Resource: aws_securitylake_data_lake

Terraform resource for managing an AWS Security Lake Data Lake.

Example Usage

resource "aws_securitylake_data_lake" "example" {
  meta_store_manager_role_arn = aws_iam_role.meta_store_manager.arn

  configuration {
    region = "eu-west-1"

    encryption_configuration {
      kms_key_id = "S3_MANAGED_KEY"
    }

    lifecycle_configuration {
      transition {
        days          = 31
        storage_class = "STANDARD_IA"
      }
      transition {
        days          = 80
        storage_class = "ONEZONE_IA"
      }
      expiration {
        days = 300
      }
    }
  }
}

Basic Usage

resource "aws_securitylake_data_lake" "example" {
  meta_store_manager_role_arn = aws_iam_role.meta_store_manager.arn

  configuration {
    region = "eu-west-1"

    encryption_configuration {
      kms_key_id = "S3_MANAGED_KEY"
    }
  }
}

Argument Reference

The following arguments are required:

Configurations support the following:

Encryption Configuration support the following:

Lifecycle Configuration support the following:

Expiration Configuration support the following:

Transitions support the following:

Replication Configuration support the following:

Attribute Reference

This resource exports the following attributes in addition to the arguments above:

Timeouts

Configuration options:

Import

In Terraform v1.5.0 and later, use an import block to import Security Hub standards subscriptions using the standards subscription ARN. For example:

import {
  to = aws_securitylake_data_lake.example
  id = "arn:aws:securitylake:eu-west-1:123456789012:data-lake/default"
}

Using terraform import, import Security Hub standards subscriptions using the standards subscription ARN. For example:

% terraform import aws_securitylake_data_lake.example arn:aws:securitylake:eu-west-1:123456789012:data-lake/default