community.aws.cloudwatchevent_rule (2.6.1) — module

Manage CloudWatch Event rules and targets

| "added in version" 1.0.0 of community.aws"

Authors: Jim Dalton (@jsdalton) <jim.dalton@gmail.com>

Install collection

Install with ansible-galaxy collection install community.aws:==2.6.1


Add to requirements.yml

  collections:
    - name: community.aws
      version: 2.6.1

Description

This module creates and manages CloudWatch event rules and targets.

Usage examples

  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- community.aws.cloudwatchevent_rule:
    name: MyCronTask
    schedule_expression: "cron(0 20 * * ? *)"
    description: Run my scheduled task
    targets:
      - id: MyTargetId
        arn: arn:aws:lambda:us-east-1:123456789012:function:MyFunction
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- community.aws.cloudwatchevent_rule:
    name: MyDisabledCronTask
    schedule_expression: "rate(5 minutes)"
    description: Run my disabled scheduled task
    state: disabled
    targets:
      - id: MyOtherTargetId
        arn: arn:aws:lambda:us-east-1:123456789012:function:MyFunction
        input: '{"foo": "bar"}'
  • Success
    Steampunk Spotter scan finished with no errors, warnings or hints.
- community.aws.cloudwatchevent_rule:
    name: MyCronTask
    state: absent

Inputs

    
name:
    description:
    - The name of the rule you are creating, updating or deleting. No spaces or special
      characters allowed (i.e. must match C([\.\-_A-Za-z0-9]+)).
    required: true
    type: str

state:
    choices:
    - present
    - disabled
    - absent
    default: present
    description:
    - Whether the rule is present (and enabled), disabled, or absent.
    required: false
    type: str

region:
    aliases:
    - aws_region
    - ec2_region
    description:
    - The AWS region to use.
    - For global services such as IAM, Route53 and CloudFront, I(region) is ignored.
    - The C(AWS_REGION) or C(EC2_REGION) environment variables may also be used.
    - See the Amazon AWS documentation for more information U(http://docs.aws.amazon.com/general/latest/gr/rande.html#ec2_region).
    - The C(ec2_region) alias has been deprecated and will be removed in a release after
      2024-12-01
    - Support for the C(EC2_REGION) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

profile:
    aliases:
    - aws_profile
    description:
    - A named AWS profile to use for authentication.
    - See the AWS documentation for more information about named profiles U(https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html).
    - The C(AWS_PROFILE) environment variable may also be used.
    - The I(profile) option is mutually exclusive with the I(aws_access_key), I(aws_secret_key)
      and I(security_token) options.
    type: str

targets:
    description:
    - A list of targets to add to or update for the rule.
    elements: dict
    required: false
    suboptions:
      arn:
        description: The ARN associated with the target.
        required: true
        type: str
      ecs_parameters:
        description:
        - Contains the ECS task definition and task count to be used, if the event target
          is an ECS task.
        suboptions:
          task_count:
            description: The number of tasks to create based on I(task_definition).
            type: int
          task_definition_arn:
            description: The full ARN of the task definition.
            type: str
        type: dict
      id:
        description: The unique target assignment ID.
        required: true
        type: str
      input:
        description:
        - A JSON object that will override the event data when passed to the target.
        - If neither I(input) nor I(input_path) is specified, then the entire event is
          passed to the target in JSON form.
        type: str
      input_path:
        description:
        - A JSONPath string (e.g. C($.detail)) that specifies the part of the event data
          to be passed to the target.
        - If neither I(input) nor I(input_path) is specified, then the entire event is
          passed to the target in JSON form.
        type: str
      role_arn:
        description: The ARN of the IAM role to be used for this target when the rule
          is triggered.
        type: str
    type: list

role_arn:
    description:
    - The Amazon Resource Name (ARN) of the IAM role associated with the rule.
    required: false
    type: str

access_key:
    aliases:
    - aws_access_key_id
    - aws_access_key
    - ec2_access_key
    description:
    - AWS access key ID.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_ACCESS_KEY_ID), C(AWS_ACCESS_KEY) or C(EC2_ACCESS_KEY) environment variables
      may also be used in decreasing order of preference.
    - The I(aws_access_key) and I(profile) options are mutually exclusive.
    - The I(aws_access_key_id) alias was added in release 5.1.0 for consistency with the
      AWS botocore SDK.
    - The I(ec2_access_key) alias has been deprecated and will be removed in a release
      after 2024-12-01.
    - Support for the C(EC2_ACCESS_KEY) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

