kunduso / rds-secretsmanager-rotation-lambda-terraform

This repository contains the necessary Terraform configurations to deploy an Amazon RDS for PostgreSQL and all the supporting infrastructure components like Amazon VPC, Subnets, KMS keys, security group and IAM roles, automated via GitHub Actions. Code scanning is enabled via Bridgecrew Checkov.
https://skundunotes.com/2024/09/18/create-amazon-rds-for-postgresql-db-using-terraform-and-github-actions/
The Unlicense
0 stars 0 forks source link

Expand VPC #10

Closed kunduso closed 3 months ago

kunduso commented 3 months ago

This PR closes #9

github-actions[bot] commented 3 months ago

💰 Infracost report

Monthly estimate generated

This comment will be updated when code changes.

github-actions[bot] commented 3 months ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan ``` terraform data.aws_caller_identity.current: Reading... data.aws_availability_zones.available: Reading... aws_vpc.this: Refreshing state... [id=vpc-00cca1bdbb2ac5fe7] data.aws_caller_identity.current: Read complete after 0s [id=743794601996] data.aws_availability_zones.available: Read complete after 1s [id=us-east-2] aws_route_table.this_rt: Refreshing state... [id=rtb-0cbfb3ce27b7d85f7] aws_default_security_group.default: Refreshing state... [id=sg-04d49f9c6598bebc4] aws_subnet.db[0]: Refreshing state... [id=subnet-0e5a5582e5bf179d3] aws_subnet.db[1]: Refreshing state... [id=subnet-08f3e995aef564925] aws_route_table_association.db[1]: Refreshing state... [id=rtbassoc-055cca10a899d0725] aws_route_table_association.db[0]: Refreshing state... [id=rtbassoc-0408b3ebfc153259c] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: -/+ destroy and then create replacement Terraform will perform the following actions: # aws_default_security_group.default must be replaced -/+ resource "aws_default_security_group" "default" { ~ arn = "arn:aws:ec2:us-east-2:743794601996:security-group/sg-04d49f9c6598bebc4" -> (known after apply) ~ description = "default VPC security group" -> (known after apply) ~ egress = [] -> (known after apply) ~ id = "sg-04d49f9c6598bebc4" -> (known after apply) ~ ingress = [] -> (known after apply) ~ name = "default" -> (known after apply) + name_prefix = (known after apply) ~ owner_id = "743794601996" -> (known after apply) - tags = { - "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" } -> null ~ tags_all = { ~ "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> "https://github.com/kunduso/rds-secretsmanager-rotation-lambda-terraform" } ~ vpc_id = "vpc-00cca1bdbb2ac5fe7" # forces replacement -> (known after apply) # forces replacement # (1 unchanged attribute hidden) } # aws_route_table.this_rt must be replaced -/+ resource "aws_route_table" "this_rt" { ~ arn = "arn:aws:ec2:us-east-2:743794601996:route-table/rtb-0cbfb3ce27b7d85f7" -> (known after apply) ~ id = "rtb-0cbfb3ce27b7d85f7" -> (known after apply) ~ owner_id = "743794601996" -> (known after apply) ~ propagating_vgws = [] -> (known after apply) ~ route = [] -> (known after apply) ~ tags = { "Name" = "app-12-route-table" - "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> null } ~ tags_all = { ~ "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> "https://github.com/kunduso/rds-secretsmanager-rotation-lambda-terraform" # (1 unchanged element hidden) } ~ vpc_id = "vpc-00cca1bdbb2ac5fe7" # forces replacement -> (known after apply) # forces replacement } # aws_route_table_association.db[0] must be replaced -/+ resource "aws_route_table_association" "db" { ~ id = "rtbassoc-0408b3ebfc153259c" -> (known after apply) ~ route_table_id = "rtb-0cbfb3ce27b7d85f7" -> (known after apply) ~ subnet_id = "subnet-0e5a5582e5bf179d3" # forces replacement -> (known after apply) # forces replacement # (1 unchanged attribute hidden) } # aws_route_table_association.db[1] must