You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
51
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
52
+
|[sumologic_caller_identity.current](https://registry.terraform.io/providers/SumoLogic/sumologic/latest/docs/data-sources/caller_identity)| data source |
29
53
30
54
## Inputs
31
55
32
56
| Name | Description | Type | Default | Required |
| cloudtrail\_details | Provide details for the AWS CloudTrail. If not provided, then defaults will be used. | <pre>object({<br> name = string<br> is_multi_region_trail = bool<br> is_organization_trail = bool<br> include_global_service_events = bool<br> })</pre> | <pre>{<br> "include_global_service_events": false,<br> "is_multi_region_trail": false,<br> "is_organization_trail": false,<br> "name": "SumoLogic-Terraform-CloudTrail-random-id"<br>}</pre> | no |
35
-
| collector\_details | Provide details for the Sumo Logic collector. If not provided, then defaults will be used. | <pre>object({<br> collector_name = string<br> description = string<br> fields = map(string)<br> })</pre> | <pre>{<br> "collector_name": "SumoLogic CloudTrail Collector <RandomID>",<br> "description": "This collector is created using Sumo Logic terraform AWS cloudtrail module to collect AWS cloudtrail logs.",<br> "fields": {}<br>}</pre> | no |
36
-
| create\_collector | Provide "true" if you would like to create the Sumo Logic Collector. |`bool`| n/a | yes |
37
-
| create\_trail | Provide "true" if you would like to create the AWS CloudTrail. If the bucket is created by the module, module by default creates the AWS cloudtrail. |`bool`| n/a | yes |
| sumologic\_organization\_id | Appears on the Account Overview page that displays information about your Sumo Logic organization. Used for IAM Role in Sumo Logic AWS Sources. |`string`| n/a | yes |
40
-
| wait\_for\_seconds | wait\_for\_seconds is used to delay sumo logic source creation. This helps persisting IAM role in AWS system.<br> Default value is 180 seconds.<br> If the AWS IAM role is created outside the module, the value can be decreased to 1 second. |`number`|`180`| no |
58
+
|<aname="input_cloudtrail_details"></a> [cloudtrail\_details](#input\_cloudtrail\_details)| Provide details for the AWS CloudTrail. If not provided, then defaults will be used. | <pre>object({<br> name = string<br> is_multi_region_trail = bool<br> is_organization_trail = bool<br> include_global_service_events = bool<br> })</pre> | <pre>{<br> "include_global_service_events": false,<br> "is_multi_region_trail": false,<br> "is_organization_trail": false,<br> "name": "SumoLogic-Terraform-CloudTrail-random-id"<br>}</pre> | no |
59
+
|<aname="input_collector_details"></a> [collector\_details](#input\_collector\_details)| Provide details for the Sumo Logic collector. If not provided, then defaults will be used. | <pre>object({<br> collector_name = string<br> description = string<br> fields = map(string)<br> })</pre> | <pre>{<br> "collector_name": "SumoLogic CloudTrail Collector <RandomID>",<br> "description": "This collector is created using Sumo Logic terraform AWS cloudtrail module to collect AWS cloudtrail logs.",<br> "fields": {}<br>}</pre> | no |
60
+
|<aname="input_create_collector"></a> [create\_collector](#input\_create\_collector)| Provide "true" if you would like to create the Sumo Logic Collector. |`bool`| n/a | yes |
61
+
|<aname="input_create_trail"></a> [create\_trail](#input\_create\_trail)| Provide "true" if you would like to create the AWS CloudTrail. If the bucket is created by the module, module by default creates the AWS cloudtrail. |`bool`| n/a | yes |
|<aname="input_sumologic_organization_id"></a> [sumologic\_organization\_id](#input\_sumologic\_organization\_id)| Appears on the Account Overview page that displays information about your Sumo Logic organization. Used for IAM Role in Sumo Logic AWS Sources. |`string`| n/a | yes |
64
+
|<aname="input_wait_for_seconds"></a> [wait\_for\_seconds](#input\_wait\_for\_seconds)| wait\_for\_seconds is used to delay sumo logic source creation. This helps persisting IAM role in AWS system.<br> Default value is 180 seconds.<br> If the AWS IAM role is created outside the module, the value can be decreased to 1 second. |`number`|`180`| no |
41
65
42
66
## Outputs
43
67
44
68
| Name | Description |
45
69
|------|-------------|
46
-
| aws\_cloudtrail | AWS Trail created to send CloudTrail logs to AWS S3 bucket. |
47
-
| aws\_iam\_role | AWS IAM role with permission to allow Sumo Logic to read logs from S3 Bucket. |
48
-
| aws\_s3\_bucket | AWS S3 Bucket name created to Store the CloudTrail logs. |
49
-
| aws\_s3\_bucket\_notification | AWS S3 Bucket Notification attached to the AWS S3 Bucket |
|<aname="output_aws_cloudtrail"></a> [aws\_cloudtrail](#output\_aws\_cloudtrail)| AWS Trail created to send CloudTrail logs to AWS S3 bucket. |
71
+
|<aname="output_aws_iam_role"></a> [aws\_iam\_role](#output\_aws\_iam\_role)| AWS IAM role with permission to allow Sumo Logic to read logs from S3 Bucket. |
72
+
|<aname="output_aws_s3_bucket"></a> [aws\_s3\_bucket](#output\_aws\_s3\_bucket)| AWS S3 Bucket name created to Store the CloudTrail logs. |
73
+
|<aname="output_aws_s3_bucket_notification"></a> [aws\_s3\_bucket\_notification](#output\_aws\_s3\_bucket\_notification)| AWS S3 Bucket Notification attached to the AWS S3 Bucket |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
30
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
31
+
|[sumologic_caller_identity.current](https://registry.terraform.io/providers/SumoLogic/sumologic/latest/docs/data-sources/caller_identity)| data source |
32
+
33
+
## Inputs
34
+
35
+
| Name | Description | Type | Default | Required |
| <aname="input_sumologic_environment"></a> [sumologic\_environment](#input\_sumologic\_environment)| Enter au, ca, de, eu, jp, us2, in, fed or us1. For more information on Sumo Logic deployments visit https://help.sumologic.com/APIs/General-API-Information/Sumo-Logic-Endpoints-and-Firewall-Security|`string`| n/a | yes |
40
+
| <aname="input_sumologic_organization_id"></a> [sumologic\_organization\_id](#input\_sumologic\_organization\_id)| You can find your org on the Preferences page in the Sumo Logic UI. For more information, see the Preferences Page topic. Your org ID will be used to configure the IAM Role for Sumo Logic AWS Sources."<br> For more details, visit https://help.sumologic.com/01Start-Here/05Customize-Your-Sumo-Logic-Experience/Preferences-Page|`string`| n/a | yes |
####### BELOW ARE REQUIRED PARAMETERS FOR TERRAFORM SCRIPT #######
2
+
sumologic_environment="<YOUR SUMO DEPLOYMENT>"# Please replace <YOUR SUMO DEPLOYMENT> (including brackets) with au, ca, de, eu, jp, us2, in, fed or us1.
3
+
sumologic_organization_id="<YOUR SUMO ORG ID>"# Please replace <YOUR SUMO ORG ID> (including brackets) with your Sumo Logic Organization ID.
4
+
sumologic_access_id="<YOUR SUMO ACCESS ID>"# Please replace <YOUR SUMO ACCESS ID> (including brackets) with your Sumo Logic Access ID.
5
+
sumologic_access_key="<YOUR SUMO ACCESS KEY>"# Please replace <YOUR SUMO ACCESS KEY> (including brackets) with your Sumo Logic Access KEY.
0 commit comments