Browse the Repo

file-type-icon.circleci
file-type-icon.github
file-type-icon_docs
file-type-iconexamples
file-type-iconmodules
file-type-iconaurora
file-type-iconbackup-plan
file-type-iconbackup-vault
file-type-iconCHANGELOG.md
file-type-iconREADME.md
file-type-iconcore-concepts.md
file-type-iconmain.tf
file-type-iconoutputs.tf
file-type-iconvariables.tf
file-type-iconefs
file-type-iconlambda-cleanup-snapshots
file-type-iconlambda-copy-shared-snapshot
file-type-iconlambda-create-snapshot
file-type-iconlambda-share-snapshot
file-type-iconrds-proxy
file-type-iconrds-replicas
file-type-iconrds
file-type-iconredshift
file-type-icontest
file-type-icon.gitignore
file-type-icon.pre-commit-config.yaml
file-type-iconCODEOWNERS
file-type-iconLICENSE.txt
file-type-iconREADME.adoc
file-type-iconterraform-cloud-enterprise-private-module-...

Browse the Repo

file-type-icon.circleci
file-type-icon.github
file-type-icon_docs
file-type-iconexamples
file-type-iconmodules
file-type-iconaurora
file-type-iconbackup-plan
file-type-iconbackup-vault
file-type-iconCHANGELOG.md
file-type-iconREADME.md
file-type-iconcore-concepts.md
file-type-iconmain.tf
file-type-iconoutputs.tf
file-type-iconvariables.tf
file-type-iconefs
file-type-iconlambda-cleanup-snapshots
file-type-iconlambda-copy-shared-snapshot
file-type-iconlambda-create-snapshot
file-type-iconlambda-share-snapshot
file-type-iconrds-proxy
file-type-iconrds-replicas
file-type-iconrds
file-type-iconredshift
file-type-icontest
file-type-icon.gitignore
file-type-icon.pre-commit-config.yaml
file-type-iconCODEOWNERS
file-type-iconLICENSE.txt
file-type-iconREADME.adoc
file-type-iconterraform-cloud-enterprise-private-module-...
RDS

RDS

Terraform code and scripts for deploying data-storage resources (e.g. databases, cache) in AWS

Code Preview

Preview the Code

mobile file icon

variables.tf

down
  • variable "vaults" {
  • # Ideally, we would use a more strict type here but since we want to support required and optional values, and since
  • # Terraform's type system only supports maps that have the same type for all values, we have to use the less useful
  • # `any` type.
  • type = any
  • # Each key for each entry in the map is the name of the name of the vault you want to create
  • # Each entry in the map supports the following attributes:
  • #
  • # OPTIONAL (defaults to value of corresponding module input):
  • # - kms_key_arn string : The ARN for the KMS key you want used to encrypt the recovery points stored in
  • # your vault
  • # - enable_notifications bool : Whether to create SNS topics and allow the vault to publish events to it
  • # - events_to_listen_for list[string] : A list of AWS Backup vault events you want to listen for. If you do not
  • # pass this list, ALL events will be listened for.
  • # - backup_policy map[PolicyStatement] : A map of statement IDs to IAM Policy statements to attach to the
  • # Backup Vault. When empty, no policy will be attached.
  • #
  • # Example:
  • # "vaults" = {
  • # "my-vault-one" = {
  • # kms_key_arn = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
  • # enable_notifications = true
  • # events_to_listen_for = ["BACKUP_JOB_STARTED", "COPY_JOB_FAILED", "RESTORE_JOB_COMPLETED"]
  • # backup_policy = {

Questions? Ask away.

We're here to talk about our services, answer any questions, give advice, or just to chat.

Ready to hand off the Gruntwork?