From 9a170239e07c56da435aeec639d93f4a9e61ec4e Mon Sep 17 00:00:00 2001
From: "docs-sourcer[bot]"
<99042413+docs-sourcer[bot]@users.noreply.github.com>
Date: Fri, 19 Sep 2025 20:02:15 +0000
Subject: [PATCH] Updated with the [latest
changes](https://github.com/gruntwork-io/terraform-aws-server/releases/tag/v1.0.3)
from the `terraform-aws-server@v1.0.3` source branch.
---
.../attach-eni/attach-eni.md | 16 ++++++++--------
.../disable-instance-metadata.md | 16 ++++++++--------
.../ec2-backup/ec2-backup.md | 16 ++++++++--------
.../persistent-ebs-volume.md | 18 +++++++++---------
...equire-instance-metadata-service-version.md | 16 ++++++++--------
.../route53-helpers/route53-helpers.md | 16 ++++++++--------
.../single-server/single-server.md | 16 ++++++++--------
7 files changed, 57 insertions(+), 57 deletions(-)
diff --git a/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md b/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md
index 833203964a..d60ce90654 100644
--- a/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md
+++ b/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Attach ENI Scripts
-View Source
+View Source
Release Notes
@@ -30,7 +30,7 @@ This folder contains scripts you can use to attach [Elastic Network Interfaces
An ENI allows you to have IP addresses that remain static, even if the underlying EC2 Instances are changing.
-Check out the [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/attach-eni) for how to use these scripts with Terraform.
+Check out the [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/attach-eni) for how to use these scripts with Terraform.
## Installing the attach-eni script
@@ -47,7 +47,7 @@ The `attach-eni` script has the following prerequisites:
1. It must be run as root
2. It must be run on an EC2 instance
3. The EC2 instance must have an IAM role with permissions to search ENIs and EC2 tags, as well as attach ENIs (see the
- [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/attach-eni))
+ [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/attach-eni))
4. The EC2 instance must have the AWS CLI and jq installed
Typically, you'll want to run the `attach-eni` script in the User Data of your EC2 instances so it attaches the ENI at
@@ -70,11 +70,11 @@ This tells the script to try find and attach an ENI with the same `Name` tag as
diff --git a/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md b/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md
index 47d04cbaba..eb69cbbd18 100644
--- a/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md
+++ b/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Disable Instance Metadata Access script
-View Source
+View Source
Release Notes
@@ -26,7 +26,7 @@ Once that is done, you can call this script to further secure your instance by d
`disable-instance-metadata`: This script can be run on an EC2 instance to disable further access to the Instance Metadata service from that instance. It uses
the AWS API to disable access to the endpoint.
-Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers) for how to use these scripts with Packer and Terraform.
+Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers) for how to use these scripts with Packer and Terraform.
## Installing the scripts
@@ -42,7 +42,7 @@ The `disable-instance-metadata` script has the following prerequisites:
1. It must be run on an EC2 instance
2. The EC2 instance must have an IAM role with permissions to modify the Instance Metadata service's options. See the
- [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers)) for a reference implementation.
+ [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers)) for a reference implementation.
3. The EC2 instance must have the AWS CLI (version 2.2.37 or higher), unzip and jq installed.
Run the `disable-instance-metadata` script in the User Data of your EC2 instances, after any required calls to the Instance Metadata service have been made. This way, your instances will still be able to access the Instance Metadata service when needed, but will also disable further access to the service upon boot.
@@ -74,11 +74,11 @@ This will result in subsequent calls to the Instance Metadata service to fail.
diff --git a/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md b/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md
index 90fbaf1604..2e31cbada5 100644
--- a/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md
+++ b/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# EC2 Backup Module
-View Source
+View Source
Release Notes
@@ -32,7 +32,7 @@ This module makes it easy to deploy a [data lifecycle manager policy](https://do
module "ec_2_backup" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.2"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.3"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -98,7 +98,7 @@ module "ec_2_backup" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.2"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.3"
}
inputs = {
@@ -304,11 +304,11 @@ The name of the IAM role associated with the data lifecycle manager
diff --git a/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md b/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md
index 9c4aca8b9f..c0d11dd725 100644
--- a/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md
+++ b/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Persistent EBS Volume Scripts
-View Source
+View Source
-Release Notes
+Release Notes
This folder contains scripts you can use to work with EBS Volumes that persist between redeploys of an EC2 instance:
@@ -40,7 +40,7 @@ volume can only be associated with a single EC2 Instance, so if you need the dat
multiple servers, check out the [Amazon Elastic File System](https://aws.amazon.com/efs/), which provides a service
built on top of NFS.
