You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat: add logging options
* feat: automatically create cloudwatch log group if required
* feat: improve name and allow selecting retention period
* chore: make
Run: make init
make readme
make github/init
* fix: do not applly logging option when not enabled
* Apply suggestions from code review by @Gowiem
Co-authored-by: Matt Gowie <[email protected]>
* chore: force document updates as in main
* chore: make readme
* chore: make github/init
* fix: missed in merge
Co-authored-by: Matt Gowie <[email protected]>
* chore: make readme
---------
Co-authored-by: Matt Gowie <[email protected]>
| <aname="input_transit_gateway_routes"></a> [transit\_gateway\_routes](#input\_transit\_gateway\_routes)| A map of transit gateway routes to create on the given TGW route table (via `transit_gateway_route_table_id`) for the created VPN Attachment. Use the key in the map to describe the route. | <pre>map(object({<br> blackhole = optional(bool, false)<br> destination_cidr_block = string<br> }))</pre> |`{}`| no |
164
165
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The ID of the VPC to which the Virtual Private Gateway will be attached |`string`|`null`| no |
165
166
| <aname="input_vpn_connection_local_ipv4_network_cidr"></a> [vpn\_connection\_local\_ipv4\_network\_cidr](#input\_vpn\_connection\_local\_ipv4\_network\_cidr)| The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
167
+
| <aname="input_vpn_connection_log_retention_in_days"></a> [vpn\_connection\_log\_retention\_in\_days](#input\_vpn\_connection\_log\_retention\_in\_days)| Specifies the number of days you want to retain log events. |`number`|`30`| no |
166
168
| <aname="input_vpn_connection_remote_ipv4_network_cidr"></a> [vpn\_connection\_remote\_ipv4\_network\_cidr](#input\_vpn\_connection\_remote\_ipv4\_network\_cidr)| The IPv4 CIDR on the AWS side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
167
169
| <aname="input_vpn_connection_static_routes_destinations"></a> [vpn\_connection\_static\_routes\_destinations](#input\_vpn\_connection\_static\_routes\_destinations)| List of CIDR blocks to be used as destination for static routes. Routes to destinations will be propagated to the route tables defined in `route_table_ids`|`list(string)`|`[]`| no |
168
170
| <aname="input_vpn_connection_static_routes_only"></a> [vpn\_connection\_static\_routes\_only](#input\_vpn\_connection\_static\_routes\_only)| If set to `true`, the VPN connection will use static routes exclusively. Static routes must be used for devices that don't support BGP |`bool`|`false`| no |
171
+
| <aname="input_vpn_connection_tunnel1_cloudwatch_log_enabled"></a> [vpn\_connection\_tunnel1\_cloudwatch\_log\_enabled](#input\_vpn\_connection\_tunnel1\_cloudwatch\_log\_enabled)| Enable or disable VPN tunnel logging feature for the tunnel |`bool`|`false`| no |
172
+
| <aname="input_vpn_connection_tunnel1_cloudwatch_log_output_format"></a> [vpn\_connection\_tunnel1\_cloudwatch\_log\_output\_format](#input\_vpn\_connection\_tunnel1\_cloudwatch\_log\_output\_format)| Set log format for the tunnel. Default format is json. Possible values are: json and text |`string`|`"json"`| no |
169
173
| <aname="input_vpn_connection_tunnel1_dpd_timeout_action"></a> [vpn\_connection\_tunnel1\_dpd\_timeout\_action](#input\_vpn\_connection\_tunnel1\_dpd\_timeout\_action)| The action to take after DPD timeout occurs for the first VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear \| none \| restart. |`string`|`"clear"`| no |
170
174
| <aname="input_vpn_connection_tunnel1_ike_versions"></a> [vpn\_connection\_tunnel1\_ike\_versions](#input\_vpn\_connection\_tunnel1\_ike\_versions)| The IKE versions that are permitted for the first VPN tunnel. Valid values are ikev1 \| ikev2. |`list(string)`|`[]`| no |
171
175
| <aname="input_vpn_connection_tunnel1_inside_cidr"></a> [vpn\_connection\_tunnel1\_inside\_cidr](#input\_vpn\_connection\_tunnel1\_inside\_cidr)| The CIDR block of the inside IP addresses for the first VPN tunnel |`string`|`null`| no |
@@ -177,6 +181,8 @@ Available targets:
177
181
| <aname="input_vpn_connection_tunnel1_phase2_integrity_algorithms"></a> [vpn\_connection\_tunnel1\_phase2\_integrity\_algorithms](#input\_vpn\_connection\_tunnel1\_phase2\_integrity\_algorithms)| One or more integrity algorithms that are permitted for the first VPN tunnel for phase 2 IKE negotiations. Valid values are SHA1 \| SHA2-256 \| SHA2-384 \| SHA2-512. |`list(string)`|`[]`| no |
