-
Notifications
You must be signed in to change notification settings - Fork 87
/
Copy pathtemplate.yaml
123 lines (113 loc) · 3.31 KB
/
template.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
AWSTemplateFormatVersion: '2010-09-09'
Description: Canary resources for trivia site
Parameters:
Stage:
Type: String
AllowedValues:
- "test"
- "prod"
WebpageUrl:
Type: String
ApiEndpoint:
Type: String
SourceBucket:
Type: String
SourceObjectKey:
Type: String
NotificationsTopic:
Type: String
Default: reinvent-trivia-notifications
Resources:
Canary:
Type: AWS::Synthetics::Canary
DependsOn:
- CanaryResultsBucket
- CanaryRole
- CanaryAlarm
Properties:
Name: !Sub "trivia-game-${Stage}"
ExecutionRoleArn: !GetAtt CanaryRole.Arn
Code:
Handler: canary.handler
S3Bucket: !Ref SourceBucket
S3Key: !Ref SourceObjectKey
ArtifactS3Location: !Sub "s3://${CanaryResultsBucket}"
RuntimeVersion: syn-nodejs-puppeteer-7.0
Schedule:
Expression: 'rate(5 minutes)'
DurationInSeconds: 0
RunConfig:
TimeoutInSeconds: 60
EnvironmentVariables:
WEBPAGE_URL: !Ref WebpageUrl
API_ENDPOINT: !Ref ApiEndpoint
FailureRetentionPeriod: 30
SuccessRetentionPeriod: 30
StartCanaryAfterCreation: true
CanaryAlarm:
Type: AWS::CloudWatch::Alarm
Properties:
AlarmName: !Sub "Synthetics-Alarm-trivia-game-${Stage}"
AlarmDescription: "Synthetics alarm thresholds: 2 test failures in 10 mins"
ActionsEnabled: true
AlarmActions:
- !Sub "arn:${AWS::Partition}:sns:${AWS::Region}:${AWS::AccountId}:${NotificationsTopic}"
MetricName: SuccessPercent
Namespace: CloudWatchSynthetics
Statistic: Sum
Period: 300
EvaluationPeriods: 2
DatapointsToAlarm: 2
Threshold: 0.0
TreatMissingData: breaching
ComparisonOperator: LessThanOrEqualToThreshold
Dimensions:
- Name: CanaryName
Value: !Sub "trivia-game-${Stage}"
CanaryResultsBucket:
Type: AWS::S3::Bucket
DeletionPolicy: Delete
Properties:
LifecycleConfiguration:
Rules:
- Status: Enabled
ExpirationInDays: 31
CanaryRole:
Type: AWS::IAM::Role
Properties:
RoleName: !Sub "CloudWatchSyntheticsRole-trivia-game-${Stage}"
AssumeRolePolicyDocument:
Statement:
- Effect: Allow
Principal:
Service:
- lambda.amazonaws.com
Action:
- sts:AssumeRole
Path: /
Policies:
- PolicyName: !Sub "CloudWatchSyntheticsPolicy-trivia-game-${Stage}"
PolicyDocument:
Statement:
- Effect: Allow
Action:
- "s3:PutObject"
Resource: !Sub "arn:aws:s3:::${CanaryResultsBucket}/*"
- Effect: Allow
Action:
- "logs:CreateLogStream"
- "logs:PutLogEvents"
- "logs:CreateLogGroup"
Resource: !Sub "arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/cwsyn-trivia-game-${Stage}-*"
- Effect: Allow
Action:
- "s3:GetBucketLocation"
- "s3:ListAllMyBuckets"
Resource: "*"
- Effect: Allow
Action:
- "cloudwatch:PutMetricData"
Resource: "*"
Condition:
StringEquals:
"cloudwatch:namespace": CloudWatchSynthetics