Dataset Viewer
Auto-converted to Parquet Duplicate
id
int32
0
299
prompt
stringlengths
93
303
prompt_original
stringlengths
21
1.39k
intent
stringlengths
25
2.17k
main_tf
stringlengths
109
8.28k
checks_rego
stringlengths
171
6.45k
plan_json
stringlengths
1.41k
174k
0
I need a way to track which lookups are being made against our domain so we can review that activity in a central place, and it should be dependable enough to use for troubleshooting later.
Configure a query log that can create a log stream and put log events using Route 53 resources. Name the zone "primary", the cloudwatch log group "aws_route53_example_com", and the cloudwatch log resource policy "route53-query-logging-policy"
Has one "aws_route53_zone" resource with "name" Has one "aws_cloudwatch_log_group" resource Has one "aws_cloudwatch_log_resource_policy" resource with "policy_document" enabling "logs:CreateLogStream" and "logs:PutLogEvents" with "policy_name" Has one "aws_route53_query_log" resource with "cloudwatch_log_group_arn" referencing the "aws_cloudwatch_log_group" resource with "zone_id" referencing the "aws_route53_zone" resource and depends on the "aws_cloudwatch_log_resource_policy" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" } resource "aws_cloudwatch_log_group" "aws_route53_example_com" { name = "/aws/route53/${aws_route53_zone.primary.name}" retention_in_days = 30 } # Example CloudWatch log resource policy to allow Route53 to write logs # to any log group under /aws/route53/* data "aws_iam_policy_document" "route53-query-logging-policy" { statement { actions = [ "logs:CreateLogStream", "logs:PutLogEvents", ] resources = ["arn:aws:logs:*:*:log-group:/aws/route53/*"] principals { identifiers = ["route53.amazonaws.com"] type = "Service" } } } resource "aws_cloudwatch_log_resource_policy" "route53-query-logging-policy" { policy_document = data.aws_iam_policy_document.route53-query-logging-policy.json policy_name = "route53-query-logging-policy" } resource "aws_route53_query_log" "example_com" { depends_on = [aws_cloudwatch_log_resource_policy.route53-query-logging-policy] cloudwatch_log_group_arn = aws_cloudwatch_log_group.aws_route53_example_com.arn zone_id = aws_route53_zone.primary.zone_id }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_cloudwatch_log_group = false default is_valid_cloudwatch_log_resource_policy = false default is_valid_route53_query_log = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name } is_valid_cloudwatch_log_group { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_cloudwatch_log_group" } is_valid_cloudwatch_log_resource_policy { some i resource := input.resource_changes[i] resource.type == "aws_cloudwatch_log_resource_policy" contains(resource.change.after.policy_document, "logs:PutLogEvents") contains(resource.change.after.policy_document, "logs:CreateLogStream") resource.change.after.policy_name } is_valid_route53_query_log { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_query_log" resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" resource.expressions.cloudwatch_log_group_arn.references[0] == "aws_cloudwatch_log_group.aws_route53_example_com.arn" resource.depends_on[0] == "aws_cloudwatch_log_resource_policy.route53-query-logging-policy" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_cloudwatch_log_group is_valid_cloudwatch_log_resource_policy is_valid_route53_query_log }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"region":null}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"sensitive_values":{}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"sensitive_values":{}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"after_unknown":{"arn":true,"deletion_protection_enabled":true,"id":true,"log_group_class":true,"name_prefix":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"name":null,"region":null}}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{},"after_unknown":{"arn":true,"cloudwatch_log_group_arn":true,"id":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1177966457","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:PutLogEvents\",\n \"logs:CreateLogStream\"\n ],\n \"Resource\": \"arn:aws:logs:*:*:log-group:/aws/route53/*\",\n \"Principal\": {\n \"Service\": \"route53.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["logs:CreateLogStream","logs:PutLogEvents"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["route53.amazonaws.com"],"type":"Service"}],"resources":["arn:aws:logs:*:*:log-group:/aws/route53/*"],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false,false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_config_key":"aws","expressions":{"name":{"references":["aws_route53_zone.primary.name","aws_route53_zone.primary"]},"retention_in_days":{"constant_value":30}},"schema_version":0},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"policy_document":{"references":["data.aws_iam_policy_document.route53-query-logging-policy.json","data.aws_iam_policy_document.route53-query-logging-policy"]},"policy_name":{"constant_value":"route53-query-logging-policy"}},"schema_version":0},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_config_key":"aws","expressions":{"cloudwatch_log_group_arn":{"references":["aws_cloudwatch_log_group.aws_route53_example_com.arn","aws_cloudwatch_log_group.aws_route53_example_com"]},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":0,"depends_on":["aws_cloudwatch_log_resource_policy.route53-query-logging-policy"]},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["logs:CreateLogStream","logs:PutLogEvents"]},"principals":[{"identifiers":{"constant_value":["route53.amazonaws.com"]},"type":{"constant_value":"Service"}}],"resources":{"constant_value":["arn:aws:logs:*:*:log-group:/aws/route53/*"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.route53-query-logging-policy","attribute":["json"]},{"resource":"aws_cloudwatch_log_group.aws_route53_example_com","attribute":["arn"]},{"resource":"aws_route53_zone.primary","attribute":["name"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:48Z","applyable":true,"complete":true,"errored":false}
1
I need to make sure one of our internal name‑lookup setups can be used from more than one private network, and it should work even as we add or remove networks over time.
