07358b3ead1156240ed014599e9543797 Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 20:02:49 -0600 Subject: [PATCH 04/15] fix --- lf.tf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lf.tf b/lf.tf index a8101fc..0647755 100644 --- a/lf.tf +++ b/lf.tf @@ -5,7 +5,7 @@ */ resource "aws_lakeformation_resource" "apiary_data_bucket" { - for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket_arn } - arn = bucket_arn + for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket } + arn = bucket hybrid_access_enabled = true } From 285be2eef00e28e1837fff7009f8842118863053 Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 20:04:35 -0600 Subject: [PATCH 05/15] fix --- lf.tf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lf.tf b/lf.tf index 0647755..0c690c4 100644 --- a/lf.tf +++ b/lf.tf @@ -5,7 +5,7 @@ */ resource "aws_lakeformation_resource" "apiary_data_bucket" { - for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket.arn => bucket } - arn = bucket + for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket => bucket } + arn = bucket.arn hybrid_access_enabled = true } From cfac2f671debebc41d3d52dd900df99062f7ae7d Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 20:06:30 -0600 Subject: [PATCH 06/15] fix --- lf.tf | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/lf.tf b/lf.tf index 0c690c4..c8773ea 100644 --- a/lf.tf +++ b/lf.tf @@ -5,7 +5,10 @@ */ resource "aws_lakeformation_resource" "apiary_data_bucket" { - for_each = { for bucket in aws_s3_bucket.apiary_data_bucket : bucket => bucket } - arn = bucket.arn + for_each = { + for schema in local.schemas_info : "${schema["schema_name"]}" => schema + } + arn = aws_s3_bucket.apiary_data_bucket[each.key].arn + hybrid_access_enabled = true } From fafbc24878a17d0c39c3f498bfc698c5d6b7383b Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Mon, 24 Feb 2025 20:10:35 -0600 Subject: [PATCH 07/15] update provider to support lf hybrid access --- version.tf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/version.tf b/version.tf index abb841b..a9e3db3 100644 --- a/version.tf +++ b/version.tf @@ -13,7 +13,7 @@ terraform { } aws = { source = "hashicorp/aws" - version = "~> 4.0" + version = ">= 5.17.0" } external = { source = "hashicorp/external" @@ -28,7 +28,7 @@ terraform { version = "3.25.0" } template = { - source = "hashicorp/template" + source = "hashicorp/template" version = "~> 2.2" } } From e44f9396a3b6bd60e13c4bdc2e08892c966d2678 Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 08/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications --- CHANGELOG.md | 4 ++++ common.tf | 2 ++ sns.tf | 7 ++++++- variables.tf | 6 ++++++ 4 files changed, 18 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index b240371..8955c19 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.3] - 2025-02-25 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.2] - 2025-02-24 ### Fixed - Fix gluesync on k8s deployment diff --git a/common.tf b/common.tf index 3b058cc..105c6ce 100644 --- a/common.tf +++ b/common.tf @@ -41,6 +41,8 @@ locals { enable_apiary_s3_log_management = var.apiary_log_bucket == "" ? true : false enable_apiary_s3_log_hive = var.apiary_log_bucket == "" && var.enable_apiary_s3_log_hive ? true : false apiary_s3_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_bucket_prefix}-s3-logs" : "" + s3_logs_bucket = var.s3_logs_buckets_csv + s3_logs_bucket_list = concat(["arn:aws:s3:::${local.apiary_s3_logs_bucket}"], [for bucket in split(",", var.s3_logs_buckets_csv):"arn:aws:s3:::${bucket}"]) apiary_s3_hive_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_s3_logs_bucket}-hive" : "" apiary_system_bucket = "${local.apiary_bucket_prefix}-${replace(var.system_schema_name, "_", "-")}" diff --git a/sns.tf b/sns.tf index 13d149a..0036e49 100644 --- a/sns.tf +++ b/sns.tf @@ -96,7 +96,12 @@ resource "aws_sqs_queue" "apiary_managed_logs_queue" { "Action": "sqs:SendMessage", "Resource": "arn:aws:sqs:*:*:${local.instance_alias}-s3-logs-queue", "Condition":{ - "ArnEquals":{"aws:SourceArn":"arn:aws:s3:::${local.apiary_s3_logs_bucket}"} + "ArnEquals":{ + "aws:SourceArn": [ + "arn:aws:s3:::${local.apiary_s3_logs_bucket}", + "arn:aws:s3:::${local.s3_logs_bucket}" + ] + } } } ] diff --git a/variables.tf b/variables.tf index 13df6f4..623586c 100644 --- a/variables.tf +++ b/variables.tf @@ -108,6 +108,12 @@ variable "s3_logs_sqs_receive_wait_time_seconds" { default = 10 } +variable "s3_logs_buckets_csv" { + description = "This is the s3 logs buckets separated by comma where the s3 logs sqs should receive event notifications from f.i: 'bucketname1,bucketname2...'" + type = string + default = "" +} + variable "enable_hive_metastore_metrics" { description = "Enable sending Hive Metastore metrics to CloudWatch." type = bool From a30a2e4b1f2d7f34c4a72ccc69661cb0d6d980f3 Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 09/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications --- CHANGELOG.md | 4 ++++ common.tf | 2 ++ sns.tf | 7 ++++++- variables.tf | 6 ++++++ 4 files changed, 18 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 9c0f138..0a5d7c3 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.4] - 2025-02-25 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.3] - 2025-02-25 ### Fixed - Merged all S3 lifecycle configurations into `aws_s3_bucket_lifecycle_configuration` object. diff --git a/common.tf b/common.tf index 3b058cc..105c6ce 100644 --- a/common.tf +++ b/common.tf @@ -41,6 +41,8 @@ locals { enable_apiary_s3_log_management = var.apiary_log_bucket == "" ? true : false enable_apiary_s3_log_hive = var.apiary_log_bucket == "" && var.enable_apiary_s3_log_hive ? true : false apiary_s3_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_bucket_prefix}-s3-logs" : "" + s3_logs_bucket = var.s3_logs_buckets_csv + s3_logs_bucket_list = concat(["arn:aws:s3:::${local.apiary_s3_logs_bucket}"], [for bucket in split(",", var.s3_logs_buckets_csv):"arn:aws:s3:::${bucket}"]) apiary_s3_hive_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_s3_logs_bucket}-hive" : "" apiary_system_bucket = "${local.apiary_bucket_prefix}-${replace(var.system_schema_name, "_", "-")}" diff --git a/sns.tf b/sns.tf index 13d149a..0036e49 100644 --- a/sns.tf +++ b/sns.tf @@ -96,7 +96,12 @@ resource "aws_sqs_queue" "apiary_managed_logs_queue" { "Action": "sqs:SendMessage", "Resource": "arn:aws:sqs:*:*:${local.instance_alias}-s3-logs-queue", "Condition":{ - "ArnEquals":{"aws:SourceArn":"arn:aws:s3:::${local.apiary_s3_logs_bucket}"} + "ArnEquals":{ + "aws:SourceArn": [ + "arn:aws:s3:::${local.apiary_s3_logs_bucket}", + "arn:aws:s3:::${local.s3_logs_bucket}" + ] + } } } ] diff --git a/variables.tf b/variables.tf index 13df6f4..623586c 100644 --- a/variables.tf +++ b/variables.tf @@ -108,6 +108,12 @@ variable "s3_logs_sqs_receive_wait_time_seconds" { default = 10 } +variable "s3_logs_buckets_csv" { + description = "This is the s3 logs buckets separated by comma where the s3 logs sqs should receive event notifications from f.i: 'bucketname1,bucketname2...'" + type = string + default = "" +} + variable "enable_hive_metastore_metrics" { description = "Enable sending Hive Metastore metrics to CloudWatch." type = bool From 172d6476dd871118a5301812e823484938593720 Mon Sep 17 00:00:00 2001 From: Raj Poluri Date: Wed, 26 Feb 2025 07:13:56 -0600 Subject: [PATCH 10/15] create_lf_resource variable --- lf.tf | 4 ++-- variables.tf | 6 ++++++ 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/lf.tf b/lf.tf index c8773ea..ca9654a 100644 --- a/lf.tf +++ b/lf.tf @@ -5,9 +5,9 @@ */ resource "aws_lakeformation_resource" "apiary_data_bucket" { - for_each = { + for_each = var.create_lf_resource ? { for schema in local.schemas_info : "${schema["schema_name"]}" => schema - } + } : {} arn = aws_s3_bucket.apiary_data_bucket[each.key].arn hybrid_access_enabled = true diff --git a/variables.tf b/variables.tf index beff1f6..a14b5ad 100644 --- a/variables.tf +++ b/variables.tf @@ -585,6 +585,12 @@ variable "rw_ingress_cidr" { default = [] } +variable "create_lf_resource" { + description = "Register data buckets in LakeFormation." + type = bool + default = false +} + variable "disable_glue_db_init" { description = "Glue databases are created programatically by default in hms-readwrite bootstrap init action. Setting this variable to true will disable the hms-readwrite bootstrap init action and create Glue databases via Terraform." type = bool From 7c7b4c5df3148053c8ebe15d943863bcce04c056 Mon Sep 17 00:00:00 2001 From: javsanbel2 Date: Wed, 26 Feb 2025 14:51:51 +0100 Subject: [PATCH 11/15] Expiration will be 0 when the S3 lifecycle rule is disabled --- CHANGELOG.md | 4 ++++ s3.tf | 4 ++-- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 535d862..706a7bb 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.6] - 2025-02-26 +### Fixed +- Expiration will be 0 when the S3 lifecycle rule is disabled. + ## [7.9.5] - 2025-02-26 ### Added - Add option to provision glue databases using terraform instead of metastore startup. diff --git a/s3.tf b/s3.tf index 2c131db..32a9aac 100644 --- a/s3.tf +++ b/s3.tf @@ -96,13 +96,13 @@ resource "aws_s3_bucket_lifecycle_configuration" "apiary_data_bucket_versioning_ storage_class = each.value["s3_storage_class"] } } - # Rule s3 object expiration + # Rule s3 object expiration - days cannot be negative rule { id = "cost_optimization_expiration" status = each.value["s3_object_expiration_days_num"] != "-1" ? "Enabled" : "Disabled" expiration { - days = each.value["s3_object_expiration_days_num"] + days = each.value["s3_object_expiration_days_num"] != "-1" ? each.value["s3_object_expiration_days_num"] : "0" } } } From 55db0cf8e264d41693d8fcf0695c1848689ab8b1 Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 12/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications # Conflicts: # CHANGELOG.md --- CHANGELOG.md | 4 ++++ common.tf | 2 ++ sns.tf | 7 ++++++- variables.tf | 6 ++++++ 4 files changed, 18 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 706a7bb..c2acc78 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.7] - 2025-02-26 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.6] - 2025-02-26 ### Fixed - Expiration will be 0 when the S3 lifecycle rule is disabled. diff --git a/common.tf b/common.tf index 3b058cc..105c6ce 100644 --- a/common.tf +++ b/common.tf @@ -41,6 +41,8 @@ locals { enable_apiary_s3_log_management = var.apiary_log_bucket == "" ? true : false enable_apiary_s3_log_hive = var.apiary_log_bucket == "" && var.enable_apiary_s3_log_hive ? true : false apiary_s3_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_bucket_prefix}-s3-logs" : "" + s3_logs_bucket = var.s3_logs_buckets_csv + s3_logs_bucket_list = concat(["arn:aws:s3:::${local.apiary_s3_logs_bucket}"], [for bucket in split(",", var.s3_logs_buckets_csv):"arn:aws:s3:::${bucket}"]) apiary_s3_hive_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_s3_logs_bucket}-hive" : "" apiary_system_bucket = "${local.apiary_bucket_prefix}-${replace(var.system_schema_name, "_", "-")}" diff --git a/sns.tf b/sns.tf index 13d149a..0036e49 100644 --- a/sns.tf +++ b/sns.tf @@ -96,7 +96,12 @@ resource "aws_sqs_queue" "apiary_managed_logs_queue" { "Action": "sqs:SendMessage", "Resource": "arn:aws:sqs:*:*:${local.instance_alias}-s3-logs-queue", "Condition":{ - "ArnEquals":{"aws:SourceArn":"arn:aws:s3:::${local.apiary_s3_logs_bucket}"} + "ArnEquals":{ + "aws:SourceArn": [ + "arn:aws:s3:::${local.apiary_s3_logs_bucket}", + "arn:aws:s3:::${local.s3_logs_bucket}" + ] + } } } ] diff --git a/variables.tf b/variables.tf index beff1f6..3ccf460 100644 --- a/variables.tf +++ b/variables.tf @@ -108,6 +108,12 @@ variable "s3_logs_sqs_receive_wait_time_seconds" { default = 10 } +variable "s3_logs_buckets_csv" { + description = "This is the