kunduso / rds-secretsmanager-rotation-lambda-terraform

This repository contains the necessary Terraform configurations to deploy an Amazon RDS for PostgreSQL and all the supporting infrastructure components like Amazon VPC, Subnets, KMS keys, security group and IAM roles, automated via GitHub Actions. Code scanning is enabled via Bridgecrew Checkov.
https://skundunotes.com/2024/09/18/create-amazon-rds-for-postgresql-db-using-terraform-and-github-actions/
The Unlicense
0 stars 0 forks source link

corrected subnet group cidr #4 #8

Closed kunduso closed 3 months ago

kunduso commented 3 months ago

This PR fixes the build and closes #4

github-actions[bot] commented 3 months ago

💰 Infracost report

Monthly estimate generated

This comment will be updated when code changes.

github-actions[bot] commented 3 months ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan ``` terraform data.aws_caller_identity.current: Reading... data.aws_availability_zones.available: Reading... aws_vpc.this: Refreshing state... [id=vpc-00cca1bdbb2ac5fe7] data.aws_caller_identity.current: Read complete after 0s [id=743794601996] data.aws_availability_zones.available: Read complete after 0s [id=us-east-2] aws_route_table.this_rt: Refreshing state... [id=rtb-0cbfb3ce27b7d85f7] aws_default_security_group.default: Refreshing state... [id=sg-04d49f9c6598bebc4] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # aws_route_table_association.db[0] will be created + resource "aws_route_table_association" "db" { + id = (known after apply) + route_table_id = "rtb-0cbfb3ce27b7d85f7" + subnet_id = (known after apply) } # aws_route_table_association.db[1] will be created + resource "aws_route_table_association" "db" { + id = (known after apply) + route_table_id = "rtb-0cbfb3ce27b7d85f7" + subnet_id = (known after apply) } # aws_subnet.db[0] will be created + resource "aws_subnet" "db" { + arn = (known after apply) + assign_ipv6_address_on_creation = false + availability_zone = "us-east-2a" + availability_zone_id = (known after apply) + cidr_block = "15.25.15.0/28" + enable_dns64 = false + enable_resource_name_dns_a_record_on_launch = false + enable_resource_name_dns_aaaa_record_on_launch = false + id = (known after apply) + ipv6_cidr_block_association_id = (known after apply) + ipv6_native = false + map_public_ip_on_launch = false + owner_id = (known after apply) + private_dns_hostname_type_on_launch = (known after apply) + tags = { + "Name" = "app-12subnet-1" } + tags_all = { + "Name" = "app-12subnet-1" + "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" } + vpc_id = "vpc-00cca1bdbb2ac5fe7" } # aws_subnet.db[1] will be created + resource "aws_subnet" "db" { + arn = (known after apply) + assign_ipv6_address_on_creation = false + availability_zone = "us-east-2b" + availability_zone_id = (known after apply) + cidr_block = "15.25.15.16/28" + enable_dns64 = false + enable_resource_name_dns_a_record_on_launch = false + enable_resource_name_dns_aaaa_record_on_launch = false + id = (known after apply) + ipv6_cidr_block_association_id = (known after apply) + ipv6_native = false + map_public_ip_on_launch = false + owner_id = (known after apply) + private_dns_hostname_type_on_launch = (known after apply) + tags = { + "Name" = "app-12subnet-2" } + tags_all = { + "Name" = "app-12subnet-2" + "Source" = "https://github.com/kunduso/terraform-rds-secretsmanager-rotation-lambda" } + vpc_id = "vpc-00cca1bdbb2ac5fe7" } Plan: 4 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: TFplan.JSON To perform exactly these actions, run the following command to apply: terraform apply "TFplan.JSON" ```

Pushed by: @kunduso, Action: pull_request