Configure a valid Route 53 zone association resource
Has multiple "aws_vpc" resource with a specified "cidr_block" with "enable_dns_hostnames" equal to "true" with "enable_dns_support" equal to "true" Has one "aws_route53_zone" resource with "name" with a "vpc" block that contains "vpc_id" that references the "aws_vpc" resource Has one "aws_route53_vpc_association_authorization" resource with "vpc_id" referencing the "aws_vpc" resource with "zone_id" referencing the "aws_route53_zone" resource Has one "aws_route53_zone_association" resource with "vpc_id" referencing the "aws_route53_vpc_association_authorization" resource with "zone_id" referencing the "aws_route53_vpc_association_authorization" resource
provider "aws" { region = "us-east-1" } resource "aws_vpc" "example" { cidr_block = "10.6.0.0/16" enable_dns_hostnames = true enable_dns_support = true } resource "aws_route53_zone" "example" { name = "example.com" vpc { vpc_id = aws_vpc.example.id } } resource "aws_vpc" "alternate" { cidr_block = "10.7.0.0/16" enable_dns_hostnames = true enable_dns_support = true } resource "aws_route53_vpc_association_authorization" "example" { vpc_id = aws_vpc.alternate.id zone_id = aws_route53_zone.example.id } resource "aws_route53_zone_association" "example" { vpc_id = aws_route53_vpc_association_authorization.example.vpc_id zone_id = aws_route53_vpc_association_authorization.example.zone_id }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_vpc = false default is_valid_zone_association = false default is_valid_vpc_association = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.vpc[0].vpc_id.references[0] resource.expressions.name } is_valid_vpc { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_vpc" resource.expressions.cidr_block resource.expressions.enable_dns_hostnames.constant_value == true resource.expressions.enable_dns_support.constant_value == true resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_vpc" resource2.expressions.cidr_block resource2.expressions.enable_dns_hostnames.constant_value == true resource2.expressions.enable_dns_support.constant_value == true } is_valid_zone_association { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone_association" resource.expressions.vpc_id.references[0] resource.expressions.zone_id.references[0] } is_valid_vpc_association { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_vpc_association_authorization" resource.expressions.vpc_id.references[0] resource.expressions.zone_id.references[0] } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_vpc is_valid_zone_association is_valid_vpc_association }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"owning_account":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.alternate.id","aws_vpc.alternate"]},"zone_id":{"references":["aws_route53_zone.example.id","aws_route53_zone.example"]}},"schema_version":0},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.example.id","aws_vpc.example"]}}]},"schema_version":0},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_route53_vpc_association_authorization.example.vpc_id","aws_route53_vpc_association_authorization.example"]},"zone_id":{"references":["aws_route53_vpc_association_authorization.example.zone_id","aws_route53_vpc_association_authorization.example"]}},"schema_version":0},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.7.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.6.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_route53_vpc_association_authorization.example","attribute":["vpc_id"]},{"resource":"aws_route53_vpc_association_authorization.example","attribute":["zone_id"]},{"resource":"aws_route53_zone.example","attribute":["id"]},{"resource":"aws_vpc.alternate","attribute":["id"]},{"resource":"aws_vpc.example","attribute":["id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
2
I need our site to show up at our main domain and automatically direct visitors to whatever is handling the traffic behind it, and it should stay reliable even if demand spikes.
