cloudtrail
clouddrove/cloudtrail/aws
Terraform module to provision an AWS CloudTrail and an encrypted S3 bucket with versioning to store CloudTrail logs
![Banner][website] Terraform AWS Cloudtrail With our comprehensive DevOps toolkit - streamline operations, automate workflows, enhance collaboration and, most importantly, deploy with confidence. We are a group of DevOps engineers & architects, joining hands in this ever evolving digital landscape. With our strong belief in Automation; just like microservices, always on the lookout to split the the infrastructure into smaller connected resources (database, cluster and more) which could be standardized, are manageable, scalable, secure & follow industry best practices. This module includes Terraform open source, examples, and automation tests (for better understanding), which would help you create and improve your infrastructure with minimalistic coding. Prerequisites and Providers This tab
| Name | Type | Description | Default |
|---|---|---|---|
| name | string | Name (e.g. `app` or `cluster`). | required |
| read_write_type | string | Specify if you want your trail to log read-only events, write-only events, or al | "All" |
| data_resource_type | string | The resource type in which you want to log data events. You can specify only the | "AWS::S3::Object" |
| iam_role_name | string | Name for the CloudTrail IAM role | "cloudtrail-cloudwatch-logs-role" |
| enable_logging | bool | Enable logging for the trail. | true |
| event_selector_data_resource | bool | Specifies logging data events. Fields documented below. | false |
| enable_log_file_validation | bool | Specifies whether log file integrity validation is enabled. Creates signed diges | true |
| cloudwatch_log_group_name | string | The name of the CloudWatch Log Group that receives CloudTrail events. | "cloudtrail-events" |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "" |
| kms_enabled | bool | If true, deploy the resources for kms in the module. Note: Supports in only sing | false |
| include_global_service_events | bool | Specifies whether the trail is publishing events from global services such as IA | true |
| is_organization_trail | bool | The trail is an AWS Organizations trail. | false |
| sns_topic_name | string | Specifies the name of the Amazon SNS topic defined for notification of log file | null |
| label_order | list(any) | Label order, e.g. `name`,`application`. | [
"name",
"environment"
] |
| managedby | string | ManagedBy, eg 'CloudDrove'. | "hello@clouddrove.com" |
| include_management_events | bool | Specify if you want your event selector to include management events for your t | true |
| log_retention_days | string | Number of days to keep AWS logs around in specific log group. | 90 |
| repository | string | Terraform current module repo | "https://github.com/clouddrove/terraform |
| s3_bucket_name | string | S3 bucket name for CloudTrail log. | "" |
| s3_key_prefix | string | (Optional) S3 key prefix that follows the name of the bucket you have designated | "" |
| event_selector | bool | Specifies an event selector for enabling data event logging. Fields documented b | true |
id — The name of the trail.home_region — The region in which the trail was created.arn — The Amazon Resource Name of the trail.tags — A mapping of tags to assign to the resource.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,