s3 logs buckets separated by comma where the s3 logs sqs should receive event notifications from f.i: 'bucketname1,bucketname2...'" + type = string + default = "" +} + variable "enable_hive_metastore_metrics" { description = "Enable sending Hive Metastore metrics to CloudWatch." type = bool From 15bdac8899e7784c1f916bfefe11f7bae404c6af Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 13/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications # Conflicts: # CHANGELOG.md --- CHANGELOG.md | 4 ++++ common.tf | 2 ++ sns.tf | 7 ++++++- variables.tf | 6 ++++++ 4 files changed, 18 insertions(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 706a7bb..c2acc78 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.7] - 2025-02-26 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.6] - 2025-02-26 ### Fixed - Expiration will be 0 when the S3 lifecycle rule is disabled. diff --git a/common.tf b/common.tf index 3b058cc..105c6ce 100644 --- a/common.tf +++ b/common.tf @@ -41,6 +41,8 @@ locals { enable_apiary_s3_log_management = var.apiary_log_bucket == "" ? true : false enable_apiary_s3_log_hive = var.apiary_log_bucket == "" && var.enable_apiary_s3_log_hive ? true : false apiary_s3_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_bucket_prefix}-s3-logs" : "" + s3_logs_bucket = var.s3_logs_buckets_csv + s3_logs_bucket_list = concat(["arn:aws:s3:::${local.apiary_s3_logs_bucket}"], [for bucket in split(",", var.s3_logs_buckets_csv):"arn:aws:s3:::${bucket}"]) apiary_s3_hive_logs_bucket = local.enable_apiary_s3_log_management ? "${local.apiary_s3_logs_bucket}-hive" : "" apiary_system_bucket = "${local.apiary_bucket_prefix}-${replace(var.system_schema_name, "_", "-")}" diff --git a/sns.tf b/sns.tf index 13d149a..0036e49 100644 --- a/sns.tf +++ b/sns.tf @@ -96,7 +96,12 @@ resource "aws_sqs_queue" "apiary_managed_logs_queue" { "Action": "sqs:SendMessage", "Resource": "arn:aws:sqs:*:*:${local.instance_alias}-s3-logs-queue", "Condition":{ - "ArnEquals":{"aws:SourceArn":"arn:aws:s3:::${local.apiary_s3_logs_bucket}"} + "ArnEquals":{ + "aws:SourceArn": [ + "arn:aws:s3:::${local.apiary_s3_logs_bucket}", + "arn:aws:s3:::${local.s3_logs_bucket}" + ] + } } } ] diff --git a/variables.tf b/variables.tf index a14b5ad..f8255bd 100644 --- a/variables.tf +++ b/variables.tf @@ -108,6 +108,12 @@ variable "s3_logs_sqs_receive_wait_time_seconds" { default = 10 } +variable "s3_logs_buckets_csv" { + description = "This is the s3 logs buckets separated by comma where the s3 logs sqs should receive event notifications from f.i: 'bucketname1,bucketname2...'" + type = string + default = "" +} + variable "enable_hive_metastore_metrics" { description = "Enable sending Hive Metastore metrics to CloudWatch." type = bool From 82c39f0e76f11f247c3a6f2c53773faeea567748 Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 14/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications # Conflicts: # CHANGELOG.md --- CHANGELOG.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index c2acc78..1093b3c 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.8] - 2025-02-25 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.7] - 2025-02-26 ### Added - Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. From 073aaa8f60526e3b05f77b88bc53f7dac9b1318e Mon Sep 17 00:00:00 2001 From: Diego Armando Vargas Date: Tue, 25 Feb 2025 06:06:36 -0500 Subject: [PATCH 15/15] feat: Update S3 Logs SQS permissions to allow external account s3 logs bucket event notifications --- CHANGELOG.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1093b3c..0024467 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,10 @@ All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). +## [7.9.9] - 2025-02-25 +### Added +- Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications. + ## [7.9.8] - 2025-02-25 ### Added - Update S3 Logs SQS permissions to allow multiple s3 logs buckets to report event notifications.