|
@@ -267,6 +267,19 @@ locals {
|
|
|
cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
|
|
|
cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
|
|
|
}
|
|
|
+ "/aws/vpn" = {
|
|
|
+ hec_token = "1E187167-1ED0-4AD1-A8C2-8AEB297C4E81"
|
|
|
+ firehose_name = "aws_vpn_firehose"
|
|
|
+ lambda_function_name = "aws_vpn_kinesis_firehose_transform"
|
|
|
+ s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-s3"
|
|
|
+ log_stream_name = "ClientVPN"
|
|
|
+ kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn"
|
|
|
+ kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn"
|
|
|
+ lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn"
|
|
|
+ kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
|
|
|
+ cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
|
|
|
+ cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
}
|