This GitHub repository contains multiple use cases of working with Terraform to provision Amazon EC2 instances. Specific Git branches separate these use cases. To read more about that, click here.
I have the Terraform code in this branch to access the AWS Secrets Manager secret value using Python from an Amazon EC2 instance.
For that, I:
1. created a couple of secrets and stored those inside AWS Secrets Manager secrets,
2. created a couple of Amazon EC2 instances, and
3. created Python files inside the Amazon EC2 instances using the user data script to access the secret.
I have detailed documentation on my note at: access-aws-secrets-manager-secret-from-amazon-ec2-instance-using-python
I installed terraform
before I worked on this repository. Installation information is available in the install guide.
I used the access_key
and the secret_key
of an IAM user that had permission to create all the resources managed via this terraform
code.
I created a terraform.tfvars
file to store them and updated the .gitignore file so the file does not get committed to this repository.
Ensure that the IAM user whose credentials are being used in this configuration has permission to create and manage all the resources that are included in this repository.
Review all the terraform
code, starting with the network block discussed in vpc.tf.
Before you run this code, add a backend.tf
if there are multiple team members working in the same code repository to avoid accidental overrides.
Next run terraform init
Then run terraform plan
And finally run terraform apply
There are eleven other branches in this repository discussing other use-cases:
This code is released under the Unlincse License. See LICENSE.