Skip to content

Commit

Permalink
Github Actions update blueprints for RDS module (#30)
Browse files Browse the repository at this point in the history
Co-authored-by: devex-sa <65592364+devex-sa@users.noreply.github.com>
  • Loading branch information
github-actions[bot] and devex-sa authored Feb 5, 2024
1 parent c3ca3db commit 714ee9a
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion aws-rds-postgresql/generic/terraform/module.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ provider "aws" {


module "db_instance" {
source = "git::https://github.com/dfds/terraform-aws-rds.git?ref=1.0.2"
source = "git::https://github.com/dfds/terraform-aws-rds.git?ref=1.1.0"

# Provide a cost centre for the resource.
# Valid Values: .
Expand Down
4 changes: 2 additions & 2 deletions aws-rds-postgresql/generic/variables.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@
| <a name="input_db_name"></a> [db\_name](#input\_db\_name) | Specifies The DB name to create.<br> Valid Values: .<br> Notes: If omitted, no database is created initially. | `string` | `null` | no |
| <a name="input_delete_automated_backups"></a> [delete\_automated\_backups](#input\_delete\_automated\_backups) | Specify whether or not whether to remove automated backups immediately after the DB instance is deleted.<br> Valid Values: .<br> Notes: . | `bool` | `true` | no |
| <a name="input_deletion_protection"></a> [deletion\_protection](#input\_deletion\_protection) | Specify whether or not to prevent the DB instance from being deleted.<br> Valid Values: .<br> Notes: The database can't be deleted when this value is set to true. | `bool` | `true` | no |
| <a name="input_enable_default_backup"></a> [enable\_default\_backup](#input\_enable\_default\_backup) | Specify whether or not to enable default backup.<br> Valid Values: .<br> Notes: This set the dfds.backup tag. See recommendations [here](https://wiki.dfds.cloud/en/playbooks/standards/tagging_policy). | `bool` | `null` | no |
| <a name="input_enable_default_backup"></a> [enable\_default\_backup](#input\_enable\_default\_backup) | Specify whether or not to enable default backup.<br> Valid Values: .<br> Notes:<br> - This set the dfds.backup tag. See recommendations [here](https://wiki.dfds.cloud/en/playbooks/standards/tagging_policy).<br> - If omitted, the default value is set to true for production and false for non-production environments. | `bool` | `null` | no |
| <a name="input_enabled_cloudwatch_logs_exports"></a> [enabled\_cloudwatch\_logs\_exports](#input\_enabled\_cloudwatch\_logs\_exports) | Specify the list of log types to enable for exporting to CloudWatch logs.<br> Valid Values: postgresql (PostgreSQL), upgrade (PostgreSQL)<br> Notes: If omitted, no logs will be exported. | `list(string)` | `[]` | no |
| <a name="input_engine_version"></a> [engine\_version](#input\_engine\_version) | Specify engine version to use.<br> Valid Values: Specific version number, for example, "15.3" or major version number, for example, "15".<br> Notes:<br> - If this is omitted, the preffered version will be used.<br> - If major version is specified, the preffered version will be used.<br> - When using a specific version. The version must be valid. A valid version can be obtained from this [documentation](https://docs.aws.amazon.com/AmazonRDS/latest/PostgreSQLReleaseNotes/postgresql-release-calendar.html) | `string` | `null` | no |
| <a name="input_enhanced_monitoring_interval"></a> [enhanced\_monitoring\_interval](#input\_enhanced\_monitoring\_interval) | Specify the interval between points when Enhanced Monitoring metrics are collected for the DB instance.<br> Valid Values: 0, 1, 5, 10, 15, 30, 60 (in seconds)<br> Notes: Specify 0 to disable collecting Enhanced Monitoring metrics. | `number` | `0` | no |
Expand Down Expand Up @@ -51,7 +51,7 @@
| <a name="input_performance_insights_kms_key_id"></a> [performance\_insights\_kms\_key\_id](#input\_performance\_insights\_kms\_key\_id) | Specify the ARN for the KMS key to encrypt Performance Insights data.<br> Valid Values: .<br> Notes:<br> - When specifying performance\_insights\_kms\_key\_id, performance\_insights\_enabled needs to be set to true.<br> - Once KMS key is set, it can never be changed | `string` | `null` | no |
| <a name="input_performance_insights_retention_period"></a> [performance\_insights\_retention\_period](#input\_performance\_insights\_retention\_period) | Specify the retention period for Performance Insights.<br> Valid Values: `7`, `731` (2 years) or a multiple of `31`<br> Notes: Set the value Default value when `performance_insights_enabled` is set to true. | `number` | `null` | no |
| <a name="input_pipeline_location"></a> [pipeline\_location](#input\_pipeline\_location) | Specify a valid URL path to the pipeline file used for automation script.<br> Valid Values: URL to repo. Example: `"https://github.com/dfds/terraform-aws-rds/actions/workflows/qa.yml"`<br> Notes: This set the dfds.automation.initiator.pipeline tag. See recommendations [here](https://wiki.dfds.cloud/en/playbooks/standards/tagging_policy). | `string` | `null` | no |
| <a name="input_port"></a> [port](#input\_port) | Specify the port number on which the DB accepts connections.<br> Valid Values: .<br> Notes: If omitted, the port number will set to 5432. | `string` | `null` | no |
| <a name="input_port"></a> [port](#input\_port) | Specify the port number on which the DB accepts connections.<br> Valid Values: .<br> Notes: Default value is set to 5432. | `number` | `5432` | no |
| <a name="input_proxy_additional_security_group_rules"></a> [proxy\_additional\_security\_group\_rules](#input\_proxy\_additional\_security\_group\_rules) | Specify additional security group rules for the RDS proxy.<br> Valid Values: .<br> Notes:<br> - Public access is not supported on RDS Proxy. See [documentation](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-proxy.html#rds-proxy.limitations) for more information.<br> - Only ingress(inbound) rules are supported.<br> - Ingress rules are set to "Allow outbound traffic to PostgreSQL instance"<br> – Ingress rules are set to "Allow inbound traffic from same security group on specified database port" | <pre>object({<br> ingress_rules = list(any)<br> ingress_with_self = optional(list(any), [])<br> })</pre> | <pre>{<br> "ingress_rules": []<br>}</pre> | no |
| <a name="input_proxy_debug_logging_is_enabled"></a> [proxy\_debug\_logging\_is\_enabled](#input\_proxy\_debug\_logging\_is\_enabled) | Turn on debug logging for the proxy.<br> Valid Values: .<br> Notes: . | `bool` | `false` | no |
| <a name="input_proxy_engine_family"></a> [proxy\_engine\_family](#input\_proxy\_engine\_family) | Specify engine family of the RDS proxy.<br> Valid Values: POSTGRESQL<br> Notes: . | `string` | `"POSTGRESQL"` | no |
Expand Down

0 comments on commit 714ee9a

Please sign in to comment.