dynk8s-provisioner/terraform
Dustin b01841ab72
dustin/dynk8s-provisioner/pipeline/head Something is wrong with the build of this commit Details
terraform: Update node template to Fedora 36
2023-01-10 17:19:20 -06:00
..
.gitattributes terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.gitignore terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.terraform.lock.hcl terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
README.md terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
asg.tf terraform: Update node template to Fedora 36 2023-01-10 17:19:20 -06:00
eventbridge.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
iam-policy.json terraform: Add config for auto-scaling group 2022-10-11 21:40:42 -05:00
main.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
sns.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
terraform.tfstate terraform: Update node template to Fedora 36 2023-01-10 17:19:20 -06:00
userdata.yml terraform: Update node template to Fedora 36 2023-01-10 17:19:20 -06:00
variables.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00

README.md

Configuring AWS Using Terraform

Prerequisites

The IAM user or role that runs Terraform must have the appropriate permissions. The iam-policy.json file defines a policy that will allow the Terraform to manage all of the necessary resources. Before running Terraform, create an IAM policy and assign it to a user, group, or role. Be sure to replace the AWS account ID in the various target resource names.

To use an IAM role, set the iam_role Terraform variable when executing terraform plan/terraform apply.

Create Resources

Terraform will create all resources automatically:

terraform apply