* setup GCP terraform structure for connector dev infra * fxes * Created aws terraform bootstrap infrastructure * Corrected path for S3 state file * Creating ssh tunnel testing infrastructure * Creating a bastion host * Docs * Created bastion host with airbyte unprivileged account for tunneling * Added yum updates * Create a private subnet and a postgres database within it * Identifier for db * Create postgres and bastion within a module. * Set up postgres infrastructure * Don't need this terraform wrapper when we run with tfenv * Dropped incomplete WIP from GCP setup for this PR. * Touchups to how to use terraform * Updated to resolve merge conflict * More separated top level structure to avoid monorepo problems with terraform destroy. * Clarifying directory structure * Migrated directory structure for testing infrastructure Co-authored-by: Jenny Brown <jenny@airbyte.io>
21 lines
509 B
HCL
21 lines
509 B
HCL
# This bucket holds terraform.tfstate files for various tf projects.
|
|
resource "aws_s3_bucket" "com-airbyte-terraform-state" {
|
|
bucket = "com-airbyte-terraform-state"
|
|
acl = "private"
|
|
versioning {
|
|
enabled = true
|
|
}
|
|
server_side_encryption_configuration {
|
|
rule {
|
|
apply_server_side_encryption_by_default {
|
|
kms_master_key_id = aws_kms_key.terraform_s3_kms.arn
|
|
sse_algorithm = "aws:kms"
|
|
}
|
|
}
|
|
}
|
|
tags = {
|
|
Name = "com-airbyte-terraform-state"
|
|
}
|
|
}
|
|
|