Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/opszero/terraform-helm-aws-vault


https://github.com/opszero/terraform-helm-aws-vault

Last synced: 6 days ago
JSON representation

Awesome Lists containing this project

README

        

## Providers

| Name | Version |
|------|---------|
| [aws](#provider\_aws) | n/a |
| [helm](#provider\_helm) | n/a |
| [null](#provider\_null) | n/a |
## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [eks\_cluster\_name](#input\_eks\_cluster\_name) | The name of EKS cluster to get OIDC ARN and Name | `any` | n/a | yes |
| [force\_detach\_policies](#input\_force\_detach\_policies) | Flag to force detachment of policies attached to the IAM role. | `string` | `false` | no |
| [iam\_role\_path](#input\_iam\_role\_path) | Path under which to create IAM role. | `string` | `"/"` | no |
| [s3\_kms\_policy\_arns](#input\_s3\_kms\_policy\_arns) | List of IAM policies to attach IAM role | `list` |

[
"arn:aws:iam::aws:policy/AmazonS3FullAccess",
"arn:aws:iam::aws:policy/AWSKeyManagementServicePowerUser"
]
| no |
| [vault\_backend\_bucket\_kms\_key](#input\_vault\_backend\_bucket\_kms\_key) | The ID of the KMS key | `string` | `"alias/aws/s3"` | no |
| [vault\_backend\_bucket\_name](#input\_vault\_backend\_bucket\_name) | The name of s3 bucket for backend | `any` | n/a | yes |
| [vault\_backend\_bucket\_region](#input\_vault\_backend\_bucket\_region) | The region of the s3 bucket | `string` | `"us-east-1"` | no |
| [vault\_s3\_kms\_role\_name](#input\_vault\_s3\_kms\_role\_name) | Role used by the Vault as S3 backend | `string` | `"vault_s3_kms_role"` | no |
| [vault\_yml\_file](#input\_vault\_yml\_file) | n/a | `any` | `null` | no |
## Resources

| Name | Type |
|------|------|
| [aws_iam_role.vault_s3_kms_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role_policy_attachment.s3_kms](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [helm_release.vault](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
| [null_resource.create_vault_yml](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource |
| [aws_eks_cluster.cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster) | data source |
| [aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
## Outputs

No outputs.
# 🚀 Built by opsZero!

Since 2016 [opsZero](https://opszero.com) has been providing Kubernetes
expertise to companies of all sizes on any Cloud. With a focus on AI and
Compliance we can say we seen it all whether SOC2, HIPAA, PCI-DSS, ITAR,
FedRAMP, CMMC we have you and your customers covered.

We provide support to organizations in the following ways:

- [Modernize or Migrate to Kubernetes](https://opszero.com/solutions/modernization/)
- [Cloud Infrastructure with Kubernetes on AWS, Azure, Google Cloud, or Bare Metal](https://opszero.com/solutions/cloud-infrastructure/)
- [Building AI and Data Pipelines on Kubernetes](https://opszero.com/solutions/ai/)
- [Optimizing Existing Kubernetes Workloads](https://opszero.com/solutions/optimized-workloads/)

We do this with a high-touch support model where you:

- Get access to us on Slack, Microsoft Teams or Email
- Get 24/7 coverage of your infrastructure
- Get an accelerated migration to Kubernetes

Please [schedule a call](https://calendly.com/opszero-llc/discovery) if you need support.