

│ with module.chatbot_slack_configuration.aws_cloudformation_stack.chatbot_slack_configuration, │ Error: creating CloudFormation stack failed: InvalidParameter: 1 validation error(s) found. When trying to apply my plan I get the following error: Logging levels include ERROR, INFO, or NONE."ĭescription = "The friendly IAM role name to match for AWS Chatbot"ĭescription = "Name of the chatbot configuration"ĭescription = "Guardrail policies for chatbot" This property affects the log entries pushed to Amazon CloudWatch Logs. * exit status 1 Doc generation for external PRsĭescription = "Specifies the logging level for this configuration. Guardrail_policies = var.chatbot_guardrail_policiesĭescription = "The ID of the Slack workspace authorized with AWS Chatbot"ĭescription = "The ID of the Slack channel." Slack_workspace_id = var.slack_workspace_id Source = "waveaccounting/chatbot-slack-configuration/aws" I am only able to pass static strings or locals that aren't set with a variable The ARN of the Chatbot Slack configuration map('BusinessUnit','XYZ')Įnables use of a user role requirement in your chat configuration. The ARNs of the SNS topics that deliver notifications to AWS Chatbot.Īdditional tags (e.g. For more details, see steps 1-4 in Setting Up AWS Chatbot with Slack in the AWS Chatbot User Guide. Then you can copy and paste the workspace ID from the console. To get the workspace ID, you must perform the initial authorization flow with Slack in the AWS Chatbot console. The ID of the Slack workspace authorized with AWS Chatbot.

The channel ID is the 9-character string at the end of the URL. To get the ID, open Slack, right click on the channel name in the left pane, then choose Copy Link. Logging levels include ERROR, INFO, or NONE. Specifies the logging level for this configuration. For more information, see IAM Policies for AWS Chatbot. This is a user-defined role that AWS Chatbot will assume. The ARN of the IAM role that defines the permissions for AWS Chatbot. "arn:aws:iam::aws:policy/AdministratorAccess" The AWS managed 'AdministratorAccess' policy is applied as a default if this is not set. The list of IAM policy ARNs that are applied as channel guardrails. Amazon GuardDuty enabled AWS Security Hub enabled and configured to ingest findings from GuardDuty A Slack account Set up Slack permissions You need to grant permissions to the users in Slack channels, which you can do in one of the following ways: Associate a channel IAM role with AWS Chatbot. serverless_sumologic_convox_scylla_pipeline_notifications. Source = "waveaccounting/chatbot-slack-configuration/aws "