Configure a Route 53 record with an Elastic Load Balancer resource. Call the zone "primary" and the elb "main"
Has one "aws_route53_zone" resource with "name" Has a "aws_elb" resource with "name" with "availability_zones" with a "listener" block with "instance_port", "instance_protocol", "lb_port", "lb_protocol" Has a "aws_route53_record" resource with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with an "alias" block with "name" and "zone_id" referencing the "aws_elb" and "evaluate_target_health" equal to true
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" } resource "aws_elb" "main" { name = "sample" availability_zones = ["us-east-1c"] listener { instance_port = 80 instance_protocol = "http" lb_port = 80 lb_protocol = "http" } } resource "aws_route53_record" "www" { zone_id = aws_route53_zone.primary.zone_id name = "example53.com" type = "A" alias { name = aws_elb.main.dns_name zone_id = aws_elb.main.zone_id evaluate_target_health = true } }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false default is_valid_elb = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name } is_valid_elb { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elb" resource.expressions.availability_zones resource.expressions.listener[0] } is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" resource.expressions.alias[0].name.references[0] == "aws_elb.main.dns_name" resource.expressions.alias[0].zone_id.references[0] == "aws_elb.main.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_elb is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"access_logs":[],"arn":true,"availability_zones":[false],"dns_name":true,"health_check":true,"id":true,"instances":true,"internal":true,"listener":[{}],"name_prefix":true,"security_groups":true,"source_security_group":true,"source_security_group_id":true,"subnets":true,"tags_all":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[{"name":true,"zone_id":true}],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_config_key":"aws","expressions":{"availability_zones":{"constant_value":["us-east-1c"]},"listener":[{"instance_port":{"constant_value":80},"instance_protocol":{"constant_value":"http"},"lb_port":{"constant_value":80},"lb_protocol":{"constant_value":"http"}}],"name":{"constant_value":"sample"}},"schema_version":0},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_config_key":"aws","expressions":{"alias":[{"evaluate_target_health":{"constant_value":true},"name":{"references":["aws_elb.main.dns_name","aws_elb.main"]},"zone_id":{"references":["aws_elb.main.zone_id","aws_elb.main"]}}],"name":{"constant_value":"example53.com"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elb.main","attribute":["dns_name"]},{"resource":"aws_elb.main","attribute":["zone_id"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
3
Our main data store is too slow for people overseas, so I want to spread read traffic across a few copies in different parts of the world while keeping things reliable.
Using route 53 resources, configure a weighted routing policy that splits users between three db_instances that are replicas of a main db_instance. Provision the three replica instances in "us-east-1", "eu-central-1", and "ap-southeast-1". Provision the zone and main db_instance in "us-west-1". Call the zone "main", the original db_instance "primary", the three replicas "replica_us_east", "replica_eu_central" and "replica_ap_southeast" respectively, and the provider aliases "main", "us-east", "eu-central", and "ap-southeast".
Has one "aws_route53_zone" resource with "name" Has a "aws_db_instance" resource with "identifier" set to "master" with "instance_class" with "allocated_storage" with "engine" with "username" with "password" with "backup_retention_period" set to a non-zero number Has multiple "aws_db_instance" resources with "identifier" with "replicate_source_db" referencing the main "aws_db_instance" resource with "instance_class" Has multiple "aws_route53_record" resources with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with "weighted_routing_policy" block that contains "weight" as a non-zero number with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" configuration_aliases = [ aws.main, aws.us_east, aws.eu_central, aws.ap_southeast ] } } required_version = ">= 1.9.0" } provider "aws" { alias = "main" region = "us-west-2" } provider "aws" { alias = "us_east" region = "us-east-1" # Example region for US East } provider "aws" { alias = "eu_central" region = "eu-central-1" # Example region for EU Central } provider "aws" { alias = "ap_southeast" region = "ap-southeast-1" # Example region for AP Southeast } resource "aws_db_instance" "primary" { provider = aws.main identifier = "master" allocated_storage = 20 engine = "postgres" instance_class = "db.t3.micro" username = "dbadmin" password = "your_password_here" skip_final_snapshot = true backup_retention_period = 7 } resource "aws_db_instance" "replica_us_east" { provider = aws.us_east replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-us-east" skip_final_snapshot = true } resource "aws_db_instance" "replica_eu_central" { provider = aws.eu_central replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-eu-central" skip_final_snapshot = true } resource "aws_db_instance" "replica_ap_southeast" { provider = aws.ap_southeast replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-ap-southeast" skip_final_snapshot = true } # Route53 Hosted Zone resource "aws_route53_zone" "main" { provider = aws.main name = "example53.com" } # Route53 Records for each RDS Read Replica with a Weighted Routing Policy resource "aws_route53_record" "replica_us_east_cname" { provider = aws.us_east zone_id = aws_route53_zone.main.zone_id name = "us.east.example53.com" type = "CNAME" records = [aws_db_instance.replica_us_east.