@@ -16,7 +16,7 @@ module "labels" {
16
16
}
17
17
18
18
resource "aws_s3_bucket" "bucket" {
19
- count = var. enabled ? 1 : 0
19
+ count = var. enabled && var . only_guardduty_enable ? 1 : 0
20
20
bucket = var. bucket_name
21
21
acl = " private"
22
22
force_destroy = true
@@ -46,7 +46,7 @@ resource "aws_guardduty_invite_accepter" "member_accepter" {
46
46
}
47
47
48
48
resource "aws_s3_bucket_object" "ipset" {
49
- count = var. enabled ? 1 : 0
49
+ count = var. enabled && var . only_guardduty_enable ? 1 : 0
50
50
acl = " private"
51
51
content = templatefile (" ${ path . module } /templates/ipset.txt.tpl" ,
52
52
{ ipset_iplist = var.ipset_iplist })
@@ -61,12 +61,12 @@ resource "aws_guardduty_ipset" "ipset" {
61
61
activate = var. ipset_activate
62
62
detector_id = join (" " , aws_guardduty_detector. detector . * . id )
63
63
format = var. ipset_format
64
- location = " https://s3.amazonaws.com/${ join (" " , aws_s3_bucket_object. ipset . * . bucket )} /${ join (" " , aws_s3_bucket_object. ipset . * . key )} "
64
+ location = var . ipset_location == " " ? " https://s3.amazonaws.com/${ join (" " , aws_s3_bucket_object. ipset . * . bucket )} /${ join (" " , aws_s3_bucket_object. ipset . * . key )} " : var . ipset_location
65
65
name = format (" %s-ipset" , module. labels . id )
66
66
}
67
67
68
68
resource "aws_s3_bucket_object" "threatintelset" {
69
- count = var. enabled ? 1 : 0
69
+ count = var. enabled && var . only_guardduty_enable ? 1 : 0
70
70
acl = " private"
71
71
content = templatefile (" ${ path . module } /templates/threatintelset.txt.tpl" ,
72
72
{ threatintelset_iplist = var.threatintelset_iplist })
@@ -81,7 +81,7 @@ resource "aws_guardduty_threatintelset" "threatintelset" {
81
81
activate = var. threatintelset_activate
82
82
detector_id = join (" " , aws_guardduty_detector. detector . * . id )
83
83
format = var. threatintelset_format
84
- location = " https://s3.amazonaws.com/${ join (" " , aws_s3_bucket_object. threatintelset . * . bucket )} /${ join (" " , aws_s3_bucket_object. threatintelset . * . key )} "
84
+ location = var . threatintelset_iplist_location == " " ? " https://s3.amazonaws.com/${ join (" " , aws_s3_bucket_object. threatintelset . * . bucket )} /${ join (" " , aws_s3_bucket_object. threatintelset . * . key )} " : var . threatintelset_iplist_location
85
85
name = format (" %s-threat" , module. labels . id )
86
86
}
87
87
@@ -98,7 +98,7 @@ resource "aws_guardduty_member" "member" {
98
98
# Module : CLOUD WATCH EVENT RULE
99
99
# Description : Event rule for cloud watch events.
100
100
resource "aws_cloudwatch_event_rule" "default" {
101
- count = var. enabled ? 1 : 0
101
+ count = var. enabled && var . only_guardduty_enable ? 1 : 0
102
102
name = format (" %s-er" , module. labels . id )
103
103
description = " Event rule for AWS Guarddduty."
104
104
role_arn = var. rule_iam_role_arn
@@ -120,7 +120,7 @@ resource "aws_cloudwatch_event_rule" "default" {
120
120
# Module : CLOUD WATCH EVENT TARGET
121
121
# Description : Attaching event rule and lambda function to targets.
122
122
resource "aws_cloudwatch_event_target" "default" {
123
- count = var. enabled ? 1 : 0
123
+ count = var. enabled && var . only_guardduty_enable ? 1 : 0
124
124
rule = join (" " , aws_cloudwatch_event_rule. default . * . name )
125
125
target_id = " Guardduty"
126
126
arn = module. slack-lambda . arn # ARN of the Lambda Function, write after including lambda function
@@ -136,7 +136,7 @@ module "slack-lambda" {
136
136
environment = var. environment
137
137
label_order = [" name" ]
138
138
managedby = var. managedby
139
- enabled = var. enabled
139
+ enabled = var. enabled && var . only_guardduty_enable
140
140
141
141
filename = format (" %s/slack" , path. module )
142
142
handler = " index.handler"
0 commit comments