You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,6 +129,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
129
129
| <aname="input_dd_app_key"></a> [dd\_app\_key](#input\_dd\_app\_key)| The Datadog application key associated with the user account that created it, which can be found from the APIs page |`string`|`""`| no |
130
130
| <aname="input_dd_site"></a> [dd\_site](#input\_dd\_site)| Define your Datadog Site to send data to. For the Datadog EU site, set to datadoghq.eu |`string`|`"datadoghq.com"`| no |
131
131
| <aname="input_kms_alias"></a> [kms\_alias](#input\_kms\_alias)| Alias of KMS key used to encrypt the Datadog API keys - must start with `alias/`|`string`| n/a | yes |
132
+
| <aname="input_log_forwarder_architectures"></a> [log\_forwarder\_architectures](#input\_log\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
132
133
| <aname="input_log_forwarder_bucket_prefix"></a> [log\_forwarder\_bucket\_prefix](#input\_log\_forwarder\_bucket\_prefix)| S3 object key prefix to prepend to zip archive name |`string`|`""`| no |
133
134
| <aname="input_log_forwarder_environment_variables"></a> [log\_forwarder\_environment\_variables](#input\_log\_forwarder\_environment\_variables)| A map of environment variables for the log forwarder lambda function |`map(string)`|`{}`| no |
134
135
| <aname="input_log_forwarder_kms_key_arn"></a> [log\_forwarder\_kms\_key\_arn](#input\_log\_forwarder\_kms\_key\_arn)| KMS key that is used to encrypt environment variables. If this configuration is not provided when environment variables are in use, AWS Lambda uses a default service key |`string`|`null`| no |
@@ -148,7 +149,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
148
149
| <aname="input_log_forwarder_role_path"></a> [log\_forwarder\_role\_path](#input\_log\_forwarder\_role\_path)| Log forwarder role path |`string`|`null`| no |
149
150
| <aname="input_log_forwarder_role_permissions_boundary"></a> [log\_forwarder\_role\_permissions\_boundary](#input\_log\_forwarder\_role\_permissions\_boundary)| The ARN of the policy that is used to set the permissions boundary for the log forwarder role |`string`|`null`| no |
150
151
| <aname="input_log_forwarder_role_tags"></a> [log\_forwarder\_role\_tags](#input\_log\_forwarder\_role\_tags)| A map of tags to apply to the log forwarder role |`map(string)`|`{}`| no |
151
-
| <aname="input_log_forwarder_runtime"></a> [log\_forwarder\_runtime](#input\_log\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.7"`| no |
152
+
| <aname="input_log_forwarder_runtime"></a> [log\_forwarder\_runtime](#input\_log\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.9"`| no |
152
153
| <aname="input_log_forwarder_s3_log_bucket_arns"></a> [log\_forwarder\_s3\_log\_bucket\_arns](#input\_log\_forwarder\_s3\_log\_bucket\_arns)| S3 log buckets for forwarder to read and forward logs to Datadog |`list(string)`|`[]`| no |
153
154
| <aname="input_log_forwarder_s3_zip_kms_key_id"></a> [log\_forwarder\_s3\_zip\_kms\_key\_id](#input\_log\_forwarder\_s3\_zip\_kms\_key\_id)| The AWS KMS Key ARN to use for object encryption |`string`|`null`| no |
154
155
| <aname="input_log_forwarder_s3_zip_metadata"></a> [log\_forwarder\_s3\_zip\_metadata](#input\_log\_forwarder\_s3\_zip\_metadata)| A map of keys/values to provision metadata (will be automatically prefixed by `x-amz-meta-`|`map(string)`|`{}`| no |
@@ -174,6 +175,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
174
175
| <aname="input_processes_vpce_security_group_ids"></a> [processes\_vpce\_security\_group\_ids](#input\_processes\_vpce\_security\_group\_ids)| IDs of security groups to attach to processes endpoint |`list(string)`|`[]`| no |
175
176
| <aname="input_processes_vpce_subnet_ids"></a> [processes\_vpce\_subnet\_ids](#input\_processes\_vpce\_subnet\_ids)| IDs of subnets to associate with processes endpoint |`list(string)`|`[]`| no |
176
177
| <aname="input_processes_vpce_tags"></a> [processes\_vpce\_tags](#input\_processes\_vpce\_tags)| A map of tags to apply to the processes endpoint |`map(string)`|`{}`| no |
178
+
| <aname="input_rds_em_forwarder_architectures"></a> [rds\_em\_forwarder\_architectures](#input\_rds\_em\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
177
179
