-
-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add aurora serverlessv2 support #138
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Change details
-
Error ID Change Path Resource BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster.aws_rds_cluster_instance.default BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster_instance.default BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster_instance.default
/test all |
Co-authored-by: Kevin Mahoney <belay.00.theorem@icloud.com>
@@ -218,7 +226,7 @@ resource "aws_rds_cluster_instance" "default" { | |||
count = local.cluster_instance_count | |||
identifier = var.cluster_identifier == "" ? "${module.this.id}-${count.index + 1}" : "${var.cluster_identifier}-${count.index + 1}" | |||
cluster_identifier = coalesce(join("", aws_rds_cluster.primary.*.id), join("", aws_rds_cluster.secondary.*.id)) | |||
instance_class = var.instance_type | |||
instance_class = var.serverlessv2_scaling_configuration != null ? "db.serverless" : var.instance_type |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure enhanced monitoring for Amazon RDS instances is enabled
Resource: module.rds_cluster_aurora_mysql.aws_rds_cluster_instance.default | ID: BC_AWS_LOGGING_28
How to Fix
resource "aws_db_instance" "default" {
allocated_storage = 10
...
+ monitoring_interval = 5
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure all data stored in Aurora is securely encrypted at rest
Resource: module.rds_cluster_aurora_mysql.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_38
How to Fix
resource "aws_rds_cluster" "example" {
...
cluster_identifier = "aurora-cluster-demo"
+ storage_encrypted = true
...
}
Description
This policy examines the resource **aws_rds_cluster** to check that encryption is set up. The property **storage_encrypted** is examined.🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS cluster has IAM authentication enabled
Resource: module.rds_cluster_aurora_mysql.aws_rds_cluster.primary | ID: BC_AWS_IAM_66
How to Fix
resource "aws_rds_cluster" "enabled" {
...
+ iam_database_authentication_enabled = true
}
Description
TBD🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS clusters and instances have deletion protection enabled
Resource: module.rds_cluster_aurora_mysql.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_69
How to Fix
resource "aws_rds_cluster" "default" {
...
+ deletion_protection = true
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure all data stored in Aurora is securely encrypted at rest
Resource: module.rds_cluster_aurora_postgres.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_38
How to Fix
resource "aws_rds_cluster" "example" {
...
cluster_identifier = "aurora-cluster-demo"
+ storage_encrypted = true
...
}
Description
This policy examines the resource **aws_rds_cluster** to check that encryption is set up. The property **storage_encrypted** is examined.🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS cluster has IAM authentication enabled
Resource: module.rds_cluster.aws_rds_cluster.primary | ID: BC_AWS_IAM_66
How to Fix
resource "aws_rds_cluster" "enabled" {
...
+ iam_database_authentication_enabled = true
}
Description
TBD🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure Amazon RDS clusters and instances have AWS IAM authentication enabled
Resource: module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary | ID: BC_AWS_IAM_59
How to Fix
resource "aws_rds_cluster" "default" {
cluster_identifier = "aurora-cluster-demo"
...
+ iam_database_authentication_enabled = true
}
Description
TBA. Identity and Access Management (IAM)🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS cluster has IAM authentication enabled
Resource: module.rds_cluster_aurora_postgres.aws_rds_cluster.primary | ID: BC_AWS_IAM_66
How to Fix
resource "aws_rds_cluster" "enabled" {
...
+ iam_database_authentication_enabled = true
}
Description
TBD🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -218,7 +226,7 @@ resource "aws_rds_cluster_instance" "default" { | |||
count = local.cluster_instance_count | |||
identifier = var.cluster_identifier == "" ? "${module.this.id}-${count.index + 1}" : "${var.cluster_identifier}-${count.index + 1}" | |||
cluster_identifier = coalesce(join("", aws_rds_cluster.primary.*.id), join("", aws_rds_cluster.secondary.*.id)) | |||
instance_class = var.instance_type | |||
instance_class = var.serverlessv2_scaling_configuration != null ? "db.serverless" : var.instance_type |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure enhanced monitoring for Amazon RDS instances is enabled
Resource: module.rds_cluster.aws_rds_cluster_instance.default | ID: BC_AWS_LOGGING_28
How to Fix
resource "aws_db_instance" "default" {
allocated_storage = 10
...
