You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We eat, drink, sleep and most importantly love **DevOps**. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy <b>Bigger problems are always solved by breaking them into smaller manageable problems</b>. Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller <b>connected yet manageable pieces</b> within the infrastructure.
41
+
We eat, drink, sleep and most importantly love **DevOps**. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy <b>Bigger problems are always solved by breaking them into smaller manageable problems</b>. Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller <b>connected yet manageable pieces</b> within the infrastructure.
42
42
43
43
This module is basically combination of [Terraform open source](https://www.terraform.io/) and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining the whole infrastructure code yourself.
44
44
@@ -49,7 +49,7 @@ We have [*fifty plus terraform modules*][terraform_modules]. A few of them are c
| alias | An alias block. Conflicts with ttl & records. Alias record documented below. |`map`| <pre>{<br> "evaluate_target_healths": [],<br> "names": [],<br> "zone_ids": []<br>}</pre> | no |
164
-
| allow\_overwrites | Allow creation of this record in Terraform to overwrite an existing record, if any. This does not affect the ability to update the record in Terraform and does not prevent other resources within Terraform or manual Route 53 changes outside Terraform from overwriting this record. false by default. This configuration is not recommended for most environments. |`list`|`[]`| no |
163
+
| alias | An alias block. Conflicts with ttl & records. Alias record documented below. |`map(any)`| <pre>{<br> "evaluate_target_healths": [],<br> "names": [],<br> "zone_ids": []<br>}</pre> | no |
164
+
| allow\_overwrites | Allow creation of this record in Terraform to overwrite an existing record, if any. This does not affect the ability to update the record in Terraform and does not prevent other resources within Terraform or manual Route 53 changes outside Terraform from overwriting this record. false by default. This configuration is not recommended for most environments. |`list(any)`|`[]`| no |
165
165
| application | Application (e.g. `cd` or `clouddrove`). |`string`|`""`| no |
166
-
| attributes | Additional attributes (e.g. `1`). |`list`|`[]`| no |
166
+
| attributes | Additional attributes (e.g. `1`). |`list(any)`|`[]`| no |
167
167
| comment | A comment for the hosted zone. Defaults to 'Managed by Terraform'. |`string`|`""`| no |
168
168
| delegation\_set\_id | The ID of the reusable delegation set whose NS records you want to assign to the hosted zone. Conflicts with vpc as delegation sets can only be used for public zones. |`string`|`""`| no |
169
169
| delimiter | Delimiter to be used between `organization`, `environment`, `name` and `attributes`. |`string`|`"-"`| no |
@@ -175,25 +175,26 @@ Here are some examples of how you can use this module in your inventory structur
175
175
| force\_destroy | Whether to destroy all records (possibly managed outside of Terraform) in the zone when destroying the zone. |`bool`|`true`| no |
176
176
| geolocation\_enabled | Whether to create Route53 record set. |`bool`|`false`| no |
177
177
| geolocation\_routing\_policies | A block indicating a routing policy based on the geolocation of the requestor. Conflicts with any other routing policy. Documented below. |`any`|`null`| no |
178
-
| health\_check\_ids | The health check the record should be associated with. |`list`|`[]`| no |
179
-
| label\_order | Label order, e.g. `name`,`application`. |`list`|`[]`| no |
178
+
| health\_check\_ids | The health check the record should be associated with. |`list(any)`|`[]`| no |
179
+
| label\_order | Label order, e.g. `name`,`application`. |`list(any)`|`[]`| no |
180
180
| latency\_enabled | Whether to create Route53 record set. |`bool`|`false`| no |
181
181
| latency\_routing\_policies | A block indicating a routing policy based on the latency between the requestor and an AWS region. Conflicts with any other routing policy. Documented below. |`any`|`null`| no |
182
182
| managedby | ManagedBy, eg 'CloudDrove' or 'AnmolNagpal'. |`string`|`"anmol@clouddrove.com"`| no |
183
-
| multivalue\_answer\_routing\_policies | Set to true to indicate a multivalue answer routing policy. Conflicts with any other routing policy. |`list`|`[]`| no |
183
+
