Ver Fonte

Adds VPN logs to cloudwatch log group

Fred Damstra [afs macbook] há 3 anos atrás
pai
commit
aee325e5db

+ 13 - 0
prod/aws-us-gov/mdr-prod-c2/account.hcl

@@ -267,6 +267,19 @@ locals {
       cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
       cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
     }
+    "/aws/vpn" = {
+      hec_token = "1E187167-1ED0-4AD1-A8C2-8AEB297C4E81"
+      firehose_name = "aws_vpn_firehose"
+      lambda_function_name = "aws_vpn_kinesis_firehose_transform"
+      s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-s3"
+      log_stream_name = "ClientVPN"
+      kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn"
+      kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn"
+      lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn"
+      kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
+      cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
+      cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
+    }
   }
 
 }

+ 14 - 1
test/aws-us-gov/mdr-test-c2/account.hcl

@@ -270,6 +270,19 @@ locals {
       cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
       cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
     }
+    "/aws/vpn" = {
+      hec_token = "1E187167-1ED0-4AD1-A8C2-8AEB297C4E81"
+      firehose_name = "aws_vpn_firehose"
+      lambda_function_name = "aws_vpn_kinesis_firehose_transform"
+      s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-s3"
+      log_stream_name = "ClientVPN"
+      kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn"
+      kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn"
+      lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn"
+      kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
+      cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
+      cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
+    }
   }
   
-}
+}