From 9d43010365ae7b7e53391d8172f25c86adb4dc29 Mon Sep 17 00:00:00 2001 From: "docs-sourcer[bot]" <99042413+docs-sourcer[bot]@users.noreply.github.com> Date: Fri, 10 Apr 2026 01:17:46 +0000 Subject: [PATCH] Updated with the [latest changes](https://github.com/gruntwork-io/terraform-aws-data-storage/releases/tag/v1.0.0) from the `terraform-aws-data-storage@v1.0.0` source branch. --- .../aurora/aurora.md | 94 ++++++++++++++-- .../backup-plan/backup-plan.md | 26 ++--- .../backup-vault/backup-vault.md | 18 +-- .../terraform-aws-data-storage/dms/dms.md | 26 ++--- .../terraform-aws-data-storage/efs/efs.md | 18 +-- .../opensearch/opensearch.md | 18 +-- .../org-backup-policy/org-backup-policy.md | 20 ++-- .../rds-proxy/rds-proxy.md | 20 ++-- .../rds-replicas/rds-replicas.md | 48 ++++++-- .../terraform-aws-data-storage/rds/rds.md | 103 ++++++++++++++++-- .../redshift/redshift.md | 20 ++-- 11 files changed, 298 insertions(+), 113 deletions(-) diff --git a/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md b/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md index a1fbdf105..e3d681e49 100644 --- a/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md +++ b/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Aurora Module -View Source +View Source -Release Notes +Release Notes This module creates an Amazon Aurora, a MySQL and PostgreSQL compatible relational database built for the cloud. @@ -59,7 +59,7 @@ Cluster](http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Aurora.Managing.h ## How do you configure this module? This module allows you to configure a number of parameters, such as backup windows, maintenance window, port number, -and encryption. For a list of all available variables and their descriptions, see [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/modules/aurora/variables.tf). +and encryption. For a list of all available variables and their descriptions, see [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/aurora/variables.tf). ## How do you create a cross-region read replica cluster? @@ -68,7 +68,7 @@ the primary cluster: ```hcl-terraform module "replica" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.8" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.0" # ... other parameters omitted ... @@ -77,7 +77,7 @@ module "replica" { } ``` -See the example [here](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/examples/aurora-with-cross-region-replica) for more details. +See the example [here](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/aurora-with-cross-region-replica) for more details. ## How do you destroy a cross-region read replica? @@ -137,7 +137,7 @@ see [Limitations of Aurora Serverless](https://docs.aws.amazon.com/AmazonRDS/lat module "aurora" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -619,7 +619,7 @@ module "aurora" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.0" } inputs = { @@ -1900,45 +1900,115 @@ Timeout for DB updating + + +The ARN of the Aurora cluster. + + + + +The connection endpoint for the primary (writer) instance of the Aurora cluster. + + + + +The DB cluster identifier (name), e.g. 'my-aurora-cluster'. + + + + +The maintenance window for each Aurora cluster instance. + + + + +The ARN of the Secrets Manager secret containing the master user password, when manage_master_user_password is enabled. + + + + +The unique resource ID assigned to the cluster (e.g. 'cluster-POBCBQUFQC56EBAAWXGFJ77GRU'). Useful for IAM database authentication. + + + + +The name of the database created in the Aurora cluster. + + + + +A list of endpoints for each Aurora cluster instance. + + + + +A list of identifiers for all Aurora cluster instances. + + + + +The port number on which the Aurora cluster accepts connections. + + + + +A list of identifiers for Aurora cluster instances that are read replicas (non-writer). + + + + +A read-only endpoint that load-balances connections across the Aurora read replicas. + + + + +The ID of the security group created for the Aurora cluster. + + + + +A list of identifiers for Aurora cluster instances that are writers. + + @@ -1947,11 +2017,11 @@ Timeout for DB updating diff --git a/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md b/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md index ca2857d94..970bff175 100644 --- a/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md +++ b/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md @@ -9,20 +9,20 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Backup Plan Module -View Source +View Source -Release Notes +Release Notes This Terraform Module creates the following AWS Backup resources: 1. Backup plans - specifying **how and when** to back things up 2. Resource selections - specifying **which resources** to back up -You associate your plans with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/modules/backup-vault). +You associate your plans with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/backup-vault). ## What