-
-
Notifications
You must be signed in to change notification settings - Fork 575
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Mehmet Gungoren <[email protected]>
- Loading branch information
Showing
5 changed files
with
460 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,78 @@ | ||
# PostgreSQL Example | ||
|
||
Configuration in this directory creates a PostgreSQL Aurora cluster. | ||
|
||
## Usage | ||
|
||
To run this example you need to execute: | ||
|
||
```bash | ||
$ terraform init | ||
$ terraform plan | ||
$ terraform apply | ||
``` | ||
|
||
Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources. | ||
|
||
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK --> | ||
## Requirements | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 | | ||
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.37 | | ||
|
||
## Providers | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.37 | | ||
|
||
## Modules | ||
|
||
| Name | Source | Version | | ||
|------|--------|---------| | ||
| <a name="module_aurora"></a> [aurora](#module\_aurora) | ../../ | n/a | | ||
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-aws-modules/kms/aws | ~> 2.0 | | ||
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | ~> 5.0 | | ||
|
||
## Resources | ||
|
||
| Name | Type | | ||
|------|------| | ||
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source | | ||
|
||
## Inputs | ||
|
||
No inputs. | ||
|
||
## Outputs | ||
|
||
| Name | Description | | ||
|------|-------------| | ||
| <a name="output_additional_cluster_endpoints"></a> [additional\_cluster\_endpoints](#output\_additional\_cluster\_endpoints) | A map of additional cluster endpoints and their attributes | | ||
| <a name="output_cluster_arn"></a> [cluster\_arn](#output\_cluster\_arn) | Amazon Resource Name (ARN) of cluster | | ||
| <a name="output_cluster_database_name"></a> [cluster\_database\_name](#output\_cluster\_database\_name) | Name for an automatically created database on cluster creation | | ||
| <a name="output_cluster_endpoint"></a> [cluster\_endpoint](#output\_cluster\_endpoint) | Writer endpoint for the cluster | | ||
| <a name="output_cluster_engine_version_actual"></a> [cluster\_engine\_version\_actual](#output\_cluster\_engine\_version\_actual) | The running version of the cluster database | | ||
| <a name="output_cluster_hosted_zone_id"></a> [cluster\_hosted\_zone\_id](#output\_cluster\_hosted\_zone\_id) | The Route53 Hosted Zone ID of the endpoint | | ||
| <a name="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id) | The RDS Cluster Identifier | | ||
| <a name="output_cluster_instances"></a> [cluster\_instances](#output\_cluster\_instances) | A map of cluster instances and their attributes | | ||
| <a name="output_cluster_master_user_secret"></a> [cluster\_master\_user\_secret](#output\_cluster\_master\_user\_secret) | The generated database master user secret when `manage_master_user_password` is set to `true` | | ||
| <a name="output_cluster_members"></a> [cluster\_members](#output\_cluster\_members) | List of RDS Instances that are a part of this cluster | | ||
| <a name="output_cluster_port"></a> [cluster\_port](#output\_cluster\_port) | The database port | | ||
| <a name="output_cluster_reader_endpoint"></a> [cluster\_reader\_endpoint](#output\_cluster\_reader\_endpoint) | A read-only endpoint for the cluster, automatically load-balanced across replicas | | ||
| <a name="output_cluster_resource_id"></a> [cluster\_resource\_id](#output\_cluster\_resource\_id) | The RDS Cluster Resource ID | | ||
| <a name="output_cluster_role_associations"></a> [cluster\_role\_associations](#output\_cluster\_role\_associations) | A map of IAM roles associated with the cluster and their attributes | | ||
| <a name="output_db_cluster_activity_stream_kinesis_stream_name"></a> [db\_cluster\_activity\_stream\_kinesis\_stream\_name](#output\_db\_cluster\_activity\_stream\_kinesis\_stream\_name) | The name of the Amazon Kinesis data stream to be used for the database activity stream | | ||
