Found 84 matches for pattern "replication" in path ".": --- File: lib/dalmatian/rds.rb L109: def replication_bucket_destination_arn L110: reference["replication_bucket_destination_arn"] || "" L113: def replication_kms_key_id L114: reference["replication_kms_key_id"] || "" L158: "replication_bucket_destination_arn" => replication_bucket_destination_arn, L159: "replication_kms_key_id" => replication_kms_key_id, --- File: lib/dalmatian/aurora.rb L98: def replication_bucket_destination_arn L99: reference["replication_bucket_destination_arn"] || "" L102: def replication_kms_key_id L103: reference["replication_kms_key_id"] || "" L144: "replication_bucket_destination_arn" => replication_bucket_destination_arn, L145: "replication_kms_key_id" => replication_kms_key_id --- File: spec/unit/rds_spec.rb L40: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket", L41: "replication_kms_key_id" => "key-id", L177: describe "#replication_bucket_destination_arn" do L178: it "uses the rds replication_bucket_destination_arn" do L179: expect(rds.replication_bucket_destination_arn).to eq("arn:aws:s3:::dest-bucket") L183: describe "#replication_kms_key_id" do L184: it "uses the rds replication_kms_key_id" do L185: expect(rds.replication_kms_key_id).to eq("key-id") L241: "replication_bucket_destination_arn" => "arn:aws:s3:::dest-bucket", L242: "replication_kms_key_id" => "key-id", --- File: docs/database-backups.md L37: ## Cross-account S3 replication for SQL backups L47: replication_bucket_destination_arn: "arn:aws:s3:::your-destination-bucket-name" L48: replication_kms_key_id: "your-destination-kms-key-id" L53: The destination account must permit the source account's replication role to write to the bucket and use the KMS key. L57: Add a policy to the destination bucket to allow the replication role from the source account: L64: "Sid": "AllowReplicationFromDalmatianSource", L67: "AWS": "arn:aws:iam:::role/--sql-backup-replication" L83: If the destination bucket uses a Customer Managed Key (CMK) for encryption, the key policy must allow the source replication role to use it: L87: "Sid": "AllowUsageByDalmatianSourceReplicationRole", L90: "AWS": "arn:aws:iam:::role/--sql-backup-replication" --- File: terraform/infrastructures/rds/sql-backups-s3.tf L80: status = var.rds.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended" L84: resource "aws_iam_role" "replication" { L85: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0 L86: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication" L105: resource "aws_iam_policy" "replication" { L106: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0 L107: name = "${var.infrastructure_name}-${local.rds_identifier}-sql-backup-replication-policy" L110: "../../policies/s3-replication-policy.json.tpl", L113: destination_bucket_arn = var.rds.replication_bucket_destination_arn L114: destination_kms_key_arn = var.rds.replication_kms_key_id L120: resource "aws_iam_role_policy_attachment" "replication" { L121: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0 L122: role = aws_iam_role.replication[0].name L123: policy_arn = aws_iam_policy.replication[0].arn L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" { L130: count = var.rds.replication_bucket_destination_arn != "" ? 1 : 0 L133: role = aws_iam_role.replication[0].arn L136: id = "replication" L140: bucket = var.rds.replication_bucket_destination_arn L148: for_each = var.rds.replication_kms_key_id != "" ? [1] : [] L150: replica_kms_key_id = var.rds.replication_kms_key_id --- File: terraform/infrastructures/rds/variables.tf L66: replication_bucket_destination_arn = string L67: replication_kms_key_id = string --- File: terraform/infrastructures/elasticache-cluster/ssm-parameter.tf L7: value = local.elasticache_cluster_engine == "redis" ? "redis://${aws_elasticache_replication_group.elasticache_redis[0].primary_endpoint_address}:${aws_elasticache_replication_group.elasticache_redis[0].port}" : "" --- File: terraform/infrastructures/elasticache-cluster/elasticache-redis.tf L23: resource "aws_elasticache_replication_group" "elasticache_redis" { L26: replication_group_id = local.elasticache_cluster_id L27: description = "ElastiCache replication group for ${var.infrastructure_name}-${var.environment}-${local.elasticache_cluster_identifier}" --- File: terraform/infrastructures/aurora/sql-backups-s3.tf L80: status = var.aurora.replication_bucket_destination_arn != "" ? "Enabled" : "Suspended" L84: resource "aws_iam_role" "replication" { L85: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L86: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication" L105: resource "aws_iam_policy" "replication" { L106: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L107: name = "${var.infrastructure_name}-${local.aurora_identifier}-sql-backup-replication-policy" L110: "../../policies/s3-replication-policy.json.tpl", L113: destination_bucket_arn = var.aurora.replication_bucket_destination_arn L114: destination_kms_key_arn = var.aurora.replication_kms_key_id L120: resource "aws_iam_role_policy_attachment" "replication" { L121: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L122: role = aws_iam_role.replication[0].name L123: policy_arn = aws_iam_policy.replication[0].arn L126: resource "aws_s3_bucket_replication_configuration" "sql_backups" { L130: count = var.aurora.replication_bucket_destination_arn != "" ? 1 : 0 L133: role = aws_iam_role.replication[0].arn L136: id = "replication" L140: bucket = var.aurora.replication_bucket_destination_arn L148: for_each = var.aurora.replication_kms_key_id != "" ? [1] : [] L150: replica_kms_key_id = var.aurora.replication_kms_key_id --- File: terraform/infrastructures/aurora/variables.tf L63: replication_bucket_destination_arn = string L64: replication_kms_key_id = string --- File: terraform/policies/s3-replication-policy.json.tpl L6: "s3:GetReplicationConfiguration", L16: "s3:GetObjectVersionForReplication", ---