sonarqube

cn-terraform/sonarqube/aws

Terraform Module HCL AWS

SonarQube Terraform Module for AWS

Install
module "sonarqube" {
source = "cn-terraform/sonarqube/aws"
version = "2.0.62"
}
⭐ Source on GitHub 📦 Registry page
README

SonarQube Terraform Module for AWS # This Terraform module deploys a SonarQube community server on AWS. Based on official Sonarqube Docker image . ![](https://github.com/cn-terraform/terraform-sonarqube/actions?query=workflow%3Aterraform) ![](https://github.com/cn-terraform/terraform-aws-sonarqube) ![](https://github.com/cn-terraform/terraform-aws-sonarqube) ![](https://github.com/cn-terraform/terraform-aws-sonarqube) ![](https://github.com/cn-terraform/terraform-aws-sonarqube) ![](https://github.com/cn-terraform/terraform-aws-sonarqube) Usage Check valid versions on: Github Releases: Terraform Module Registry: Install pre commit hooks. Pleas run this command right after cloning the repository. pre-commit install For that you may need to install the following tools: Pre-commit Terraform Do

Inputs (43)
NameTypeDescriptionDefault
private_subnets_idslist(string)List of Private Subnets IDs required
regionstringAWS Region the infrastructure is hosted in required
public_subnets_idslist(string)List of Public Subnets IDs required
name_prefixstringName prefix for resources on AWS required
vpc_idstringID of the VPC required
create_kms_keyboolIf true a new KMS key will be created to encrypt the logs. Defaults true. If setfalse
log_group_kms_key_idstringThe ARN of the KMS Key to use when encrypting log data. Please note, after the Anull
s3_bucket_server_side_encryption_sse_algorithmstring(Optional) The server-side encryption algorithm to use. Valid values are AES256 "AES256"
container_memorynumber(Optional) The amount of memory (in MiB) to allow the container to use. This is 8192
ephemeral_storage_sizenumberThe number of GBs to provision for ephemeral storage on Fargate tasks. Must be g0
default_certificate_arnstringACM certificate ARN if you plan to manage it yourself""
lb_waf_web_acl_arnstringARN of a WAFV2 to associate with the ALB""
db_passwordstringDB password""
custom_lb_arnstringARN of the Load Balancer to use in the ECS service. If provided, this module wilnull
block_s3_bucket_public_accessbool(Optional) If true, public access to the S3 bucket will be blocked.true
sonarqube_imagestringSonarqube image"sonarqube:lts"
permissions_boundarystring(Optional) The ARN of the policy that is used to set the permissions boundary fonull
deployment_circuit_breaker_enabledbool(Optional) You can enable the deployment circuit breaker to cause a service deplfalse
tagsmap(string)Resource tags{}
db_backup_retention_periodnumberThe days to retain backups for. Default 33
enable_s3_bucket_server_side_encryptionbool(Optional) If true, server side encryption will be applied.true
container_cpunumber(Optional) The number of cpu units to reserve for the container. This is optiona4096
lb_https_portsmap(any)Map containing objects to define listeners behaviour based on type field. If typ{ "default": { "listener_port": 44
log_group_retention_in_daysnumber(Optional) Specifies the number of days you want to retain log events in the spe30
db_instance_numbernumberNumber of instance deployed on Aurora. By default, number of subnet in private_snull
… and 3 more inputs
Outputs (6)
sonar_lb_zone_id — SonarQube Load Balancer Zone ID
ecs_tasks_sg_id — SonarQube ECS Tasks Security Group - The ID of the security group
sonar_lb_id — SonarQube Load Balancer ID
sonar_lb_arn — SonarQube Load Balancer ARN
sonar_lb_arn_suffix — SonarQube Load Balancer ARN Suffix
sonar_lb_dns_name — SonarQube Load Balancer DNS Name
Resources (7)
aws_db_subnet_groupaws_kms_keyaws_rds_clusteraws_rds_cluster_instanceaws_route53_recordaws_security_grouprandom_password
Details
FrameworkTerraform Module
LanguageHCL
Version2.0.62
Cloud AWS
★ Stars40
Forks46
Total downloads16.3k
Inputs43
Outputs6
Resources7
Examples1
LicenseApache-2.0
Namespacecn-terraform
Updated