Terraform resource for managing an Amazon Security Lake AWS Log Source.
resource "aws_securitylake_aws_log_source" "example" {
source {
accounts = ["123456789012"]
regions = ["eu-west-1"]
source_name = "ROUTE53"
}
depends_on = [aws_securitylake_data_lake.example]
}
The following arguments are required:
source
- (Required) Specify the natively-supported AWS service to add as a source in Security Lake.source
supports the following:
accounts
- (Optional) Specify the AWS account information where you want to enable Security Lake.
If not specified, uses all accounts included in the Security Lake.regions
- (Required) Specify the Regions where you want to enable Security Lake.source_name
- (Required) The name for a AWS source. This must be a Regionally unique value. Valid values: ROUTE53
, VPC_FLOW
, SH_FINDINGS
, CLOUD_TRAIL_MGMT
, LAMBDA_EXECUTION
, S3_DATA
.source_version
- (Optional) The version for a AWS source.
If not specified, the version will be the default.
This must be a Regionally unique value.This resource exports no additional attributes.
In Terraform v1.5.0 and later, use an import
block to import AWS log sources using the source name. For example:
import {
to = aws_securitylake_aws_log_source.example
id = "ROUTE53"
}
Using terraform import
, import AWS log sources using the source name. For example:
% terraform import aws_securitylake_aws_log_source.example ROUTE53