Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ provider "aws" {
}

module "fleet_log_sharing_target" {
source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0"
source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1"

providers = {
aws.destination = aws.source_region
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ provider "aws" {
}

module "fleet_log_sharing_target" {
source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.0"
source = "github.com/fleetdm/fleet-terraform//addons/byo-cloudwatch-log-sharing/target-account-firehose?depth=1&ref=tf-mod-addon-byo-cloudwatch-log-sharing-v1.0.1"

providers = {
aws.destination = aws.source_region
Expand Down Expand Up @@ -71,9 +71,9 @@ Then apply the source account module (`../cloudwatch`) using `module.fleet_log_s

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.29.0 |
| <a name="provider_aws.destination"></a> [aws.destination](#provider\_aws.destination) | >= 5.29.0 |
| <a name="provider_aws.target"></a> [aws.target](#provider\_aws.target) | >= 5.29.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |
| <a name="provider_aws.destination"></a> [aws.destination](#provider\_aws.destination) | 6.41.0 |
| <a name="provider_aws.target"></a> [aws.target](#provider\_aws.target) | 6.41.0 |

## Modules

Expand Down
2 changes: 1 addition & 1 deletion addons/byo-file-carving/target-account/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | n/a |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,13 +13,13 @@ If you wanted to make changes to the individual files to fit your environment, f
```
module "firehose_logging" {
source = "github.com/fleetdm/fleet-terraform//addons/byo-firehose-logging-destination/target-account"

# Variables
osquery_logging_destination_bucket_name = {your-desired-bucket-prefix}
fleet_iam_role_arn = {supplied by Fleet}
sts_external_id = {if using}
}
```

## Requirements

| Name | Version |
Expand All @@ -31,7 +31,7 @@ module "firehose_logging" {

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.29.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down Expand Up @@ -64,9 +64,9 @@ No modules.

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_fleet_iam_role_arn"></a> [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | the arn of the fleet role that firehose will assume to write data to your bucket | `string` | n/a | yes |
| <a name="input_fleet_iam_role_arn"></a> [fleet\_iam\_role\_arn](#input\_fleet\_iam\_role\_arn) | The ARN of the IAM role that will be assumed to gain permissions required to write to the Kinesis Firehose delivery stream. | `string` | n/a | yes |
| <a name="input_kms_key_arn"></a> [kms\_key\_arn](#input\_kms\_key\_arn) | An optional KMS key ARN for server-side encryption. If not provided and encryption is enabled, a new key will be created. | `string` | `""` | no |
| <a name="input_log_destinations"></a> [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. | <pre>map(object({<br> name = string<br> prefix = string<br> error_output_prefix = string<br> buffering_size = number<br> buffering_interval = number<br> compression_format = string<br> }))</pre> | <pre>{<br> "audit": {<br> "buffering_interval": 120,<br> "buffering_size": 20,<br> "compression_format": "UNCOMPRESSED",<br> "error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br> "name": "fleet_audit",<br> "prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br> },<br> "results": {<br> "buffering_interval": 120,<br> "buffering_size": 20,<br> "compression_format": "UNCOMPRESSED",<br> "error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br> "name": "osquery_results",<br> "prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br> },<br> "status": {<br> "buffering_interval": 120,<br> "buffering_size": 20,<br> "compression_format": "UNCOMPRESSED",<br> "error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br> "name": "osquery_status",<br> "prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br> }<br>}</pre> | no |
| <a name="input_log_destinations"></a> [log\_destinations](#input\_log\_destinations) | A map of configurations for Firehose delivery streams. | <pre>map(object({<br/> name = string<br/> prefix = string<br/> error_output_prefix = string<br/> buffering_size = number<br/> buffering_interval = number<br/> compression_format = string<br/> }))</pre> | <pre>{<br/> "audit": {<br/> "buffering_interval": 120,<br/> "buffering_size": 20,<br/> "compression_format": "UNCOMPRESSED",<br/> "error_output_prefix": "audit/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br/> "name": "fleet_audit",<br/> "prefix": "audit/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br/> },<br/> "results": {<br/> "buffering_interval": 120,<br/> "buffering_size": 20,<br/> "compression_format": "UNCOMPRESSED",<br/> "error_output_prefix": "results/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br/> "name": "osquery_results",<br/> "prefix": "results/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br/> },<br/> "status": {<br/> "buffering_interval": 120,<br/> "buffering_size": 20,<br/> "compression_format": "UNCOMPRESSED",<br/> "error_output_prefix": "status/error/error=!{firehose:error-output-type}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/",<br/> "name": "osquery_status",<br/> "prefix": "status/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/"<br/> }<br/>}</pre> | no |
| <a name="input_osquery_logging_destination_bucket_name"></a> [osquery\_logging\_destination\_bucket\_name](#input\_osquery\_logging\_destination\_bucket\_name) | name of the bucket to store osquery results & status logs | `string` | n/a | yes |
| <a name="input_server_side_encryption_enabled"></a> [server\_side\_encryption\_enabled](#input\_server\_side\_encryption\_enabled) | A boolean flag to enable/disable server-side encryption. Defaults to true (enabled). | `bool` | `true` | no |
| <a name="input_sts_external_id"></a> [sts\_external\_id](#input\_sts\_external\_id) | Optional unique identifier that can be used by the principal assuming the role to assert its identity. | `string` | `""` | no |
Expand Down
4 changes: 2 additions & 2 deletions addons/logging-destination-datadog/.header.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad

```hcl
module "datadog-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2"

datadog_api_key = "your-datadog-api-key"

Expand Down Expand Up @@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down
6 changes: 3 additions & 3 deletions addons/logging-destination-datadog/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Datad

