nexus
cn-terraform/nexus/aws
Sonatype Nexus Terraform Module for AWS
Sonatype Nexus Terraform Module for AWS # This Terraform module deploys a Sonatype Nexus OOS on AWS. Based on official Sonatype Nexus Docker image .       Usage Check valid versions on: Github Releases: Terraform Module Registry: Other modules that you may need to use this module The Networking module: Github Releases: Terraform Module Registry: Install pre commit hooks. Pleas run this command right after cloning the reposito
| Name | Type | Description | Default |
|---|---|---|---|
| name_prefix | string | Name prefix for resources on AWS | required |
| public_subnets_ids | list(any) | List of Public Subnets IDs | required |
| region | string | AWS Region the infrastructure is hosted in | required |
| vpc_id | string | ID of the VPC | required |
| private_subnets_ids | list(any) | List of Private Subnets IDs | required |
| nexus_image | string | Nexus image | "sonatype/nexus3" |
| deployment_circuit_breaker_rollback | bool | (Optional) The optional rollback option causes Amazon ECS to roll back to the la | false |
| enable_s3_bucket_server_side_encryption | bool | (Optional) If true, server side encryption will be applied. | true |
| create_kms_key | bool | If true a new KMS key will be created to encrypt the logs. Defaults true. If set | false |
| container_cpu | number | (Optional) The number of cpu units to reserve for the container. This is optiona | 4096 |
| container_memory_reservation | number | (Optional) The amount of memory (in MiB) to reserve for the container. If contai | 4096 |
| volumes | list(object({ host_path = | (Optional) A set of volume blocks that containers in your task may use | [] |
| log_group_kms_key_id | string | The ARN of the KMS Key to use when encrypting log data. Please note, after the A | null |
| log_group_retention_in_days | number | (Optional) Specifies the number of days you want to retain log events in the spe | 30 |
| mount_points | list(any) | Container mount points. This is a list of maps, where each map should contain a | [] |
| lb_waf_web_acl_arn | string | ARN of a WAFV2 to associate with the ALB | "" |
| lb_http_ports | map(any) | Map containing objects to define listeners behaviour based on type field. If typ | {} |
| s3_bucket_server_side_encryption_sse_algorithm | string | (Optional) The server-side encryption algorithm to use. Valid values are AES256 | "AES256" |
| s3_bucket_server_side_encryption_key | string | (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can o | null |
| ephemeral_storage_size | number | The number of GBs to provision for ephemeral storage on Fargate tasks. Must be g | 0 |
| tags | map(string) | Resource tags | {} |
| lb_enable_cross_zone_load_balancing | string | Enable cross zone support for LB | "true" |
| container_memory | number | (Optional) The amount of memory (in MiB) to allow the container to use. This is | 8192 |
| deployment_circuit_breaker_enabled | bool | (Optional) You can enable the deployment circuit breaker to cause a service depl | false |
| configure_loadbalancer_ssl | object({ enable_ssl | Enable SSL, and configure the loadbalancer to use the certificate | {
"dns_zone_id": "",
"enable_ssl": f |
nexus_lb_id — Sonatype Nexus Load Balancer IDnexus_lb_arn — Sonatype Nexus Load Balancer ARNnexus_lb_arn_suffix — Sonatype Nexus Load Balancer ARN Suffixnexus_lb_dns_name — Sonatype Nexus Load Balancer DNS Namenexus_lb_zone_id — Sonatype Nexus Load Balancer Zone IDAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,