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-us-east" } resource "aws_route53_record" "replica_eu_central_cname" { provider = aws.eu_central zone_id = aws_route53_zone.main.zone_id name = "eu.central.example53.com" type = "CNAME" records = [aws_db_instance.replica_eu_central.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-eu-central" } resource "aws_route53_record" "replica_ap_southeast_cname" { provider = aws.ap_southeast zone_id = aws_route53_zone.main.zone_id name = "ap.southeast.example53.com" type = "CNAME" records = [aws_db_instance.replica_ap_southeast.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-ap-southeast" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record_us = false default is_valid_r53_record_eu = false default is_valid_r53_record_ap = false default is_valid_db_instance_main = false default is_valid_db_instance_replicaus = false default is_valid_db_instance_replicaeu = false default is_valid_db_instance_replicaap = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.name == "main" resource.provider_config_key == "aws.main" } # Validate aws_route53_record is_valid_r53_record_us { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.us_east" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_us_east.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_eu { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.eu_central" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_eu_central.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_ap { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.ap_southeast" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_ap_southeast.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } # Rule to check if a valid aws_db_instance exists is_valid_db_instance_main { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.provider_config_key == "aws.main" has_required_main_db_arguments } is_valid_db_instance_replicaus { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaus_arguments } is_valid_db_instance_replicaeu { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaeu_arguments } is_valid_db_instance_replicaap { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaap_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) # Check for instance_class validity requirement2(resource.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } has_required_db_replicaus_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_us_east" resource.provider_config_key == "aws.us_east" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replicaeu_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_eu_central" resource.provider_config_key == "aws.eu_central" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replicaap_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_ap_southeast" resource.provider_config_key == "aws.ap_southeast" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record_us is_valid_r53_record_eu is_valid_r53_record_ap is_valid_db_instance_main is_valid_db_instance_replicaus is_valid_db_instance_replicaeu is_valid_db_instance_replicaap }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0"},"aws.ap_southeast":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"ap_southeast","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"ap-southeast-1"}}},"aws.eu_central":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"eu_central","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"eu-central-1"}}},"aws.main":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"main","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-west-2"}}},"aws.us_east":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"us_east","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws.main","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"master"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_config_key":"aws.ap_southeast","expressions":{"identifier":{"constant_value":"mydb-replica-ap-southeast"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_config_key":"aws.eu_central","expressions":{"identifier":{"constant_value":"mydb-replica-eu-central"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_config_key":"aws.us_east","expressions":{"identifier":{"constant_value":"mydb-replica-us-east"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_config_key":"aws.ap_southeast","expressions":{"name":{"constant_value":"ap.southeast.example53.com"},"records":{"references":["aws_db_instance.replica_ap_southeast.endpoint","aws_db_instance.replica_ap_southeast"]},"set_identifier":{"constant_value":"replica-ap-southeast"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_config_key":"aws.eu_central","expressions":{"name":{"constant_value":"eu.central.example53.com"},"records":{"references":["aws_db_instance.replica_eu_central.endpoint","aws_db_instance.replica_eu_central"]},"set_identifier":{"constant_value":"replica-eu-central"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_config_key":"aws.us_east","expressions":{"name":{"constant_value":"us.east.example53.com"},"records":{"references":["aws_db_instance.replica_us_east.endpoint","aws_db_instance.replica_us_east"]},"set_identifier":{"constant_value":"replica-us-east"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws.main","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.replica_ap_southeast","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.primary","attribute":["arn"]},{"resource":"aws_db_instance.replica_eu_central","attribute":["endpoint"]},{"resource":"aws_db_instance.replica_us_east","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:48:39Z","applyable":true,"complete":true,"errored":false}
4
I need a setup where people inside our company automatically connect to a different data store than outsiders, and everyone should be able to use simple, human‑friendly names to reach the right place without extra steps.