is a Backup Plan? @@ -50,7 +50,7 @@ module "backup_plan" { plans = { "tag-based-backup-plan" = { rule = { - target_vault_name = element(module.backup_vault.vault_names, 0), + target_vault_name = values(module.backup_vault.vault_names)[0], schedule = "cron(47 0/1 * * ? *)" } selection = { @@ -77,7 +77,7 @@ module "backup_plan" { plans = { "tag-based-backup-plan" = { rule = { - target_vault_name = element(module.backup_vault.vault_names, 0), + target_vault_name = values(module.backup_vault.vault_names)[0], schedule = "cron(47 0/1 * * ? *)" } resources = [ @@ -91,7 +91,7 @@ module "backup_plan" { ## How do you troubleshoot Backup jobs? -See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/core-concepts.md#troubleshooting-aws-backup) in the core-concepts guide. +See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/core-concepts.md#troubleshooting-aws-backup) in the core-concepts guide. ## Sample Usage @@ -106,7 +106,7 @@ See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-d module "backup_plan" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -137,7 +137,7 @@ module "backup_plan" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.0.0" } inputs = { @@ -244,11 +244,11 @@ The ARN of the IAM service role used by Backup plans diff --git a/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md b/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md index 003240456..35d144b7a 100644 --- a/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md +++ b/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Backup Vault Module -View Source +View Source -Release Notes +Release Notes This Terraform Module launches a [Backup Vault](https://docs.aws.amazon.com/aws-backup/latest/devguide/vaults.html) that you can use to store, organize and, optionally, preserve your AWS Backup recovery points against deletion. @@ -115,7 +115,7 @@ then you will end up with many potentially large recovery points that you cannot module "backup_vault" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -159,7 +159,7 @@ module "backup_vault" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.0.0" } inputs = { @@ -322,11 +322,11 @@ A map of tags assigned to the vault resources, including those inherited from th diff --git a/docs/reference/modules/terraform-aws-data-storage/dms/dms.md b/docs/reference/modules/terraform-aws-data-storage/dms/dms.md index b742397e9..c6885504c 100644 --- a/docs/reference/modules/terraform-aws-data-storage/dms/dms.md +++ b/docs/reference/modules/terraform-aws-data-storage/dms/dms.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # DMS Module -View Source +View Source -Release Notes +Release Notes This module creates AWS Database Migration Service (DMS) resources for database migration and replication. @@ -86,10 +86,10 @@ module "dms" { ## Configuration -* See the [root README](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/README.md) for instructions on using Terraform modules. -* See the [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/modules/dms/variables.tf) for all the variables you can set on this module. -* See the [dms-mysql examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/examples/dms-mysql/) folder for instruction on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance. -* See the [dms-aurora examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/examples/dms-aurora/) folder for instructions on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance. +* See the [root README](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/README.md) for instructions on using Terraform modules. +* See the [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/dms/variables.tf) for all the variables you can set on this module. +* See the [dms-mysql examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/dms-mysql/) folder for instruction on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance. +* See the [dms-aurora examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/dms-aurora/) folder for instructions on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance. ## Key Variables @@ -127,7 +127,7 @@ module "dms" { module "dms" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -371,7 +371,7 @@ module "dms" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.0.0" } inputs = { @@ -1177,11 +1177,11 @@ A map of maps containing the replication tasks created and their full output of diff --git a/docs/reference/modules/terraform-aws-data-storage/efs/efs.md b/docs/reference/modules/terraform-aws-data-storage/efs/efs.md index e100844c3..386860731 100644 --- a/docs/reference/modules/terraform-aws-data-storage/efs/efs.md +++ b/docs/reference/modules/terraform-aws-data-storage/efs/efs.