Releases: trussworks/terraform-aws-logs
Releases · trussworks/terraform-aws-logs
Fix policy for enabling CloudWatch
Merge pull request #13 from trussworks/mk-fix-cloudwatch-policy Fix bucket policy for Cloudwatch
Adapt module to also support creation of 1 bucket per AWS service
Additionally:
- Removes enabling Cloudtrail and Cloudwatch for an account, but continues to support allowing Cloudtrail & Cloudwatch to log to bucket via bucket policy.
- Enforces private ACL and policies for bucket.
Fix key name for s3 bucket resource
Merge pull request #10 from trussworks/rek_fix-var-name fix var name
Separate Expiration Variables
S3 log bucket retention and cloudwatch log group retention were both being represented by the same variable--expiration
. Since the cloudwatch_log_group expiration is limited to a set of values (https://registry.terraform.io/modules/trussworks/logs/aws/1.6.0), and should not always necessarily have the same retention value for an s3 bucket, these 2 values are being decoupled within the module. This release separates the two into s3_log_bucket_retention
and cloudwatch_log_group_retention
.
This is a breaking change.
CloudWatch Exports
Merge pull request #6 from trussworks/cloudwatch_export Enable CloudWatch Exports
Update readme to reflect accurate var name
Merge pull request #5 from trussworks/rek_update-readme update readme to reflect accurate var name
Support CloudTrail events going to CloudWatch Logs
Merge pull request #3 from trussworks/mk-cond-cloudtail Add support for sending CloudTrail events to CloudWatch Logs.
v1.3.0
Support S3 access logs
Merge pull request #1 from trussworks/mk-s3-logging Support S3 access logs