```hcl
module "datadog-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-logging-destination-datadog-v1.1.1"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-datadog?ref=tf-mod-addon-datadog-logging-v1.1.2"

datadog_api_key = "your-datadog-api-key"

Expand Down Expand Up @@ -82,7 +82,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.15.2"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down Expand Up @@ -121,7 +121,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.24.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
2 changes: 1 addition & 1 deletion addons/logging-destination-firehose/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.24.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
4 changes: 2 additions & 2 deletions addons/logging-destination-snowflake/.header.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf

```hcl
module "snowflake-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3"

s3_bucket_config = {
name_prefix = "fleet-snowflake-failure"
Expand Down Expand Up @@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down
6 changes: 3 additions & 3 deletions addons/logging-destination-snowflake/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Snowf

```hcl
module "snowflake-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.2"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-snowflake?depth=1&ref=tf-mod-addon-logging-destination-snowflake-v1.0.3"

s3_bucket_config = {
name_prefix = "fleet-snowflake-failure"
Expand Down Expand Up @@ -78,7 +78,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down Expand Up @@ -117,7 +117,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.24.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
4 changes: 2 additions & 2 deletions addons/logging-destination-splunk/.header.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun

```hcl
module "splunk-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1"

s3_bucket_config = {
name_prefix = "fleet-splunk-failure"
Expand Down Expand Up @@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down
6 changes: 3 additions & 3 deletions addons/logging-destination-splunk/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This addon configures AWS Kinesis Firehose to send Fleet's osquery logs to Splun

```hcl
module "splunk-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.0"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-splunk?depth=1&ref=tf-mod-addon-logging-destination-splunk-v1.0.1"

