More sessions

This commit is contained in:
2026-02-24 18:03:22 +00:00
parent eb5bd4a929
commit 23cc78aa98
284 changed files with 129543 additions and 4 deletions

View File

@@ -0,0 +1,108 @@
Found 84 matches for pattern "replication" in path ".":
---
File: lib/dalmatian/rds.rb
L109: def replication_bucket_destination_arn
L110: reference["replication_bucket_destination_arn"] || ""
L113: def replication_kms_key_id
L114: reference["replication_kms_key_id"] || ""
L158: "replication_bucket_destination_arn" => replication_bucket_destination_arn,
L159: "replication_kms_key_id" => replication_kms_key_id,
---
File: lib/dalmatian/aurora.rb
L98: def replication_bucket_destination_arn
L99: reference["replication_bucket_destination_arn"] || ""
L102: def replication_kms_key_id
L103: reference["replication_kms_key_id"] || ""
L144: "replication_bucket_destination_arn" => replication_bucket_destination_arn,
L145: "replication_kms_key_id" => replication_kms_key_id
---
File: spec/unit/rds_spec.rb
L40: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
L41: "replication_kms_key_id" => "key-id",
L177: describe "#replication_bucket_destination_arn" do
L178: it "uses the rds replication_bucket_destination_arn" do
L179: expect(rds.replication_bucket_destination_arn).to eq("arn:aws:s3:::dest-bucket")
L183: describe "#replication_kms_key_id" do
L184: it "uses the rds replication_kms_key_id" do
L185: expect(rds.replication_kms_key_id).to eq("key-id")
L241: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
L242: "replication_kms_key_id" => "key-id",
---
File: docs/database-backups.md
L37: ## Cross-account S3 replication for SQL backups
L47: replication_bucket_destination_arn: "arn:aws:s3:::your-destination-bucket-name"
L48: replication_kms_key_id: "your-destination-kms-key-id"
L53: The destination account must permit the source account's replication role to write to the bucket and use the KMS key.
L57: Add a policy to the destination bucket to allow the replication role from the source account:
L64: "Sid": "AllowReplicationFromDalmatianSource",
L67: "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
L83: If the destination bucket uses a Customer Managed Key (CMK) for encryption, the key policy must allow the source replication role to use it:
L87: "Sid": "AllowUsageByDalmatianSourceReplicationRole",
L90: "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
---
File: terraform/infrastructures/rds/sql-backups-s3.tf
L80: status = var.rds.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
L84: resource "aws_iam_role" "replication" {
L85: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L86: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication"
L105: resource "aws_iam_policy" "replication" {
L106: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L107: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication-policy"
L110: "../../policies/s3-replication-policy.json.tpl",
L113: destination_bucket_arn = var.rds.replication_bucket_destination_arn
L114: destination_kms_key_arn = var.rds.replication_kms_key_id
L120: resource "aws_iam_role_policy_attachment" "replication" {
L121: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L122: role = aws_iam_role.replication[0].name
L123: policy_arn = aws_iam_policy.replication[0].arn
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
L130: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
L133: role = aws_iam_role.replication[0].arn
L136: id = "replication"
L140: bucket = var.rds.replication_bucket_destination_arn
L148: for_each = var.rds.replication_kms_key_id != "" ? [1] : []
L150: replica_kms_key_id = var.rds.replication_kms_key_id
---
File: terraform/infrastructures/rds/variables.tf
L66: replication_bucket_destination_arn = string
L67: replication_kms_key_id = string
---
File: terraform/infrastructures/elasticache-cluster/ssm-parameter.tf
L7: value = local.elasticache_cluster_engine == "redis" ? "redis://${aws_elasticache_replication_group.elasticache_redis[0].primary_endpoint_address}:${aws_elasticache_replication_group.elasticache_redis[0].port}" : ""
---
File: terraform/infrastructures/elasticache-cluster/elasticache-redis.tf
L23: resource "aws_elasticache_replication_group" "elasticache_redis" {
L26: replication_group_id = local.elasticache_cluster_id
L27: description = "ElastiCache replication group for ${var.infrastructure_name}-${var.environment}-${local.elasticache_cluster_identifier}"
---
File: terraform/infrastructures/aurora/sql-backups-s3.tf
L80: status = var.aurora.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
L84: resource "aws_iam_role" "replication" {
L85: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L86: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication"
L105: resource "aws_iam_policy" "replication" {
L106: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L107: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication-policy"
L110: "../../policies/s3-replication-policy.json.tpl",
L113: destination_bucket_arn = var.aurora.replication_bucket_destination_arn
L114: destination_kms_key_arn = var.aurora.replication_kms_key_id
L120: resource "aws_iam_role_policy_attachment" "replication" {
L121: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L122: role = aws_iam_role.replication[0].name
L123: policy_arn = aws_iam_policy.replication[0].arn
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
L130: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
L133: role = aws_iam_role.replication[0].arn
L136: id = "replication"
L140: bucket = var.aurora.replication_bucket_destination_arn
L148: for_each = var.aurora.replication_kms_key_id != "" ? [1] : []
L150: replica_kms_key_id = var.aurora.replication_kms_key_id
---
File: terraform/infrastructures/aurora/variables.tf
L63: replication_bucket_destination_arn = string
L64: replication_kms_key_id = string
---
File: terraform/policies/s3-replication-policy.json.tpl
L6: "s3:GetReplicationConfiguration",
L16: "s3:GetObjectVersionForReplication",
---