| <a name="output_db_cluster_cloudwatch_log_groups"></a> [db\_cluster\_cloudwatch\_log\_groups](#output\_db\_cluster\_cloudwatch\_log\_groups) | Map of CloudWatch log groups created and their attributes | | ||
| <a name="output_db_cluster_parameter_group_arn"></a> [db\_cluster\_parameter\_group\_arn](#output\_db\_cluster\_parameter\_group\_arn) | The ARN of the DB cluster parameter group created | | ||
| <a name="output_db_cluster_parameter_group_id"></a> [db\_cluster\_parameter\_group\_id](#output\_db\_cluster\_parameter\_group\_id) | The ID of the DB cluster parameter group created | | ||
| <a name="output_db_parameter_group_arn"></a> [db\_parameter\_group\_arn](#output\_db\_parameter\_group\_arn) | The ARN of the DB parameter group created | | ||
| <a name="output_db_parameter_group_id"></a> [db\_parameter\_group\_id](#output\_db\_parameter\_group\_id) | The ID of the DB parameter group created | | ||
| <a name="output_db_subnet_group_name"></a> [db\_subnet\_group\_name](#output\_db\_subnet\_group\_name) | The db subnet group name | | ||
| <a name="output_enhanced_monitoring_iam_role_arn"></a> [enhanced\_monitoring\_iam\_role\_arn](#output\_enhanced\_monitoring\_iam\_role\_arn) | The Amazon Resource Name (ARN) specifying the enhanced monitoring role | | ||
| <a name="output_enhanced_monitoring_iam_role_name"></a> [enhanced\_monitoring\_iam\_role\_name](#output\_enhanced\_monitoring\_iam\_role\_name) | The name of the enhanced monitoring role | | ||
| <a name="output_enhanced_monitoring_iam_role_unique_id"></a> [enhanced\_monitoring\_iam\_role\_unique\_id](#output\_enhanced\_monitoring\_iam\_role\_unique\_id) | Stable and unique string identifying the enhanced monitoring role | | ||
| <a name="output_security_group_id"></a> [security\_group\_id](#output\_security\_group\_id) | The security group ID of the cluster | | ||
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK --> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,204 @@ | ||
provider "aws" { | ||
region = local.region | ||
} | ||
|
||
data "aws_availability_zones" "available" {} | ||
data "aws_partition" "current" {} | ||
|
||
locals { | ||
name = "ex-${basename(path.cwd)}" | ||
region = "eu-west-1" | ||
|
||
vpc_cidr = "10.0.0.0/16" | ||
azs = slice(data.aws_availability_zones.available.names, 0, 3) | ||
|
||
tags = { | ||
Example = local.name | ||
GithubRepo = "terraform-aws-rds-aurora" | ||
GithubOrg = "terraform-aws-modules" | ||
} | ||
} | ||
|
||
################################################################################ | ||
# RDS Aurora Module | ||
################################################################################ | ||
|
||
module "aurora" { | ||
source = "../../" | ||
|
||
name = local.name | ||
engine = "aurora-postgresql" | ||
engine_version = "14.7" | ||
master_username = "root" | ||
storage_type = "aurora-iopt1" | ||
instances = { | ||
1 = { | ||
instance_class = "db.r5.2xlarge" | ||
publicly_accessible = true | ||
db_parameter_group_name = "default.aurora-postgresql14" | ||
} | ||
2 = { | ||
identifier = "static-member-1" | ||
instance_class = "db.r5.2xlarge" | ||
} | ||
3 = { | ||
identifier = "excluded-member-1" | ||
instance_class = "db.r5.large" | ||
promotion_tier = 15 | ||
} | ||
} | ||
|
||
endpoints = { | ||
static = { | ||
identifier = "static-custom-endpt" | ||
type = "ANY" | ||
static_members = ["static-member-1"] | ||
tags = { Endpoint = "static-members" } | ||
} | ||
excluded = { | ||
identifier = "excluded-custom-endpt" | ||
type = "READER" | ||
excluded_members = ["excluded-member-1"] | ||
tags = { Endpoint = "excluded-members" } | ||
} | ||
} | ||
|
||
vpc_id = module.vpc.vpc_id | ||
db_subnet_group_name = module.vpc.database_subnet_group_name | ||
security_group_rules = { | ||
vpc_ingress = { | ||
cidr_blocks = module.vpc.private_subnets_cidr_blocks | ||
} | ||
egress_example = { | ||
cidr_blocks = ["10.33.0.0/28"] | ||
description = "Egress to corporate printer closet" | ||
} | ||
