aws_cloudwatch_log_destination_policy
Provides a CloudWatch Logs destination policy resource.
Example Usage
resource "aws_cloudwatch_log_destination" "test_destination" { name = "test_destination" role_arn = "${aws_iam_role.iam_for_cloudwatch.arn}" target_arn = "${aws_kinesis_stream.kinesis_for_cloudwatch.arn}" } data "aws_iam_policy_document" "test_destination_policy" { statement { effect = "Allow" principals = { type = "AWS" identifiers = [ "123456789012", ] } actions = [ "logs:PutSubscriptionFilter", ] resources = [ "${aws_cloudwatch_log_destination.test_destination.arn}", ] } } resource "aws_cloudwatch_log_destination_policy" "test_destination_policy" { destination_name = "${aws_cloudwatch_log_destination.test_destination.name}" access_policy = "${data.aws_iam_policy_document.test_destination_policy.json}" }
Argument Reference
The following arguments are supported:
-
destination_name
- (Required) A name for the subscription filter -
access_policy
- (Required) The policy document. This is a JSON formatted string.
Import
CloudWatch Logs destination policies can be imported using the destination_name
, e.g.
$ terraform import aws_cloudwatch_log_destination_policy.test_destination_policy test_destination
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/aws/r/cloudwatch_log_destination_policy.html