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # EFS Module -View Source +View Source -Release Notes +Release Notes This module creates an Amazon Elastic File System (EFS) with mount targets across multiple availability zones for NFSv4-compatible shared storage. @@ -108,7 +108,7 @@ sudo mount -t nfs4 -o nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,ret module "efs" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -227,7 +227,7 @@ module "efs" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.0.0" } inputs = { @@ -641,11 +641,11 @@ The IDs of the security groups created for the file system. diff --git a/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md b/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md index 81cad129e..47aa64cb5 100644 --- a/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md +++ b/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # OpenSearch Module -View Source +View Source -Release Notes +Release Notes This module creates an [Amazon OpenSearch Service](https://aws.amazon.com/opensearch-service/) domain (the successor to Amazon Elasticsearch Service). @@ -102,7 +102,7 @@ module "opensearch" { module "opensearch" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -345,7 +345,7 @@ module "opensearch" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.0.0" } inputs = { @@ -1223,11 +1223,11 @@ The ID of the security group created for the OpenSearch domain. Null if not in V diff --git a/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md b/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md index f287d59f3..0aa626587 100644 --- a/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md +++ b/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md @@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Organization Backup Policies Module -View Source +View Source -Release Notes +Release Notes This Terraform Module creates the [AWS Organizations Backup Policies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_backup.html). -You associate your each plan on the backup policies with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/modules/backup-vault). +You associate your each plan on the backup policies with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/backup-vault). ## What are Backup Policies ? @@ -42,7 +42,7 @@ account. This effective policy instructs AWS Backup how to automatically back up module "org_backup_policy" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -155,7 +155,7 @@ module "org_backup_policy" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.0.0" } inputs = { @@ -734,11 +734,11 @@ ID of the backup policies diff --git a/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md b/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md index cd11c0132..371c5c1e6 100644 --- a/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md +++ b/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # RDS Proxy Module -View Source +View Source -Release Notes +Release Notes Amazon RDS Proxy is a fully managed database proxy service that makes it easy to manage database connections for Amazon Relational Database Service (RDS) and Amazon Aurora. It allows you to @@ -54,7 +54,7 @@ Before using this module, you need to: ## How to use the RDS Proxy Module In order to setup a RDS proxy, you need to setup database credentials in AWS Secrets Manager and pass it to this module. -Refer to the [examples/rds-proxy](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v0.47.0/examples/rds-proxy) or [https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns) for more information. +Refer to the [examples/rds-proxy](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/rds-proxy) or [https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns) for more information. If you use a customer managed KMS key to encrypt the secret, you will need to provide the KMS key ARN to this module using the `db_secret_kms_key_arn` parameter. @@ -143,7 +143,7 @@ Each authentication method can be configured with: module "rds_proxy" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -262,7 +262,7 @@ module "rds_proxy" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.0.0" } inputs = { @@ -632,11 +632,11 @@ The ID of the security group associated with the RDS proxy. This security group diff --git a/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md b/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md index 0352c29db..c02aa14f3 100644 --- a/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md +++ b/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # RDS Read Replicas Module -View Source +View Source -Release Notes +Release Notes This module creates a read replica (read-only copy) of a DB instance. @@ -77,7 +77,7 @@ terraform import aws_db_instance. module "rds_replicas" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -325,7 +325,7 @@ module "rds_replicas" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.0.0" } inputs = { @@ -1012,21 +1012,51 @@ Timeout for DB updating + + +A list of hostnames of the read replica instances. + + + + +A list of ARNs of the read replica instances. + + + + +A list of connection endpoints for the read replica instances in address:port format. + + + + +A list of identifiers of the read replica instances. + + + + +A list of identifiers (names) of the read replica instances. + + + + +The port number on which the read replicas accept connections. + + @@ -1035,11 +1065,11 @@ Timeout for DB updating diff --git a/docs/reference/modules/terraform-aws-data-storage/rds/rds.md b/docs/reference/modules/terraform-aws-data-storage/rds/rds.md index 9aab7d09f..e6fd8140d 100644 --- a/docs/reference/modules/terraform-aws-data-storage/rds/rds.md +++ b/docs/reference/modules/terraform-aws-data-storage/rds/rds.