You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18Lines changed: 18 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,6 +150,22 @@ module "vpc" {
150
150
}
151
151
```
152
152
153
+
## Enable DNS Request Logging
154
+
155
+
To enable DNS request logging in your VPC, you can use the `enable_dns_request_logging` variable. This feature allows you to log DNS queries made within your VPC, which can be useful for monitoring and troubleshooting.
156
+
157
+
Here is an example configuration:
158
+
159
+
```hcl
160
+
module "vpc" {
161
+
source = "appvia/network/aws"
162
+
version = "0.0.8"
163
+
164
+
enable_dns_request_logging = true
165
+
# ... other configuration ...
166
+
}
167
+
```
168
+
153
169
## Using Route53 Resolver Rules
154
170
155
171
The module supports automatically associating shared Route53 Resolver Rules with your VPC. By default, any resolver rules shared with your account will be automatically associated. Here are some configuration examples:
@@ -229,8 +245,10 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
229
245
| <aname="input_name"></a> [name](#input\_name)| Is the name of the network to provision |`string`| n/a | yes |
230
246
| <aname="input_tags"></a> [tags](#input\_tags)| Tags to apply to all resources |`map(string)`| n/a | yes |
231
247
| <aname="input_availability_zones"></a> [availability\_zones](#input\_availability\_zones)| The number of availability zone the network should be deployed into |`number`|`2`| no |
248
+
| <aname="input_dns_query_log_retention"></a> [dns\_query\_log\_retention](#input\_dns\_query\_log\_retention)| The number of days to retain DNS query logs |`number`|`7`| no |
232
249
| <aname="input_enable_default_route_table_association"></a> [enable\_default\_route\_table\_association](#input\_enable\_default\_route\_table\_association)| Indicates the transit gateway default route table should be associated with the subnets |`bool`|`true`| no |
233
250
| <aname="input_enable_default_route_table_propagation"></a> [enable\_default\_route\_table\_propagation](#input\_enable\_default\_route\_table\_propagation)| Indicates the transit gateway default route table should be propagated to the subnets |`bool`|`true`| no |
251
+
| <aname="input_enable_dns_request_logging"></a> [enable\_dns\_request\_logging](#input\_enable\_dns\_request\_logging)| Enable logging of DNS requests |`bool`|`false`| no |
234
252
| <aname="input_enable_private_endpoints"></a> [enable\_private\_endpoints](#input\_enable\_private\_endpoints)| Indicates the network should provision private endpoints |`list(string)`|`[]`| no |
235
253
| <aname="input_enable_route53_resolver_rules"></a> [enable\_route53\_resolver\_rules](#input\_enable\_route53\_resolver\_rules)| Automatically associates any shared route53 resolver rules with the VPC |`bool`|`true`| no |
236
254
| <aname="input_enable_ssm"></a> [enable\_ssm](#input\_enable\_ssm)| Indicates we should provision SSM private endpoints |`bool`|`false`| no |
0 commit comments