rds-cluster-instance-group
cloudposse/rds-cluster-instance-group/aws
Terraform module to provision an RDS cluster instance pool with a dedicated endpoint
[![README Header][readme_header_img]][readme_header_link] [![Cloud Posse][logo]](https://cpco.io/homepage) terraform-aws-rds-cluster-instance-group    Terraform module to provision an RDS Aurora instance group for MySQL or Postgres along with a dedicated endpoint. Use this module together with our terraform-aws-rds-cluster to provision pools of RDS instances. This is useful for creating reporting clusters that don't impact the production databases. Supports Amazon Aurora Serverless. --- This project is part of our comprehensive "SweetOps" approach tow
| Name | Type | Description | Default |
|---|---|---|---|
| stage | any | Stage (e.g. `prod`, `dev`, `staging`) | required |
| name | any | Name of the application | required |
| namespace | any | Namespace (e.g. `eg` or `cp`) | required |
| cluster_identifier | any | The cluster identifier | required |
| vpc_id | any | VPC ID to create the cluster in (e.g. `vpc-a22222ee`) | required |
| subnets | any | List of VPC subnet IDs | required |
| instance_type | any | Instance type to use | "db.t2.small" |
| storage_encrypted | any | Specifies whether the DB cluster is encrypted. The default is `false` for `provi | "true" |
| security_groups | any | List of security groups to be allowed to connect to the DB instances | [] |
| engine | any | The name of the database engine to be used for this DB cluster. Valid values: `a | "aurora" |
| custom_endpoint_type | any | The type of the endpoint. One of: READER, ANY | "READER" |
| allowed_cidr_blocks | any | List of CIDR blocks allowed to access | [] |
| rds_monitoring_interval | any | Interval in seconds that metrics are collected, 0 to disable (values can only be | "0" |
| db_subnet_group_name | any | A DB subnet group to associate with this DB instance. NOTE: This must match the | "" |
| publicly_accessible | any | Set to true if you want your cluster to be publicly accessible (such as via Quic | "false" |
| rds_monitoring_role_arn | any | The ARN for the IAM role that can send monitoring metrics to CloudWatch Logs | "" |
| cluster_size | any | Number of DB instances to create in the cluster | "2" |
| attributes | any | Additional attributes (e.g. `1`) | [
"replicas"
] |
| cluster_family | any | The family of the DB cluster parameter group | "aurora5.6" |
| promotion_tier | any | Failover Priority setting on instance level. The reader who has lower tier has h | "15" |
| tags | any | Additional tags (e.g. map(`BusinessUnit`,`XYZ`) | {} |
| instance_parameters | any | List of DB instance parameters to apply | [] |
| security_group_ids | any | The IDs of the security groups from which to allow `ingress` traffic to the DB i | [] |
| zone_id | any | Route53 parent zone ID. If provided (not empty), the module will create sub-doma | "" |
| delimiter | any | Delimiter to be used between `name`, `namespace`, `stage` and `attributes` | "-" |
| db_port | any | Database port | "3306" |
hostname — The DNS address for the endpoint of the Aurora clusterendpoint — The endpoint for the Aurora cluster, automatically load-balanced across replicasAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,