Skip to main content

Module: datadog-lambda-forwarder

Terraform module to provision all the necessary infrastructure to deploy Datadog Lambda forwarders

Usage

For a complete example, see examples/complete.

For automated tests of the complete example using bats and Terratest (which tests and deploys the example on AWS), see test.

To enable Datadog forwarder for RDS Enhanced monitoring:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_rds_enabled = true
}

To enable Datadog forwarder for a CloudTrail S3 bucket:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_log_enabled = true
s3_buckets = ["cloudtrail-audit-bucket"]
s3_bucket_kms_arns = ["arn:aws:kms:us-west-2:1234567890:key/b204f3d2-1111-2222-94333332-4444ccc222"]
}

To enable Datadog forwarder for a S3 bucket with prefix:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_log_enabled = true
s3_buckets_with_prefixes = {
MyBucketWithPrefix = {bucket_name = "my-bucket-with-prefix", bucket_prefix = "events/"}
AnotherWithPrefix = {bucket_name = "another-with-prefix", bucket_prefix = "records/"}
}
s3_bucket_kms_arns = ["arn:aws:kms:us-west-2:1234567890:key/b204f3d2-1111-2222-94333332-4444ccc222"]
}

To enable Datadog forwarder for RDS authentication CloudWatch logs:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_log_enabled = true
cloudwatch_forwarder_log_groups = {
postgres = {
name = "/aws/rds/cluster/pg-main/postgresql"
filter_pattern = ""
}
}
}

To enable Datadog forwarder for VPC Flow Logs CloudWatch logs:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_vpc_logs_enabled = true
vpclogs_cloudwatch_log_group = "/aws/vpc/flowlogs/vpc1"
}

To use a local copy of the lambda code you can specify the artifact url:

module "datadog_lambda_forwarder" {
source = "cloudposse/datadog-lambda-forwarder/aws"
# Cloud Posse recommends pinning every module to a specific version
# version = "x.x.x"

forwarder_rds_enabled = true
forwarder_rds_artifact_url = file("${path.module}/function.zip")
}

Examples

Here is an example of using this module:

Requirements

NameVersion
terraform>= 1.3.0
archive>= 2.2.0
aws>= 3.0

Providers

NameVersion
archive>= 2.2.0
aws>= 3.0

Modules

NameSourceVersion
cloudwatch_eventcloudposse/cloudwatch-events/aws0.6.1
forwarder_log_artifactcloudposse/module-artifact/external0.8.0
forwarder_log_labelcloudposse/label/null0.25.0
forwarder_log_s3_labelcloudposse/label/null0.25.0
forwarder_rds_artifactcloudposse/module-artifact/external0.8.0
forwarder_rds_labelcloudposse/label/null0.25.0
forwarder_vpclogs_artifactcloudposse/module-artifact/external0.8.0
forwarder_vpclogs_labelcloudposse/label/null0.25.0
thiscloudposse/label/null0.25.0

Resources

NameType
aws_cloudwatch_log_group.forwarder_logresource
aws_cloudwatch_log_group.forwarder_rdsresource
aws_cloudwatch_log_group.forwarder_vpclogsresource
aws_cloudwatch_log_subscription_filter.cloudwatch_log_subscription_filterresource
aws_cloudwatch_log_subscription_filter.datadog_log_subscription_filter_rdsresource
aws_cloudwatch_log_subscription_filter.datadog_log_subscription_filter_vpclogsresource
aws_iam_policy.datadog_custom_policyresource
aws_iam_policy.lambda_forwarder_logresource
aws_iam_policy.lambda_forwarder_log_s3resource
aws_iam_policy.lambda_forwarder_rdsresource
aws_iam_policy.lambda_forwarder_vpclogsresource
aws_iam_role.lambda_forwarder_logresource
aws_iam_role.lambda_forwarder_rdsresource
aws_iam_role.lambda_forwarder_vpclogsresource
aws_iam_role_policy_attachment.datadog_s3resource
aws_iam_role_policy_attachment.lambda_forwarder_logresource
aws_iam_role_policy_attachment.lambda_forwarder_rdsresource
aws_iam_role_policy_attachment.lambda_forwarder_vpclogsresource
aws_lambda_function.forwarder_logresource
aws_lambda_function.forwarder_rdsresource
aws_lambda_function.forwarder_vpclogsresource
aws_lambda_permission.allow_eventbridgeresource
aws_lambda_permission.allow_s3_bucketresource
aws_lambda_permission.cloudwatch_enhanced_rds_monitoringresource
aws_lambda_permission.cloudwatch_groupsresource
aws_lambda_permission.cloudwatch_vpclogsresource
aws_s3_bucket_notification.s3_bucket_notificationresource
aws_s3_bucket_notification.s3_bucket_notification_with_prefixesresource
archive_file.forwarder_rdsdata source
archive_file.forwarder_vpclogsdata source
aws_caller_identity.currentdata source
aws_iam_policy_document.assume_roledata source
aws_iam_policy_document.lambda_defaultdata source
aws_iam_policy_document.s3_log_bucketdata source
aws_partition.currentdata source
aws_region.currentdata source
aws_ssm_parameter.api_keydata source