} | ||
|
||
apply_immediately = true | ||
skip_final_snapshot = true | ||
|
||
create_db_cluster_parameter_group = true | ||
db_cluster_parameter_group_name = local.name | ||
db_cluster_parameter_group_family = "aurora-postgresql14" | ||
db_cluster_parameter_group_description = "${local.name} example cluster parameter group" | ||
db_cluster_parameter_group_parameters = [ | ||
{ | ||
name = "log_min_duration_statement" | ||
value = 4000 | ||
apply_method = "immediate" | ||
}, { | ||
name = "rds.force_ssl" | ||
value = 1 | ||
apply_method = "immediate" | ||
} | ||
] | ||
|
||
create_db_parameter_group = true | ||
db_parameter_group_name = local.name | ||
db_parameter_group_family = "aurora-postgresql14" | ||
db_parameter_group_description = "${local.name} example DB parameter group" | ||
db_parameter_group_parameters = [ | ||
{ | ||
name = "log_min_duration_statement" | ||
value = 4000 | ||
apply_method = "immediate" | ||
} | ||
] | ||
|
||
enabled_cloudwatch_logs_exports = ["postgresql"] | ||
create_cloudwatch_log_group = true | ||
|
||
create_db_cluster_activity_stream = true | ||
db_cluster_activity_stream_kms_key_id = module.kms.key_id | ||
db_cluster_activity_stream_mode = "async" | ||
|
||
domain = aws_directory_service_directory.demo.id | ||
domain_iam_role_name = aws_iam_role.rds_ad_auth.name | ||
|
||
tags = local.tags | ||
} | ||
|
||
################################################################################ | ||
# IAM Role for Windows Authentication | ||
################################################################################ | ||
|
||
data "aws_iam_policy_document" "rds_assume_role" { | ||
statement { | ||
actions = [ | ||
"sts:AssumeRole", | ||
] | ||
|
||
principals { | ||
type = "Service" | ||
identifiers = [ | ||
"directoryservice.rds.amazonaws.com", | ||
"rds.amazonaws.com" | ||
] | ||
} | ||
} | ||
} | ||
|
||
resource "aws_iam_role" "rds_ad_auth" { | ||
name = "${local.name}-directory-service-role" | ||
description = "Role used by RDS for Active Directory authentication and authorization" | ||
assume_role_policy = data.aws_iam_policy_document.rds_assume_role.json | ||
} | ||
|
||
resource "aws_iam_role_policy_attachment" "rds_directory_services" { | ||
role = aws_iam_role.rds_ad_auth.name | ||
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonRDSDirectoryServiceAccess" | ||
} | ||
|
||
################################################################################ | ||
# AWS Directory Service (Acitve Directory) | ||
################################################################################ | ||
|
||
resource "aws_directory_service_directory" "demo" { | ||
name = "corp.demo.com" | ||
password = "SuperSecretPassw0rd" | ||
edition = "Standard" | ||
type = "MicrosoftAD" | ||
|
||
vpc_settings { | ||
vpc_id = module.vpc.vpc_id | ||
# Only 2 subnets, must be in different AZs | ||
subnet_ids = slice(tolist(module.vpc.database_subnets), 0, 2) | ||
} | ||
|
||
tags = local.tags | ||
} | ||
|
||
################################################################################ | ||
# Supporting Resources | ||
################################################################################ | ||
|
||
module "vpc" { | ||
source = "terraform-aws-modules/vpc/aws" | ||
version = "~> 5.0" | ||
|
||
name = local.name | ||
cidr = local.vpc_cidr | ||
|
||
azs = local.azs | ||
public_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k)] | ||
private_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 3)] | ||
database_subnets = [for k, v in local.azs : cidrsubnet(local.vpc_cidr, 8, k + 6)] | ||
|
||
tags = local.tags | ||
} | ||
|
||
module "kms" { | ||
source = "terraform-aws-modules/kms/aws" | ||
version = "~> 2.0" | ||
|
||
deletion_window_in_days = 7 | ||
description = "KMS key for ${local.name} cluster activity stream." | ||
enable_key_rotation = true | ||
is_enabled = true | ||
key_usage = "ENCRYPT_DECRYPT" | ||
|
||
aliases = [local.name] | ||
|
||
tags = local.tags | ||
} |
Oops, something went wrong.