// Jest Snapshot v1, https://goo.gl/fbAQLP exports[`test Text Analysis Fireshose Stream Creation 1`] = ` { "Parameters": { "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aArtifactHash88A33C87": { "Description": "Artifact hash for asset "09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16a"", "Type": "String", }, "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aS3BucketAB08A02E": { "Description": "S3 bucket for asset "09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16a"", "Type": "String", }, "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aS3VersionKey5B136550": { "Description": "S3 key for asset version "09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16a"", "Type": "String", }, }, "Resources": { "CustomFirehoseRole67C464FB": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomFirehoseRoleDefaultPolicy812A51B7": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionStorage1B0F4BB3", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionStorage1B0F4BB3", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "CustomFirehoseRoleDefaultPolicy812A51B7", "Roles": [ { "Ref": "CustomFirehoseRole67C464FB", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomIngestionItemFirehoseRole0C28E7B0": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomIngestionItemFirehoseRoleDefaultPolicy85008CFE": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionItemStorageA523E8A1", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionItemStorageA523E8A1", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "CustomIngestionItemFirehoseRoleDefaultPolicy85008CFE", "Roles": [ { "Ref": "CustomIngestionItemFirehoseRole0C28E7B0", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomIngestionItemKinesisFirehoseB1C4046B": { "DependsOn": [ "CustomIngestionItemFirehoseRoleDefaultPolicy85008CFE", "CustomIngestionItemFirehoseRole0C28E7B0", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "customIngestionItemStorageA523E8A1", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "CustomIngestionItemKinesisFirehosefirehoseloggroup5791E8D7", }, "LogStreamName": { "Ref": "CustomIngestionItemKinesisFirehosefirehoseloggroupfirehoselogstreamDA1A45AA", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "customingestionitem", "RoleARN": { "Fn::GetAtt": [ "CustomIngestionItemFirehoseRole0C28E7B0", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "CustomIngestionItemKinesisFirehoseKinesisFirehosePolicyB8D89319": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionItemStorageA523E8A1", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionItemStorageA523E8A1", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "CustomIngestionItemKinesisFirehosefirehoseloggroup5791E8D7", }, ":log-stream:", { "Ref": "CustomIngestionItemKinesisFirehosefirehoseloggroupfirehoselogstreamDA1A45AA", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "CustomIngestionItemKinesisFirehoseKinesisFirehosePolicyB8D89319", "Roles": [ { "Ref": "CustomIngestionItemKinesisFirehoseKinesisFirehoseRole33676D8F", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomIngestionItemKinesisFirehoseKinesisFirehoseRole33676D8F": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomIngestionItemKinesisFirehosefirehoseloggroup5791E8D7": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "CustomIngestionItemKinesisFirehosefirehoseloggroupfirehoselogstreamDA1A45AA": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "CustomIngestionItemKinesisFirehosefirehoseloggroup5791E8D7", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "CustomIngestionLoudnessFirehoseRoleA3BD55D4": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomIngestionLoudnessFirehoseRoleDefaultPolicy260A80D8": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionLoudnessStorage8EFCD992", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionLoudnessStorage8EFCD992", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "CustomIngestionLoudnessFirehoseRoleDefaultPolicy260A80D8", "Roles": [ { "Ref": "CustomIngestionLoudnessFirehoseRoleA3BD55D4", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomIngestionLoudnessKinesisFirehoseB1BA3233": { "DependsOn": [ "CustomIngestionLoudnessFirehoseRoleDefaultPolicy260A80D8", "CustomIngestionLoudnessFirehoseRoleA3BD55D4", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "customIngestionLoudnessStorage8EFCD992", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "CustomIngestionLoudnessKinesisFirehosefirehoseloggroup3C405E61", }, "LogStreamName": { "Ref": "CustomIngestionLoudnessKinesisFirehosefirehoseloggroupfirehoselogstreamE0C9387F", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "customingestionloudness", "RoleARN": { "Fn::GetAtt": [ "CustomIngestionLoudnessFirehoseRoleA3BD55D4", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "CustomIngestionLoudnessKinesisFirehoseKinesisFirehosePolicyABA81DA0": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionLoudnessStorage8EFCD992", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionLoudnessStorage8EFCD992", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "CustomIngestionLoudnessKinesisFirehosefirehoseloggroup3C405E61", }, ":log-stream:", { "Ref": "CustomIngestionLoudnessKinesisFirehosefirehoseloggroupfirehoselogstreamE0C9387F", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "CustomIngestionLoudnessKinesisFirehoseKinesisFirehosePolicyABA81DA0", "Roles": [ { "Ref": "CustomIngestionLoudnessKinesisFirehoseKinesisFirehoseRoleDCC7EA05", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomIngestionLoudnessKinesisFirehoseKinesisFirehoseRoleDCC7EA05": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomIngestionLoudnessKinesisFirehosefirehoseloggroup3C405E61": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "CustomIngestionLoudnessKinesisFirehosefirehoseloggroupfirehoselogstreamE0C9387F": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "CustomIngestionLoudnessKinesisFirehosefirehoseloggroup3C405E61", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "CustomKinesisFirehoseAF080B75": { "DependsOn": [ "CustomFirehoseRoleDefaultPolicy812A51B7", "CustomFirehoseRole67C464FB", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "customIngestionStorage1B0F4BB3", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "CustomKinesisFirehosefirehoseloggroup595023B5", }, "LogStreamName": { "Ref": "CustomKinesisFirehosefirehoseloggroupfirehoselogstream980107E1", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "customingestion", "RoleARN": { "Fn::GetAtt": [ "CustomFirehoseRole67C464FB", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "CustomKinesisFirehoseKinesisFirehosePolicyCC338FA2": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "customIngestionStorage1B0F4BB3", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "customIngestionStorage1B0F4BB3", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "CustomKinesisFirehosefirehoseloggroup595023B5", }, ":log-stream:", { "Ref": "CustomKinesisFirehosefirehoseloggroupfirehoselogstream980107E1", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "CustomKinesisFirehoseKinesisFirehosePolicyCC338FA2", "Roles": [ { "Ref": "CustomKinesisFirehoseKinesisFirehoseRole82E83FC9", }, ], }, "Type": "AWS::IAM::Policy", }, "CustomKinesisFirehoseKinesisFirehoseRole82E83FC9": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "CustomKinesisFirehosefirehoseloggroup595023B5": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "CustomKinesisFirehosefirehoseloggroupfirehoselogstream980107E1": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "CustomKinesisFirehosefirehoseloggroup595023B5", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "EntityFirehoseRole67127AB0": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "EntityFirehoseRoleDefaultPolicy24CB5410": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "entitybucketA094FEBC", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "entitybucketA094FEBC", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "EntityFirehoseRoleDefaultPolicy24CB5410", "Roles": [ { "Ref": "EntityFirehoseRole67127AB0", }, ], }, "Type": "AWS::IAM::Policy", }, "EntityKinesisFirehose2D670D30": { "DependsOn": [ "EntityFirehoseRoleDefaultPolicy24CB5410", "EntityFirehoseRole67127AB0", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "entitybucketA094FEBC", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "EntityKinesisFirehosefirehoseloggroup35035055", }, "LogStreamName": { "Ref": "EntityKinesisFirehosefirehoseloggroupfirehoselogstream5BFCB0A7", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "entity/", "RoleARN": { "Fn::GetAtt": [ "EntityFirehoseRole67127AB0", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "EntityKinesisFirehoseKinesisFirehosePolicy59061B08": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "entitybucketA094FEBC", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "entitybucketA094FEBC", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "EntityKinesisFirehosefirehoseloggroup35035055", }, ":log-stream:", { "Ref": "EntityKinesisFirehosefirehoseloggroupfirehoselogstream5BFCB0A7", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "EntityKinesisFirehoseKinesisFirehosePolicy59061B08", "Roles": [ { "Ref": "EntityKinesisFirehoseKinesisFirehoseRole0054630D", }, ], }, "Type": "AWS::IAM::Policy", }, "EntityKinesisFirehoseKinesisFirehoseRole0054630D": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "EntityKinesisFirehosefirehoseloggroup35035055": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "EntityKinesisFirehosefirehoseloggroupfirehoselogstream5BFCB0A7": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "EntityKinesisFirehosefirehoseloggroup35035055", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "KeyPhraseFirehoseRoleDCB50F6B": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "KeyPhraseFirehoseRoleDefaultPolicyAD3F286D": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "keyphrasebucketFFC777CE", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "keyphrasebucketFFC777CE", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "KeyPhraseFirehoseRoleDefaultPolicyAD3F286D", "Roles": [ { "Ref": "KeyPhraseFirehoseRoleDCB50F6B", }, ], }, "Type": "AWS::IAM::Policy", }, "KeyPhraseKinesisFirehose299642E2": { "DependsOn": [ "KeyPhraseFirehoseRoleDefaultPolicyAD3F286D", "KeyPhraseFirehoseRoleDCB50F6B", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "keyphrasebucketFFC777CE", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "KeyPhraseKinesisFirehosefirehoseloggroup894BC257", }, "LogStreamName": { "Ref": "KeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamCE152BFB", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "keyphrase/", "RoleARN": { "Fn::GetAtt": [ "KeyPhraseFirehoseRoleDCB50F6B", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "KeyPhraseKinesisFirehoseKinesisFirehosePolicy47DB5148": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "keyphrasebucketFFC777CE", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "keyphrasebucketFFC777CE", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "KeyPhraseKinesisFirehosefirehoseloggroup894BC257", }, ":log-stream:", { "Ref": "KeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamCE152BFB", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "KeyPhraseKinesisFirehoseKinesisFirehosePolicy47DB5148", "Roles": [ { "Ref": "KeyPhraseKinesisFirehoseKinesisFirehoseRole59E57AD2", }, ], }, "Type": "AWS::IAM::Policy", }, "KeyPhraseKinesisFirehoseKinesisFirehoseRole59E57AD2": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "KeyPhraseKinesisFirehosefirehoseloggroup894BC257": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "KeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamCE152BFB": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "KeyPhraseKinesisFirehosefirehoseloggroup894BC257", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "MetadataFirehoseRole4F2427BD": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "MetadataFirehoseRoleDefaultPolicyB2D1B672": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "metadataStorage1FC96022", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "metadataStorage1FC96022", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "MetadataFirehoseRoleDefaultPolicyB2D1B672", "Roles": [ { "Ref": "MetadataFirehoseRole4F2427BD", }, ], }, "Type": "AWS::IAM::Policy", }, "MetadataKinesisFirehose649EB08F": { "DependsOn": [ "MetadataFirehoseRoleDefaultPolicyB2D1B672", "MetadataFirehoseRole4F2427BD", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "metadataStorage1FC96022", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "MetadataKinesisFirehosefirehoseloggroup92B7718C", }, "LogStreamName": { "Ref": "MetadataKinesisFirehosefirehoseloggroupfirehoselogstreamF47AC60F", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "metadata", "RoleARN": { "Fn::GetAtt": [ "MetadataFirehoseRole4F2427BD", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "MetadataKinesisFirehoseKinesisFirehosePolicyD9E6B250": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "metadataStorage1FC96022", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "metadataStorage1FC96022", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "MetadataKinesisFirehosefirehoseloggroup92B7718C", }, ":log-stream:", { "Ref": "MetadataKinesisFirehosefirehoseloggroupfirehoselogstreamF47AC60F", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "MetadataKinesisFirehoseKinesisFirehosePolicyD9E6B250", "Roles": [ { "Ref": "MetadataKinesisFirehoseKinesisFirehoseRole448BA67C", }, ], }, "Type": "AWS::IAM::Policy", }, "MetadataKinesisFirehoseKinesisFirehoseRole448BA67C": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "MetadataKinesisFirehosefirehoseloggroup92B7718C": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "MetadataKinesisFirehosefirehoseloggroupfirehoselogstreamF47AC60F": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "MetadataKinesisFirehosefirehoseloggroup92B7718C", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "ModerationLabelsFirehoseRole7FC3CF11": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "ModerationLabelsFirehoseRoleDefaultPolicy2557D265": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "moderationlabelFADE9E84", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "moderationlabelFADE9E84", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "ModerationLabelsFirehoseRoleDefaultPolicy2557D265", "Roles": [ { "Ref": "ModerationLabelsFirehoseRole7FC3CF11", }, ], }, "Type": "AWS::IAM::Policy", }, "ModerationLabelsKinesisFirehose6FCD594B": { "DependsOn": [ "ModerationLabelsFirehoseRoleDefaultPolicy2557D265", "ModerationLabelsFirehoseRole7FC3CF11", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "moderationlabelFADE9E84", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "ModerationLabelsKinesisFirehosefirehoseloggroupDFEFC436", }, "LogStreamName": { "Ref": "ModerationLabelsKinesisFirehosefirehoseloggroupfirehoselogstreamDCBA7EAA", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "moderationLabel", "RoleARN": { "Fn::GetAtt": [ "ModerationLabelsFirehoseRole7FC3CF11", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "ModerationLabelsKinesisFirehoseKinesisFirehosePolicyBE977D37": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "moderationlabelFADE9E84", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "moderationlabelFADE9E84", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "ModerationLabelsKinesisFirehosefirehoseloggroupDFEFC436", }, ":log-stream:", { "Ref": "ModerationLabelsKinesisFirehosefirehoseloggroupfirehoselogstreamDCBA7EAA", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "ModerationLabelsKinesisFirehoseKinesisFirehosePolicyBE977D37", "Roles": [ { "Ref": "ModerationLabelsKinesisFirehoseKinesisFirehoseRoleC7D234B7", }, ], }, "Type": "AWS::IAM::Policy", }, "ModerationLabelsKinesisFirehoseKinesisFirehoseRoleC7D234B7": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "ModerationLabelsKinesisFirehosefirehoseloggroupDFEFC436": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "ModerationLabelsKinesisFirehosefirehoseloggroupfirehoselogstreamDCBA7EAA": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "ModerationLabelsKinesisFirehosefirehoseloggroupDFEFC436", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "NewsFeedStorageFirehoseRoleAFA1640E": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "NewsFeedStorageFirehoseRoleDefaultPolicyDF66A977": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "newsFeedStorage0BFF378B", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "newsFeedStorage0BFF378B", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "NewsFeedStorageFirehoseRoleDefaultPolicyDF66A977", "Roles": [ { "Ref": "NewsFeedStorageFirehoseRoleAFA1640E", }, ], }, "Type": "AWS::IAM::Policy", }, "NewsFeedStorageKinesisFirehoseF48B61B2": { "DependsOn": [ "NewsFeedStorageFirehoseRoleDefaultPolicyDF66A977", "NewsFeedStorageFirehoseRoleAFA1640E", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "newsFeedStorage0BFF378B", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "NewsFeedStorageKinesisFirehosefirehoseloggroup13015849", }, "LogStreamName": { "Ref": "NewsFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamB80D4B4E", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "newsfeedStorage", "RoleARN": { "Fn::GetAtt": [ "NewsFeedStorageFirehoseRoleAFA1640E", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "NewsFeedStorageKinesisFirehoseKinesisFirehosePolicyC4F0CF1E": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "newsFeedStorage0BFF378B", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "newsFeedStorage0BFF378B", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "NewsFeedStorageKinesisFirehosefirehoseloggroup13015849", }, ":log-stream:", { "Ref": "NewsFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamB80D4B4E", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "NewsFeedStorageKinesisFirehoseKinesisFirehosePolicyC4F0CF1E", "Roles": [ { "Ref": "NewsFeedStorageKinesisFirehoseKinesisFirehoseRoleBC9560DF", }, ], }, "Type": "AWS::IAM::Policy", }, "NewsFeedStorageKinesisFirehoseKinesisFirehoseRoleBC9560DF": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "NewsFeedStorageKinesisFirehosefirehoseloggroup13015849": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "NewsFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamB80D4B4E": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "NewsFeedStorageKinesisFirehosefirehoseloggroup13015849", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "RedditCommentsFirehoseRole40339780": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "RedditCommentsFirehoseRoleDefaultPolicy53B33A45": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "redditcommentsstorageC4956261", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "redditcommentsstorageC4956261", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "RedditCommentsFirehoseRoleDefaultPolicy53B33A45", "Roles": [ { "Ref": "RedditCommentsFirehoseRole40339780", }, ], }, "Type": "AWS::IAM::Policy", }, "RedditCommentsKinesisFirehoseC3BD4DFA": { "DependsOn": [ "RedditCommentsFirehoseRoleDefaultPolicy53B33A45", "RedditCommentsFirehoseRole40339780", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "redditcommentsstorageC4956261", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "RedditCommentsKinesisFirehosefirehoseloggroup2DEF64EE", }, "LogStreamName": { "Ref": "RedditCommentsKinesisFirehosefirehoseloggroupfirehoselogstream80D3DBB9", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "redditcomments", "RoleARN": { "Fn::GetAtt": [ "RedditCommentsFirehoseRole40339780", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "RedditCommentsKinesisFirehoseKinesisFirehosePolicy73D7E7BD": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "redditcommentsstorageC4956261", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "redditcommentsstorageC4956261", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "RedditCommentsKinesisFirehosefirehoseloggroup2DEF64EE", }, ":log-stream:", { "Ref": "RedditCommentsKinesisFirehosefirehoseloggroupfirehoselogstream80D3DBB9", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "RedditCommentsKinesisFirehoseKinesisFirehosePolicy73D7E7BD", "Roles": [ { "Ref": "RedditCommentsKinesisFirehoseKinesisFirehoseRole818766AB", }, ], }, "Type": "AWS::IAM::Policy", }, "RedditCommentsKinesisFirehoseKinesisFirehoseRole818766AB": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "RedditCommentsKinesisFirehosefirehoseloggroup2DEF64EE": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "RedditCommentsKinesisFirehosefirehoseloggroupfirehoselogstream80D3DBB9": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "RedditCommentsKinesisFirehosefirehoseloggroup2DEF64EE", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "SentimentFirehoseRole8C82670C": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "SentimentFirehoseRoleDefaultPolicyDE6B3CB8": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "testBucketDF4D7D1A", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "testBucketDF4D7D1A", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "SentimentFirehoseRoleDefaultPolicyDE6B3CB8", "Roles": [ { "Ref": "SentimentFirehoseRole8C82670C", }, ], }, "Type": "AWS::IAM::Policy", }, "SentimentKinesisFirehose490D8CD7": { "DependsOn": [ "SentimentFirehoseRoleDefaultPolicyDE6B3CB8", "SentimentFirehoseRole8C82670C", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "testBucketDF4D7D1A", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "SentimentKinesisFirehosefirehoseloggroupA4034328", }, "LogStreamName": { "Ref": "SentimentKinesisFirehosefirehoseloggroupfirehoselogstream54B97AB9", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "/sentiment", "RoleARN": { "Fn::GetAtt": [ "SentimentFirehoseRole8C82670C", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "SentimentKinesisFirehoseKinesisFirehosePolicyEE3267E9": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "testBucketDF4D7D1A", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "testBucketDF4D7D1A", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "SentimentKinesisFirehosefirehoseloggroupA4034328", }, ":log-stream:", { "Ref": "SentimentKinesisFirehosefirehoseloggroupfirehoselogstream54B97AB9", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "SentimentKinesisFirehoseKinesisFirehosePolicyEE3267E9", "Roles": [ { "Ref": "SentimentKinesisFirehoseKinesisFirehoseRoleDF60842F", }, ], }, "Type": "AWS::IAM::Policy", }, "SentimentKinesisFirehoseKinesisFirehoseRoleDF60842F": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "SentimentKinesisFirehosefirehoseloggroupA4034328": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "SentimentKinesisFirehosefirehoseloggroupfirehoselogstream54B97AB9": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "SentimentKinesisFirehosefirehoseloggroupA4034328", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "TestTAProxyLambdaFunction646B9726": { "DependsOn": [ "TestTAProxyLambdaFunctionServiceRoleDefaultPolicyFC7C1A09", "TestTAProxyLambdaFunctionServiceRole1AE0D1E2", ], "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W58", "reason": "Lambda functions has the required permission to write CloudWatch Logs. It uses custom policy instead of arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole with tighter permissions.", }, { "id": "W89", "reason": "This is not a rule for the general case, just for specific use cases/industries", }, { "id": "W92", "reason": "Impossible for us to define the correct concurrency for clients", }, ], }, }, "Properties": { "Code": { "S3Bucket": { "Ref": "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aS3BucketAB08A02E", }, "S3Key": { "Fn::Join": [ "", [ { "Fn::Select": [ 0, { "Fn::Split": [ "||", { "Ref": "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aS3VersionKey5B136550", }, ], }, ], }, { "Fn::Select": [ 1, { "Fn::Split": [ "||", { "Ref": "AssetParameters09f4ea1cd73c829bbfae7d834c7644c8bb7ae06c10db49af309e099e7328a16aS3VersionKey5B136550", }, ], }, ], }, ], ], }, }, "Environment": { "Variables": { "AWS_NODEJS_CONNECTION_REUSE_ENABLED": "1", "CUSTOMINGESTIONITEM_FEED_STORAGE": { "Ref": "CustomIngestionItemKinesisFirehoseB1C4046B", }, "CUSTOMINGESTIONLOUDNESS_FEED_STORAGE": { "Ref": "CustomIngestionLoudnessKinesisFirehoseB1BA3233", }, "CUSTOMINGESTIONMETADATA_FEED_STORAGE": { "Ref": "MetadataKinesisFirehose649EB08F", }, "CUSTOMINGESTION_FEED_STORAGE": { "Ref": "CustomKinesisFirehoseAF080B75", }, "ENTITIES_FIREHOSE": { "Ref": "EntityKinesisFirehose2D670D30", }, "KEYPHRASE_FIREHOSE": { "Ref": "KeyPhraseKinesisFirehose299642E2", }, "METADATA_NS": "metadata.call_analytics", "MODERATION_LABELS_FIREHOSE": { "Ref": "ModerationLabelsKinesisFirehose6FCD594B", }, "NEWSFEEDS_FEED_STORAGE": { "Ref": "NewsFeedStorageKinesisFirehoseF48B61B2", }, "REDDIT_FEED_STORAGE": { "Ref": "RedditCommentsKinesisFirehoseC3BD4DFA", }, "SENTIMENT_FIREHOSE": { "Ref": "SentimentKinesisFirehose490D8CD7", }, "TEXT_ANALYSIS_NS": "com.analyze.inference.text", "TW_FEED_STORAGE": { "Ref": "TwFeedStorageKinesisFirehoseFA049A08", }, "TXT_IN_IMG_ENTITY_FIREHOSE": { "Ref": "TxtInImgEntityKinesisFirehoseC57CD69A", }, "TXT_IN_IMG_KEYPHRASE_FIREHOSE": { "Ref": "TxtInImgKeyPhraseKinesisFirehose8A54B4C3", }, "TXT_IN_IMG_SENTIMENT_FIREHOSE": { "Ref": "TxtImgSentimentKinesisFirehose9E112549", }, "YOUTUBECOMMENTS_FEED_STORAGE": { "Ref": "YouTubeCommentsKinesisFirehose93E34664", }, }, }, "Handler": "index.handler", "Role": { "Fn::GetAtt": [ "TestTAProxyLambdaFunctionServiceRole1AE0D1E2", "Arn", ], }, "Runtime": "nodejs14.x", "Timeout": 900, "TracingConfig": { "Mode": "Active", }, }, "Type": "AWS::Lambda::Function", }, "TestTAProxyLambdaFunctionServiceRole1AE0D1E2": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "lambda.amazonaws.com", }, }, ], "Version": "2012-10-17", }, "Policies": [ { "PolicyDocument": { "Statement": [ { "Action": [ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents", ], "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:/aws/lambda/*", ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "LambdaFunctionServiceRolePolicy", }, ], }, "Type": "AWS::IAM::Role", }, "TestTAProxyLambdaFunctionServiceRoleDefaultPolicyFC7C1A09": { "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W76", "reason": "The lambda role policy requires to access multiple firehose buckets. Hence suppressing the SPCM rule", }, { "id": "W12", "reason": "Lambda