From 59a6e97b190d866b3362037826e1ae9910ef1d9e Mon Sep 17 00:00:00 2001 From: badra001 Date: Fri, 6 May 2022 19:23:31 -0400 Subject: [PATCH] comment logging --- terraform-state/README.md | 1 - terraform-state/main.tf | 10 +++++----- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/terraform-state/README.md b/terraform-state/README.md index 9fa6d6e..8efda6e 100644 --- a/terraform-state/README.md +++ b/terraform-state/README.md @@ -80,7 +80,6 @@ No modules. | [aws_kms_key.tfstate_key](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/kms_key) | resource | | [aws_s3_bucket.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource | | [aws_s3_bucket_acl.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_acl) | resource | -| [aws_s3_bucket_logging.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_logging) | resource | | [aws_s3_bucket_ownership_controls.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_ownership_controls) | resource | | [aws_s3_bucket_public_access_block.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block) | resource | | [aws_s3_bucket_server_side_encryption_configuration.tfstate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_server_side_encryption_configuration) | resource | diff --git a/terraform-state/main.tf b/terraform-state/main.tf index 6bc55d5..fcabe27 100644 --- a/terraform-state/main.tf +++ b/terraform-state/main.tf @@ -133,11 +133,11 @@ resource "aws_s3_bucket_public_access_block" "tfstate" { restrict_public_buckets = true } -resource "aws_s3_bucket_logging" "tfstate" { - bucket = aws_s3_bucket.tfstate.id - target_bucket = var.access_log_bucket - target_prefix = format("%s/%s/", var.access_log_bucket_prefix, local.bucket_name) -} +# resource "aws_s3_bucket_logging" "tfstate" { +# bucket = aws_s3_bucket.tfstate.id +# target_bucket = var.access_log_bucket +# target_prefix = format("%s/%s/", var.access_log_bucket_prefix, local.bucket_name) +# } resource "aws_s3_bucket_server_side_encryption_configuration" "tfstate" { bucket = aws_s3_bucket.tfstate.id