More sessions
This commit is contained in:
108
tmp/dalmatian/tool-outputs/grep_search_199.txt
Normal file
108
tmp/dalmatian/tool-outputs/grep_search_199.txt
Normal file
@@ -0,0 +1,108 @@
|
||||
Found 84 matches for pattern "replication" in path ".":
|
||||
---
|
||||
File: lib/dalmatian/rds.rb
|
||||
L109: def replication_bucket_destination_arn
|
||||
L110: reference["replication_bucket_destination_arn"] || ""
|
||||
L113: def replication_kms_key_id
|
||||
L114: reference["replication_kms_key_id"] || ""
|
||||
L158: "replication_bucket_destination_arn" => replication_bucket_destination_arn,
|
||||
L159: "replication_kms_key_id" => replication_kms_key_id,
|
||||
---
|
||||
File: lib/dalmatian/aurora.rb
|
||||
L98: def replication_bucket_destination_arn
|
||||
L99: reference["replication_bucket_destination_arn"] || ""
|
||||
L102: def replication_kms_key_id
|
||||
L103: reference["replication_kms_key_id"] || ""
|
||||
L144: "replication_bucket_destination_arn" => replication_bucket_destination_arn,
|
||||
L145: "replication_kms_key_id" => replication_kms_key_id
|
||||
---
|
||||
File: spec/unit/rds_spec.rb
|
||||
L40: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
|
||||
L41: "replication_kms_key_id" => "key-id",
|
||||
L177: describe "#replication_bucket_destination_arn" do
|
||||
L178: it "uses the rds replication_bucket_destination_arn" do
|
||||
L179: expect(rds.replication_bucket_destination_arn).to eq("arn:aws:s3:::dest-bucket")
|
||||
L183: describe "#replication_kms_key_id" do
|
||||
L184: it "uses the rds replication_kms_key_id" do
|
||||
L185: expect(rds.replication_kms_key_id).to eq("key-id")
|
||||
L241: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket",
|
||||
L242: "replication_kms_key_id" => "key-id",
|
||||
---
|
||||
File: docs/database-backups.md
|
||||
L37: ## Cross-account S3 replication for SQL backups
|
||||
L47: replication_bucket_destination_arn: "arn:aws:s3:::your-destination-bucket-name"
|
||||
L48: replication_kms_key_id: "your-destination-kms-key-id"
|
||||
L53: The destination account must permit the source account's replication role to write to the bucket and use the KMS key.
|
||||
L57: Add a policy to the destination bucket to allow the replication role from the source account:
|
||||
L64: "Sid": "AllowReplicationFromDalmatianSource",
|
||||
L67: "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
|
||||
L83: If the destination bucket uses a Customer Managed Key (CMK) for encryption, the key policy must allow the source replication role to use it:
|
||||
L87: "Sid": "AllowUsageByDalmatianSourceReplicationRole",
|
||||
L90: "AWS": "arn:aws:iam::<SOURCE_ACCOUNT_ID>:role/<INFRASTRUCTURE_NAME>-<RDS_ID>-sql-backup-replication"
|
||||
---
|
||||
File: terraform/infrastructures/rds/sql-backups-s3.tf
|
||||
L80: status = var.rds.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
|
||||
L84: resource "aws_iam_role" "replication" {
|
||||
L85: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L86: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication"
|
||||
L105: resource "aws_iam_policy" "replication" {
|
||||
L106: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L107: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication-policy"
|
||||
L110: "../../policies/s3-replication-policy.json.tpl",
|
||||
L113: destination_bucket_arn = var.rds.replication_bucket_destination_arn
|
||||
L114: destination_kms_key_arn = var.rds.replication_kms_key_id
|
||||
L120: resource "aws_iam_role_policy_attachment" "replication" {
|
||||
L121: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L122: role = aws_iam_role.replication[0].name
|
||||
L123: policy_arn = aws_iam_policy.replication[0].arn
|
||||
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
|
||||
L130: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L133: role = aws_iam_role.replication[0].arn
|
||||
L136: id = "replication"
|
||||
L140: bucket = var.rds.replication_bucket_destination_arn
|
||||
L148: for_each = var.rds.replication_kms_key_id != "" ? [1] : []
|
||||
L150: replica_kms_key_id = var.rds.replication_kms_key_id
|
||||
---
|
||||
File: terraform/infrastructures/rds/variables.tf
|
||||
L66: replication_bucket_destination_arn = string
|
||||
L67: replication_kms_key_id = string
|
||||
---
|
||||
File: terraform/infrastructures/elasticache-cluster/ssm-parameter.tf
|
||||
L7: value = local.elasticache_cluster_engine == "redis" ? "redis://${aws_elasticache_replication_group.elasticache_redis[0].primary_endpoint_address}:${aws_elasticache_replication_group.elasticache_redis[0].port}" : ""
|
||||
---
|
||||
File: terraform/infrastructures/elasticache-cluster/elasticache-redis.tf
|
||||
L23: resource "aws_elasticache_replication_group" "elasticache_redis" {
|
||||
L26: replication_group_id = local.elasticache_cluster_id
|
||||
L27: description = "ElastiCache replication group for ${var.infrastructure_name}-${var.environment}-${local.elasticache_cluster_identifier}"
|
||||
---
|
||||
File: terraform/infrastructures/aurora/sql-backups-s3.tf
|
||||
L80: status = var.aurora.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended"
|
||||
L84: resource "aws_iam_role" "replication" {
|
||||
L85: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L86: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication"
|
||||
L105: resource "aws_iam_policy" "replication" {
|
||||
L106: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L107: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication-policy"
|
||||
L110: "../../policies/s3-replication-policy.json.tpl",
|
||||
L113: destination_bucket_arn = var.aurora.replication_bucket_destination_arn
|
||||
L114: destination_kms_key_arn = var.aurora.replication_kms_key_id
|
||||
L120: resource "aws_iam_role_policy_attachment" "replication" {
|
||||
L121: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L122: role = aws_iam_role.replication[0].name
|
||||
L123: policy_arn = aws_iam_policy.replication[0].arn
|
||||
L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" {
|
||||
L130: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0
|
||||
L133: role = aws_iam_role.replication[0].arn
|
||||
L136: id = "replication"
|
||||
L140: bucket = var.aurora.replication_bucket_destination_arn
|
||||
L148: for_each = var.aurora.replication_kms_key_id != "" ? [1] : []
|
||||
L150: replica_kms_key_id = var.aurora.replication_kms_key_id
|
||||
---
|
||||
File: terraform/infrastructures/aurora/variables.tf
|
||||
L63: replication_bucket_destination_arn = string
|
||||
L64: replication_kms_key_id = string
|
||||
---
|
||||
File: terraform/policies/s3-replication-policy.json.tpl
|
||||
L6: "s3:GetReplicationConfiguration",
|
||||
L16: "s3:GetObjectVersionForReplication",
|
||||
---
|
||||
Reference in New Issue
Block a user