| multivalue\_answer\_routing\_policies | Set to true to indicate a multivalue answer routing policy. Conflicts with any other routing policy. |`list(any)`|`[]`| no |
184
184
| name | Name (e.g. `app` or `cluster`). |`string`|`""`| no |
185
-
| names | The name of the record. |`list`|`[]`| no |
185
+
| names | The name of the record. |`list(any)`|`[]`| no |
186
186
| private\_enabled | Whether to create private Route53 zone. |`bool`|`false`| no |
187
187
| public\_enabled | Whether to create public Route53 zone. |`bool`|`false`| no |
188
188
| record\_enabled | Whether to create Route53 record set. |`bool`|`false`| no |
189
189
| record\_set\_enabled | Whether to create seperate Route53 record set. |`bool`|`false`| no |
190
+
| repository | Terraform current module repo |`string`|`"https://github.com/clouddrove/terraform-aws-route53"`| no |
190
191
| secondary\_vpc\_id | The VPC to associate with the private hosted zone. |`string`|`""`| no |
191
192
| secondary\_vpc\_region | The VPC's region. Defaults to the region of the AWS provider. |`string`|`""`| no |
192
-
| set\_identifiers | Unique identifier to differentiate records with routing policies from one another. Required if using failover, geolocation, latency, or weighted routing policies documented below. |`list`|`[]`| no |
193
-
| tags | Additional tags (e.g. map(`BusinessUnit`,`XYZ`). |`map`|`{}`| no |
194
-
| ttls | (Required for non-alias records) The TTL of the record. |`list`|`[]`| no |
195
-
| types | The record type. Valid values are A, AAAA, CAA, CNAME, MX, NAPTR, NS, PTR, SOA, SPF, SRV and TXT. |`list`|`[]`| no |
196
-
| values | (Required for non-alias records) A string list of records. To specify a single record value longer than 255 characters such as a TXT record for DKIM, add "" inside the Terraform configuration string (e.g. "first255characters""morecharacters"). |`list`|`[]`| no |
193
+
| set\_identifiers | Unique identifier to differentiate records with routing policies from one another. Required if using failover, geolocation, latency, or weighted routing policies documented below. |`list(any)`|`[]`| no |
194
+
| tags | Additional tags (e.g. map(`BusinessUnit`,`XYZ`). |`map(any)`|`{}`| no |
195
+
| ttls | (Required for non-alias records) The TTL of the record. |`list(any)`|`[]`| no |
196
+
| types | The record type. Valid values are A, AAAA, CAA, CNAME, MX, NAPTR, NS, PTR, SOA, SPF, SRV and TXT. |`list(any)`|`[]`| no |
197
+
| values | (Required for non-alias records) A string list of records. To specify a single record value longer than 255 characters such as a TXT record for DKIM, add "" inside the Terraform configuration string (e.g. "first255characters""morecharacters"). |`list(any)`|`[]`| no |
197
198
| vpc\_id | VPC ID. |`string`|`""`| no |
198
199
| weighted\_enabled | Whether to create Route53 record set. |`bool`|`false`| no |
199
200
| weighted\_routing\_policies | A block indicating a weighted routing policy. Conflicts with any other routing policy. Documented below. |`any`|`null`| no |
@@ -210,7 +211,7 @@ Here are some examples of how you can use this module in your inventory structur
210
211
211
212
212
213
## Testing
213
-
In this module testing is performed with [terratest](https://github.com/gruntwork-io/terratest) and it creates a small piece of infrastructure, matches the output like ARN, ID and Tags name etc and destroy infrastructure in your AWS account. This testing is written in GO, so you need a [GO environment](https://golang.org/doc/install) in your system.
214
+
In this module testing is performed with [terratest](https://github.com/gruntwork-io/terratest) and it creates a small piece of infrastructure, matches the output like ARN, ID and Tags name etc and destroy infrastructure in your AWS account. This testing is written in GO, so you need a [GO environment](https://golang.org/doc/install) in your system.
214
215
215
216
You need to run the following command in the testing folder:
216
217
```hcl
@@ -219,7 +220,7 @@ You need to run the following command in the testing folder:
219
220
220
221
221
222
222
-
## Feedback
223
+
## Feedback
223
224
If you come accross a bug or have any feedback, please log it in our [issue tracker](https://github.com/clouddrove/terraform-aws-route53/issues), or feel free to drop us an email at [hello@clouddrove.com](mailto:hello@clouddrove.com).
224
225
225
226
If you have found it worth your time, go ahead and give us a ★ on [our GitHub](https://github.com/clouddrove/terraform-aws-route53)!
0 commit comments