diff --git a/terraform/layer2-k8s/README.md b/terraform/layer2-k8s/README.md
index d9e54a00..a9d8df6e 100644
--- a/terraform/layer2-k8s/README.md
+++ b/terraform/layer2-k8s/README.md
@@ -62,8 +62,13 @@
| [aws_route53_record.default_ingress](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/route53_record) | resource |
| [aws_s3_bucket.elastic_stack](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket) | resource |
| [aws_s3_bucket.gitlab_runner_cache](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket) | resource |
+| [aws_s3_bucket_acl.elastic_stack_acl](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_acl) | resource |
+| [aws_s3_bucket_acl.gitlab_runner_acl](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_acl) | resource |
+| [aws_s3_bucket_lifecycle_configuration.gitlab_runner_lifecycle](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_lifecycle_configuration) | resource |
| [aws_s3_bucket_public_access_block.elastic_stack_public_access_block](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_public_access_block) | resource |
| [aws_s3_bucket_public_access_block.gitlab_runner_cache_public_access_block](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_public_access_block) | resource |
+| [aws_s3_bucket_server_side_encryption_configuration.elastic_stack_encryption](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_server_side_encryption_configuration) | resource |
+| [aws_s3_bucket_server_side_encryption_configuration.gitlab_runner_encryption](https://registry.terraform.io/providers/aws/4.10.0/docs/resources/s3_bucket_server_side_encryption_configuration) | resource |
| [helm_release.aws_loadbalancer_controller](https://registry.terraform.io/providers/helm/2.5.1/docs/resources/release) | resource |
| [helm_release.aws_node_termination_handler](https://registry.terraform.io/providers/helm/2.5.1/docs/resources/release) | resource |
| [helm_release.cert_manager](https://registry.terraform.io/providers/helm/2.5.1/docs/resources/release) | resource |
@@ -142,4 +147,4 @@
| [victoria\_metrics\_k8s\_stack\_get\_grafana\_admin\_password](#output\_victoria\_metrics\_k8s\_stack\_get\_grafana\_admin\_password) | Command which gets admin password from kubernetes secret |
| [victoria\_metrics\_k8s\_stack\_grafana\_admin\_password](#output\_victoria\_metrics\_k8s\_stack\_grafana\_admin\_password) | Grafana admin password |
| [victoria\_metrics\_k8s\_stack\_grafana\_domain\_name](#output\_victoria\_metrics\_k8s\_stack\_grafana\_domain\_name) | Grafana dashboards address |
-
\ No newline at end of file
+
diff --git a/terraform/layer2-k8s/eks-elk.tf b/terraform/layer2-k8s/eks-elk.tf
index de52d6c4..0344997c 100644
--- a/terraform/layer2-k8s/eks-elk.tf
+++ b/terraform/layer2-k8s/eks-elk.tf
@@ -798,22 +798,32 @@ resource "aws_s3_bucket" "elastic_stack" {
count = local.elk.enabled ? 1 : 0
bucket = "${local.name}-elastic-stack"
- acl = "private"
force_destroy = true
- server_side_encryption_configuration {
- rule {
- apply_server_side_encryption_by_default {
- sse_algorithm = "aws:kms"
- }
- }
- }
-
tags = {
Name = "${local.name}-elastic-stack"
Environment = local.env
}
}
+resource "aws_s3_bucket_acl" "elastic_stack_acl" {
+ count = local.elk.enabled ? 1 : 0
+
+ bucket = aws_s3_bucket.elastic_stack[0].id
+ acl = "private"
+}
+
+resource "aws_s3_bucket_server_side_encryption_configuration" "elastic_stack_encryption" {
+ count = local.elk.enabled ? 1 : 0
+
+ bucket = aws_s3_bucket.elastic_stack[0].bucket
+
+ rule {
+ apply_server_side_encryption_by_default {
+ sse_algorithm = "aws:kms"
+ }
+ }
+}
+
resource "aws_s3_bucket_public_access_block" "elastic_stack_public_access_block" {
count = local.elk.enabled ? 1 : 0
diff --git a/terraform/layer2-k8s/eks-gitlab-runner.tf b/terraform/layer2-k8s/eks-gitlab-runner.tf
index 03cd1109..3a171a0f 100644
--- a/terraform/layer2-k8s/eks-gitlab-runner.tf
+++ b/terraform/layer2-k8s/eks-gitlab-runner.tf
@@ -116,30 +116,50 @@ resource "aws_s3_bucket" "gitlab_runner_cache" {
count = local.gitlab_runner.enabled ? 1 : 0
bucket = "${local.name}-gitlab-runner-cache"
- acl = "private"
force_destroy = true
- server_side_encryption_configuration {
- rule {
- apply_server_side_encryption_by_default {
- sse_algorithm = "aws:kms"
- }
- }
- }
-
tags = {
Name = "${local.name}-gitlab-runner-cache"
Environment = local.env
}
- lifecycle_rule {
- id = "gitlab-runner-cache-lifecycle-rule"
- enabled = true
- tags = {
- "rule" = "gitlab-runner-cache-lifecycle-rule"
+}
+
+resource "aws_s3_bucket_acl" "gitlab_runner_acl" {
+ count = local.gitlab_runner.enabled ? 1 : 0
+
+ bucket = aws_s3_bucket.gitlab_runner_cache[0].id
+ acl = "private"
+}
+
+resource "aws_s3_bucket_server_side_encryption_configuration" "gitlab_runner_encryption" {
+ count = local.gitlab_runner.enabled ? 1 : 0
+
+ bucket = aws_s3_bucket.gitlab_runner_cache[0].bucket
+
+ rule {
+ apply_server_side_encryption_by_default {
+ sse_algorithm = "aws:kms"
}
+ }
+}
+
+resource "aws_s3_bucket_lifecycle_configuration" "gitlab_runner_lifecycle" {
+ bucket = aws_s3_bucket.gitlab_runner_cache[0].id
+
+ rule {
+ id = "gitlab-runner-cache-lifecycle-rule"
expiration {
days = 120
}
+
+ filter {
+ and {
+ tags = {
+ rule = "gitlab-runner-cache-lifecycle-rule"
+ }
+ }
+ }
+ status = "Enabled"
}
}
diff --git a/terraform/modules/self-signed-certificate/README.md b/terraform/modules/self-signed-certificate/README.md
index 79c1c89b..9737e09d 100644
--- a/terraform/modules/self-signed-certificate/README.md
+++ b/terraform/modules/self-signed-certificate/README.md
@@ -39,4 +39,4 @@ No modules.
| [cert\_pem](#output\_cert\_pem) | n/a |
| [p8](#output\_p8) | n/a |
| [private\_key\_pem](#output\_private\_key\_pem) | n/a |
-
\ No newline at end of file
+
diff --git a/terraform/modules/self-signed-certificate/main.tf b/terraform/modules/self-signed-certificate/main.tf
index 9393166a..4eeac09e 100644
--- a/terraform/modules/self-signed-certificate/main.tf
+++ b/terraform/modules/self-signed-certificate/main.tf
@@ -3,7 +3,6 @@ resource "tls_private_key" "this" {
}
resource "tls_self_signed_cert" "this" {
- key_algorithm = tls_private_key.this.algorithm
private_key_pem = tls_private_key.this.private_key_pem
validity_period_hours = var.validity_period_hours
early_renewal_hours = var.early_renewal_hours