be replaced -/+ resource "aws_route_table_association" "db" { ~ id = "rtbassoc-055cca10a899d0725" -> (known after apply) ~ route_table_id = "rtb-0cbfb3ce27b7d85f7" -> (known after apply) ~ subnet_id = "subnet-08f3e995aef564925" # forces replacement -> (known after apply) # forces replacement # (1 unchanged attribute hidden) } # aws_subnet.db[0] must be replaced -/+ resource "aws_subnet" "db" { ~ arn = "arn:aws:ec2:us-east-2:743794601996:subnet/subnet-0e5a5582e5bf179d3" -> (known after apply) ~ availability_zone_id = "use2-az1" -> (known after apply) - enable_lni_at_device_index = 0 -> null ~ id = "subnet-0e5a5582e5bf179d3" -> (known after apply) + ipv6_cidr_block_association_id = (known after apply) - map_customer_owned_ip_on_launch = false -> null ~ owner_id = "743794601996" -> (known after apply) ~ private_dns_hostname_type_on_launch = "ip-name" -> (known after apply) ~ tags = { "Name" = "app-12subnet-1" - "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> null } ~ tags_all = { ~ "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> "https://github.com/kunduso/rds-secretsmanager-rotation-lambda-terraform" # (1 unchanged element hidden) } ~ vpc_id = "vpc-00cca1bdbb2ac5fe7" # forces replacement -> (known after apply) # forces replacement # (11 unchanged attributes hidden) } # aws_subnet.db[1] must be replaced -/+ resource "aws_subnet" "db" { ~ arn = "arn:aws:ec2:us-east-2:743794601996:subnet/subnet-08f3e995aef564925" -> (known after apply) ~ availability_zone_id = "use2-az2" -> (known after apply) - enable_lni_at_device_index = 0 -> null ~ id = "subnet-08f3e995aef564925" -> (known after apply) + ipv6_cidr_block_association_id = (known after apply) - map_customer_owned_ip_on_launch = false -> null ~ owner_id = "743794601996" -> (known after apply) ~ private_dns_hostname_type_on_launch = "ip-name" -> (known after apply) ~ tags = { "Name" = "app-12subnet-2" - "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> null } ~ tags_all = { ~ "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> "https://github.com/kunduso/rds-secretsmanager-rotation-lambda-terraform" # (1 unchanged element hidden) } ~ vpc_id = "vpc-00cca1bdbb2ac5fe7" # forces replacement -> (known after apply) # forces replacement # (11 unchanged attributes hidden) } # aws_vpc.this must be replaced -/+ resource "aws_vpc" "this" { ~ arn = "arn:aws:ec2:us-east-2:743794601996:vpc/vpc-00cca1bdbb2ac5fe7" -> (known after apply) - assign_generated_ipv6_cidr_block = false -> null ~ cidr_block = "15.25.15.0/27" -> "15.25.15.0/26" # forces replacement ~ default_network_acl_id = "acl-054bd48546252675e" -> (known after apply) ~ default_route_table_id = "rtb-01e3c20d3b60fe03d" -> (known after apply) ~ default_security_group_id = "sg-04d49f9c6598bebc4" -> (known after apply) ~ dhcp_options_id = "dopt-004ba8a36aaf520f6" -> (known after apply) ~ enable_network_address_usage_metrics = false -> (known after apply) ~ id = "vpc-00cca1bdbb2ac5fe7" -> (known after apply) + ipv6_association_id = (known after apply) + ipv6_cidr_block = (known after apply) + ipv6_cidr_block_network_border_group = (known after apply) - ipv6_netmask_length = 0 -> null ~ main_route_table_id = "rtb-01e3c20d3b60fe03d" -> (known after apply) ~ owner_id = "743794601996" -> (known after apply) ~ tags = { "Name" = "app-12" - "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> null } ~ tags_all = { ~ "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" -> "https://github.com/kunduso/rds-secretsmanager-rotation-lambda-terraform" # (1 unchanged element hidden) } # (4 unchanged attributes hidden) } Plan: 7 to add, 0 to change, 7 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: TFplan.JSON To perform exactly these actions, run the following command to apply: terraform apply "TFplan.JSON" ```

Pushed by: @kunduso, Action: pull_request