| <aname="input_rds_em_forwarder_environment_variables"></a> [rds\_em\_forwarder\_environment\_variables](#input\_rds\_em\_forwarder\_environment\_variables)| A map of environment variables for the RDS enhanced monitoring forwarder lambda function |`map(string)`|`{}`| no |
178
180
| <aname="input_rds_em_forwarder_kms_key_arn"></a> [rds\_em\_forwarder\_kms\_key\_arn](#input\_rds\_em\_forwarder\_kms\_key\_arn)| KMS key that is used to encrypt environment variables. If this configuration is not provided when environment variables are in use, AWS Lambda uses a default service key |`string`|`null`| no |
179
181
| <aname="input_rds_em_forwarder_lambda_tags"></a> [rds\_em\_forwarder\_lambda\_tags](#input\_rds\_em\_forwarder\_lambda\_tags)| A map of tags to apply to the RDS enhanced monitoring forwarder lambda function |`map(string)`|`{}`| no |
@@ -192,7 +194,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
192
194
| <aname="input_rds_em_forwarder_role_path"></a> [rds\_em\_forwarder\_role\_path](#input\_rds\_em\_forwarder\_role\_path)| RDS enhanced monitoring forwarder role path |`string`|`null`| no |
193
195
| <aname="input_rds_em_forwarder_role_permissions_boundary"></a> [rds\_em\_forwarder\_role\_permissions\_boundary](#input\_rds\_em\_forwarder\_role\_permissions\_boundary)| The ARN of the policy that is used to set the permissions boundary for the RDS enhanced monitoring forwarder role |`string`|`null`| no |
194
196
| <aname="input_rds_em_forwarder_role_tags"></a> [rds\_em\_forwarder\_role\_tags](#input\_rds\_em\_forwarder\_role\_tags)| A map of tags to apply to the RDS enhanced monitoring forwarder role |`map(string)`|`{}`| no |
195
-
| <aname="input_rds_em_forwarder_runtime"></a> [rds\_em\_forwarder\_runtime](#input\_rds\_em\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.7"`| no |
197
+
| <aname="input_rds_em_forwarder_runtime"></a> [rds\_em\_forwarder\_runtime](#input\_rds\_em\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.9"`| no |
196
198
| <aname="input_rds_em_forwarder_security_group_ids"></a> [rds\_em\_forwarder\_security\_group\_ids](#input\_rds\_em\_forwarder\_security\_group\_ids)| List of security group ids when forwarder lambda function should run in the VPC |`list(string)`|`null`| no |
197
199
| <aname="input_rds_em_forwarder_subnet_ids"></a> [rds\_em\_forwarder\_subnet\_ids](#input\_rds\_em\_forwarder\_subnet\_ids)| List of subnet ids when forwarder lambda function should run in the VPC. Usually private or intra subnets |`list(string)`|`null`| no |
198
200
| <aname="input_rds_em_forwarder_tags"></a> [rds\_em\_forwarder\_tags](#input\_rds\_em\_forwarder\_tags)| A map of tags to apply to the RDS enhanced monitoring forwarder resources |`map(string)`|`{}`| no |
@@ -205,6 +207,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
205
207
| <aname="input_traces_vpce_security_group_ids"></a> [traces\_vpce\_security\_group\_ids](#input\_traces\_vpce\_security\_group\_ids)| IDs of security groups to attach to traces endpoint |`list(string)`|`[]`| no |
206
208
| <aname="input_traces_vpce_subnet_ids"></a> [traces\_vpce\_subnet\_ids](#input\_traces\_vpce\_subnet\_ids)| IDs of subnets to associate with traces endpoint |`list(string)`|`[]`| no |
207
209
| <aname="input_traces_vpce_tags"></a> [traces\_vpce\_tags](#input\_traces\_vpce\_tags)| A map of tags to apply to the traces endpoint |`map(string)`|`{}`| no |
210
+
| <aname="input_vpc_fl_forwarder_architectures"></a> [vpc\_fl\_forwarder\_architectures](#input\_vpc\_fl\_forwarder\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
208
211
| <aname="input_vpc_fl_forwarder_environment_variables"></a> [vpc\_fl\_forwarder\_environment\_variables](#input\_vpc\_fl\_forwarder\_environment\_variables)| A map of environment variables for the VPC flow log forwarder lambda function |`map(string)`|`{}`| no |
209
212
| <aname="input_vpc_fl_forwarder_kms_key_arn"></a> [vpc\_fl\_forwarder\_kms\_key\_arn](#input\_vpc\_fl\_forwarder\_kms\_key\_arn)| KMS key that is used to encrypt environment variables. If this configuration is not provided when environment variables are in use, AWS Lambda uses a default service key |`string`|`null`| no |
210
213
| <aname="input_vpc_fl_forwarder_lambda_tags"></a> [vpc\_fl\_forwarder\_lambda\_tags](#input\_vpc\_fl\_forwarder\_lambda\_tags)| A map of tags to apply to the VPC flow log forwarder lambda function |`map(string)`|`{}`| no |