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # RDS Module -View Source +View Source -Release Notes +Release Notes This module creates an Amazon Relational Database Service (RDS) cluster that can run MySQL, Postgres, MariaDB, Oracle, or SQL Server. The cluster is managed by AWS and automatically handles standby failover, read replicas, backups, @@ -159,7 +159,7 @@ Set `multi_az=true`. When setting up a multi-AZ (Availability Zone) RDS deployme module "rds" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -541,6 +541,9 @@ module "rds" { # use the same value as the primary, which is set in var.iops. read_replica_iops = null + # Redefine replica multi-AZ settings. + read_replica_multi_az = null + # The type of storage to use for read replicas. If null, the replica will use # the same value as the primary, which is set in var.storage_type. read_replica_storage_type = null @@ -608,7 +611,7 @@ module "rds" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.0.0" } inputs = { @@ -993,6 +996,9 @@ inputs = { # use the same value as the primary, which is set in var.iops. read_replica_iops = null + # Redefine replica multi-AZ settings. + read_replica_multi_az = null + # The type of storage to use for read replicas. If null, the replica will use # the same value as the primary, which is set in var.storage_type. read_replica_storage_type = null @@ -1820,6 +1826,15 @@ The amount of provisioned IOPS for read replicas. If null, the replica will use + + + +Redefine replica multi-AZ settings. + + + + + @@ -1928,45 +1943,115 @@ Timeout for DB updating + + +The name of the database created on the RDS instance. + + + + +The ARN of the Secrets Manager secret containing the master user password, when manage_master_user_password is enabled. + + + + +The name (identifier) of the RDS instance. + + + + +The port number on which the RDS instance accepts connections. + + + + +The hostname of the primary RDS instance. Unlike the endpoint, this does not include the port. + + + + +The ARN of the primary RDS instance. + + + + +The connection endpoint for the primary RDS instance in address:port format. + + + + +The identifier of the primary RDS instance. + + + + +A list of hostnames of the read replica RDS instances. + + + + +A list of ARNs of the read replica RDS instances. + + + + +A list of connection endpoints for the read replica RDS instances in address:port format. + + + + +A list of identifiers of the read replica RDS instances. + + + + +The RDS resource ID of the primary instance (e.g., db-ABCDEFGHIJKL1MNOPQRS2TUVWX). + + + + +The ID of the security group created for the RDS instance. + + @@ -1975,11 +2060,11 @@ Timeout for DB updating diff --git a/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md b/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md index 0532cf658..be891634d 100644 --- a/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md +++ b/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md @@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Redshift Module -View Source +View Source -Release Notes +Release Notes This module creates an Amazon Redshift cluster that you can use as a data warehouse. The cluster is managed by AWS and automatically handles leader nodes, worker nodes, backups, patching, and encryption. @@ -36,7 +36,7 @@ to get more information: ## Serverless Amazon Redshift Serverless makes it convenient for you to run and scale analytics without having to provision and manage -data warehouses. Use the `var.enable_serverless` to enable serverless and the `var.serverless_base_capacity` to set teh +data warehouses. Use the `var.enable_serverless` to enable serverless and the `var.serverless_base_capacity` to set the base Redshift Processing Units (RPU) for serving queries. Refer to the [Amazon Redshift Serverless](https://docs.aws.amazon.com/redshift/latest/mgmt/working-with-serverless.html) @@ -65,7 +65,7 @@ workaround, you can re-run the destroy command once the workspace gets deleted c module "redshift" { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -321,7 +321,7 @@ module "redshift" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v0.47.0" + source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.0.0" } inputs = { @@ -1155,11 +1155,11 @@ The ID of the Security Group that controls access to the cluster