Configure Route 53 to return different database endpoints to internal versus external users. Internal users are routed to an internal RDS instance, while external users are routed to a publicly accessible one. Name the zones "private" and "public", the databases "internal" and "public", and the subnet group "main"
Has one "aws_vpc" resource with a specified "cidr_block" Has multiple "aws_subnet" resources with "vpc_id" referencing the "aws_vpc" resource with specified "cidr_block" for each with "availability_zone" set Has one "aws_db_subnet_group" resource with "subnet_ids" referencing the IDs of "aws_subnet" resources Has one "aws_route53_zone" resource with "name" Has one "aws_route53_zone" resource with "name" with a "vpc" block with "vpc_id" referencing the "aws_vpc" resource Has one "aws_db_instance" resource for internal use with "allocated_storage" set to a specific size with a specified "engine" with a specified "instance_class" with "username" and "password" with "skip_final_snapshot" set to true with "identifier" with "password" with "db_subnet_group_name" referencing the "aws_db_subnet_group" resource Has one "aws_db_instance" resource for public use with "allocated_storage" set to a specific size with a specified "engine" with a specified "instance_class" with "username" and "password" with "skip_final_snapshot" set to true with "identifier" with "password" with "publicly_accessible" set to true Has two "aws_route53_record" resources with "zone_id" referencing one of the "aws_route53_zone" resources with "type" with "ttl" with "records" referencing one of the "aws_db_instance" resources
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # Create a VPC for internal resources resource "aws_vpc" "main" { cidr_block = "10.0.0.0/24" } # RDS instances resource "aws_db_instance" "internal" { # Internal DB configuration allocated_storage = 20 engine = "mysql" instance_class = "db.t3.micro" identifier = "internal" username = "user" password = "password" db_subnet_group_name = aws_db_subnet_group.main.name skip_final_snapshot = true } resource "aws_db_instance" "public" { # Public DB configuration publicly_accessible = true allocated_storage = 20 engine = "mysql" instance_class = "db.t3.micro" identifier = "public" username = "user" password = "password" skip_final_snapshot = true } resource "aws_db_subnet_group" "main" { name = "mydb-subnet-group" subnet_ids = [aws_subnet.maina.id, aws_subnet.mainb.id] } data "aws_availability_zones" "available" {} # Subnet for RDS resource "aws_subnet" "maina" { vpc_id = aws_vpc.main.id cidr_block = "10.0.0.0/25" availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "mainb" { vpc_id = aws_vpc.main.id cidr_block = "10.0.0.128/25" availability_zone = data.aws_availability_zones.available.names[1] } # Route 53 Public Hosted Zone for external users resource "aws_route53_zone" "public" { name = "example53.com" } # Route 53 Private Hosted Zone for internal users resource "aws_route53_zone" "private" { name = "example53.com" vpc { vpc_id = aws_vpc.main.id } } # Route 53 Record for Public DB (External Endpoint) resource "aws_route53_record" "public_db" { zone_id = aws_route53_zone.public.zone_id name = "public-db.example.com" type = "CNAME" ttl = "300" records = [aws_db_instance.public.address] } # Route 53 Record for Internal DB (Internal Endpoint) resource "aws_route53_record" "internal_db" { zone_id = aws_route53_zone.private.zone_id name = "internal-db.example.com" type = "CNAME" ttl = "300" records = [aws_db_instance.internal.address] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false default is_valid_db_instance = false default is_valid_vpc = false default is_valid_subnet = false default is_valid_subnet_group = false is_valid_r53_zone { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_route53_zone" resource2.expressions.name resource2.expressions.vpc[0].vpc_id.references[0] } is_valid_vpc { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_vpc" resource.expressions.cidr_block } is_valid_r53_record { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.ttl resource.expressions.zone_id.references[0] == "aws_route53_zone.public.zone_id" resource.expressions.records.references[0] == "aws_db_instance.public.address" resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_route53_record" resource2.expressions.name resource2.expressions.type resource2.expressions.ttl resource2.expressions.zone_id.references[0] == "aws_route53_zone.private.zone_id" resource2.expressions.records.references[0] == "aws_db_instance.internal.address" } is_valid_subnet { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_subnet" resource.expressions.cidr_block resource.expressions.availability_zone resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_subnet" resource2.expressions.cidr_block resource2.expressions.availability_zone resource2.expressions.vpc_id.references[0] == resource.expressions.vpc_id.references[0] } is_valid_subnet_group { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_db_subnet_group" resource.expressions.subnet_ids.references[0] } is_valid_db_instance { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_db_instance" has_required_main_db_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_db_instance" resource.expressions.db_subnet_group_name.references[0] == "aws_db_subnet_group.main.name" resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_db_instance" resource2.expressions.publicly_accessible.constant_value == true # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) requirement1(resource2.expressions) # Check for instance_class validity requirement2(resource.expressions) requirement2(resource2.