needs the following minimum required permissions to send trace data to X-Ray and access ENIs in a VPC.", }, ], }, }, "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "xray:PutTraceSegments", "xray:PutTelemetryRecords", ], "Effect": "Allow", "Resource": "*", }, { "Action": [ "firehose:PutRecord", "firehose:PutRecordBatch", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "SentimentKinesisFirehose490D8CD7", "Arn", ], }, { "Fn::GetAtt": [ "EntityKinesisFirehose2D670D30", "Arn", ], }, { "Fn::GetAtt": [ "KeyPhraseKinesisFirehose299642E2", "Arn", ], }, { "Fn::GetAtt": [ "TxtImgSentimentKinesisFirehose9E112549", "Arn", ], }, { "Fn::GetAtt": [ "TxtInImgEntityKinesisFirehoseC57CD69A", "Arn", ], }, { "Fn::GetAtt": [ "TxtInImgKeyPhraseKinesisFirehose8A54B4C3", "Arn", ], }, { "Fn::GetAtt": [ "ModerationLabelsKinesisFirehose6FCD594B", "Arn", ], }, { "Fn::GetAtt": [ "TwFeedStorageKinesisFirehoseFA049A08", "Arn", ], }, { "Fn::GetAtt": [ "NewsFeedStorageKinesisFirehoseF48B61B2", "Arn", ], }, { "Fn::GetAtt": [ "YouTubeCommentsKinesisFirehose93E34664", "Arn", ], }, { "Fn::GetAtt": [ "CustomKinesisFirehoseAF080B75", "Arn", ], }, { "Fn::GetAtt": [ "CustomIngestionLoudnessKinesisFirehoseB1BA3233", "Arn", ], }, { "Fn::GetAtt": [ "CustomIngestionItemKinesisFirehoseB1C4046B", "Arn", ], }, { "Fn::GetAtt": [ "MetadataKinesisFirehose649EB08F", "Arn", ], }, { "Fn::GetAtt": [ "RedditCommentsKinesisFirehoseC3BD4DFA", "Arn", ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "TestTAProxyLambdaFunctionServiceRoleDefaultPolicyFC7C1A09", "Roles": [ { "Ref": "TestTAProxyLambdaFunctionServiceRole1AE0D1E2", }, ], }, "Type": "AWS::IAM::Policy", }, "TwFeedStorageFirehoseRole9A5B798C": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TwFeedStorageFirehoseRoleDefaultPolicyCDDB8360": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "twfeedstorage53FEDE7A", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "twfeedstorage53FEDE7A", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "TwFeedStorageFirehoseRoleDefaultPolicyCDDB8360", "Roles": [ { "Ref": "TwFeedStorageFirehoseRole9A5B798C", }, ], }, "Type": "AWS::IAM::Policy", }, "TwFeedStorageKinesisFirehoseFA049A08": { "DependsOn": [ "TwFeedStorageFirehoseRoleDefaultPolicyCDDB8360", "TwFeedStorageFirehoseRole9A5B798C", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "twfeedstorage53FEDE7A", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "TwFeedStorageKinesisFirehosefirehoseloggroupEF61DCCD", }, "LogStreamName": { "Ref": "TwFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamF5C63904", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "feedStorage", "RoleARN": { "Fn::GetAtt": [ "TwFeedStorageFirehoseRole9A5B798C", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "TwFeedStorageKinesisFirehoseKinesisFirehosePolicy65467598": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "twfeedstorage53FEDE7A", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "twfeedstorage53FEDE7A", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "TwFeedStorageKinesisFirehosefirehoseloggroupEF61DCCD", }, ":log-stream:", { "Ref": "TwFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamF5C63904", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "TwFeedStorageKinesisFirehoseKinesisFirehosePolicy65467598", "Roles": [ { "Ref": "TwFeedStorageKinesisFirehoseKinesisFirehoseRoleA3150C63", }, ], }, "Type": "AWS::IAM::Policy", }, "TwFeedStorageKinesisFirehoseKinesisFirehoseRoleA3150C63": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TwFeedStorageKinesisFirehosefirehoseloggroupEF61DCCD": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "TwFeedStorageKinesisFirehosefirehoseloggroupfirehoselogstreamF5C63904": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "TwFeedStorageKinesisFirehosefirehoseloggroupEF61DCCD", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "TxtImgSentimentFirehoseRoleDefaultPolicyF5760D77": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgsentimentF3FCCBAB", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgsentimentF3FCCBAB", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "TxtImgSentimentFirehoseRoleDefaultPolicyF5760D77", "Roles": [ { "Ref": "TxtImgSentimentFirehoseRoleFBEB2611", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtImgSentimentFirehoseRoleFBEB2611": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtImgSentimentKinesisFirehose9E112549": { "DependsOn": [ "TxtImgSentimentFirehoseRoleDefaultPolicyF5760D77", "TxtImgSentimentFirehoseRoleFBEB2611", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "txtinimgsentimentF3FCCBAB", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "TxtImgSentimentKinesisFirehosefirehoseloggroup8249C9B4", }, "LogStreamName": { "Ref": "TxtImgSentimentKinesisFirehosefirehoseloggroupfirehoselogstream9BE5DA4E", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "txtinimgsentiment", "RoleARN": { "Fn::GetAtt": [ "TxtImgSentimentFirehoseRoleFBEB2611", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "TxtImgSentimentKinesisFirehoseKinesisFirehosePolicyF56CD724": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgsentimentF3FCCBAB", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgsentimentF3FCCBAB", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "TxtImgSentimentKinesisFirehosefirehoseloggroup8249C9B4", }, ":log-stream:", { "Ref": "TxtImgSentimentKinesisFirehosefirehoseloggroupfirehoselogstream9BE5DA4E", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "TxtImgSentimentKinesisFirehoseKinesisFirehosePolicyF56CD724", "Roles": [ { "Ref": "TxtImgSentimentKinesisFirehoseKinesisFirehoseRole78F1604E", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtImgSentimentKinesisFirehoseKinesisFirehoseRole78F1604E": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtImgSentimentKinesisFirehosefirehoseloggroup8249C9B4": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "TxtImgSentimentKinesisFirehosefirehoseloggroupfirehoselogstream9BE5DA4E": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "TxtImgSentimentKinesisFirehosefirehoseloggroup8249C9B4", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "TxtInImgEntityFirehoseRole053C9DE7": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtInImgEntityFirehoseRoleDefaultPolicy156B4454": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgentityA78B97B2", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgentityA78B97B2", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "TxtInImgEntityFirehoseRoleDefaultPolicy156B4454", "Roles": [ { "Ref": "TxtInImgEntityFirehoseRole053C9DE7", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtInImgEntityKinesisFirehoseC57CD69A": { "DependsOn": [ "TxtInImgEntityFirehoseRoleDefaultPolicy156B4454", "TxtInImgEntityFirehoseRole053C9DE7", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "txtinimgentityA78B97B2", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "TxtInImgEntityKinesisFirehosefirehoseloggroup0EA2B35B", }, "LogStreamName": { "Ref": "TxtInImgEntityKinesisFirehosefirehoseloggroupfirehoselogstream75777D03", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "txtinimgentity/", "RoleARN": { "Fn::GetAtt": [ "TxtInImgEntityFirehoseRole053C9DE7", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "TxtInImgEntityKinesisFirehoseKinesisFirehosePolicy95266AE9": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgentityA78B97B2", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgentityA78B97B2", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "TxtInImgEntityKinesisFirehosefirehoseloggroup0EA2B35B", }, ":log-stream:", { "Ref": "TxtInImgEntityKinesisFirehosefirehoseloggroupfirehoselogstream75777D03", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "TxtInImgEntityKinesisFirehoseKinesisFirehosePolicy95266AE9", "Roles": [ { "Ref": "TxtInImgEntityKinesisFirehoseKinesisFirehoseRoleF1BA0BBE", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtInImgEntityKinesisFirehoseKinesisFirehoseRoleF1BA0BBE": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtInImgEntityKinesisFirehosefirehoseloggroup0EA2B35B": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "TxtInImgEntityKinesisFirehosefirehoseloggroupfirehoselogstream75777D03": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "TxtInImgEntityKinesisFirehosefirehoseloggroup0EA2B35B", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "TxtInImgKeyPhraseFirehoseRoleCD623422": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtInImgKeyPhraseFirehoseRoleDefaultPolicy12DE2EA5": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgkeyphrase008A6C27", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgkeyphrase008A6C27", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "TxtInImgKeyPhraseFirehoseRoleDefaultPolicy12DE2EA5", "Roles": [ { "Ref": "TxtInImgKeyPhraseFirehoseRoleCD623422", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtInImgKeyPhraseKinesisFirehose8A54B4C3": { "DependsOn": [ "TxtInImgKeyPhraseFirehoseRoleDefaultPolicy12DE2EA5", "TxtInImgKeyPhraseFirehoseRoleCD623422", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "txtinimgkeyphrase008A6C27", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroup60CD4EAE", }, "LogStreamName": { "Ref": "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamE34F2E52", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "txtinimgkeyphrase", "RoleARN": { "Fn::GetAtt": [ "TxtInImgKeyPhraseFirehoseRoleCD623422", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "TxtInImgKeyPhraseKinesisFirehoseKinesisFirehosePolicy0596B6F9": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "txtinimgkeyphrase008A6C27", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "txtinimgkeyphrase008A6C27", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroup60CD4EAE", }, ":log-stream:", { "Ref": "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamE34F2E52", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "TxtInImgKeyPhraseKinesisFirehoseKinesisFirehosePolicy0596B6F9", "Roles": [ { "Ref": "TxtInImgKeyPhraseKinesisFirehoseKinesisFirehoseRoleA7C4AA2D", }, ], }, "Type": "AWS::IAM::Policy", }, "TxtInImgKeyPhraseKinesisFirehoseKinesisFirehoseRoleA7C4AA2D": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroup60CD4EAE": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroupfirehoselogstreamE34F2E52": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "TxtInImgKeyPhraseKinesisFirehosefirehoseloggroup60CD4EAE", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "YouTubeCommentsFirehoseRoleD099E247": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "YouTubeCommentsFirehoseRoleDefaultPolicy19C6E179": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:GetObject*", "s3:GetBucket*", "s3:List*", "s3:DeleteObject*", "s3:PutObject*", "s3:Abort*", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "youTubeCommentsStorage102B80C8", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "youTubeCommentsStorage102B80C8", "Arn", ], }, "/*", ], ], }, ], }, ], "Version": "2012-10-17", }, "PolicyName": "YouTubeCommentsFirehoseRoleDefaultPolicy19C6E179", "Roles": [ { "Ref": "YouTubeCommentsFirehoseRoleD099E247", }, ], }, "Type": "AWS::IAM::Policy", }, "YouTubeCommentsKinesisFirehose93E34664": { "DependsOn": [ "YouTubeCommentsFirehoseRoleDefaultPolicy19C6E179", "YouTubeCommentsFirehoseRoleD099E247", ], "Properties": { "DeliveryStreamEncryptionConfigurationInput": { "KeyType": "AWS_OWNED_CMK", }, "DeliveryStreamType": "DirectPut", "ExtendedS3DestinationConfiguration": { "BucketARN": { "Fn::GetAtt": [ "youTubeCommentsStorage102B80C8", "Arn", ], }, "BufferingHints": { "IntervalInSeconds": 600, "SizeInMBs": 128, }, "CloudWatchLoggingOptions": { "Enabled": true, "LogGroupName": { "Ref": "YouTubeCommentsKinesisFirehosefirehoseloggroup3D8F2B5E", }, "LogStreamName": { "Ref": "YouTubeCommentsKinesisFirehosefirehoseloggroupfirehoselogstream8D5BC661", }, }, "CompressionFormat": "UNCOMPRESSED", "EncryptionConfiguration": { "KMSEncryptionConfig": { "AWSKMSKeyARN": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":kms:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":alias/aws/s3", ], ], }, }, }, "Prefix": "youTubeComments", "RoleARN": { "Fn::GetAtt": [ "YouTubeCommentsFirehoseRoleD099E247", "Arn", ], }, }, }, "Type": "AWS::KinesisFirehose::DeliveryStream", }, "YouTubeCommentsKinesisFirehoseKinesisFirehosePolicy751B98A3": { "Properties": { "PolicyDocument": { "Statement": [ { "Action": [ "s3:AbortMultipartUpload", "s3:GetBucketLocation", "s3:GetObject", "s3:ListBucket", "s3:ListBucketMultipartUploads", "s3:PutObject", ], "Effect": "Allow", "Resource": [ { "Fn::GetAtt": [ "youTubeCommentsStorage102B80C8", "Arn", ], }, { "Fn::Join": [ "", [ { "Fn::GetAtt": [ "youTubeCommentsStorage102B80C8", "Arn", ], }, "/*", ], ], }, ], }, { "Action": "logs:PutLogEvents", "Effect": "Allow", "Resource": { "Fn::Join": [ "", [ "arn:", { "Ref": "AWS::Partition", }, ":logs:", { "Ref": "AWS::Region", }, ":", { "Ref": "AWS::AccountId", }, ":log-group:", { "Ref": "YouTubeCommentsKinesisFirehosefirehoseloggroup3D8F2B5E", }, ":log-stream:", { "Ref": "YouTubeCommentsKinesisFirehosefirehoseloggroupfirehoselogstream8D5BC661", }, ], ], }, }, ], "Version": "2012-10-17", }, "PolicyName": "YouTubeCommentsKinesisFirehoseKinesisFirehosePolicy751B98A3", "Roles": [ { "Ref": "YouTubeCommentsKinesisFirehoseKinesisFirehoseRoleA83DD013", }, ], }, "Type": "AWS::IAM::Policy", }, "YouTubeCommentsKinesisFirehoseKinesisFirehoseRoleA83DD013": { "Properties": { "AssumeRolePolicyDocument": { "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "firehose.amazonaws.com", }, }, ], "Version": "2012-10-17", }, }, "Type": "AWS::IAM::Role", }, "YouTubeCommentsKinesisFirehosefirehoseloggroup3D8F2B5E": { "DeletionPolicy": "Retain", "Metadata": { "cfn_nag": { "rules_to_suppress": [ { "id": "W86", "reason": "Retention period for CloudWatchLogs LogGroups are set to 'Never Expire' to preserve customer data indefinitely", }, { "id": "W84", "reason": "By default CloudWatchLogs LogGroups data is encrypted using the CloudWatch server-side encryption keys (AWS Managed Keys)", }, ], }, }, "Type": "AWS::Logs::LogGroup", "UpdateReplacePolicy": "Retain", }, "YouTubeCommentsKinesisFirehosefirehoseloggroupfirehoselogstream8D5BC661": { "DeletionPolicy": "Retain", "Properties": { "LogGroupName": { "Ref": "YouTubeCommentsKinesisFirehosefirehoseloggroup3D8F2B5E", }, }, "Type": "AWS::Logs::LogStream", "UpdateReplacePolicy": "Retain", }, "customIngestionItemStorageA523E8A1": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "customIngestionLoudnessStorage8EFCD992": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "customIngestionStorage1B0F4BB3": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "entitybucketA094FEBC": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "keyphrasebucketFFC777CE": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "metadataStorage1FC96022": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "moderationlabelFADE9E84": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "newsFeedStorage0BFF378B": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "redditcommentsstorageC4956261": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "testBucketDF4D7D1A": { "DeletionPolicy": "Retain", "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "twfeedstorage53FEDE7A": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "txtinimgentityA78B97B2": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "txtinimgkeyphrase008A6C27": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "txtinimgsentimentF3FCCBAB": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, "youTubeCommentsStorage102B80C8": { "DeletionPolicy": "Retain", "Properties": { "BucketEncryption": { "ServerSideEncryptionConfiguration": [ { "ServerSideEncryptionByDefault": { "SSEAlgorithm": "AES256", }, }, ], }, }, "Type": "AWS::S3::Bucket", "UpdateReplacePolicy": "Retain", }, }, } `;