178
182
| <aname="input_vpn_connection_tunnel1_preshared_key"></a> [vpn\_connection\_tunnel1\_preshared\_key](#input\_vpn\_connection\_tunnel1\_preshared\_key)| The preshared key of the first VPN tunnel. The preshared key must be between 8 and 64 characters in length and cannot start with zero. Allowed characters are alphanumeric characters, periods(.) and underscores(\_) |`string`|`null`| no |
179
183
| <aname="input_vpn_connection_tunnel1_startup_action"></a> [vpn\_connection\_tunnel1\_startup\_action](#input\_vpn\_connection\_tunnel1\_startup\_action)| The action to take when the establishing the tunnel for the first VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for AWS to initiate the IKE negotiation. Valid values are add \| start. |`string`|`"add"`| no |
184
+
| <aname="input_vpn_connection_tunnel2_cloudwatch_log_enabled"></a> [vpn\_connection\_tunnel2\_cloudwatch\_log\_enabled](#input\_vpn\_connection\_tunnel2\_cloudwatch\_log\_enabled)| Enable or disable VPN tunnel logging feature for the tunnel |`bool`|`false`| no |
185
+
| <aname="input_vpn_connection_tunnel2_cloudwatch_log_output_format"></a> [vpn\_connection\_tunnel2\_cloudwatch\_log\_output\_format](#input\_vpn\_connection\_tunnel2\_cloudwatch\_log\_output\_format)| Set log format for the tunnel. Default format is json. Possible values are: json and text |`string`|`"json"`| no |
180
186
| <aname="input_vpn_connection_tunnel2_dpd_timeout_action"></a> [vpn\_connection\_tunnel2\_dpd\_timeout\_action](#input\_vpn\_connection\_tunnel2\_dpd\_timeout\_action)| The action to take after DPD timeout occurs for the second VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear \| none \| restart. |`string`|`"clear"`| no |
181
187
| <aname="input_vpn_connection_tunnel2_ike_versions"></a> [vpn\_connection\_tunnel2\_ike\_versions](#input\_vpn\_connection\_tunnel2\_ike\_versions)| The IKE versions that are permitted for the second VPN tunnel. Valid values are ikev1 \| ikev2. |`list(string)`|`[]`| no |
182
188
| <aname="input_vpn_connection_tunnel2_inside_cidr"></a> [vpn\_connection\_tunnel2\_inside\_cidr](#input\_vpn\_connection\_tunnel2\_inside\_cidr)| The CIDR block of the inside IP addresses for the second VPN tunnel |`string`|`null`| no |
| <aname="input_transit_gateway_routes"></a> [transit\_gateway\_routes](#input\_transit\_gateway\_routes)| A map of transit gateway routes to create on the given TGW route table (via `transit_gateway_route_table_id`) for the created VPN Attachment. Use the key in the map to describe the route. | <pre>map(object({<br> blackhole = optional(bool, false)<br> destination_cidr_block = string<br> }))</pre> |`{}`| no |
64
65
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The ID of the VPC to which the Virtual Private Gateway will be attached |`string`|`null`| no |
65
66
| <aname="input_vpn_connection_local_ipv4_network_cidr"></a> [vpn\_connection\_local\_ipv4\_network\_cidr](#input\_vpn\_connection\_local\_ipv4\_network\_cidr)| The IPv4 CIDR on the customer gateway (on-premises) side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
67
+
| <aname="input_vpn_connection_log_retention_in_days"></a> [vpn\_connection\_log\_retention\_in\_days](#input\_vpn\_connection\_log\_retention\_in\_days)| Specifies the number of days you want to retain log events. |`number`|`30`| no |
66
68
| <aname="input_vpn_connection_remote_ipv4_network_cidr"></a> [vpn\_connection\_remote\_ipv4\_network\_cidr](#input\_vpn\_connection\_remote\_ipv4\_network\_cidr)| The IPv4 CIDR on the AWS side of the VPN connection. |`string`|`"0.0.0.0/0"`| no |
67
69
| <aname="input_vpn_connection_static_routes_destinations"></a> [vpn\_connection\_static\_routes\_destinations](#input\_vpn\_connection\_static\_routes\_destinations)| List of CIDR blocks to be used as destination for static routes. Routes to destinations will be propagated to the route tables defined in `route_table_ids`|`list(string)`|`[]`| no |
68
70
| <aname="input_vpn_connection_static_routes_only"></a> [vpn\_connection\_static\_routes\_only](#input\_vpn\_connection\_static\_routes\_only)| If set to `true`, the VPN connection will use static routes exclusively. Static routes must be used for devices that don't support BGP |`bool`|`false`| no |
71
+
