Policy: AWS > VPC > VPC > Flow Logging > Cloud Watch > Role
The name of an IAM role that Flow Logging will assume to write logs to CloudWatch logs. If CloudWatch Log forwarding is enabled, you must also specify a role that CloudTrail can assume to write the logs. This role must have the correct access for the CloudWatch Log Group, and must allow the CloudTrail Service (cloudtrail.amazonaws.com) the ability to assume the role The role must already exist - the stack wont create it
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Default template |
|
Default template input |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/turbot
- tmod:@turbot/aws-vpc-core#/policy/types/vpcFlowLoggingCloudWatchRole
- turbot graphql policy-type --id "tmod:@turbot/aws-vpc-core#/policy/types/vpcFlowLoggingCloudWatchRole"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-vpc-core#/policy/types/vpcFlowLoggingCloudWatchRole"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI