Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
terraform-aws-rds
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Container Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Terraform Modules
terraform-aws-rds
Commits
71521914
Commit
71521914
authored
Sep 30, 2017
by
Robin Bowes
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add complete enhanced monitoring example
parent
dd88fda3
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
75 additions
and
11 deletions
+75
-11
README.md
README.md
+3
-3
main.tf
examples/complete/main.tf
+6
-6
README.md
examples/enhanced_monitoring/README.md
+14
-0
main.tf
examples/enhanced_monitoring/main.tf
+52
-2
No files found.
README.md
View file @
71521914
...
@@ -39,9 +39,9 @@ module "db" {
...
@@ -39,9 +39,9 @@ module "db" {
maintenance_window
=
"Mon:00:00-Mon:03:00"
maintenance_window
=
"Mon:00:00-Mon:03:00"
backup_window
=
"03:00-06:00"
backup_window
=
"03:00-06:00"
# Enhanced Monitoring
# Enhanced Monitoring
- see example for details on how to create the role
monitoring_interval
=
"${var.monitoring_interval}
# monitoring_interval = "10"
monitoring_role_arn = "
$
{
var
.
monitoring_interval
==
"0"
?
""
:
aws_iam_role
.
rds_monitoring
.
arn
}
"
# monitoring_role_arn = "aws_iam_role.rds_enhanced_monitoring.arn
"
tags
=
{
tags
=
{
Owner
=
"user"
Owner
=
"user"
...
...
examples/complete/main.tf
View file @
71521914
...
@@ -34,14 +34,14 @@ module "db" {
...
@@ -34,14 +34,14 @@ module "db" {
# kms_key_id = "arm:aws:kms:<region>:<accound id>:key/<kms key id>"
# kms_key_id = "arm:aws:kms:<region>:<accound id>:key/<kms key id>"
name
=
"demodb"
name
=
"demodb"
username
=
"user"
username
=
"user"
password
=
"YourPwdShouldBeLongAndSecure!"
password
=
"YourPwdShouldBeLongAndSecure!"
port
=
"3306"
port
=
"3306"
vpc_security_group_ids
=
[
"
${data
.
aws_security_group
.
default
.
id
}
"
]
vpc_security_group_ids
=
[
"
${data
.
aws_security_group
.
default
.
id
}
"
]
maintenance_window
=
"Mon:00:00-Mon:03:00"
maintenance_window
=
"Mon:00:00-Mon:03:00"
backup_window
=
"03:00-06:00"
backup_window
=
"03:00-06:00"
backup_retention_period
=
0
// disable backups to create DB faster
backup_retention_period
=
0
// disable backups to create DB faster
tags
=
{
tags
=
{
Owner
=
"user"
Owner
=
"user"
Environment
=
"dev"
Environment
=
"dev"
...
...
examples/enhanced_monitoring/README.md
View file @
71521914
...
@@ -3,3 +3,17 @@ Enhanced Monitoring example
...
@@ -3,3 +3,17 @@ Enhanced Monitoring example
Configuration in this directory creates the additional resources required to use Enhanced Monitoring.
Configuration in this directory creates the additional resources required to use Enhanced Monitoring.
Data sources are used to discover existing VPC resources (VPC, subnet and security group).
Usage
=====
To run this example you need to execute:
```
bash
$
terraform init
$
terraform plan
$
terraform apply
```
Note that this example may create resources which cost money. Run
`terraform destroy`
when you don't need these resources.
examples/enhanced_monitoring/main.tf
View file @
71521914
provider
"aws"
{
region
=
"eu-west-1"
}
##############################################################
# Data sources to get VPC, subnets and security group details
##############################################################
data
"aws_vpc"
"default"
{
default
=
true
}
data
"aws_subnet_ids"
"all"
{
vpc_id
=
"
${data
.
aws_vpc
.
default
.
id
}
"
}
data
"aws_security_group"
"default"
{
vpc_id
=
"
${data
.
aws_vpc
.
default
.
id
}
"
name
=
"default"
}
##################################################
# Create an IAM role to allow enhanced monitoring
##################################################
resource
"aws_iam_role"
"rds_enhanced_monitoring"
{
resource
"aws_iam_role"
"rds_enhanced_monitoring"
{
name
=
"rds-enhanced_monitoring-role"
name
=
"rds-enhanced_monitoring-role"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
rds_enhanced_monitoring
.
json
}
"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
rds_enhanced_monitoring
.
json
}
"
...
@@ -23,11 +46,38 @@ data "aws_iam_policy_document" "rds_enhanced_monitoring" {
...
@@ -23,11 +46,38 @@ data "aws_iam_policy_document" "rds_enhanced_monitoring" {
}
}
}
}
#####
# DB
#####
module
"db"
{
module
"db"
{
source
=
"../../"
source
=
"../../"
# rest of params here as per complete example
identifier
=
"demodb"
engine
=
"mysql"
engine_version
=
"5.7.11"
instance_class
=
"db.t2.large"
allocated_storage
=
5
storage_encrypted
=
false
monitoring_interval
=
"
${
var
.
monitoring_interval
}
"
# kms_key_id = "arm:aws:kms:<region>:<accound id>:key/<kms key id>"
name
=
"demodb"
username
=
"user"
password
=
"YourPwdShouldBeLongAndSecure!"
port
=
"3306"
vpc_security_group_ids
=
[
"
${data
.
aws_security_group
.
default
.
id
}
"
]
maintenance_window
=
"Mon:00:00-Mon:03:00"
backup_window
=
"03:00-06:00"
backup_retention_period
=
0
// disable backups to create DB faster
tags
=
{
Owner
=
"user"
Environment
=
"dev"
}
# DB subnet group
subnet_ids
=
[
"
${data
.
aws_subnet_ids
.
all
.
ids
}
"
]
# DB parameter group
family
=
"mysql5.7"
monitoring_interval
=
"30"
monitoring_role_arn
=
"
${
aws_iam_role
.
rds_enhanced_monitoring
.
arn
}
"
monitoring_role_arn
=
"
${
aws_iam_role
.
rds_enhanced_monitoring
.
arn
}
"
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment