terraform-provider-aws
terraform-provider-aws copied to clipboard
[Enhancement]: Add security_lake_organization_configuration
Description
When using Security Lake with an organization a user will want to be able to configure an organization configuration to centrally manage sources.
https://docs.aws.amazon.com/security-lake/latest/APIReference/API_CreateDataLakeOrganizationConfiguration.html
Affected Resource(s) and/or Data Source(s)
security_lake_organization_configuration
Potential Terraform Configuration
"security_lake_organization_configuration" "foo" {
region = us-east-1
sources = [
{
sourceName = foo
sourceVersion = "2.0"
}
{
sourceName = bar
sourceVersion = "2.0"
}
]
}
References
https://docs.aws.amazon.com/security-lake/latest/APIReference/API_CreateDataLakeOrganizationConfiguration.html
Would you like to implement a fix?
None
Community Note
Voting for Prioritization
- Please vote on this issue by adding a 👍 reaction to the original post to help the community and maintainers prioritize this request.
- Please see our prioritization guide for information on how we prioritize.
- Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.
Volunteering to Work on This Issue
- If you are interested in working on this issue, please leave a comment.
- If this would be your first contribution, please review the contribution guide.
This can be valuable to add as creating a data lake with the aws_securitylake_data_lake resource has the auto account enablement disabled which is unideal.
I would like to contribute and try to add this resource. I think an example resource will look something like this:
aws_securitylake_data_lake_organization_configuration {
region = 'us-west-2'
sources = [
{
sourceName = 'ROUTE53'
sourceVersion: '2.0'
},
{
sourceName = 'VPC_FLOW'
sourceVersion = '2.0'
},
]
}
Let me know if this format looks good and I will try to implement.
This can be valuable to add as creating a data lake with the aws_securitylake_data_lake resource has the auto account enablement disabled which is unideal.
I would like to contribute and try to add this resource. I think an example resource will look something like this:
aws_securitylake_data_lake_organization_configuration { region = 'us-west-2' sources = [ { sourceName = 'ROUTE53' sourceVersion: '2.0' }, { sourceName = 'VPC_FLOW' sourceVersion = '2.0' }, ] }Let me know if this format looks good and I will try to implement.
Yep that looks like what we need.