| <a name="input_service_linked_roles"></a> [service_linked_roles](#input_service_linked_roles) | By default the CFN stack creates the service-linked IAM roles needed by the stack.<br/> Since these are global in your account, they can't be defined as regular resources<br/> in the CFN, because these roles may already exist in your account and thus<br/> the deployment would fail on a name conflict.<br/><br/> Instead, by default, they are deployed using an AWS::CloudFormation::CustomResource<br/> which invokes an AWS Lambda function that creates the service-linked roles only if<br/> they don't exist and doesn't fail if they do.<br/><br/> The default approach of creating the service-linked roles via the CFN requires<br/> creating a lambda function in your environment that has IAM write permission of<br/> `iam:CreateServiceLinkedRole`. If you can't afford creating such a lambda function<br/> then set this parameter to `tf` and this terraform module will create the<br/> service-linked roles without the need for a lambda function.<br/><br/> If you set this to `tf`, then make sure you have the AWS CLI installed and<br/> configured with the necessary credentials on the machine where you run terraform. | `string` | `"cfn"` | no |
0 commit comments