Google Cloud (Stackdriver) Logging Folder Sink

This page shows how to write Terraform for Cloud (Stackdriver) Logging Folder Sink and write them securely.

google_logging_folder_sink (Terraform)

The Folder Sink in Cloud (Stackdriver) Logging can be configured in Terraform with the resource name google_logging_folder_sink. The following sections describe 4 examples of how to use the resource and its parameters.

Example Usage from GitHub

main.tf#L9
resource "google_logging_folder_sink" "folder_sink_good_1" {
  name   = "my-sink"
  description = "some explaination on what this is"
  folder = "folder-name"
  destination = google_storage_bucket.log_bucket_good.name
  filter = "resource.type = gce_instance AND severity >= WARNING"
main.tf#L9
resource "google_logging_folder_sink" "folder_sink_good_1" {
  name   = "my-sink"
  description = "some explaination on what this is"
  folder = "folder-name"
  destination = google_storage_bucket.log_bucket_good.name
  filter = "resource.type = gce_instance AND severity >= WARNING"
logging_folder_sink_test.tf#L6
resource "google_logging_folder_sink" "basic" {
  name        = "my-sink"
  description = "what it is"
  folder      = "fake"

  destination = "storage.googleapis.com/fake"
logging_folder_sink_test.tf#L6
resource "google_logging_folder_sink" "basic" {
  name        = "my-sink"
  description = "what it is"
  folder      = "fake"

  destination = "storage.googleapis.com/fake"

Review your Terraform file for Google best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Parameters

A description of this sink. The maximum length of the description is 8000 characters.

The destination of the sink (or, in other words, where logs are written to). Can be a Cloud Storage bucket, a PubSub topic, or a BigQuery dataset. Examples: "storage.googleapis.com/[GCS_BUCKET]" "bigquery.googleapis.com/projects/[PROJECT_ID]/datasets/[DATASET]" "pubsub.googleapis.com/projects/[PROJECT_ID]/topics/[TOPIC_ID]" The writer associated with the sink must have access to write to the above resource.

If set to True, then this sink is disabled and it does not export any log entries.

The filter to apply when exporting logs. Only log entries that match the filter are exported.

The folder to be exported to the sink. Note that either [FOLDER_ID] or "folders/[FOLDER_ID]" is accepted.

Whether or not to include children folders in the sink export. If true, logs associated with child projects are also exported; otherwise only logs relating to the provided folder are included.

The name of the logging sink.

The identity associated with this sink. This identity must be granted write access to the configured destination.

  • bigquery_options list block

    Whether to use BigQuery's partition tables. By default, Logging creates dated tables based on the log entries' timestamps, e.g. syslog_20170523. With partitioned tables the date suffix is no longer present and special query syntax has to be used instead. In both cases, tables are sharded based on UTC timezone.

  • exclusions list block

    A description of this exclusion.

    If set to True, then this exclusion is disabled and it does not exclude any log entries

    An advanced logs filter that matches the log entries to be excluded. By using the sample function, you can exclude less than 100% of the matching log entries

    A client-assigned identifier, such as "load-balancer-exclusion". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods. First character has to be alphanumeric.

Explanation in Terraform Registry

Manages a folder-level logging sink. For more information see:

Frequently asked questions

What is Google Cloud (Stackdriver) Logging Folder Sink?

Google Cloud (Stackdriver) Logging Folder Sink is a resource for Cloud (Stackdriver) Logging of Google Cloud Platform. Settings can be wrote in Terraform.

Where can I find the example code for the Google Cloud (Stackdriver) Logging Folder Sink?

For Terraform, the SnidermanIndustries/checkov-fork, melscoop-test/check and gilyas/infracost source code examples are useful. See the Terraform Example section for further details.

security-icon

Automate config file reviews on your commits

Fix issues in your infrastructure as code with auto-generated patches.