Home

Awesome

AWS EventBridge Terraform module

Terraform module to create EventBridge resources.

Supported Features

Usage

EventBridge Complete

Most common use-case which creates custom bus, rules and targets.

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  rules = {
    orders = {
      description   = "Capture all order data"
      event_pattern = jsonencode({ "source" : ["myapp.orders"] })
      enabled       = true
    }
  }

  targets = {
    orders = [
      {
        name            = "send-orders-to-sqs"
        arn             = aws_sqs_queue.queue.arn
        dead_letter_arn = aws_sqs_queue.dlq.arn
      },
      {
        name              = "send-orders-to-kinesis"
        arn               = aws_kinesis_stream.this.arn
        dead_letter_arn   = aws_sqs_queue.dlq.arn
        input_transformer = local.kinesis_input_transformer
      },
      {
        name = "log-orders-to-cloudwatch"
        arn  = aws_cloudwatch_log_group.this.arn
      }
    ]
  }

  tags = {
    Name = "my-bus"
  }
}

EventBridge Bus

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  tags = {
    Name = "my-bus"
  }
}

EventBridge Rule

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  create_targets = false

  rules = {
    logs = {
      description   = "Capture log data"
      event_pattern = jsonencode({ "source" : ["my.app.logs"] })
    }
  }
}

EventBridge Target

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  rules = {
    logs = {
      description   = "Capture log data"
      event_pattern = jsonencode({ "source" : ["my.app.logs"] })
    }
  }

  targets = {
    logs = [
      {
        name = "send-logs-to-sqs"
        arn  = aws_sqs_queue.queue.arn
      },
      {
        name = "send-logs-to-cloudwatch"
        arn  = aws_cloudwatch_log_stream.logs.arn
      }
    ]
  }
}

EventBridge Archive

module "eventbridge_with_archive" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  create_archives = true

  archives = {
    "my-bus-launch-archive" = {
      description    = "EC2 AutoScaling Event archive",
      retention_days = 1
      event_pattern  = <<PATTERN
      {
        "source": ["aws.autoscaling"],
        "detail-type": ["EC2 Instance Launch Successful"]
      }
      PATTERN
    }
  }

  tags = {
    Name = "my-bus"
  }
}

EventBridge Permission

module "eventbridge_with_permissions" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  create_permissions = true

  permissions = {
    "099720109477 DevAccess" = {}
    "099720109466 ProdAccess" = {}
  }

  tags = {
    Name = "my-bus"
  }
}

EventBridge with schedule rule and Lambda target

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  create_bus = false

  rules = {
    crons = {
      description         = "Trigger for a Lambda"
      schedule_expression = "rate(5 minutes)"
    }
  }

  targets = {
    crons = [
      {
        name  = "lambda-loves-cron"
        arn   = "arn:aws:lambda:ap-southeast-1:135367859851:function:resolved-penguin-lambda"
        input = jsonencode({"job": "cron-by-rate"})
      }
    ]
  }
}

EventBridge with schedule rule and Step Functions target

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  create_bus = false

  rules = {
    crons = {
      description         = "Run state machine everyday 10:00 UTC"
      schedule_expression = "cron(0 10 * * ? *)"
    }
  }

  targets = {
    crons = [
      {
        name            = "your-awesome-state-machine"
        arn             = "arn:aws:states:us-east-1:123456789012:stateMachine:your-awesome-state-machine"
        attach_role_arn = true
      }
    ]
  }

  sfn_target_arns   = ["arn:aws:states:us-east-1:123456789012:stateMachine:your-awesome-state-machine"]
  attach_sfn_policy = true
}

EventBridge Scheduler which triggers Lambda Function

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "example" # "default" bus already support schedule_expression in rules

  attach_lambda_policy = true
  lambda_target_arns   = ["arn:aws:lambda:us-east-1:135367859851:function:resolved-penguin-lambda"]

  schedules = {
    lambda-cron = {
      description         = "Trigger for a Lambda"
      schedule_expression = "rate(1 day)"
      timezone            = "Europe/London"
      arn                 = "arn:aws:lambda:us-east-1:135367859851:function:resolved-penguin-lambda"
      input               = jsonencode({ "job" : "cron-by-rate" })
    }
  }
}