-Check out the [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/persistent-ebs-volume) for how to use these scripts with
+Check out the [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/persistent-ebs-volume) for how to use these scripts with
Terraform.
## Installing the scripts
@@ -58,7 +58,7 @@ The scripts have the following prerequisites:
1. They must be run as root
2. They must be run on an EC2 instance
3. The EC2 instance must have an IAM role with permissions to list, attach, and detach volumes (see the
- [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/persistent-ebs-volume))
+ [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/persistent-ebs-volume))
4. The EC2 instance must have the AWS CLI and jq installed
Run the `mount-ebs-volume` script in the User Data of your EC2 instances so it mounts the volume at boot. Run the
@@ -219,11 +219,11 @@ detaching the device.
diff --git a/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md b/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md
index 45e10ce503..5857079875 100644
--- a/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md
+++ b/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Require Instance Metadata Service version script
-View Source
+View Source
Release Notes
@@ -24,7 +24,7 @@ This folder contains a script (`require-instance-metadata-service-version`) you
Learn more at [the official AWS EC2 Instance Metadata Service documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html).
-Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers) for how to use these scripts with Packer and Terraform.
+Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers) for how to use these scripts with Packer and Terraform.
## Installing bash-commons
@@ -49,7 +49,7 @@ The `require-instance-metadata-service-version` script has the following prerequ
1. It must be run on an EC2 instance
2. It requires that `bash-commons` version `v0.1.8` or newer is installed on the EC2 Instance. See instructions above.
3. The EC2 instance must have an IAM role with permissions to modify the Instance Metadata service's options. See the
- [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers)) for a reference implementation.
+ [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers)) for a reference implementation.
4. The EC2 instance must have the AWS CLI (version 2.2.37 or higher), unzip and jq installed.
Run the `require-instance-metadata-service-version` script in the User Data of your EC2 instances, prior to any calls to the Instance Metadata Service to configure if you want `2.0` credentials to be `required` or `optional`.
@@ -97,11 +97,11 @@ Setting Instance Metadata Service version 2 state to optional
diff --git a/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md b/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md
index 0217b2247e..e7138cd8df 100644
--- a/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md
+++ b/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Route 53 Helpers
-View Source
+View Source
Release Notes
@@ -23,7 +23,7 @@ The helpers are:
* `add-dns-a-record`: A script that can be run on an EC2 instance to add a DNS A record pointing to the instance's IP
address.
-Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers) for how to use these scripts with Terraform.
+Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers) for how to use these scripts with Terraform.
## Installing the helpers
@@ -69,16 +69,16 @@ Here is an example of an IAM policy your EC2 instance needs attached to its IAM
}
```
-Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.2/examples/route53-helpers) to see what this looks like in action.
+Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.3/examples/route53-helpers) to see what this looks like in action.
diff --git a/docs/reference/modules/terraform-aws-server/single-server/single-server.md b/docs/reference/modules/terraform-aws-server/single-server/single-server.md
index ce10c88d59..8df442093b 100644
--- a/docs/reference/modules/terraform-aws-server/single-server/single-server.md
+++ b/docs/reference/modules/terraform-aws-server/single-server/single-server.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Single Server Module
-View Source
+View Source
Release Notes
@@ -105,7 +105,7 @@ resource "aws_iam_policy_attachment" "attachment" {
module "single_server" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.2"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.3"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -394,7 +394,7 @@ module "single_server" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.2"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.3"
}
inputs = {
@@ -1318,11 +1318,11 @@ When used in combination with user_data or user_data_base64, a user_data change