You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
63
+
<!--BEGIN_TF_DOCS-->
64
64
## Requirements
65
65
66
66
| Name | Version |
@@ -106,7 +106,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
106
106
| <aname="input_api_vpce_subnet_ids"></a> [api\_vpce\_subnet\_ids](#input\_api\_vpce\_subnet\_ids)| IDs of subnets to associate with API endpoint |`list(string)`|`[]`| no |
107
107
| <aname="input_api_vpce_tags"></a> [api\_vpce\_tags](#input\_api\_vpce\_tags)| A map of tags to apply to the API endpoint |`map(string)`|`{}`| no |
108
108
| <aname="input_bucket_attach_deny_insecure_transport_policy"></a> [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy)| Controls if S3 bucket should have deny non-SSL transport policy attacheds |`bool`|`true`| no |
109
-
| <aname="input_bucket_encryption_settings"></a> [bucket\_encryption\_settings](#input\_bucket\_encryption\_settings)| S3 bucket server side encryption settings |`map(string)`| <pre>{<br> "sse_algorithm": "AES256"<br>}</pre> | no |
109
+
| <aname="input_bucket_encryption_settings"></a> [bucket\_encryption\_settings](#input\_bucket\_encryption\_settings)| S3 bucket server side encryption settings |`map(string)`| <pre>{<br/> "sse_algorithm": "AES256"<br/>}</pre> | no |
110
110
| <aname="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name)| Lambda artifact S3 bucket name |`string`|`""`| no |
111
111
| <aname="input_create_agent_vpce"></a> [create\_agent\_vpce](#input\_create\_agent\_vpce)| Controls whether an agent endpoint should be created |`bool`|`false`| no |
112
112
| <aname="input_create_api_vpce"></a> [create\_api\_vpce](#input\_create\_api\_vpce)| Controls whether a API endpoint should be created |`bool`|`false`| no |
@@ -129,7 +129,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
129
129
| <aname="input_dd_app_key"></a> [dd\_app\_key](#input\_dd\_app\_key)| The Datadog application key associated with the user account that created it, which can be found from the APIs page |`string`|`""`| no |
130
130
| <aname="input_dd_site"></a> [dd\_site](#input\_dd\_site)| Define your Datadog Site to send data to. For the Datadog EU site, set to datadoghq.eu |`string`|`"datadoghq.com"`| no |
131
131
| <aname="input_kms_alias"></a> [kms\_alias](#input\_kms\_alias)| Alias of KMS key used to encrypt the Datadog API keys - must start with `alias/`|`string`| n/a | yes |
132
-
| <aname="input_log_forwarder_architectures"></a> [log\_forwarder\_architectures](#input\_log\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
132
+
| <aname="input_log_forwarder_architectures"></a> [log\_forwarder\_architectures](#input\_log\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br/> "x86_64"<br/>]</pre> | no |
133
133
| <aname="input_log_forwarder_bucket_prefix"></a> [log\_forwarder\_bucket\_prefix](#input\_log\_forwarder\_bucket\_prefix)| S3 object key prefix to prepend to zip archive name |`string`|`""`| no |
134
134
| <aname="input_log_forwarder_bucket_tags"></a> [log\_forwarder\_bucket\_tags](#input\_log\_forwarder\_bucket\_tags)| A map of tags to apply to the log forwarder bucket |`map(any)`|`{}`| no |
135
135
| <aname="input_log_forwarder_environment_variables"></a> [log\_forwarder\_environment\_variables](#input\_log\_forwarder\_environment\_variables)| A map of environment variables for the log forwarder lambda function |`map(string)`|`{}`| no |
@@ -178,7 +178,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
178
178
| <aname="input_processes_vpce_security_group_ids"></a> [processes\_vpce\_security\_group\_ids](#input\_processes\_vpce\_security\_group\_ids)| IDs of security groups to attach to processes endpoint |`list(string)`|`[]`| no |
179
179
| <aname="input_processes_vpce_subnet_ids"></a> [processes\_vpce\_subnet\_ids](#input\_processes\_vpce\_subnet\_ids)| IDs of subnets to associate with processes endpoint |`list(string)`|`[]`| no |
180
180
| <aname="input_processes_vpce_tags"></a> [processes\_vpce\_tags](#input\_processes\_vpce\_tags)| A map of tags to apply to the processes endpoint |`map(string)`|`{}`| no |
181
-
