Found 84 matches for pattern "replication" in path ".":
---
File: lib/dalmatian/rds.rb
L109:     def replication_bucket_destination_arn
L110:       reference["replication_bucket_destination_arn"] || ""
L113:     def replication_kms_key_id
L114:       reference["replication_kms_key_id"] || ""
L158:         "replication_bucket_destination_arn" => replication_bucket_destination_arn,
L159:         "replication_kms_key_id" => replication_kms_key_id,
---
File: lib/dalmatian/aurora.rb
L98:     def replication_bucket_destination_arn
L99:       reference["replication_bucket_destination_arn"] || ""
L102:     def replication_kms_key_id
L103:       reference["replication_kms_key_id"] || ""
L144:         "replication_bucket_destination_arn" => replication_bucket_destination_arn,
L145:         "replication_kms_key_id" => replication_kms_key_id
---
File: spec/unit/rds_spec.rb
L40:         "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
L41:         "replication_kms_key_id" => "key-id",
L177:     describe "#replication_bucket_destination_arn" do
L178:       it "uses the rds replication_bucket_destination_arn" do
L179:         expect(rds.replication_bucket_destination_arn).to eq("arn:aws:s3:::dest-bucket")
L183:     describe "#replication_kms_key_id" do
L184:       it "uses the rds replication_kms_key_id" do
L185:         expect(rds.replication_kms_key_id).to eq("key-id")
L241:           "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
L242:           "replication_kms_key_id" => "key-id",
---
File: docs/database-backups.md
L37: ## Cross-account S3 replication for SQL backups
L47:   replication_bucket_destination_arn: "arn:aws:s3:::your-destination-bucket-name"
L48:   replication_kms_key_id: "your-destination-kms-key-id"
L53: The destination account must permit the source account's replication role to write to the bucket and use the KMS key.
L57: Add a policy to the destination bucket to allow the replication role from the source account:
L64:             "Sid": "AllowReplicationFromDalmatianSource",
L67:                 "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
L83: If the destination bucket uses a Customer Managed Key (CMK) for encryption, the key policy must allow the source replication role to use it:
L87:     "Sid": "AllowUsageByDalmatianSourceReplicationRole",
L90:         "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
---
File: terraform/infrastructures/rds/sql-backups-s3.tf
L80:     status = var.rds.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
L84: resource "aws_iam_role" "replication" {
L85:   count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L86:   name  = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication"
L105: resource "aws_iam_policy" "replication" {
L106:   count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L107:   name  = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication-policy"
L110:     "../../policies/s3-replication-policy.json.tpl",
L113:       destination_bucket_arn = var.rds.replication_bucket_destination_arn
L114:       destination_kms_key_arn = var.rds.replication_kms_key_id
L120: resource "aws_iam_role_policy_attachment" "replication" {
L121:   count      = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L122:   role       = aws_iam_role.replication[0].name
L123:   policy_arn = aws_iam_policy.replication[0].arn
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
L130:   count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L133:   role   = aws_iam_role.replication[0].arn
L136:     id     = "replication"
L140:       bucket        = var.rds.replication_bucket_destination_arn
L148:         for_each = var.rds.replication_kms_key_id != "" ? [1] : []
L150:           replica_kms_key_id = var.rds.replication_kms_key_id
---
File: terraform/infrastructures/rds/variables.tf
L66:     replication_bucket_destination_arn                    = string
L67:     replication_kms_key_id                                = string
---
File: terraform/infrastructures/elasticache-cluster/ssm-parameter.tf
L7:   value       = local.elasticache_cluster_engine == "redis" ? "redis://${aws_elasticache_replication_group.elasticache_redis[0].primary_endpoint_address}:${aws_elasticache_replication_group.elasticache_redis[0].port}" : ""
---
File: terraform/infrastructures/elasticache-cluster/elasticache-redis.tf
L23: resource "aws_elasticache_replication_group" "elasticache_redis" {
L26:   replication_group_id = local.elasticache_cluster_id
L27:   description          = "ElastiCache replication group for ${var.infrastructure_name}-${var.environment}-${local.elasticache_cluster_identifier}"
---
File: terraform/infrastructures/aurora/sql-backups-s3.tf
L80:     status = var.aurora.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
L84: resource "aws_iam_role" "replication" {
L85:   count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L86:   name  = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication"
L105: resource "aws_iam_policy" "replication" {
L106:   count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L107:   name  = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication-policy"
L110:     "../../policies/s3-replication-policy.json.tpl",
L113:       destination_bucket_arn = var.aurora.replication_bucket_destination_arn
L114:       destination_kms_key_arn = var.aurora.replication_kms_key_id
L120: resource "aws_iam_role_policy_attachment" "replication" {
L121:   count      = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L122:   role       = aws_iam_role.replication[0].name
L123:   policy_arn = aws_iam_policy.replication[0].arn
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
L130:   count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L133:   role   = aws_iam_role.replication[0].arn
L136:     id     = "replication"
L140:       bucket        = var.aurora.replication_bucket_destination_arn
L148:         for_each = var.aurora.replication_kms_key_id != "" ? [1] : []
L150:           replica_kms_key_id = var.aurora.replication_kms_key_id
---
File: terraform/infrastructures/aurora/variables.tf
L63:     replication_bucket_destination_arn              = string
L64:     replication_kms_key_id                          = string
---
File: terraform/policies/s3-replication-policy.json.tpl
L6:         "s3:GetReplicationConfiguration",
L16:         "s3:GetObjectVersionForReplication",
---