diff --git a/README.md b/README.md
index 40641e8a..e5c4e2e4 100644
--- a/README.md
+++ b/README.md
@@ -262,6 +262,7 @@ Available targets:
| [bucket\_region](#output\_bucket\_region) | Bucket region |
| [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name |
| [enabled](#output\_enabled) | Is module enabled |
+| [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role |
| [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text |
| [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user |
| [user\_enabled](#output\_user\_enabled) | Is user creation enabled |
@@ -278,6 +279,7 @@ Like this project? Please give it a ★ on [our GitHub](https://github.com/cloud
Are you using this project or any of our other projects? Consider [leaving a testimonial][testimonial]. =)
+
## Related Projects
Check out these related projects.
@@ -289,8 +291,6 @@ Check out these related projects.
- [terraform-aws-lb-s3-bucket](https://github.com/cloudposse/terraform-aws-lb-s3-bucket) - Terraform module to provision an S3 bucket with built in IAM policy to allow AWS Load Balancers to ship access logs
- [terraform-aws-s3-log-storage](https://github.com/cloudposse/terraform-aws-s3-log-storage) - Terraform module creates an S3 bucket suitable for receiving logs from other AWS services such as S3, CloudFront, and CloudTrail
-
-
## Help
**Got a question?** We got answers.
diff --git a/docs/terraform.md b/docs/terraform.md
index 1d2274ea..f12ac41a 100644
--- a/docs/terraform.md
+++ b/docs/terraform.md
@@ -90,6 +90,7 @@
| [bucket\_region](#output\_bucket\_region) | Bucket region |
| [bucket\_regional\_domain\_name](#output\_bucket\_regional\_domain\_name) | The bucket region-specific domain name |
| [enabled](#output\_enabled) | Is module enabled |
+| [replication\_role\_arn](#output\_replication\_role\_arn) | The ARN of the replication IAM Role |
| [secret\_access\_key](#output\_secret\_access\_key) | The secret access key. This will be written to the state file in plain-text |
| [user\_arn](#output\_user\_arn) | The ARN assigned by AWS for the user |
| [user\_enabled](#output\_user\_enabled) | Is user creation enabled |
diff --git a/outputs.tf b/outputs.tf
index f02f4207..a657a4af 100644
--- a/outputs.tf
+++ b/outputs.tf
@@ -48,6 +48,11 @@ output "user_unique_id" {
description = "The user unique ID assigned by AWS"
}
+output "replication_role_arn" {
+ value = module.this.enabled && var.s3_replication_enabled ? join("", aws_iam_role.replication.*.arn) : ""
+ description = "The ARN of the replication IAM Role"
+}
+
output "access_key_id" {
sensitive = true
value = module.s3_user.access_key_id