Skip to content

Latest commit

 

History

History

aws-asg

Requirements

Name Version
terraform >= 0.14
aws >= 4.23
random ~> 3

Providers

Name Version
aws 5.17.0
random 3.5.1

Modules

No modules.

Resources

Name Type
aws_autoscaling_group.asg resource
aws_autoscaling_notification.notification resource
aws_cloudwatch_log_group.cloudgen_access_proxy resource
aws_elasticache_replication_group.redis resource
aws_elasticache_subnet_group.redis resource
aws_iam_instance_profile.profile resource
aws_iam_role.role resource
aws_iam_role_policy.cloudgen_access_proxy_secrets resource
aws_iam_role_policy.cloudwatch_logs resource
aws_iam_role_policy.redis resource
aws_launch_template.launch_template resource
aws_lb.nlb resource
aws_lb_listener.nlb_listener resource
aws_lb_target_group.nlb_target_group resource
aws_secretsmanager_secret.token resource
aws_secretsmanager_secret_version.token resource
aws_security_group.inbound resource
aws_security_group.redis resource
aws_security_group.resources resource
random_string.prefix resource
aws_ami.ami data source
aws_caller_identity.current data source
aws_subnet.vpc_from_first_subnet data source

Inputs

Name Description Type Default Required
asg_ami Uses linux AMI maintained by AWS by default.
Suported types are CentOS, Ubuntu or AWS Linux based.
string "amazonlinux2" no
asg_desired_capacity The number of Amazon EC2 instances that should be running in the auto scaling group number 3 no
asg_health_check_grace_period The amount of time, in seconds, that Amazon EC2 Auto Scaling waits
before checking the health status of new instances.
number 300 no
asg_max_size The minimum size of the auto scaling group number 3 no
asg_min_size The maximum size of the auto scaling group number 3 no
asg_notification_arn_topic Optional ARN topic to get Auto Scaling Group events string "" no
asg_subnets A list of subnet IDs to launch resources in.
Use Private Subnets with NAT Gateway configured or Public Subnets
list(any) n/a yes
aws_region AWS Region string n/a yes
cloudWatch_logs_retention_in_days Days to keep CloudWatch logs (Possible values are:
1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, 3653, and 0.
0 = never delete.)
number 7 no
cloudgen_access_proxy_level Set the CloudGen Access Proxy orchestrator log level string "info" no
cloudgen_access_proxy_public_port Public port for this proxy (must match the value configured in the console for this proxy) number 443 no
cloudgen_access_proxy_token CloudGen Access Proxy Token for this proxy (obtained from the console after proxy creation) string n/a yes
cloudwatch_logs_enabled Set to true to send '/var/log/message' logs to CloudWatch bool true no
launch_tmpl_associate_public_ip_address Associate a public ip address with an instance in a VPC bool false no
launch_tmpl_instance_type The type of instance to use (e.g. t3.micro, t3.small, t3.medium, etc) string "t3.small" no
module_version Terraform module version string "v2.0.3" no
nlb_enable_cross_zone_load_balancing Configure cross zone load balancing for the NLB bool false no
nlb_subnets A list of public subnet IDs to attach to the LB. Use Public Subnets only list(string) n/a yes
redis_subnets A list of subnet IDs to to use for the redis instances.
At least two subnets on different Availability Zones must be provided
list(any) [] no
ssm_allow_console Configures Systems Manager Session Manager to allow console bool true no
ssm_parameter_store Set to false to disable querying the Systems Manager Parameter Store for process arguments bool true no
tags A map of tags to add to all resources map(string) {} no

Outputs

Name Description
Network_Load_Balancer_DNS_Name Update the CloudGen Access Proxy in the Console with this DNS name
Security_Group_for_Resources Use this group to allow CloudGen Access Proxy access to internal resources