| <aname="input_vpn_connection_tunnel1_cloudwatch_log_enabled"></a> [vpn\_connection\_tunnel1\_cloudwatch\_log\_enabled](#input\_vpn\_connection\_tunnel1\_cloudwatch\_log\_enabled)| Enable or disable VPN tunnel logging feature for the tunnel |`bool`|`false`| no |
72
+
| <aname="input_vpn_connection_tunnel1_cloudwatch_log_output_format"></a> [vpn\_connection\_tunnel1\_cloudwatch\_log\_output\_format](#input\_vpn\_connection\_tunnel1\_cloudwatch\_log\_output\_format)| Set log format for the tunnel. Default format is json. Possible values are: json and text |`string`|`"json"`| no |
69
73
| <aname="input_vpn_connection_tunnel1_dpd_timeout_action"></a> [vpn\_connection\_tunnel1\_dpd\_timeout\_action](#input\_vpn\_connection\_tunnel1\_dpd\_timeout\_action)| The action to take after DPD timeout occurs for the first VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear \| none \| restart. |`string`|`"clear"`| no |
70
74
| <aname="input_vpn_connection_tunnel1_ike_versions"></a> [vpn\_connection\_tunnel1\_ike\_versions](#input\_vpn\_connection\_tunnel1\_ike\_versions)| The IKE versions that are permitted for the first VPN tunnel. Valid values are ikev1 \| ikev2. |`list(string)`|`[]`| no |
71
75
| <aname="input_vpn_connection_tunnel1_inside_cidr"></a> [vpn\_connection\_tunnel1\_inside\_cidr](#input\_vpn\_connection\_tunnel1\_inside\_cidr)| The CIDR block of the inside IP addresses for the first VPN tunnel |`string`|`null`| no |
@@ -77,6 +81,8 @@
77
81
| <aname="input_vpn_connection_tunnel1_phase2_integrity_algorithms"></a> [vpn\_connection\_tunnel1\_phase2\_integrity\_algorithms](#input\_vpn\_connection\_tunnel1\_phase2\_integrity\_algorithms)| One or more integrity algorithms that are permitted for the first VPN tunnel for phase 2 IKE negotiations. Valid values are SHA1 \| SHA2-256 \| SHA2-384 \| SHA2-512. |`list(string)`|`[]`| no |
78
82
| <aname="input_vpn_connection_tunnel1_preshared_key"></a> [vpn\_connection\_tunnel1\_preshared\_key](#input\_vpn\_connection\_tunnel1\_preshared\_key)| The preshared key of the first VPN tunnel. The preshared key must be between 8 and 64 characters in length and cannot start with zero. Allowed characters are alphanumeric characters, periods(.) and underscores(\_) |`string`|`null`| no |
79
83
| <aname="input_vpn_connection_tunnel1_startup_action"></a> [vpn\_connection\_tunnel1\_startup\_action](#input\_vpn\_connection\_tunnel1\_startup\_action)| The action to take when the establishing the tunnel for the first VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start for AWS to initiate the IKE negotiation. Valid values are add \| start. |`string`|`"add"`| no |
84
+
| <aname="input_vpn_connection_tunnel2_cloudwatch_log_enabled"></a> [vpn\_connection\_tunnel2\_cloudwatch\_log\_enabled](#input\_vpn\_connection\_tunnel2\_cloudwatch\_log\_enabled)| Enable or disable VPN tunnel logging feature for the tunnel |`bool`|`false`| no |
85
+
| <aname="input_vpn_connection_tunnel2_cloudwatch_log_output_format"></a> [vpn\_connection\_tunnel2\_cloudwatch\_log\_output\_format](#input\_vpn\_connection\_tunnel2\_cloudwatch\_log\_output\_format)| Set log format for the tunnel. Default format is json. Possible values are: json and text |`string`|`"json"`| no |
80
86
| <aname="input_vpn_connection_tunnel2_dpd_timeout_action"></a> [vpn\_connection\_tunnel2\_dpd\_timeout\_action](#input\_vpn\_connection\_tunnel2\_dpd\_timeout\_action)| The action to take after DPD timeout occurs for the second VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear \| none \| restart. |`string`|`"clear"`| no |
81
87
| <aname="input_vpn_connection_tunnel2_ike_versions"></a> [vpn\_connection\_tunnel2\_ike\_versions](#input\_vpn\_connection\_tunnel2\_ike\_versions)| The IKE versions that are permitted for the second VPN tunnel. Valid values are ikev1 \| ikev2. |`list(string)`|`[]`| no |
82
88
| <aname="input_vpn_connection_tunnel2_inside_cidr"></a> [vpn\_connection\_tunnel2\_inside\_cidr](#input\_vpn\_connection\_tunnel2\_inside\_cidr)| The CIDR block of the inside IP addresses for the second VPN tunnel |`string`|`null`| no |
description="The action to take after DPD timeout occurs for the first VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear | none | restart."
description="The action to take after DPD timeout occurs for the second VPN tunnel. Specify restart to restart the IKE initiation. Specify clear to end the IKE session. Valid values are clear | none | restart."
0 commit comments