From 6175e16f2b1ed146271de1c33002d19939bf8a3a Mon Sep 17 00:00:00 2001 From: prashansa joshi Date: Thu, 7 Nov 2024 14:40:14 +0545 Subject: [PATCH] Changed the secrets manager name --- root_infra/README.md | 43 +++++++++++++++++++++++++++++++++++++++++++ terraform/locals.tf | 2 +- terraform/prod.tfvars | 10 +++++----- 3 files changed, 49 insertions(+), 6 deletions(-) create mode 100644 root_infra/README.md diff --git a/root_infra/README.md b/root_infra/README.md new file mode 100644 index 0000000..1722394 --- /dev/null +++ b/root_infra/README.md @@ -0,0 +1,43 @@ + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | ~> 1.0 | +| [aws](#requirement\_aws) | ~> 5.0 | + +## Providers + +No providers. + +## Modules + +| Name | Source | Version | +|------|--------|---------| +| [naming](#module\_naming) | ./modules/terraform-naming-convention-module | n/a | +| [terraform\_state\_backend](#module\_terraform\_state\_backend) | ./modules/terraform-aws-tfstate-backend-module | n/a | + +## Resources + +No resources. + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [block\_public\_acls](#input\_block\_public\_acls) | Whether Amazon S3 should block public ACLs for this bucket. | `bool` | n/a | yes | +| [block\_public\_policy](#input\_block\_public\_policy) | Whether Amazon S3 should block public bucket policies for this bucket. | `bool` | n/a | yes | +| [bucket\_replication\_enabled](#input\_bucket\_replication\_enabled) | Enable/Disable replica for S3 bucket (for cross region replication purpose) | `bool` | n/a | yes | +| [enable\_server\_side\_encryption](#input\_enable\_server\_side\_encryption) | Enable DynamoDB server-side encryption | `bool` | n/a | yes | +| [enforce\_ssl\_requests](#input\_enforce\_ssl\_requests) | Enable/Disable replica for S3 bucket (for cross region replication purpose) | `bool` | n/a | yes | +| [environment](#input\_environment) | Environment, e.g. 'prod', 'staging', 'dev', 'pre-prod', 'UAT' | `string` | n/a | yes | +| [name](#input\_name) | Solution name, e.g. 'app' or 'jenkins' | `string` | n/a | yes | +| [namespace](#input\_namespace) | Namespace, which could be your organization name or abbreviation, e.g. 'eg' or 'cp' | `string` | n/a | yes | +| [naming\_environment](#input\_naming\_environment) | Name of the environment | `string` | n/a | yes | +| [region](#input\_region) | Region be used for all the resources | `string` | n/a | yes | +| [restrict\_public\_buckets](#input\_restrict\_public\_buckets) | Whether Amazon S3 should restrict public bucket policies for this bucket. | `bool` | n/a | yes | + +## Outputs + +No outputs. + diff --git a/terraform/locals.tf b/terraform/locals.tf index 2861738..cf600b4 100644 --- a/terraform/locals.tf +++ b/terraform/locals.tf @@ -44,7 +44,7 @@ locals { ### secrets_manager secrets_manager = { - name_prefix = "${var.naming_environment}-elasticbeanstalk-rds-secrets" + name_prefix = "${var.naming_environment}-eb-rds-secrets" description = "Secrets Manager secret for RDS database" region = var.region enable_rotation = false diff --git a/terraform/prod.tfvars b/terraform/prod.tfvars index 50bdd04..00eea68 100644 --- a/terraform/prod.tfvars +++ b/terraform/prod.tfvars @@ -13,11 +13,11 @@ load_balancer_type = "application" enable_cross_zone_load_balancing = true enable_deletion_protection = false # private_subnets = ["subnet-094222bc07bb63e74", "subnet-0a6f15fc861987834"] -backend_port = 80 -backend_protocol = "HTTP" -target_group_index = 0 -target_type = "instance" -create_attachment = false +backend_port = 80 +backend_protocol = "HTTP" +target_group_index = 0 +target_type = "instance" +create_attachment = false ## Variables for Elastic Beanstalk Environment