An open API service indexing awesome lists of open source software.

https://github.com/opszero/terraform-aws-eks-airbyte


https://github.com/opszero/terraform-aws-eks-airbyte

Last synced: 2 months ago
JSON representation

Awesome Lists containing this project

README

          

# terraform-aws-eks-airbyte

## Table of Contents
- [Introduction](#introduction)
- [Usage](#usage)
- [Examples](#Examples)
- [Author](#Author)
- [License](#license)
- [Inputs](#inputs)
- [Outputs](#outputs)

## Introduction
This Terraform module creates an AWS elasticache along with additional configuration options.

## Usage
To use this module, you can include it in your Terraform configuration. Here's an example of how to use it:

## Example: eks-airbyte

```hcl
module "airbyte" {
source = "git::https://github.com/opszero/terraform-aws-eks-airbyte.git?ref=v1.0.1"
environment = "prod"
instance_class = "db.t3.micro"
vpc_id = "vpc-xxxxxxxxxx" # add vpc id here
subnet_ids = ["subnets-xxxxxxx", "subnets-xxxxxxxx"]
password = "" #if add some password
allowed_ip = ["0.0.0.0/0"]
}
```

## Examples
For detailed examples on how to use this module, please refer to the [Examples](https://github.com/opszero/terraform-aws-eks-airbyte.git) directory within this repository.

## Providers

| Name | Version |
|------|---------|
| [helm](#provider\_helm) | 3.1.1 |
| [random](#provider\_random) | 3.8.0 |
## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [airbyte\_version](#input\_airbyte\_version) | version of airbyte hemm chart. | `string` | `"0.50.21"` | no |
| [allocated\_storage](#input\_allocated\_storage) | The allocated storage in gigabytes | `number` | `50` | no |
| [allowed\_ip](#input\_allowed\_ip) | List of allowed ip. | `list(any)` | `[]` | no |
| [allowed\_ports](#input\_allowed\_ports) | List of allowed ingress ports | `list(any)` |

[
5432
]
| no |
| [db\_name](#input\_db\_name) | The DB name to create. If omitted, no database is created initially | `string` | `"airbyte"` | no |
| [enabled\_cloudwatch\_logs\_exports](#input\_enabled\_cloudwatch\_logs\_exports) | List of log types to enable for exporting to CloudWatch logs. If omitted, no logs will be exported. Valid values (depending on engine): alert, audit, error, general, listener, slowquery, trace, postgresql (PostgreSQL), upgrade (PostgreSQL). | `list(string)` |
[
"postgresql",
"upgrade"
]
| no |
| [instance\_class](#input\_instance\_class) | The instance type of the RDS instance | `string` | `"db.t4g.micro"` | no |
| [name](#input\_name) | Name (e.g. `app` or `cluster`). | `string` | `"airbyte"` | no |
| [namespace](#input\_namespace) | namespace of airbyte (e.g. `tools` or `prod`). | `string` | `"airbyte"` | no |
| [password](#input\_password) | Password for the master DB user. Note that this may show up in logs, and it will be stored in the state file | `string` | `""` | no |
| [publicly\_accessible](#input\_publicly\_accessible) | Bool to control if instance is publicly accessible | `bool` | `false` | no |
| [subnet\_ids](#input\_subnet\_ids) | A list of VPC Subnet IDs to launch in. | `list(string)` | `[]` | no |
| [username](#input\_username) | Username for the master DB user | `string` | `"postgres"` | no |
| [vpc\_id](#input\_vpc\_id) | The ID of the VPC that the instance security group belongs to. | `string` | `""` | no |
## Resources

| Name | Type |
|------|------|
| [helm_release.airbyte](https://registry.terraform.io/providers/hashicorp/helm/3.1.1/docs/resources/release) | resource |
| [random_password.password](https://registry.terraform.io/providers/hashicorp/random/3.8.0/docs/resources/password) | resource |
## Outputs

No outputs.
# 🚀 Built by opsZero!

[opsZero](https://opszero.com) provides software and consulting for Cloud + AI. With our decade plus of experience scaling some of the world’s most innovative companies we have developed deep expertise in Kubernetes, DevOps, FinOps, and Compliance.

Our software and consulting solutions enable organizations to:

- migrate workloads to the Cloud
- setup compliance frameworks including SOC2, HIPAA, PCI-DSS, ITAR, FedRamp, CMMC, and more.
- FinOps solutions to reduce the cost of running Cloud workloads
- Kubernetes optimized for web scale and AI workloads
- finding underutilized Cloud resources
- setting up custom AI training and delivery
- building data integrations and scrapers
- modernizing onto modern ARM based processors

We do this with a high-touch support model where you:

- Get access to us on Slack, Microsoft Teams or Email
- Get 24/7 coverage of your infrastructure
- Get an accelerated migration to Kubernetes

Please [schedule a call](https://calendly.com/opszero-llc/discovery) if you need support.




AWS Advanced Tier
AWS DevOps Competency
AWS EKS Delivery
AWS Public Sector