s3
clouddrove/s3/aws
Terraform module to create default S3 bucket with logging and encryption type specific features.
Terraform AWS S3 Terraform module to create default S3 bucket with logging and encryption type specific features. We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems . Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure. This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining th
| Name | Type | Description | Default |
|---|---|---|---|
| versioning | bool | Enable Versioning of S3. | true |
| sse_algorithm | string | The server-side encryption algorithm to use. Valid values are AES256 and aws:kms | "AES256" |
| object_ownership | string | Object ownership. Valid values: BucketOwnerEnforced, BucketOwnerPreferred or Obj | "ObjectWriter" |
| configuration_status | string | Versioning state of the bucket. Valid values: Enabled, Suspended, or Disabled. D | "Enabled" |
| repository | string | Terraform current module repo | "https://github.com/clouddrove/terraform |
| bucket_policy | bool | Conditionally create S3 bucket policy. | false |
| vpc_endpoints | any | [] | |
| timeouts | map(string) | Define maximum timeout for creating, updating, and deleting VPC endpoint resourc | {} |
| acl_grants | list(object({ id = | A list of policy grants for the bucket. Conflicts with `acl`. Set `acl` to `null | null |
| attach_public_policy | bool | Controls if a user defined public bucket policy will be attached (set to `false` | true |
| managedby | string | ManagedBy, eg 'CloudDrove'. | "hello@clouddrove.com" |
| acl | string | Canned ACL to apply to the S3 bucket. | null |
| enable_server_side_encryption | bool | Enable enable_server_side_encryption | false |
| kms_master_key_id | string | The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used | "" |
| bucket_prefix | string | (Optional, Forces new resource) Creates a unique bucket name beginning with the | null |
| force_destroy | bool | A boolean that indicates all objects should be deleted from the bucket so that t | false |
| logging | bool | Logging Object to enable and disable logging | false |
| request_payer | string | (Optional) Specifies who should bear the cost of Amazon S3 data transfer. Can be | null |
| object_lock_enabled | bool | Whether S3 bucket should have an Object Lock configuration enabled. | false |
| s3_name | string | name of s3 bucket | null |
| … and 10 more inputs | |||
bucket_regional_domain_name — The bucket region-specific domain name. The bucket domain name including the region name, please refs3_bucket_lifecycle_configuration_rules — The lifecycle rules of the bucket, if the bucket is configured with lifecycle rules. If not, this wis3_bucket_website_endpoint — The website endpoint, if the bucket is configured with a website. If not, this will be an empty stris3_bucket_website_domain — The domain of the website endpoint, if the bucket is configured with a website. If not, this will beid — The ID of the s3 bucket.bucket_domain_name — The Domain of the s3 bucket.s3_bucket_hosted_zone_id — The Route 53 Hosted Zone ID for this bucket's region.arn — The ARN of the s3 bucket.tags — A mapping of tags to assign to the resource.s3_bucket_policy — The policy of the bucket, if the bucket is configured with a policy. If not, this will be an empty sAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,