EventBridge API Destination

module "eventbridge_with_api_destination" {
  source = "terraform-aws-modules/eventbridge/aws"

  bus_name = "my-bus"

  create_connections      = true
  create_api_destinations = true

  attach_api_destination_policy = true

  connections = {
    smee = {
      authorization_type = "OAUTH_CLIENT_CREDENTIALS"
      auth_parameters = {
        oauth = {
          authorization_endpoint = "https://oauth.endpoint.com"
          http_method            = "GET"

          client_parameters = {
            client_id     = "1234567890"
            client_secret = "Pass1234!"
          }

          oauth_http_parameters = {
            body = [{
              key             = "body-parameter-key"
              value           = "body-parameter-value"
              is_value_secret = false
            }]

            header = [{
              key   = "header-parameter-key1"
              value = "header-parameter-value1"
            }, {
              key             = "header-parameter-key2"
              value           = "header-parameter-value2"
              is_value_secret = true
            }]

            query_string = [{
              key             = "query-string-parameter-key"
              value           = "query-string-parameter-value"
              is_value_secret = false
            }]
          }
        }
      }
    }
  }

  api_destinations = {
    smee = {
      description                      = "my smee endpoint"
      invocation_endpoint              = "https://smee.io/hgoubgoibwekt331"
      http_method                      = "POST"
      invocation_rate_limit_per_second = 200
    }
  }
}

Additional IAM policies for Step Function

In addition to all supported AWS service integrations you may want to create and attach additional policies.

There are 5 supported ways to attach additional IAM policies to IAM role used by Step Function:

  1. policy_json - JSON string or heredoc, when attach_policy_json = true.
  2. policy_jsons - List of JSON strings or heredoc, when attach_policy_jsons = true and number_of_policy_jsons > 0.
  3. policy - ARN of existing IAM policy, when attach_policy = true.
  4. policies - List of ARNs of existing IAM policies, when attach_policies = true and number_of_policies > 0.
  5. policy_statements - Map of maps to define IAM statements which will be generated as IAM policy. Requires attach_policy_statements = true. See examples/complete for more information.

Conditional creation

Sometimes you need to have a way to create resources conditionally but Terraform does not allow usage of count inside module block, so the solution is to specify create arguments.

module "eventbridge" {
  source = "terraform-aws-modules/eventbridge/aws"

  create = false # to disable all resources

  create_bus              = false  # to control creation of the EventBridge Bus and related resources
  create_rules            = false  # to control creation of EventBridge Rules and related resources
  create_targets          = false  # to control creation of EventBridge Targets and related resources
  create_archives         = false  # to control creation of EventBridge Archives
  create_permissions      = false  # to control creation of EventBridge Permissions
  create_role             = false  # to control creation of the IAM role and policies required for EventBridge
  create_connections      = false  # to control creation of EventBridge Connection resources
  create_api_destinations = false  # to control creation of EventBridge Destination resources
  create_schedule_groups  = false  # to control creation of EventBridge Schedule Group resources
  create_schedules        = false  # to control creation of EventBridge Schedule resources
  create_pipes            = false  # to control creation of EventBridge Pipes resources

  attach_cloudwatch_policy       = false
  attach_ecs_policy              = false
  attach_kinesis_policy          = false
  attach_kinesis_firehose_policy = false
  attach_lambda_policy           = false
  attach_sfn_policy              = false
  attach_sqs_policy              = false
  attach_tracing_policy          = false
  attach_api_destination_policy  = false

  # ... omitted
}

Examples

<!-- BEGIN_TF_DOCS -->

Requirements

NameVersion
<a name="requirement_terraform"></a> terraform>= 1.0
<a name="requirement_aws"></a> aws>= 5.75.1

Providers

NameVersion
<a name="provider_aws"></a> aws>= 5.75.1

Modules

No modules.

