Found 100 matches for pattern "Aurora" in path "." (results limited to 100 matches for performance): --- File: lib/dalmatian.rb L40: require_relative "dalmatian/aurora" L41: require_relative "dalmatian/aurora_test" L42: require_relative "dalmatian/aurora_deployment" --- File: lib/dalmatian/aurora_deployment.rb L2: class AuroraDeployment L6: aurora:, L13: @aurora = aurora L25: attr_reader :aurora, :env, :helper, :logger, :auto_approve, :plan, :destroy, :verbose L31: "aurora" L37: "account_id" => aurora.account_id, L38: "infrastructure_name" => aurora.cluster_id, L40: "aurora" => aurora.to_params L49: [aurora.cluster_id, aurora.identifier, "aurora", env_name].join("-") --- File: lib/dalmatian/cluster.rb L18: @auroras = build_auroras(properties["aurora"]) L24: attr_reader :hosted_zones, :s3s, :vpn_customer_gateways, :sources, :services, :wafs, :rdss, :auroras, :elasticache_clusters, L73: auroras.each do |aurora| L74: unless skip_deployments.include?("aurora") L75: deploy_aurora(aurora, environment, test, auto_approve, plan, destroy, verbose) L167: def build_auroras(aurora_references) L168: (aurora_references || []).map do |reference| L169: Aurora.new(cluster: self, reference: reference) L272: def deploy_aurora(aurora, env, test, auto_approve, plan, destroy, verbose) L273: test_aurora(aurora, env) if test L274: AuroraDeployment.new( L275: aurora: aurora, L356: def test_aurora(aurora, env) L357: puts "debug Testing Aurora" L358: AuroraTest.new(aurora: aurora, env: env).call --- File: lib/dalmatian/aurora.rb L2: class Aurora --- File: lib/dalmatian/aurora_test.rb L2: class AuroraTest L6: aurora:, L12: @aurora = aurora L21: attr_reader :aurora, :env, :helper, :logger, :terraform L25: "account_id" => aurora.account_id, L26: "infrastructure_name" => aurora.cluster_id, L29: "aurora" => { L30: "identifier" => aurora.identifier, L31: "in_use_by" => aurora.in_use_by, L32: "clusters_in_use" => aurora.clusters_in_use, L33: "engine" => aurora.engine, L34: "engine_version" => aurora.engine_version, L35: "db_name" => aurora.db_name, L36: "port" => aurora.port, L37: "maintenance_window" => aurora.maintenance_window, L38: "backup_window" => aurora.backup_window, L39: "backup_retention_period" => aurora.backup_retention_period, L40: "force_ssl" => aurora.force_ssl, L41: "parameter_store_path_db_url_name" => aurora.parameter_store_path_db_url_name, L42: "sql_backup_scheduled_task_environment_variables" => aurora.sql_backup_scheduled_task_environment_variables, L43: "sync_sql_backup_to_azure" => aurora.sync_sql_backup_to_azure, L44: "replication_bucket_destination_arn" => aurora.replication_bucket_destination_arn, L45: "replication_kms_key_id" => aurora.replication_kms_key_id L55: [aurora.cluster_id, aurora.identifier, "aurora", env_name].join("-") L62: "aurora" --- File: lib/tasks/dalmatian.rake L78: skip_deployments = ENV["skip_deployments"] || "hosted-zone,vpn-customer-gateway,ecs,ecs-services,elasticache-cluster,opensearch-cluster,aurora,rds,shared-loadbalancer,waf,s3" --- File: docs/rds-snapshots-and-point-in-time-restore.md L89: dalmatian aurora export-dump -i dxw-govpress -r cluster2 -d salukitest -e prod -o /tmp L95: $ dalmatian aurora shell -i dxw-govpress -r cluster2 -e prod L132: dalmatian aurora import-dump -i dxw-govpress -r cluster2 -d salukitest -e prod -f /tmp/salukitest-prod-sql-export.sql L153: - `dxw-govpress-cluster2-aurora-prod-aurora-sg` L191: #### Aurora L216: >Remember, `$DB_HOST` should be the **Endpoint** you got from the Aurora Instance earlier! L246: dalmatian aurora import-dump -i dxw-govpress -r cluster2 -d salukitest -e prod -f ~/Downloads/salukitest.sql --- File: Terrafile L51: # https://github.com/terraform-aws-modules/terraform-aws-rds-aurora L52: terraform-aws-rds-aurora: L53: source: "git@github.com:terraform-aws-modules/terraform-aws-rds-aurora.git" --- File: terraform/infrastructures/aurora/data.tf L52: for_each = toset(local.aurora_extra_clusters_in_use) L69: count = local.aurora_sql_backup_sync_azure_enabled ? 1 : 0 L74: count = local.aurora_sql_backup_sync_azure_enabled ? 1 : 0 L79: count = local.aurora_sql_backup_sync_azure_enabled ? 1 : 0 L84: count = local.aurora_sql_backup_sync_azure_enabled ? 1 : 0 L89: count = local.aurora_sql_backup_sync_azure_enabled ? 1 : 0 --- File: terraform/infrastructures/aurora/sql-backups-s3.tf L2: bucket = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup" L80: status = var.aurora.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended" L85: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L86: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication" L106: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L107: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication-policy" L113: destination_bucket_arn = var.aurora.replication_bucket_destination_arn L114: destination_kms_key_arn = var.aurora.replication_kms_key_id L121: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L130: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L140: bucket = var.aurora.replication_bucket_destination_arn L148: for_each = var.aurora.replication_kms_key_id != "" ? [1] : [] L150: replica_kms_key_id = var.aurora.replication_kms_key_id --- File: terraform/infrastructures/aurora/session-manager-list-databases.tf L1: resource "aws_ssm_document" "aurora_db_list" { L2: name = "${local.aurora_identifier}-aurora-db-list" L5: "../../ssm_documents/aurora-db-list.json.tpl", L7: aurora_name = module.aurora.cluster_id L8: command = local.aurora_db_list_command --- File: terraform/infrastructures/aurora/variables.tf L43: variable "aurora" { L44: description = "Aurora configuration" --- File: terraform/infrastructures/aurora/session-manager-db-shell.tf L1: resource "aws_ssm_document" "aurora_shell" { L2: name = "${local.aurora_identifier}-aurora-shell" L5: "../../ssm_documents/aurora-shell.json.tpl", L7: aurora_name = module.aurora.cluster_id L8: command = local.aurora_shell_command --- File: terraform/infrastructures/aurora/ssm_parameter.tf L1: resource "aws_kms_key" "aurora_ssm" { L6: resource "aws_kms_alias" "aurora_ssm" { L7: name = "alias/${terraform.workspace}-aurora-values-ssm" L8: target_key_id = aws_kms_key.aurora_ssm.key_id L11: resource "aws_ssm_parameter" "aurora_db_password" { ---