|
@@ -279,7 +279,19 @@ locals {
|
|
|
kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn"
|
|
|
cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn"
|
|
|
cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn"
|
|
|
+ },
|
|
|
+ "/aws/lambda/AWSClientVPN-ConnectionHandler" = {
|
|
|
+ hec_token = "BEB99C82-7608-454A-B0B1-CB1564A147A4"
|
|
|
+ firehose_name = "aws_vpn_connectionhandler_firehose"
|
|
|
+ lambda_function_name = "aws_vpn_connectionhandler_kinesis_firehose_transform"
|
|
|
+ s3_bucket_name = "${local.account_name}-kinesis-aws-vpn-connectionhandler-s3"
|
|
|
+ log_stream_name = "ClientVPNConnectionHandler"
|
|
|
+ kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-aws_vpn_connectionhandler"
|
|
|
+ kinesis_firehose_role_name = "kinesis-firehose-role-name-aws-vpn-connectionhandler"
|
|
|
+ lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-aws_vpn_connectionhandler"
|
|
|
+ kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-aws_vpn_connectionhandler"
|
|
|
+ cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-aws_vpn_connectionhandler"
|
|
|
+ cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-aws_vpn_connectionhandler"
|
|
|
}
|
|
|
}
|
|
|
-
|
|
|
}
|