|
@@ -0,0 +1,54 @@
|
|
|
+variable "tags" {
|
|
|
+ description = "Tags to add to the resource (in addition to global standard tags)"
|
|
|
+ type = map
|
|
|
+ default = { }
|
|
|
+}
|
|
|
+
|
|
|
+variable "moose_cloudwatch_log_groups" {
|
|
|
+ type = map
|
|
|
+ default = {}
|
|
|
+ description = <<EOF
|
|
|
+Map of Cloudwatch Log groups to loop over and create. Sturucture looks like this:
|
|
|
+```
|
|
|
+moose_cloudwatch_log_groups = {
|
|
|
+ "MyCloudwatchLogGroup" = {
|
|
|
+ hec_token = "myhectoken"
|
|
|
+ firehose_name = "portal_customer_sync_firehose"
|
|
|
+ lambda_function_name = "portal_customer_sync_kinesis_firehose_transform"
|
|
|
+ s3_bucket_name = "kinesis-flowlogs-portal-customer-sync-s3"
|
|
|
+ log_stream_name = "SplunkDelivery_portal_customer_sync"
|
|
|
+ kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-portal_customer_sync"
|
|
|
+ kinesis_firehose_role_name = "kinesis-firehose-role-name-portal-customer-sync"
|
|
|
+ lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-portal_customer_sync"
|
|
|
+ kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-portal_customer_sync"
|
|
|
+ cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_customer_sync"
|
|
|
+ cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_customer_sync"
|
|
|
+ }
|
|
|
+ "MyCloudwatchLogGroup2" = {
|
|
|
+ hec_token = "myhectoken"
|
|
|
+ firehose_name = "portal_scheduler_firehose"
|
|
|
+ lambda_function_name = "portal_scheduler_kinesis_firehose_transform"
|
|
|
+ s3_bucket_name = "kinesis-flowlogs-portal-scheduler-s3"
|
|
|
+ log_stream_name = "SplunkDelivery_portal_scheduler"
|
|
|
+ kinesis_firehose_lambda_role_name = "KinesisFirehoseToLambaRole-portal_scheduler"
|
|
|
+ kinesis_firehose_role_name = "kinesis-firehose-role-name-portal-scheduler"
|
|
|
+ lambda_iam_policy_name = "Kinesis-Firehose-to-Splunk-Policy-portal_scheduler"
|
|
|
+ kinesis_firehose_iam_policy_name = "KinesisFirehose-Policy-portal_scheduler"
|
|
|
+ cloudwatch_to_firehose_trust_iam_role_name = "CloudWatchToSplunkFirehoseTrust-portal_scheduler"
|
|
|
+ cloudwatch_to_fh_access_policy_name = "KinesisCloudWatchToFirehosePolicy-portal_scheduler"
|
|
|
+ }
|
|
|
+ }
|
|
|
+```
|
|
|
+EOF
|
|
|
+}
|
|
|
+
|
|
|
+variable "hec_pub_ack" { type = string }
|
|
|
+variable "standard_tags" { type = map }
|
|
|
+variable "account_name" { type = string }
|
|
|
+variable "aws_account_id" { type = string }
|
|
|
+variable "aws_partition_alias" { type = string }
|
|
|
+variable "environment" { type = string }
|
|
|
+variable "account_map" { type = map }
|
|
|
+variable "aws_region" { type = string }
|
|
|
+variable "aws_partition" { type = string }
|
|
|
+
|