Resources

NameType
aws_cloudwatch_event_api_destination.thisresource
aws_cloudwatch_event_archive.thisresource
aws_cloudwatch_event_bus.thisresource
aws_cloudwatch_event_connection.thisresource
aws_cloudwatch_event_permission.thisresource
aws_cloudwatch_event_rule.thisresource
aws_cloudwatch_event_target.thisresource
aws_iam_policy.additional_inlineresource
aws_iam_policy.additional_jsonresource
aws_iam_policy.additional_jsonsresource
aws_iam_policy.api_destinationresource
aws_iam_policy.cloudwatchresource
aws_iam_policy.ecsresource
aws_iam_policy.kinesisresource
aws_iam_policy.kinesis_firehoseresource
aws_iam_policy.lambdaresource
aws_iam_policy.serviceresource
aws_iam_policy.sfnresource
aws_iam_policy.snsresource
aws_iam_policy.sqsresource
aws_iam_policy.tracingresource
aws_iam_policy_attachment.additional_inlineresource
aws_iam_policy_attachment.additional_jsonresource
aws_iam_policy_attachment.additional_jsonsresource
aws_iam_policy_attachment.api_destinationresource
aws_iam_policy_attachment.cloudwatchresource
aws_iam_policy_attachment.ecsresource
aws_iam_policy_attachment.kinesisresource
aws_iam_policy_attachment.kinesis_firehoseresource
aws_iam_policy_attachment.lambdaresource
aws_iam_policy_attachment.serviceresource
aws_iam_policy_attachment.sfnresource
aws_iam_policy_attachment.snsresource
aws_iam_policy_attachment.sqsresource
aws_iam_policy_attachment.tracingresource
aws_iam_role.eventbridgeresource
aws_iam_role.eventbridge_piperesource
aws_iam_role_policy_attachment.additional_manyresource
aws_iam_role_policy_attachment.additional_oneresource
aws_pipes_pipe.thisresource
aws_scheduler_schedule.thisresource
aws_scheduler_schedule_group.thisresource
aws_schemas_discoverer.thisresource
aws_caller_identity.currentdata source
aws_cloudwatch_event_bus.thisdata source
aws_iam_policy.tracingdata source
aws_iam_policy_document.additional_inlinedata source
aws_iam_policy_document.api_destinationdata source
aws_iam_policy_document.assume_roledata source
aws_iam_policy_document.assume_role_pipedata source
aws_iam_policy_document.cloudwatchdata source
aws_iam_policy_document.ecsdata source
aws_iam_policy_document.kinesisdata source
aws_iam_policy_document.kinesis_firehosedata source
aws_iam_policy_document.lambdadata source
aws_iam_policy_document.servicedata source
aws_iam_policy_document.sfndata source
aws_iam_policy_document.snsdata source
aws_iam_policy_document.sqsdata source
aws_partition.currentdata source
aws_region.currentdata source

