Browse Source

Merge pull request #564 from mdr-engineering/feature/ftd_MSOCI-2040_VPN_Logs

Adds VPN logs to cloudwatch log group
Frederick Damstra 3 years ago
parent
commit
b07288e753
2 changed files with 27 additions and 1 deletions
  1. 13 0
      prod/aws-us-gov/mdr-prod-c2/account.hcl
  2. 14 1
      test/aws-us-gov/mdr-test-c2/account.hcl

+ 13 - 0
prod/aws-us-gov/mdr-prod-c2/account.hcl

@@ -267,6 +267,19 @@ locals {
       cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
       cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
     }
+    "/aws/vpn" = {
+      hec_token = "1E187167-1ED0-4AD1-A8C2-8AEB297C4E81"
+      firehose_name = "aws_vpn_firehose"
+      lambda_function_name = "aws_vpn_kinesis_firehose_transform"
+      s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-s3"
+      log_stream_name = "ClientVPN"
+      kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn"
+      kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn"
+      lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn"
+      kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
+      cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
+      cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
+    }
   }
 
 }

+ 14 - 1
test/aws-us-gov/mdr-test-c2/account.hcl

@@ -270,6 +270,19 @@ locals {
       cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
       cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
     }
+    "/aws/vpn" = {
+      hec_token = "1E187167-1ED0-4AD1-A8C2-8AEB297C4E81"
+      firehose_name = "aws_vpn_firehose"
+      lambda_function_name = "aws_vpn_kinesis_firehose_transform"
+      s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-s3"
+      log_stream_name = "ClientVPN"
+      kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn"
+      kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn"
+      lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn"
+      kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
+      cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
+      cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
+    }
   }
   
-}
+}