sqs
foss-cafe/sqs/aws
Terraform module for AWS SQS
Terraform Module for AWS SQS Using as Module KMS Enabled ``hcl module "sqsexample" { source = "../" name = var.name tags = var.tags } ` Without KMS `hcl module "sqsexample" { source = "../" name = var.name kms_enabled = false tags = var.tags } ` Requirements No requirements. Providers | Name | Version | |------|---------| | aws | n/a | Inputs | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | content\_based\_deduplication | Enables content-based deduplication for FIFO queues | bool | false | no | | create | Whether to create SQS queue | bool | true | no | | customer\_master\_key\_spec | Specifies whether the key contains a symmetric key or an asymmetric key pair and the encryption algorithms or signing algorithms that the key supports. V
| Name | Type | Description | Default |
|---|---|---|---|
| kms_master_key_id | string | The ID of an AWS-managed customer master key (CMK) for Amazon SQS or a custom CM | required |
| name | string | This is the human-readable name of the queue. If omitted, Terraform will assign | required |
| kms_enabled | bool | Do you want to Enable KMS key for SQS | true |
| key_usage | string | Specifies the intended use of the key. Valid values: ENCRYPT_DECRYPT or SIGN_VER | "ENCRYPT_DECRYPT" |
| customer_master_key_spec | string | Specifies whether the key contains a symmetric key or an asymmetric key pair and | "SYMMETRIC_DEFAULT" |
| kms_policy | string | A valid KMS policy JSON document. Note that if the policy document is not specif | "" |
| deletion_window_in_days | number | Duration in days after which the key is deleted after destruction of the resourc | 30 |
| is_enabled | bool | Specifies whether the key is enabled. Defaults to true. | true |
| delay_seconds | number | The time in seconds that the delivery of all messages in the queue will be delay | 0 |
| redrive_policy | string | The JSON policy to set up the Dead Letter Queue, see AWS docs. Note: when specif | "" |
| source_arn | string | S3 ARN for SQS Policies | "" |
| policy | string | The JSON policy for the SQS queue | "" |
| fifo_queue | bool | Boolean designating a FIFO queue | false |
| content_based_deduplication | bool | Enables content-based deduplication for FIFO queues | false |
| description | string | The description of the key as viewed in AWS console. | "SQS: KMS Key for" |
| visibility_timeout_seconds | number | The visibility timeout for the queue. An integer from 0 to 43200 (12 hours) | 30 |
| max_message_size | number | The limit of how many bytes a message can contain before Amazon SQS rejects it. | 262144 |
| kms_data_key_reuse_period_seconds | number | The length of time, in seconds, for which Amazon SQS can reuse a data key to enc | 300 |
| tags | map(string) | A mapping of tags to assign to all resources | {} |
| enable_key_rotation | bool | Specifies whether key rotation is enabled. Defaults to false | false |
| create | bool | Whether to create SQS queue | true |
| message_retention_seconds | number | The number of seconds Amazon SQS retains a message. Integer representing seconds | 345600 |
kmd_key_id — The globally unique identifier for the key.kmd_target_key_id — Key identifier pointed to by the alias.kmd_target_key_arn — ARN pointed to by the alias.id — The URL for the created Amazon SQS queuearn — The ARN of the SQS queuekmd_arn — The Amazon Resource Name(ARN) of the key alias.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,