Inputs

NameDescriptionTypeDefaultRequired
<a name="input_api_destinations"></a> api_destinationsA map of objects with EventBridge Destination definitions.map(any){}no
<a name="input_append_connection_postfix"></a> append_connection_postfixControls whether to append '-connection' to the name of the connectionbooltrueno
<a name="input_append_destination_postfix"></a> append_destination_postfixControls whether to append '-destination' to the name of the destinationbooltrueno
<a name="input_append_pipe_postfix"></a> append_pipe_postfixControls whether to append '-pipe' to the name of the pipebooltrueno
<a name="input_append_rule_postfix"></a> append_rule_postfixControls whether to append '-rule' to the name of the rulebooltrueno
<a name="input_append_schedule_group_postfix"></a> append_schedule_group_postfixControls whether to append '-group' to the name of the schedule groupbooltrueno
<a name="input_append_schedule_postfix"></a> append_schedule_postfixControls whether to append '-schedule' to the name of the schedulebooltrueno
<a name="input_archives"></a> archivesA map of objects with the EventBridge Archive definitions.map(any){}no
<a name="input_attach_api_destination_policy"></a> attach_api_destination_policyControls whether the API Destination policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_cloudwatch_policy"></a> attach_cloudwatch_policyControls whether the Cloudwatch policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_ecs_policy"></a> attach_ecs_policyControls whether the ECS policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_kinesis_firehose_policy"></a> attach_kinesis_firehose_policyControls whether the Kinesis Firehose policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_kinesis_policy"></a> attach_kinesis_policyControls whether the Kinesis policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_lambda_policy"></a> attach_lambda_policyControls whether the Lambda Function policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_policies"></a> attach_policiesControls whether list of policies should be added to IAM roleboolfalseno
<a name="input_attach_policy"></a> attach_policyControls whether policy should be added to IAM roleboolfalseno
<a name="input_attach_policy_json"></a> attach_policy_jsonControls whether policy_json should be added to IAM roleboolfalseno
<a name="input_attach_policy_jsons"></a> attach_policy_jsonsControls whether policy_jsons should be added to IAM roleboolfalseno
<a name="input_attach_policy_statements"></a> attach_policy_statementsControls whether policy_statements should be added to IAM roleboolfalseno
<a name="input_attach_sfn_policy"></a> attach_sfn_policyControls whether the StepFunction policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_sns_policy"></a> attach_sns_policyControls whether the SNS policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_sqs_policy"></a> attach_sqs_policyControls whether the SQS policy should be added to IAM role for EventBridge Targetboolfalseno
<a name="input_attach_tracing_policy"></a> attach_tracing_policyControls whether X-Ray tracing policy should be added to IAM role for EventBridgeboolfalseno
<a name="input_bus_description"></a> bus_descriptionEvent bus descriptionstringnullno
<a name="input_bus_name"></a> bus_nameA unique name for your EventBridge Busstring"default"no
<a name="input_cloudwatch_target_arns"></a> cloudwatch_target_arnsThe Amazon Resource Name (ARN) of the Cloudwatch Log Streams you want to use as EventBridge targetslist(string)[]no
<a name="input_connections"></a> connectionsA map of objects with EventBridge Connection definitions.any{}no
<a name="input_create"></a> createControls whether resources should be createdbooltrueno
<a name="input_create_api_destinations"></a> create_api_destinationsControls whether EventBridge Destination resources should be createdboolfalseno
<a name="input_create_archives"></a> create_archivesControls whether EventBridge Archive resources should be createdboolfalseno
<a name="input_create_bus"></a> create_busControls whether EventBridge Bus resource should be createdbooltrueno
<a name="input_create_connections"></a> create_connectionsControls whether EventBridge Connection resources should be createdboolfalseno
<a name="input_create_permissions"></a> create_permissionsControls whether EventBridge Permission resources should be createdbooltrueno
<a name="input_create_pipes"></a> create_pipesControls whether EventBridge Pipes resources should be createdbooltrueno
<a name="input_create_role"></a> create_roleControls whether IAM roles should be createdbooltrueno
<a name="input_create_rules"></a> create_rulesControls whether EventBridge Rule resources should be createdbooltrueno
<a name="input_create_schedule_groups"></a> create_schedule_groupsControls whether EventBridge Schedule Group resources should be createdbooltrueno
<a name="input_create_schedules"></a> create_schedulesControls whether EventBridge Schedule resources should be createdbooltrueno
