File tree 5 files changed +13
-3
lines changed
examples/existing-cluster-with-base-and-infra
modules/eks-monitoring/add-ons/external-secrets
5 files changed +13
-3
lines changed Original file line number Diff line number Diff line change @@ -28,4 +28,4 @@ if [[ $? -eq 0 && $destroy_output == *"Destroy complete!"* ]]; then
28
28
else
29
29
echo " FAILED: Terraform destroy of all targets failed"
30
30
exit 1
31
- fi
31
+ fi
Original file line number Diff line number Diff line change @@ -29,4 +29,4 @@ if [[ ${PIPESTATUS[0]} -eq 0 && $apply_output == *"Apply complete"* ]]; then
29
29
else
30
30
echo " FAILED: Terraform apply of all modules failed"
31
31
exit 1
32
- fi
32
+ fi
Original file line number Diff line number Diff line change @@ -11,13 +11,15 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p
11
11
| <a name =" requirement_aws " ></a > [ aws] ( #requirement\_ aws ) | >= 3.72 |
12
12
| <a name =" requirement_kubectl " ></a > [ kubectl] ( #requirement\_ kubectl ) | >= 2.0.3 |
13
13
| <a name =" requirement_kubernetes " ></a > [ kubernetes] ( #requirement\_ kubernetes ) | >= 2.10 |
14
+ | <a name =" requirement_random " ></a > [ random] ( #requirement\_ random ) | >= 3.6.1 |
14
15
15
16
## Providers
16
17
17
18
| Name | Version |
18
19
| ------| ---------|
19
20
| <a name =" provider_aws " ></a > [ aws] ( #provider\_ aws ) | >= 3.72 |
20
21
| <a name =" provider_kubectl " ></a > [ kubectl] ( #provider\_ kubectl ) | >= 2.0.3 |
22
+ | <a name =" provider_random " ></a > [ random] ( #provider\_ random ) | >= 3.6.1 |
21
23
22
24
## Modules
23
25
@@ -35,6 +37,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p
35
37
| [ aws_ssm_parameter.secret] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssm_parameter ) | resource |
36
38
| [ kubectl_manifest.cluster_secretstore] ( https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest ) | resource |
37
39
| [ kubectl_manifest.secret] ( https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest ) | resource |
40
+ | [ random_uuid.grafana_key_suffix] ( https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/uuid ) | resource |
38
41
| [ aws_region.current] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region ) | data source |
39
42
40
43
## Inputs
Original file line number Diff line number Diff line change 76
76
depends_on = [module . external_secrets ]
77
77
}
78
78
79
+ resource "random_uuid" "grafana_key_suffix" {
80
+ }
81
+
79
82
resource "aws_ssm_parameter" "secret" {
80
- name = " /terraform-accelerator/grafana-api-key"
83
+ name = " /terraform-accelerator/grafana-api-key/ ${ random_uuid . grafana_key_suffix . result } "
81
84
description = " SSM Secret to store grafana API Key"
82
85
type = " SecureString"
83
86
value = jsonencode ({
Original file line number Diff line number Diff line change @@ -14,5 +14,9 @@ terraform {
14
14
source = " alekc/kubectl"
15
15
version = " >= 2.0.3"
16
16
}
17
+ random = {
18
+ source = " hashicorp/random"
19
+ version = " >= 3.6.1"
20
+ }
17
21
}
18
22
}
You can’t perform that action at this time.
0 commit comments