+ monitoring_interval = 5
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure Amazon RDS clusters and instances have AWS IAM authentication enabled
Resource: module.rds_cluster.aws_rds_cluster.primary | ID: BC_AWS_IAM_59
How to Fix
resource "aws_rds_cluster" "default" {
cluster_identifier = "aurora-cluster-demo"
...
+ iam_database_authentication_enabled = true
}
Description
TBA. Identity and Access Management (IAM)🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS clusters and instances have deletion protection enabled
Resource: module.rds_cluster_aurora_postgres.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_69
How to Fix
resource "aws_rds_cluster" "default" {
...
+ deletion_protection = true
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure all data stored in Aurora is securely encrypted at rest
Resource: module.rds_cluster.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_38
How to Fix
resource "aws_rds_cluster" "example" {
...
cluster_identifier = "aurora-cluster-demo"
+ storage_encrypted = true
...
}
Description
This policy examines the resource **aws_rds_cluster** to check that encryption is set up. The property **storage_encrypted** is examined.🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS clusters and instances have deletion protection enabled
Resource: module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary | ID: BC_AWS_GENERAL_69
How to Fix
resource "aws_rds_cluster" "default" {
...
+ deletion_protection = true
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -218,7 +226,7 @@ resource "aws_rds_cluster_instance" "default" { | |||
count = local.cluster_instance_count | |||
identifier = var.cluster_identifier == "" ? "${module.this.id}-${count.index + 1}" : "${var.cluster_identifier}-${count.index + 1}" | |||
cluster_identifier = coalesce(join("", aws_rds_cluster.primary.*.id), join("", aws_rds_cluster.secondary.*.id)) | |||
instance_class = var.instance_type | |||
instance_class = var.serverlessv2_scaling_configuration != null ? "db.serverless" : var.instance_type |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure enhanced monitoring for Amazon RDS instances is enabled
Resource: module.rds_cluster_aurora_postgres.aws_rds_cluster_instance.default | ID: BC_AWS_LOGGING_28
How to Fix
resource "aws_db_instance" "default" {
allocated_storage = 10
...
+ monitoring_interval = 5
}
Description
TBA🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure Amazon RDS clusters and instances have AWS IAM authentication enabled
Resource: module.rds_cluster_aurora_mysql.aws_rds_cluster.primary | ID: BC_AWS_IAM_59
How to Fix
resource "aws_rds_cluster" "default" {
cluster_identifier = "aurora-cluster-demo"
...
+ iam_database_authentication_enabled = true
}
Description
TBA. Identity and Access Management (IAM)🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure RDS cluster has IAM authentication enabled
Resource: module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary | ID: BC_AWS_IAM_66
How to Fix
resource "aws_rds_cluster" "enabled" {
...
+ iam_database_authentication_enabled = true
}
Description
TBD🎉 Fixed by commit e9ead5e - upgrade terraform version in test
@@ -115,6 +115,14 @@ resource "aws_rds_cluster" "primary" { | |||
} | |||
} | |||
|
|||
dynamic "serverlessv2_scaling_configuration" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ensure Amazon RDS clusters and instances have AWS IAM authentication enabled
Resource: module.rds_cluster_aurora_postgres.aws_rds_cluster.primary | ID: BC_AWS_IAM_59
How to Fix
resource "aws_rds_cluster" "default" {
cluster_identifier = "aurora-cluster-demo"
...
+ iam_database_authentication_enabled = true
}
Description
TBA. Identity and Access Management (IAM)🎉 Fixed by commit e9ead5e - upgrade terraform version in test
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Change details
-
Error ID Change Path Resource BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster.aws_rds_cluster_instance.default BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster_instance.default BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_mysql_serverless.aws_rds_cluster.primary BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_GENERAL_69 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster.primary BC_AWS_LOGGING_28 Fixed /main.tf module.rds_cluster_aurora_postgres.aws_rds_cluster_instance.default BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_IAM_59 Fixed /main.tf module.rds_cluster.aws_rds_cluster.primary BC_AWS_GENERAL_38 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary BC_AWS_IAM_66 Fixed /main.tf module.rds_cluster_aurora_mysql.aws_rds_cluster.primary
/test all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The bats
test failure is due to formatting differences among Terraform versions, and inconsistency in what the actions format with vs what the actions test with. Ignoring it for now.
Marking this version as no-release
so we can release it as version 1.0, per Cloud Posse migration to production semantic versioning.
@Nuru I'm happy that this change is merged into the upstream. Thanks |
what
why
references