<a name="input_create_schemas_discoverer"></a> create_schemas_discovererControls whether default schemas discoverer should be createdboolfalseno
<a name="input_create_targets"></a> create_targetsControls whether EventBridge Target resources should be createdbooltrueno
<a name="input_ecs_pass_role_resources"></a> ecs_pass_role_resourcesList of approved roles to be passedlist(string)[]no
<a name="input_ecs_target_arns"></a> ecs_target_arnsThe Amazon Resource Name (ARN) of the AWS ECS Tasks you want to use as EventBridge targetslist(string)[]no
<a name="input_event_source_name"></a> event_source_nameThe partner event source that the new event bus will be matched with. Must match name.stringnullno
<a name="input_kinesis_firehose_target_arns"></a> kinesis_firehose_target_arnsThe Amazon Resource Name (ARN) of the Kinesis Firehose Delivery Streams you want to use as EventBridge targetslist(string)[]no
<a name="input_kinesis_target_arns"></a> kinesis_target_arnsThe Amazon Resource Name (ARN) of the Kinesis Streams you want to use as EventBridge targetslist(string)[]no
<a name="input_kms_key_identifier"></a> kms_key_identifierThe identifier of the AWS KMS customer managed key for EventBridge to use, if you choose to use a customer managed key to encrypt events on this event bus. The identifier can be the key Amazon Resource Name (ARN), KeyId, key alias, or key alias ARN.stringnullno
<a name="input_lambda_target_arns"></a> lambda_target_arnsThe Amazon Resource Name (ARN) of the Lambda Functions you want to use as EventBridge targetslist(string)[]no
<a name="input_number_of_policies"></a> number_of_policiesNumber of policies to attach to IAM rolenumber0no
<a name="input_number_of_policy_jsons"></a> number_of_policy_jsonsNumber of policies JSON to attach to IAM rolenumber0no
<a name="input_permissions"></a> permissionsA map of objects with EventBridge Permission definitions.map(any){}no
<a name="input_pipes"></a> pipesA map of objects with EventBridge Pipe definitions.any{}no
<a name="input_policies"></a> policiesList of policy statements ARN to attach to IAM rolelist(string)[]no
<a name="input_policy"></a> policyAn additional policy document ARN to attach to IAM rolestringnullno
<a name="input_policy_json"></a> policy_jsonAn additional policy document as JSON to attach to IAM rolestringnullno
<a name="input_policy_jsons"></a> policy_jsonsList of additional policy documents as JSON to attach to IAM rolelist(string)[]no
<a name="input_policy_path"></a> policy_pathPath of IAM policy to use for EventBridgestringnullno
<a name="input_policy_statements"></a> policy_statementsMap of dynamic policy statements to attach to IAM roleany{}no
<a name="input_role_description"></a> role_descriptionDescription of IAM role to use for EventBridgestringnullno
<a name="input_role_force_detach_policies"></a> role_force_detach_policiesSpecifies to force detaching any policies the IAM role has before destroying it.booltrueno
<a name="input_role_name"></a> role_nameName of IAM role to use for EventBridgestringnullno
<a name="input_role_path"></a> role_pathPath of IAM role to use for EventBridgestringnullno
<a name="input_role_permissions_boundary"></a> role_permissions_boundaryThe ARN of the policy that is used to set the permissions boundary for the IAM role used by EventBridgestringnullno
<a name="input_role_tags"></a> role_tagsA map of tags to assign to IAM rolemap(string){}no
<a name="input_rules"></a> rulesA map of objects with EventBridge Rule definitions.map(any){}no
<a name="input_schedule_group_timeouts"></a> schedule_group_timeoutsA map of objects with EventBridge Schedule Group create and delete timeouts.map(string){}no
<a name="input_schedule_groups"></a> schedule_groupsA map of objects with EventBridge Schedule Group definitions.any{}no
<a name="input_schedules"></a> schedulesA map of objects with EventBridge Schedule definitions.map(any){}no
<a name="input_schemas_discoverer_description"></a> schemas_discoverer_descriptionDefault schemas discoverer descriptionstring"Auto schemas discoverer event"no
<a name="input_sfn_target_arns"></a> sfn_target_arnsThe Amazon Resource Name (ARN) of the StepFunctions you want to use as EventBridge targetslist(string)[]no
<a name="input_sns_kms_arns"></a> sns_kms_arnsThe Amazon Resource Name (ARN) of the AWS KMS's configured for AWS SNS you want Decrypt/GenerateDataKey forlist(string)<pre>[<br/> "*"<br/>]</pre>no
<a name="input_sns_target_arns"></a> sns_target_arnsThe Amazon Resource Name (ARN) of the AWS SNS's you want to use as EventBridge targetslist(string)[]no
<a name="input_sqs_target_arns"></a> sqs_target_arnsThe Amazon Resource Name (ARN) of the AWS SQS Queues you want to use as EventBridge targetslist(string)[]no
<a name="input_tags"></a> tagsA map of tags to assign to resources.map(string){}no
<a name="input_targets"></a> targetsA map of objects with EventBridge Target definitions.any{}no
<a name="input_trusted_entities"></a> trusted_entitiesAdditional trusted entities for assuming roles (trust relationship)list(string)[]no