s3_bucket_config = {
name_prefix = "fleet-splunk-failure"
Expand Down Expand Up @@ -58,7 +58,7 @@ Then you can use the module's outputs in your Fleet configuration:

```hcl
module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.16.4"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
certificate_arn = module.acm.acm_certificate_arn

vpc = {
Expand Down Expand Up @@ -97,7 +97,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.25.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
4 changes: 2 additions & 2 deletions addons/okta-conditional-access/.header.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" {
}

module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
...
fleet_config = {
...
Expand All @@ -86,7 +86,7 @@ module "fleet" {
}

module "okta-conditional-access" {
source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0"
source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1"
customer_prefix = "fleet"
vpc_id = module.fleet.vpc.vpc_id
trust_store_s3_config = {
Expand Down
6 changes: 3 additions & 3 deletions addons/okta-conditional-access/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ resource "aws_route53_record" "okta" {
}

module "fleet" {
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.19.0"
source = "github.com/fleetdm/fleet-terraform?depth=1&ref=tf-mod-root-v1.26.1"
...
fleet_config = {
...
Expand All @@ -86,7 +86,7 @@ module "fleet" {
}

module "okta-conditional-access" {
source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.0"
source = "github.com/fleetdm/fleet-terraform/addons/okta-conditional-access?depth=1&ref=tf-mod-addon-okta-conditional-access-v0.5.1"
customer_prefix = "fleet"
vpc_id = module.fleet.vpc.vpc_id
trust_store_s3_config = {
Expand Down Expand Up @@ -126,7 +126,7 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.28.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
2 changes: 1 addition & 1 deletion addons/osquery-carve/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ When bringing your own KMS key, it is your responsibility to ensure that key pol

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.39.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |

## Modules

Expand Down
16 changes: 8 additions & 8 deletions byo-vpc/example/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,33 +2,33 @@

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.8 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | 6.11.0 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.11.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.11.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.41.0 |
| <a name="provider_random"></a> [random](#provider\_random) | 3.8.1 |

## Modules

| Name | Source | Version |
|------|--------|---------|
| <a name="module_acm"></a> [acm](#module\_acm) | terraform-aws-modules/acm/aws | 4.3.1 |
| <a name="module_byo-vpc"></a> [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.22.1 | n/a |
| <a name="module_firehose-logging"></a> [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1 | n/a |
| <a name="module_migrations"></a> [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1 | n/a |
| <a name="module_byo-vpc"></a> [byo-vpc](#module\_byo-vpc) | github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1 | n/a |
| <a name="module_firehose-logging"></a> [firehose-logging](#module\_firehose-logging) | github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6 | n/a |
| <a name="module_migrations"></a> [migrations](#module\_migrations) | github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2 | n/a |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | 5.1.2 |

## Resources

| Name | Type |
|------|------|
| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/resources/route53_record) | resource |
| [aws_route53_record.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource |
| [random_pet.main](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) | resource |
| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/6.11.0/docs/data-sources/route53_zone) | data source |
| [aws_route53_zone.main](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source |

## Inputs

Expand Down
7 changes: 4 additions & 3 deletions byo-vpc/example/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ data "aws_route53_zone" "main" {
}

module "firehose-logging" {
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.1.1"
source = "github.com/fleetdm/fleet-terraform//addons/logging-destination-firehose?depth=1&ref=tf-mod-addon-logging-destination-firehose-v1.2.6"
osquery_results_s3_bucket = {
name = "${random_pet.main.id}-results"
}
Expand Down Expand Up @@ -92,7 +92,7 @@ module "vpc" {
}

module "byo-vpc" {
source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.0"
source = "github.com/fleetdm/fleet-terraform//byo-vpc?depth=1&ref=tf-mod-byo-vpc-v1.27.1"
vpc_config = {
vpc_id = module.vpc.vpc_id
networking = {
Expand Down Expand Up @@ -167,7 +167,7 @@ module "byo-vpc" {
}

module "migrations" {
source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.0.1"
source = "github.com/fleetdm/fleet-terraform/addons/migrations?depth=1&ref=tf-mod-addon-migrations-v2.2.2"
ecs_cluster = module.byo-vpc.byo-db.byo-ecs.service.cluster
task_definition = module.byo-vpc.byo-db.byo-ecs.task_definition.family
task_definition_revision = module.byo-vpc.byo-db.byo-ecs.task_definition.revision
Expand All @@ -176,4 +176,5 @@ module "migrations" {
ecs_service = module.byo-vpc.byo-db.byo-ecs.service.name
desired_count = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity
min_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.min_capacity
max_capacity = module.byo-vpc.byo-db.byo-ecs.appautoscaling_target.max_capacity
}
Loading
Loading