-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathserverless.yml
125 lines (124 loc) · 3.56 KB
/
serverless.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
service: serverless-data-pipeline
frameworkVersion: '3'
package:
exclude:
- '**/*'
include:
- 'data-extractor.py'
provider:
name: aws
runtime: python3.9
region: us-east-1
iam:
role:
statements:
- Effect: Allow
Action:
- 's3:*'
- 'cloudwatch:*'
- 'logs:*'
- 'firehose:*'
Resource: '*'
lambdaHashingVersion: 20201221
functions:
data_extractor_lambda:
handler: data-extractor.lambda_handler
timeout: 300
environment:
FIREHOSE_NAME: !Ref FirehoseDeliveryStream
events:
- schedule:
name: DataExtractor-Lambda-Schedule
rate: cron(0 8 * * ? *)
resources:
Resources:
SQSQueue:
Type: AWS::SQS::Queue
Properties:
QueueName: ${self:service}-s3-event-notification-queue
S3BucketRawData:
Type: AWS::S3::Bucket
Properties:
BucketName: cse-aspi-index-raw-data-bucket
NotificationConfiguration:
QueueConfigurations:
- Event: s3:ObjectCreated:*
Queue: !GetAtt SQSQueue.Arn
SQSQueuePolicy:
Type: AWS::SQS::QueuePolicy
Properties:
Queues:
- !Ref SQSQueue
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal: '*'
Action: sqs:*
Resource: !GetAtt SQSQueue.Arn
Condition:
ArnEquals:
aws:SourceArn: !GetAtt S3BucketRawData.Arn
- Effect: Allow
Principal:
AWS: !GetAtt ExecutionIAMRole.Arn
Action: sqs:*
Resource: !GetAtt SQSQueue.Arn
S3BucketParquetData:
Type: AWS::S3::Bucket
Properties:
BucketName: cse-aspi-index-parquet-data-bucket
S3BucketProdData:
Type: AWS::S3::Bucket
Properties:
BucketName: cse-aspi-index-prod-table-data-bucket
S3BucketOutputData:
Type: AWS::S3::Bucket
Properties:
BucketName: athena-query-results-output-data-bucket
ExecutionIAMRole:
Type: AWS::IAM::Role
Properties:
RoleName: ${self:service}-execution-role
AssumeRolePolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Principal:
Service:
- firehose.amazonaws.com
- glue.amazonaws.com
Action: sts:AssumeRole
Policies:
- PolicyName: '${self:service}-execution-role-policy'
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- s3:*
- sqs:*
- glue:*
- athena:*
Resource:
- '*'
- Effect: Allow
Action:
- logs:*
Resource:
- '*'
FirehoseDeliveryStream:
Type: AWS::KinesisFirehose::DeliveryStream
Properties:
DeliveryStreamType: DirectPut
S3DestinationConfiguration:
BucketARN: !GetAtt S3BucketRawData.Arn
RoleARN: !GetAtt ExecutionIAMRole.Arn
BufferingHints:
IntervalInSeconds: 300
SizeInMBs: 5
CompressionFormat: UNCOMPRESSED
CloudWatchLoggingOptions:
Enabled: true
LogGroupName: !Sub "/aws/kinesisfirehose/${AWS::StackName}/delivery"
LogStreamName: !Sub "${AWS::StackName}-firehose-delivery-stream"