Outputs

NameDescription
<a name="output_eventbridge_api_destination_arns"></a> eventbridge_api_destination_arnsThe EventBridge API Destination ARNs
<a name="output_eventbridge_api_destinations"></a> eventbridge_api_destinationsThe EventBridge API Destinations created and their attributes
<a name="output_eventbridge_archive_arns"></a> eventbridge_archive_arnsThe EventBridge Archive ARNs
<a name="output_eventbridge_archives"></a> eventbridge_archivesThe EventBridge Archives created and their attributes
<a name="output_eventbridge_bus"></a> eventbridge_busThe EventBridge Bus created and their attributes
<a name="output_eventbridge_bus_arn"></a> eventbridge_bus_arnThe EventBridge Bus ARN
<a name="output_eventbridge_bus_name"></a> eventbridge_bus_nameThe EventBridge Bus Name
<a name="output_eventbridge_connection_arns"></a> eventbridge_connection_arnsThe EventBridge Connection Arns
<a name="output_eventbridge_connection_ids"></a> eventbridge_connection_idsThe EventBridge Connection IDs
<a name="output_eventbridge_connections"></a> eventbridge_connectionsThe EventBridge Connections created and their attributes
<a name="output_eventbridge_iam_roles"></a> eventbridge_iam_rolesThe EventBridge IAM roles created and their attributes
<a name="output_eventbridge_permission_ids"></a> eventbridge_permission_idsThe EventBridge Permission IDs
<a name="output_eventbridge_permissions"></a> eventbridge_permissionsThe EventBridge Permissions created and their attributes
<a name="output_eventbridge_pipe_arns"></a> eventbridge_pipe_arnsThe EventBridge Pipes ARNs
<a name="output_eventbridge_pipe_ids"></a> eventbridge_pipe_idsThe EventBridge Pipes IDs
<a name="output_eventbridge_pipe_role_arns"></a> eventbridge_pipe_role_arnsThe ARNs of the IAM role created for EventBridge Pipes
<a name="output_eventbridge_pipe_role_names"></a> eventbridge_pipe_role_namesThe names of the IAM role created for EventBridge Pipes
<a name="output_eventbridge_pipes"></a> eventbridge_pipesThe EventBridge Pipes created and their attributes
<a name="output_eventbridge_pipes_iam_roles"></a> eventbridge_pipes_iam_rolesThe EventBridge Pipes IAM roles created and their attributes
<a name="output_eventbridge_role_arn"></a> eventbridge_role_arnThe ARN of the IAM role created for EventBridge
<a name="output_eventbridge_role_name"></a> eventbridge_role_nameThe name of the IAM role created for EventBridge
<a name="output_eventbridge_rule_arns"></a> eventbridge_rule_arnsThe EventBridge Rule ARNs
<a name="output_eventbridge_rule_ids"></a> eventbridge_rule_idsThe EventBridge Rule IDs
<a name="output_eventbridge_rules"></a> eventbridge_rulesThe EventBridge Rules created and their attributes
<a name="output_eventbridge_schedule_arns"></a> eventbridge_schedule_arnsThe EventBridge Schedule ARNs created
<a name="output_eventbridge_schedule_group_arns"></a> eventbridge_schedule_group_arnsThe EventBridge Schedule Group ARNs
<a name="output_eventbridge_schedule_group_ids"></a> eventbridge_schedule_group_idsThe EventBridge Schedule Group IDs
<a name="output_eventbridge_schedule_group_states"></a> eventbridge_schedule_group_statesThe EventBridge Schedule Group states
<a name="output_eventbridge_schedule_groups"></a> eventbridge_schedule_groupsThe EventBridge Schedule Groups created and their attributes
<a name="output_eventbridge_schedule_ids"></a> eventbridge_schedule_idsThe EventBridge Schedule IDs created
<a name="output_eventbridge_schedules"></a> eventbridge_schedulesThe EventBridge Schedules created and their attributes
<a name="output_eventbridge_targets"></a> eventbridge_targetsThe EventBridge Targets created and their attributes
<!-- END_TF_DOCS -->

Authors

Module managed by Sven Lito. Check out serverless.tf to learn more about doing serverless with Terraform.

License

Apache 2 Licensed. See LICENSE for full details.