Skip to content

Commit c60475f

Browse files
glue crawler
1 parent 34747a4 commit c60475f

3 files changed

Lines changed: 112 additions & 1 deletion

File tree

infrastructure/terraform/components/api/glue_catalog_table_events.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
resource "aws_glue_catalog_table" "events" {
2-
name = "events_history"
2+
name = "${local.csi}-events_history"
33
database_name = aws_glue_catalog_database.supplier.name
44

55
table_type = "EXTERNAL_TABLE"
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
resource "aws_glue_crawler" "event_crawler" {
2+
name = "event-crawler-${aws_glue_catalog_table.events.name}"
3+
database_name = aws_glue_catalog_database.supplier.name
4+
role = aws_iam_role.glue_role.arn
5+
6+
table_prefix = ""
7+
s3_target {
8+
path = "s3://${aws_s3_bucket.event_reporting.bucket}/events/"
9+
}
10+
recrawl_policy {
11+
recrawl_behavior = "CRAWL_EVERYTHING"
12+
}
13+
14+
configuration = jsonencode({
15+
Version = 1.0
16+
CrawlerOutput = {
17+
Partitions = {
18+
AddOrUpdateBehavior = "InheritFromTable"
19+
}
20+
}
21+
})
22+
}
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
resource "aws_iam_role" "glue_role" {
2+
name = "${local.csi}-glue-role"
3+
assume_role_policy = data.aws_iam_policy_document.glue_assume_role.json
4+
}
5+
6+
data "aws_iam_policy_document" "glue_assume_role" {
7+
statement {
8+
sid = "AllowGlueServiceAssumeRole"
9+
effect = "Allow"
10+
11+
principals {
12+
type = "Service"
13+
identifiers = ["glue.amazonaws.com"]
14+
}
15+
16+
actions = [
17+
"sts:AssumeRole",
18+
]
19+
}
20+
}
21+
22+
resource "aws_iam_policy" "glue_service_policy" {
23+
name = "${local.csi}-glue-service-policy"
24+
description = "Policy for ${local.csi} Glue Service Role"
25+
policy = data.aws_iam_policy_document.glue_service_policy.json
26+
}
27+
28+
data "aws_iam_policy_document" "glue_service_policy" {
29+
statement {
30+
sid = "AllowGlueLogging"
31+
effect = "Allow"
32+
33+
actions = [
34+
"logs:CreateLogGroup",
35+
"logs:CreateLogStream",
36+
"logs:PutLogEvents"
37+
]
38+
resources = ["arn:aws:logs:*:*:*"]
39+
}
40+
41+
statement {
42+
sid = "AllowS3Access"
43+
effect = "Allow"
44+
45+
actions = [
46+
"s3:GetObject",
47+
"s3:PutObject",
48+
"s3:ListBucket",
49+
"s3:GetBucketLocation",
50+
"s3:DeleteObject"
51+
]
52+
resources = ["arn:aws:s3:::${local.csi}-glue-bucket/*",
53+
"arn:aws:s3:::${local.csi_global}-event-reporting/*"]
54+
}
55+
statement {
56+
sid = "GlueCatalogAccess"
57+
effect = "Allow"
58+
actions = [
59+
"glue:GetDatabase",
60+
"glue:GetDatabases",
61+
"glue:GetTable",
62+
"glue:GetTables",
63+
"glue:CreateTable",
64+
"glue:UpdateTable",
65+
"glue:CreatePartition",
66+
"glue:BatchCreatePartition",
67+
"glue:GetPartition",
68+
"glue:BatchGetPartition"
69+
]
70+
resources = ["*"]
71+
}
72+
statement {
73+
sid = "S3TempAndGlueETL"
74+
effect = "Allow"
75+
actions = [
76+
"s3:PutObject",
77+
"s3:GetObject"
78+
]
79+
resources = [
80+
"arn:aws:s3:::aws-glue-*",
81+
"arn:aws:s3:::aws-glue-*/*"
82+
]
83+
}
84+
}
85+
86+
resource "aws_iam_role_policy_attachment" "gllue_attach_policy" {
87+
role = aws_iam_role.glue_role.name
88+
policy_arn = aws_iam_policy.glue_service_policy.arn
89+
}

0 commit comments

Comments
 (0)