Inputs

NameDescriptionTypeDefaultRequired
additional_tag_mapAdditional key-value pairs to add to each map in tags_as_list_of_maps. Not added to tags or id.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration.
map(string){}no
api_key_ssm_arnARN of the SSM parameter for the Datadog API key.
Passing this removes the need to fetch the key from the SSM parameter store.
This could be the case if the SSM Key is in a different region than the lambda.
stringnullno
attributesID element. Additional attributes (e.g. workers or cluster) to add to id,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the delimiter
and treated as a single ID element.
list(string)[]no
cloudwatch_forwarder_event_patternsMap of title => CloudWatch Event patterns to forward to Datadog. Event structure from here: https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEventsandEventPatterns.html#CloudWatchEventsPatterns
Example:
hcl
cloudwatch_forwarder_event_rules = {
"guardduty" = {
source = ["aws.guardduty"]
detail-type = ["GuardDuty Finding"]
}
"ec2-terminated" = {
source = ["aws.ec2"]
detail-type = ["EC2 Instance State-change Notification"]
detail = {
state = ["terminated"]
}
}
}
map(object({
version = optional(list(string))
id = optional(list(string))
detail-type = optional(list(string))
source = optional(list(string))
account = optional(list(string))
time = optional(list(string))
region = optional(list(string))
resources = optional(list(string))
detail = optional(map(list(string)))
}))
{}no
cloudwatch_forwarder_log_groupsMap of CloudWatch Log Groups with a filter pattern that the Lambda forwarder will send logs from. For example: { mysql1 = { name = "/aws/rds/maincluster", filter_pattern = "" }
map(object({
name = string
filter_pattern = string
}))
{}no
contextSingle object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as null to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional_tag_map, which are merged.
any
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}
no
datadog_forwarder_lambda_environment_variablesMap of environment variables to pass to the Lambda Functionmap(string){}no
dd_api_key_kms_ciphertext_blobCiphertextBlob stored in environment variable DD_KMS_API_KEY used by the lambda function, along with the KMS key, to decrypt Datadog API keystring""no
dd_api_key_sourceOne of: ARN for AWS Secrets Manager (asm) to retrieve the Datadog (DD) api key, ARN for the KMS (kms) key used to decrypt the ciphertext_blob of the api key, or the name of the SSM (ssm) parameter used to retrieve the Datadog API key
object({
resource = string
identifier = string
})
{
"identifier": "",
"resource": ""
}
no
dd_artifact_filenameThe Datadog artifact filename minus extensionstring"aws-dd-forwarder"no
dd_forwarder_versionVersion tag of Datadog lambdas to use. https://github.com/DataDog/datadog-serverless-functions/releasesstring"3.39.0"no
dd_module_nameThe Datadog GitHub repository namestring"datadog-serverless-functions"no
dd_tagsA list of Datadog tags to apply to all logs forwarded to Datadoglist(string)[]no
dd_tags_mapA map of Datadog tags to apply to all logs forwarded to Datadog. This will override dd_tags.map(string){}no
delimiterDelimiter to be used between ID elements.
Defaults to - (hyphen). Set to "" to use no delimiter at all.
stringnullno
descriptor_formatsDescribe additional descriptors to be output in the descriptors output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
{<br/> format = string<br/> labels = list(string)<br/>}
(Type is any so the map values can later be enhanced to provide additional options.)
format is a Terraform format string to be passed to the format() function.
labels is a list of labels, in order, to pass to format() function.
Label values will be normalized before being passed to format() so they will be
identical to how they appear in id.
Default is {} (descriptors output will be empty).
any{}no
enabledSet to false to prevent the module from creating any resourcesboolnullno
environmentID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'stringnullno
forwarder_iam_pathPath to the IAM roles and policies createdstring"/"no
forwarder_lambda_datadog_hostDatadog Site to send data to. Possible values are datadoghq.com, datadoghq.eu, us3.datadoghq.com, us5.datadoghq.com and ddog-gov.comstring"datadoghq.com"no
forwarder_lambda_debug_enabledWhether to enable or disable debug for the Lambda forwarderboolfalseno
forwarder_log_artifact_urlThe URL for the code of the Datadog forwarder for Logs. It can be a local file, URL or git repostringnullno
forwarder_log_enabledFlag to enable or disable Datadog log forwarderboolfalseno
forwarder_log_layersList of Lambda Layer Version ARNs (maximum of 5) to attach to Datadog log forwarder lambda functionlist(string)[]no
forwarder_log_retention_daysNumber of days to retain Datadog forwarder lambda execution logs. One of [0 1 3 5 7 14 30 60 90 120 150 180 365 400 545 731 1827 3653]number14no
forwarder_rds_artifact_urlThe URL for the code of the Datadog forwarder for RDS. It can be a local file, url or git repostringnullno
forwarder_rds_enabledFlag to enable or disable Datadog RDS enhanced monitoring forwarderboolfalseno
forwarder_rds_filter_patternFilter pattern for Lambda forwarder RDSstring""no
forwarder_rds_layersList of Lambda Layer Version ARNs (maximum of 5) to attach to Datadog RDS enhanced monitoring lambda functionlist(string)[]no
