65aa02b6df
When you need to enable monitoring for Redshift, you need to create the correct policy in the bucket for logging. This needs to have the Redshift Account ID for a given region. This data source provides a handy lookup for this http://docs.aws.amazon.com/redshift/latest/mgmt/db-auditing.html#db-auditing-enable-logging % make testacc TEST=./builtin/providers/aws % TESTARGS='-run=TestAccAWSRedshiftAccountId_basic' 2 ↵ ✹ ✭ ==> Checking that code complies with gofmt requirements... /Users/stacko/Code/go/bin/stringer go generate $(go list ./... | grep -v /terraform/vendor/) 2016/08/16 14:39:35 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSRedshiftAccountId_basic -timeout 120m === RUN TestAccAWSRedshiftAccountId_basic --- PASS: TestAccAWSRedshiftAccountId_basic (19.47s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 19.483s |
||
---|---|---|
.. | ||
archive | ||
atlas | ||
aws | ||
azure | ||
azurerm | ||
chef | ||
clc | ||
cloudflare | ||
cloudstack | ||
cobbler | ||
consul | ||
datadog | ||
digitalocean | ||
dme | ||
dnsimple | ||
docker | ||
dyn | ||
fastly | ||
github | ||
grafana | ||
heroku | ||
influxdb | ||
librato | ||
logentries | ||
mailgun | ||
mysql | ||
null | ||
openstack | ||
packet | ||
postgresql | ||
powerdns | ||
random | ||
rundeck | ||
scaleway | ||
softlayer | ||
statuscake | ||
template | ||
terraform | ||
test | ||
tls | ||
triton | ||
ultradns | ||
vcd | ||
vsphere |