You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -450,8 +450,9 @@ No modules.
450
450
| <aname="input_flow_log_cloudwatch_log_group_name_suffix"></a> [flow\_log\_cloudwatch\_log\_group\_name\_suffix](#input\_flow\_log\_cloudwatch\_log\_group\_name\_suffix)| Specifies the name suffix of CloudWatch Log Group for VPC flow logs |`string`|`""`| no |
451
451
| <aname="input_flow_log_cloudwatch_log_group_retention_in_days"></a> [flow\_log\_cloudwatch\_log\_group\_retention\_in\_days](#input\_flow\_log\_cloudwatch\_log\_group\_retention\_in\_days)| Specifies the number of days you want to retain log events in the specified log group for VPC flow logs |`number`|`null`| no |
452
452
| <aname="input_flow_log_cloudwatch_log_group_skip_destroy"></a> [flow\_log\_cloudwatch\_log\_group\_skip\_destroy](#input\_flow\_log\_cloudwatch\_log\_group\_skip\_destroy)| Set to true if you do not wish the log group (and any logs it may contain) to be deleted at destroy time, and instead just remove the log group from the Terraform state |`bool`|`false`| no |
453
+
| <aname="input_flow_log_deliver_cross_account_role"></a> [flow\_log\_deliver\_cross\_account\_role](#input\_flow\_log\_deliver\_cross\_account\_role)| (Optional) ARN of the IAM role that allows Amazon EC2 to publish flow logs across accounts. |`string`|`null`| no |
453
454
| <aname="input_flow_log_destination_arn"></a> [flow\_log\_destination\_arn](#input\_flow\_log\_destination\_arn)| The ARN of the CloudWatch log group or S3 bucket where VPC Flow Logs will be pushed. If this ARN is a S3 bucket the appropriate permissions need to be set on that bucket's policy. When create\_flow\_log\_cloudwatch\_log\_group is set to false this argument must be provided |`string`|`""`| no |
454
-
| <aname="input_flow_log_destination_type"></a> [flow\_log\_destination\_type](#input\_flow\_log\_destination\_type)| Type of flow log destination. Can be s3 or cloud-watch-logs |`string`|`"cloud-watch-logs"`| no |
455
+
| <aname="input_flow_log_destination_type"></a> [flow\_log\_destination\_type](#input\_flow\_log\_destination\_type)| Type of flow log destination. Can be s3, kinesis-data-firehose or cloud-watch-logs |`string`|`"cloud-watch-logs"`| no |
455
456
| <aname="input_flow_log_file_format"></a> [flow\_log\_file\_format](#input\_flow\_log\_file\_format)| (Optional) The format for the flow log. Valid values: `plain-text`, `parquet`|`string`|`null`| no |
456
457
| <aname="input_flow_log_hive_compatible_partitions"></a> [flow\_log\_hive\_compatible\_partitions](#input\_flow\_log\_hive\_compatible\_partitions)| (Optional) Indicates whether to use Hive-compatible prefixes for flow logs stored in Amazon S3 |`bool`|`false`| no |
457
458
| <aname="input_flow_log_log_format"></a> [flow\_log\_log\_format](#input\_flow\_log\_log\_format)| The fields to include in the flow log record, in the order in which they should appear |`string`|`null`| no |
@@ -682,6 +683,7 @@ No modules.
682
683
| <aname="output_vpc_enable_dns_hostnames"></a> [vpc\_enable\_dns\_hostnames](#output\_vpc\_enable\_dns\_hostnames)| Whether or not the VPC has DNS hostname support |
683
684
| <aname="output_vpc_enable_dns_support"></a> [vpc\_enable\_dns\_support](#output\_vpc\_enable\_dns\_support)| Whether or not the VPC has DNS support |
684
685
| <aname="output_vpc_flow_log_cloudwatch_iam_role_arn"></a> [vpc\_flow\_log\_cloudwatch\_iam\_role\_arn](#output\_vpc\_flow\_log\_cloudwatch\_iam\_role\_arn)| The ARN of the IAM role used when pushing logs to Cloudwatch log group |
686
+
| <aname="output_vpc_flow_log_deliver_cross_account_role"></a> [vpc\_flow\_log\_deliver\_cross\_account\_role](#output\_vpc\_flow\_log\_deliver\_cross\_account\_role)| The ARN of the IAM role used when pushing logs cross account |
685
687
| <aname="output_vpc_flow_log_destination_arn"></a> [vpc\_flow\_log\_destination\_arn](#output\_vpc\_flow\_log\_destination\_arn)| The ARN of the destination for VPC Flow Logs |
686
688
| <aname="output_vpc_flow_log_destination_type"></a> [vpc\_flow\_log\_destination\_type](#output\_vpc\_flow\_log\_destination\_type)| The type of the destination for VPC Flow Logs |
687
689
| <aname="output_vpc_flow_log_id"></a> [vpc\_flow\_log\_id](#output\_vpc\_flow\_log\_id)| The ID of the Flow Log resource |
0 commit comments