You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| [aws_regions.all](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/regions) | data source |
50
54
51
55
## Inputs
52
56
@@ -68,6 +72,7 @@ No resources.
68
72
| <a name="input_id_length_limit"></a> [id\_length\_limit](#input\_id\_length\_limit) | Limit `id` to this many characters (minimum 6).<br>Set to `0` for unlimited length.<br>Set to `null` for keep the existing setting, which defaults to `0`.<br>Does not affect `id_full`. | `number` | `null` | no |
69
73
| <a name="input_import_profile_name"></a> [import\_profile\_name](#input\_import\_profile\_name) | AWS Profile name to use when importing a resource | `string` | `null` | no |
70
74
| <a name="input_import_role_arn"></a> [import\_role\_arn](#input\_import\_role\_arn) | IAM Role ARN to use when importing a resource | `string` | `null` | no |
75
+
| <a name="input_included_regions"></a> [included\_regions](#input\_included\_regions) | An array of AWS regions to include in metrics collection | `list(string)` | `[]` | no |
71
76
| <a name="input_integrations"></a> [integrations](#input\_integrations) | List of AWS permission names to apply for different integrations (e.g. 'all', 'core') | `list(string)` | <pre>[<br> "all"<br>]</pre> | no |
72
77
| <a name="input_label_key_case"></a> [label\_key\_case](#input\_label\_key\_case) | Controls the letter case of the `tags` keys (label names) for tags generated by this module.<br>Does not affect keys of tags passed in via the `tags` input.<br>Possible values: `lower`, `title`, `upper`.<br>Default value: `title`. | `string` | `null` | no |
73
78
| <a name="input_label_order"></a> [label\_order](#input\_label\_order) | The order in which the labels (ID elements) appear in the `id`.<br>Defaults to ["namespace", "environment", "stage", "name", "attributes"].<br>You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. | `list(string)` | `null` | no |
@@ -91,49 +96,6 @@ No resources.
91
96
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
92
97
93
98
94
-
## FAQ:
95
-
96
-
### Stack Errors (Spacelift):
97
-
98
-
```
99
-
╷
100
-
│ Error: error creating AWS integration from https://api.datadoghq.com/api/v1/integration/aws: 409 Conflict: {"errors": ["Could not update AWS Integration due to conflicting updates"]}
101
-
│
102
-
│ with module.datadog_integration.datadog_integration_aws.integration[0],
103
-
│ on .terraform/modules/datadog_integration/main.tf line 18, in resource "datadog_integration_aws" "integration":
This can happen when you apply multiple integrations at the same time. Fix is easy though, re-trigger the stack.
110
-
111
-
## Enabling Security Audits
112
-
113
-
To enable the Datadog compliance capabilities, AWS integration to must have the `SecurityAudit` policy attached to the Datadog IAM role. This is handled by our [https://github.com/cloudposse/terraform-aws-datadog-integration](https://github.com/cloudposse/terraform-aws-datadog-integration) module used
114
-
115
-
the by the `datadog-integration` component.
116
-
117
-
Attaching the `SecurityAudit` policy allows Datadog to collect information about how AWS resources are configured (used in Datadog Cloud Security Posture Management to read security configuration metadata)
118
-
119
-
- Datadog Cloud Security Posture Management (CSPM) makes it easier to assess and visualize the current and historic security posture of cloud environments, automate audit evidence collection, and catch misconfigurations that leave your organization vulnerable to attacks
120
-
121
-
- Cloud Security Posture Management (CSPM) can be accessed at [https://app.datadoghq.com/security/compliance/home](https://app.datadoghq.com/security/compliance/home)
122
-
123
-
- The process to enable Datadog Cloud Security Posture Management (CSPM) consists of two steps (one automated, the other manual):
124
-
125
-
- Enable `SecurityAudit` policy and provision it with terraform
126
-
127
-
- In Datadog UI, perform the following manual steps:
128
-
129
-
```
130
-
Go to the Datadog AWS integration tile
131
-
Click on the AWS account where you wish to enable resource collection
132
-
Go to the Resource collection section for that account and check the box "Route resource data to the Cloud Security Posture Management product"
133
-
At the bottom left of the tile, click Update Configuration
134
-
135
-
```
136
-
137
99
## References
138
100
* Datadog's [documentation about provisioning keys](https://docs.datadoghq.com/account_management/api-app-keys)
Copy file name to clipboardExpand all lines: src/variables.tf
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,11 @@ variable "excluded_regions" {
33
33
default=[]
34
34
}
35
35
36
+
variable"included_regions" {
37
+
type=list(string)
38
+
description="An array of AWS regions to include in metrics collection"
39
+
default=[]
40
+
}
36
41
variable"account_specific_namespace_rules" {
37
42
type=map(string)
38
43
description="An object, (in the form {\"namespace1\":true/false, \"namespace2\":true/false} ), that enables or disables metric collection for specific AWS namespaces for this AWS account only"
0 commit comments