aws_config:
    description:
    - A dictionary to modify the botocore configuration.
    - Parameters can be found in the AWS documentation U(https://botocore.amazonaws.com/v1/documentation/api/latest/reference/config.html#botocore.config.Config).
    type: dict

secret_key:
    aliases:
    - aws_secret_access_key
    - aws_secret_key
    - ec2_secret_key
    description:
    - AWS secret access key.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_SECRET_ACCESS_KEY), C(AWS_SECRET_KEY), or C(EC2_SECRET_KEY) environment
      variables may also be used in decreasing order of preference.
    - The I(secret_key) and I(profile) options are mutually exclusive.
    - The I(aws_secret_access_key) alias was added in release 5.1.0 for consistency with
      the AWS botocore SDK.
    - The I(ec2_secret_key) alias has been deprecated and will be removed in a release
      after 2024-12-01.
    - Support for the C(EC2_SECRET_KEY) environment variable has been deprecated and will
      be removed in a release after 2024-12-01.
    type: str

description:
    description:
    - A description of the rule.
    required: false
    type: str

endpoint_url:
    aliases:
    - ec2_url
    - aws_endpoint_url
    - s3_url
    description:
    - URL to connect to instead of the default AWS endpoints.  While this can be used
      to connection to other AWS-compatible services the amazon.aws and community.aws
      collections are only tested against AWS.
    - The  C(AWS_URL) or C(EC2_URL) environment variables may also be used, in decreasing
      order of preference.
    - The I(ec2_url) and I(s3_url) aliases have been deprecated and will be removed in
      a release after 2024-12-01.
    - Support for the C(EC2_URL) environment variable has been deprecated and will be
      removed in a release after 2024-12-01.
    type: str

aws_ca_bundle:
    description:
    - The location of a CA Bundle to use when validating SSL certificates.
    - The C(AWS_CA_BUNDLE) environment variable may also be used.
    type: path

event_pattern:
    description:
    - A string pattern (in valid JSON format) that is used to match against incoming events
      to determine if the rule should be triggered.
    required: false
    type: str

session_token:
    aliases:
    - aws_session_token
    - security_token
    - aws_security_token
    - access_token
    description:
    - AWS STS session token for use with temporary credentials.
    - See the AWS documentation for more information about access tokens U(https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys).
    - The C(AWS_SESSION_TOKEN), C(AWS_SECURITY_TOKEN) or C(EC2_SECURITY_TOKEN) environment
      variables may also be used in decreasing order of preference.
    - The I(security_token) and I(profile) options are mutually exclusive.
    - Aliases I(aws_session_token) and I(session_token) were added in release 3.2.0, with
      the parameter being renamed from I(security_token) to I(session_token) in release
      6.0.0.
    - The I(security_token), I(aws_security_token), and I(access_token) aliases have been
      deprecated and will be removed in a release after 2024-12-01.
    - Support for the C(EC2_SECRET_KEY) and C(AWS_SECURITY_TOKEN) environment variables
      has been deprecated and will be removed in a release after 2024-12-01.
    type: str

validate_certs:
    default: true
    description:
    - When set to C(false), SSL certificates will not be validated for communication with
      the AWS APIs.
    - Setting I(validate_certs=false) is strongly discouraged, as an alternative, consider
      setting I(aws_ca_bundle) instead.
    type: bool

schedule_expression:
    description:
    - A cron or rate expression that defines the schedule the rule will trigger on. For
      example, C(cron(0 20 * * ? *)), C(rate(5 minutes)).
    required: false
    type: str

debug_botocore_endpoint_logs:
    default: false
    description:
    - Use a C(botocore.endpoint) logger to parse the unique (rather than total) C("resource:action")
      API calls made during a task, outputing the set to the resource_actions key in the
      task results. Use the C(aws_resource_action) callback to output to total list made
      during a playbook.
    - The C(ANSIBLE_DEBUG_BOTOCORE_LOGS) environment variable may also be used.
    type: bool

Outputs

rule:
  description: CloudWatch Event rule data.
  returned: success
  sample:
    arn: arn:aws:events:us-east-1:123456789012:rule/MyCronTask
    description: Run my scheduled task
    name: MyCronTask
    schedule_expression: cron(0 20 * * ? *)
    state: ENABLED
  type: dict
targets:
  description: CloudWatch Event target(s) assigned to the rule.
  returned: success
  sample: '[{ ''arn'': ''arn:aws:lambda:us-east-1:123456789012:function:MyFunction'',
    ''id'': ''MyTargetId'' }]'
  type: list