| <aname="input_rds_em_forwarder_architectures"></a> [rds\_em\_forwarder\_architectures](#input\_rds\_em\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
181
+
| <aname="input_rds_em_forwarder_architectures"></a> [rds\_em\_forwarder\_architectures](#input\_rds\_em\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br/> "x86_64"<br/>]</pre> | no |
182
182
| <aname="input_rds_em_forwarder_environment_variables"></a> [rds\_em\_forwarder\_environment\_variables](#input\_rds\_em\_forwarder\_environment\_variables)| A map of environment variables for the RDS enhanced monitoring forwarder lambda function |`map(string)`|`{}`| no |
183
183
| <aname="input_rds_em_forwarder_kms_key_arn"></a> [rds\_em\_forwarder\_kms\_key\_arn](#input\_rds\_em\_forwarder\_kms\_key\_arn)| KMS key that is used to encrypt environment variables. If this configuration is not provided when environment variables are in use, AWS Lambda uses a default service key |`string`|`null`| no |
184
184
| <aname="input_rds_em_forwarder_lambda_tags"></a> [rds\_em\_forwarder\_lambda\_tags](#input\_rds\_em\_forwarder\_lambda\_tags)| A map of tags to apply to the RDS enhanced monitoring forwarder lambda function |`map(string)`|`{}`| no |
@@ -211,7 +211,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
211
211
| <aname="input_traces_vpce_security_group_ids"></a> [traces\_vpce\_security\_group\_ids](#input\_traces\_vpce\_security\_group\_ids)| IDs of security groups to attach to traces endpoint |`list(string)`|`[]`| no |
212
212
| <aname="input_traces_vpce_subnet_ids"></a> [traces\_vpce\_subnet\_ids](#input\_traces\_vpce\_subnet\_ids)| IDs of subnets to associate with traces endpoint |`list(string)`|`[]`| no |
213
213
| <aname="input_traces_vpce_tags"></a> [traces\_vpce\_tags](#input\_traces\_vpce\_tags)| A map of tags to apply to the traces endpoint |`map(string)`|`{}`| no |
214
-
| <aname="input_vpc_fl_forwarder_architectures"></a> [vpc\_fl\_forwarder\_architectures](#input\_vpc\_fl\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
214
+
| <aname="input_vpc_fl_forwarder_architectures"></a> [vpc\_fl\_forwarder\_architectures](#input\_vpc\_fl\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br/> "x86_64"<br/>]</pre> | no |
215
215
| <aname="input_vpc_fl_forwarder_environment_variables"></a> [vpc\_fl\_forwarder\_environment\_variables](#input\_vpc\_fl\_forwarder\_environment\_variables)| A map of environment variables for the VPC flow log forwarder lambda function |`map(string)`|`{}`| no |
216
216
| <aname="input_vpc_fl_forwarder_kms_key_arn"></a> [vpc\_fl\_forwarder\_kms\_key\_arn](#input\_vpc\_fl\_forwarder\_kms\_key\_arn)| KMS key that is used to encrypt environment variables. If this configuration is not provided when environment variables are in use, AWS Lambda uses a default service key |`string`|`null`| no |
217
217
| <aname="input_vpc_fl_forwarder_lambda_tags"></a> [vpc\_fl\_forwarder\_lambda\_tags](#input\_vpc\_fl\_forwarder\_lambda\_tags)| A map of tags to apply to the VPC flow log forwarder lambda function |`map(string)`|`{}`| no |
@@ -329,7 +329,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
329
329
| <aname="output_vpc_fl_forwarder_role_policy_id"></a> [vpc\_fl\_forwarder\_role\_policy\_id](#output\_vpc\_fl\_forwarder\_role\_policy\_id)| The ID of the VPC flow log forwarder lambda role policy |
330
330
| <aname="output_vpc_fl_forwarder_role_policy_name"></a> [vpc\_fl\_forwarder\_role\_policy\_name](#output\_vpc\_fl\_forwarder\_role\_policy\_name)| The name of the VPC flow log forwarder lambda role policy |
331
331
| <aname="output_vpc_fl_forwarder_role_unique_id"></a> [vpc\_fl\_forwarder\_role\_unique\_id](#output\_vpc\_fl\_forwarder\_role\_unique\_id)| The stable and unique string identifying the VPC flow log forwarder lambda role. |
Copy file name to clipboardExpand all lines: examples/complete/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ $ terraform apply
18
18
19
19
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
20
20
21
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
21
+
<!--BEGIN_TF_DOCS-->
22
22
## Requirements
23
23
24
24
| Name | Version |
@@ -132,6 +132,6 @@ No inputs.
132
132
| <aname="output_vpc_fl_forwarder_role_name"></a> [vpc\_fl\_forwarder\_role\_name](#output\_vpc\_fl\_forwarder\_role\_name)| The VPC flow log forwarder lambda role name |
133
133
| <aname="output_vpc_fl_forwarder_role_policy_arn"></a> [vpc\_fl\_forwarder\_role\_policy\_arn](#output\_vpc\_fl\_forwarder\_role\_policy\_arn)| The ARN of the VPC flow log forwarder lambda role policy |
134
134
| <aname="output_vpc_fl_forwarder_role_policy_name"></a> [vpc\_fl\_forwarder\_role\_policy\_name](#output\_vpc\_fl\_forwarder\_role\_policy\_name)| The name of the VPC flow log forwarder lambda role policy |
135
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
135
+
<!--END_TF_DOCS-->
136
136
137
137
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-datadog-forwarders/blob/master/LICENSE).
Copy file name to clipboardExpand all lines: examples/simple/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ $ terraform apply
14
14
15
15
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
16
16
17
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
17
+
<!--BEGIN_TF_DOCS-->
18
18
## Requirements
19
19
20
20
| Name | Version |
@@ -84,6 +84,6 @@ No inputs.
84
84
| <aname="output_vpc_fl_forwarder_role_name"></a> [vpc\_fl\_forwarder\_role\_name](#output\_vpc\_fl\_forwarder\_role\_name)| The VPC flow log forwarder lambda role name |
85
85
| <aname="output_vpc_fl_forwarder_role_policy_arn"></a> [vpc\_fl\_forwarder\_role\_policy\_arn](#output\_vpc\_fl\_forwarder\_role\_policy\_arn)| The ARN of the VPC flow log forwarder lambda role policy |
86
86
| <aname="output_vpc_fl_forwarder_role_policy_name"></a> [vpc\_fl\_forwarder\_role\_policy\_name](#output\_vpc\_fl\_forwarder\_role\_policy\_name)| The name of the VPC flow log forwarder lambda role policy |
87
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
87
+
<!--END_TF_DOCS-->
88
88
89
89
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-datadog-forwarders/blob/master/LICENSE).
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
82
+
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br/> "x86_64"<br/>]</pre> | no |
83
83
| <aname="input_bucket_attach_deny_insecure_transport_policy"></a> [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy)| Controls if S3 bucket should have deny non-SSL transport policy attacheds |`bool`|`false`| no |
84
-
| <aname="input_bucket_encryption_settings"></a> [bucket\_encryption\_settings](#input\_bucket\_encryption\_settings)| S3 bucket server side encryption settings |`map(string)`| <pre>{<br> "sse_algorithm": "AES256"<br>}</pre> | no |
84
+
| <aname="input_bucket_encryption_settings"></a> [bucket\_encryption\_settings](#input\_bucket\_encryption\_settings)| S3 bucket server side encryption settings |`map(string)`| <pre>{<br/> "sse_algorithm": "AES256"<br/>}</pre> | no |
85
85
| <aname="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name)| Forwarder S3 bucket name |`string`|`""`| no |
86
86
| <aname="input_bucket_prefix"></a> [bucket\_prefix](#input\_bucket\_prefix)| S3 object key prefix to prepend to zip archive name |`string`|`""`| no |
87
87
| <aname="input_bucket_tags"></a> [bucket\_tags](#input\_bucket\_tags)| A map of tags to apply to the bucket |`map(string)`|`{}`| no |
| <aname="output_s3_object_etag"></a> [s3\_object\_etag](#output\_s3\_object\_etag)| The ETag generated for the forwarder lambda zip object (an MD5 sum of the object content) |
152
152
| <aname="output_s3_object_id"></a> [s3\_object\_id](#output\_s3\_object\_id)| The `key` of the forwarder lambda zip archive |
153
153
| <aname="output_s3_object_version"></a> [s3\_object\_version](#output\_s3\_object\_version)| A unique version ID value for the forwarder lambda zip object, if bucket versioning is enabled |
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
63
+
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br/> "x86_64"<br/>]</pre> | no |
64
64
| <aname="input_create"></a> [create](#input\_create)| Controls whether the forwarder resources should be created |`bool`|`true`| no |
65
65
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Controls whether an IAM role is created for the forwarder |`bool`|`true`| no |
66
66
| <aname="input_create_role_policy"></a> [create\_role\_policy](#input\_create\_role\_policy)| Controls whether an IAM role policy is created for the forwarder |`bool`|`true`| no |
@@ -112,7 +112,7 @@ No modules.
112
112
| <aname="output_role_policy_id"></a> [role\_policy\_id](#output\_role\_policy\_id)| The ID of the forwarder lambda role policy |
113
113
| <aname="output_role_policy_name"></a> [role\_policy\_name](#output\_role\_policy\_name)| The name of the forwarder lambda role policy |
114
114
| <aname="output_role_unique_id"></a> [role\_unique\_id](#output\_role\_unique\_id)| The stable and unique string identifying the forwarder lambda role |
0 commit comments