forwarder_vpc_logs_artifact_urlThe URL for the code of the Datadog forwarder for VPC Logs. It can be a local file, url or git repostringnullno
forwarder_vpc_logs_enabledFlag to enable or disable Datadog VPC flow log forwarderboolfalseno
forwarder_vpc_logs_layersList of Lambda Layer Version ARNs (maximum of 5) to attach to Datadog VPC flow log forwarder lambda functionlist(string)[]no
forwarder_vpclogs_filter_patternFilter pattern for Lambda forwarder VPC Logsstring""no
id_length_limitLimit id to this many characters (minimum 6).
Set to 0 for unlimited length.
Set to null for keep the existing setting, which defaults to 0.
Does not affect id_full.
numbernullno
kms_key_idOptional KMS key ID to encrypt Datadog Lambda function logsstringnullno
label_key_caseControls the letter case of the tags keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the tags input.
Possible values: lower, title, upper.
Default value: title.
stringnullno
label_orderThe order in which the labels (ID elements) appear in the id.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present.
list(string)nullno
label_value_caseControls the letter case of ID elements (labels) as included in id,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the tags input.
Possible values: lower, title, upper and none (no transformation).
Set this to title and set delimiter to "" to yield Pascal Case IDs.
Default value: lower.
stringnullno
labels_as_tagsSet of labels (ID elements) to include as tags in the tags output.
Default is to include all labels.
Tags with empty values will not be included in the tags output.
Set to [] to suppress all generated tags.
Notes:
The value of the name tag, if included, will be the id, not the name.
Unlike other null-label inputs, the initial setting of labels_as_tags cannot be
changed in later chained modules. Attempts to change it will be silently ignored.
set(string)
[
"default"
]
no
lambda_custom_policy_nameAdditional IAM policy document that can optionally be passed and merged with the created policy documentstring"DatadogForwarderCustomPolicy"no
lambda_memory_sizeAmount of memory in MB your Lambda Function can use at runtimenumber128no
lambda_policy_source_jsonAdditional IAM policy document that can optionally be passed and merged with the created policy documentstring""no
lambda_reserved_concurrent_executionsAmount of reserved concurrent executions for the lambda function. A value of 0 disables Lambda from being triggered and -1 removes any concurrency limitations. Defaults to Unreserved Concurrency Limits -1number-1no
lambda_runtimeRuntime environment for Datadog Lambdastring"python3.11"no
lambda_timeoutAmount of time your Datadog Lambda Function has to run in secondsnumber120no
log_permissions_boundaryARN of the policy that is used to set the permissions boundary for the lambda-log role managed by this module.stringnullno
nameID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a tag.
The "name" tag is set to the full id string. There is no tag with the value of the name input.
stringnullno
namespaceID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally uniquestringnullno
rds_permissions_boundaryARN of the policy that is used to set the permissions boundary for the lambda-rds role managed by this module.stringnullno
regex_replace_charsTerraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, "/[^a-zA-Z0-9-]/" is used to remove all characters other than hyphens, letters and digits.
stringnullno
s3_bucket_kms_arnsList of KMS key ARNs for s3 bucket encryptionlist(string)[]no
s3_bucketsThe names of S3 buckets to forward logs to Datadoglist(string)[]no
s3_buckets_with_prefixesThe names S3 buckets and prefix to forward logs to Datadogmap(object({ bucket_name : string, bucket_prefix : string })){}no
security_group_idsList of security group IDs to use when the Lambda Function runs in a VPClist(string)nullno
stageID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'stringnullno
subnet_idsList of subnet IDs to use when deploying the Lambda Function in a VPClist(string)nullno
tagsAdditional tags (e.g. {'BusinessUnit': 'XYZ'}).
Neither the tag keys nor the tag values will be modified by this module.
map(string){}no
tenantID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is forstringnullno
tracing_config_modeCan be either PassThrough or Active. If PassThrough, Lambda will only trace the request from an upstream service if it contains a tracing header with 'sampled=1'. If Active, Lambda will respect any tracing header it receives from an upstream servicestring"PassThrough"no
vpc_logs_permissions_boundaryARN of the policy that is used to set the permissions boundary for the lambda-vpc-logs role managed by this module.stringnullno
vpclogs_cloudwatch_log_groupThe name of the CloudWatch Log Group for VPC flow logsstringnullno

Outputs

NameDescription
lambda_forwarder_log_function_arnDatadog Lambda forwarder CloudWatch/S3 function ARN
lambda_forwarder_log_function_nameDatadog Lambda forwarder CloudWatch/S3 function name
lambda_forwarder_rds_enhanced_monitoring_function_nameDatadog Lambda forwarder RDS Enhanced Monitoring function name
lambda_forwarder_rds_function_arnDatadog Lambda forwarder RDS Enhanced Monitoring function ARN
lambda_forwarder_vpc_log_function_arnDatadog Lambda forwarder VPC Flow Logs function ARN
lambda_forwarder_vpc_log_function_nameDatadog Lambda forwarder VPC Flow Logs function name