@@ -224,7 +227,7 @@ Examples codified under the [`examples`](./examples) are intended to give users
224
227
| <aname="input_vpc_fl_forwarder_role_path"></a> [vpc\_fl\_forwarder\_role\_path](#input\_vpc\_fl\_forwarder\_role\_path)| VPC flow log forwarder role path |`string`|`null`| no |
225
228
| <aname="input_vpc_fl_forwarder_role_permissions_boundary"></a> [vpc\_fl\_forwarder\_role\_permissions\_boundary](#input\_vpc\_fl\_forwarder\_role\_permissions\_boundary)| The ARN of the policy that is used to set the permissions boundary for the VPC flow log forwarder role |`string`|`null`| no |
226
229
| <aname="input_vpc_fl_forwarder_role_tags"></a> [vpc\_fl\_forwarder\_role\_tags](#input\_vpc\_fl\_forwarder\_role\_tags)| A map of tags to apply to the VPC flow log forwarder role |`map(string)`|`{}`| no |
227
-
| <aname="input_vpc_fl_forwarder_runtime"></a> [vpc\_fl\_forwarder\_runtime](#input\_vpc\_fl\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.7"`| no |
230
+
| <aname="input_vpc_fl_forwarder_runtime"></a> [vpc\_fl\_forwarder\_runtime](#input\_vpc\_fl\_forwarder\_runtime)| Lambda function runtime |`string`|`"python3.9"`| no |
228
231
| <aname="input_vpc_fl_forwarder_s3_log_bucket_arns"></a> [vpc\_fl\_forwarder\_s3\_log\_bucket\_arns](#input\_vpc\_fl\_forwarder\_s3\_log\_bucket\_arns)| S3 log buckets for VPC flow log forwarder to read and forward to Datadog |`list(string)`|`[]`| no |
229
232
| <aname="input_vpc_fl_forwarder_security_group_ids"></a> [vpc\_fl\_forwarder\_security\_group\_ids](#input\_vpc\_fl\_forwarder\_security\_group\_ids)| List of security group ids when forwarder lambda function should run in the VPC |`list(string)`|`null`| no |
230
233
| <aname="input_vpc_fl_forwarder_subnet_ids"></a> [vpc\_fl\_forwarder\_subnet\_ids](#input\_vpc\_fl\_forwarder\_subnet\_ids)| List of subnet ids when forwarder lambda function should run in the VPC. Usually private or intra subnets |`list(string)`|`null`| no |
| <aname="input_architectures"></a> [architectures](#input\_architectures)| Instruction set architecture for your Lambda function. Valid values are `["x86_64"]` and `["arm64"]`. Default is `["x86_64"]`|`list(string)`| <pre>[<br> "x86_64"<br>]</pre> | no |
82
83
| <aname="input_bucket_attach_deny_insecure_transport_policy"></a> [bucket\_attach\_deny\_insecure\_transport\_policy](#input\_bucket\_attach\_deny\_insecure\_transport\_policy)| Controls if S3 bucket should have deny non-SSL transport policy attacheds |`bool`|`false`| no |
83
84
| <aname="input_bucket_encryption_settings"></a> [bucket\_encryption\_settings](#input\_bucket\_encryption\_settings)| S3 bucket server side encryption settings |`map(string)`| <pre>{<br> "sse_algorithm": "AES256"<br>}</pre> | no |
84
85
| <aname="input_bucket_name"></a> [bucket\_name](#input\_bucket\_name)| Forwarder S3 bucket name |`string`|`""`| no |
| <aname="input_role_path"></a> [role\_path](#input\_role\_path)| Forwarder role path |`string`|`null`| no |
110
111
| <aname="input_role_permissions_boundary"></a> [role\_permissions\_boundary](#input\_role\_permissions\_boundary)| The ARN of the policy that is used to set the permissions boundary for the forwarder role |`string`|`null`| no |
111
112
| <aname="input_role_tags"></a> [role\_tags](#input\_role\_tags)| A map of tags to apply to the forwarder role |`map(string)`|`{}`| no |
112
-
| <aname="input_runtime"></a> [runtime](#input\_runtime)| Lambda function runtime |`string`|`"python3.7"`| no |
113
+
| <aname="input_runtime"></a> [runtime](#input\_runtime)| Lambda function runtime |`string`|`"python3.9"`| no |
113
114
| <aname="input_s3_log_bucket_arns"></a> [s3\_log\_bucket\_arns](#input\_s3\_log\_bucket\_arns)| S3 log buckets for forwarder to read and forward logs to Datadog |`list(string)`|`[]`| no |
114
115
| <aname="input_s3_zip_kms_key_id"></a> [s3\_zip\_kms\_key\_id](#input\_s3\_zip\_kms\_key\_id)| The AWS KMS Key ARN to use for object encryption |`string`|`null`| no |
115
116
| <aname="input_s3_zip_metadata"></a> [s3\_zip\_metadata](#input\_s3\_zip\_metadata)| A map of keys/values to provision metadata (will be automatically prefixed by `x-amz-meta-`|`map(string)`|`{}`| no |
0 commit comments