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } # Combine all checks into a final rule is_configuration_valid { is_valid_db_instance is_valid_vpc is_valid_subnet is_valid_subnet_group is_valid_r53_record is_valid_r53_zone }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"name_prefix":true,"subnet_ids":true,"supported_network_types":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":null,"timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"db_subnet_group_name":{"references":["aws_db_subnet_group.main.name","aws_db_subnet_group.main"]},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"internal"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"public"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"publicly_accessible":{"constant_value":true},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"mydb-subnet-group"},"subnet_ids":{"references":["aws_subnet.maina.id","aws_subnet.maina","aws_subnet.mainb.id","aws_subnet.mainb"]}},"schema_version":0},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"internal-db.example.com"},"records":{"references":["aws_db_instance.internal.address","aws_db_instance.internal"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.private.zone_id","aws_route53_zone.private"]}},"schema_version":2},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"public-db.example.com"},"records":{"references":["aws_db_instance.public.address","aws_db_instance.public"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.public.zone_id","aws_route53_zone.public"]}},"schema_version":2},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}}]},"schema_version":0},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.0/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.128/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/24"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.internal","attribute":["address"]},{"resource":"aws_db_instance.public","attribute":["address"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_route53_zone.public","attribute":["zone_id"]},{"resource":"aws_subnet.mainb","attribute":["id"]},{"resource":"aws_db_subnet_group.main","attribute":["name"]},{"resource":"aws_subnet.maina","attribute":["id"]},{"resource":"aws_route53_zone.private","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:01Z","applyable":true,"complete":true,"errored":false}
5
I need to spread read traffic across a couple of copies of our main database so things stay fast and reliable, and I want to be able to nudge more users toward one copy than the other.
Using route 53 resources, configure a weighted routing policy that splits users between two db_instances that are replicas of a main db_instance. Call the zone "main", the original db_instance "primary", and the two replicas "replica-1" and "replica-2" respectively
Has one "aws_route53_zone" resource with "name" Has a "aws_db_instance" resource with "identifier" set to "primary" with "instance_class" with "allocated_storage" with "engine" with "username" with "password" with "backup_retention_period" set to a non-zero number Has multiple "aws_db_instance" resources with "identifier" with "replicate_source_db" referencing the main "aws_db_instance" resource with "instance_class" Has multiple "aws_route53_record" resources with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with "weighted_routing_policy" block that contains "weight" as a non-zero number with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_db_instance" "primary" { identifier = "primary" allocated_storage = 20 engine = "postgres" instance_class = "db.t3.micro" username = "dbadmin" password = "your_password_here" skip_final_snapshot = true backup_retention_period = 7 } resource "aws_db_instance" "replica_1" { replicate_source_db = aws_db_instance.primary.identifier instance_class = "db.t3.micro" identifier = "mydb-replica-1" skip_final_snapshot = true } resource "aws_db_instance" "replica_2" { replicate_source_db = aws_db_instance.primary.identifier instance_class = "db.t3.micro" identifier = "mydb-replica-2" skip_final_snapshot = true } # Route53 Hosted Zone resource "aws_route53_zone" "main" { name = "example53.com" } # Route53 Records for each RDS Read Replica with a Weighted Routing Policy resource "aws_route53_record" "replica_1_cname" { zone_id = aws_route53_zone.main.zone_id name = "replica1.example53.com" type = "CNAME" records = [aws_db_instance.replica_1.endpoint] ttl = "60" weighted_routing_policy { weight = 10 } set_identifier = "replica-1-record" } resource "aws_route53_record" "replica_2_cname" { zone_id = aws_route53_zone.main.zone_id name = "replica2.example53.com" type = "CNAME" records = [aws_db_instance.replica_2.endpoint] ttl = "60" weighted_routing_policy { weight = 20 } set_identifier = "replica-2-record" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record_primary = false default is_valid_r53_record_secondary = false default is_valid_db_instance_main = false default is_valid_db_instance_replica1 = false default is_valid_db_instance_replica2 = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.name == "main" } # Validate aws_route53_record is_valid_r53_record_primary { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type.constant_value == "CNAME" resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_1.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_secondary { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type.constant_value == "CNAME" resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_2.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } # Rule to check if a valid aws_db_instance exists is_valid_db_instance_main { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_main_db_arguments } is_valid_db_instance_replica1 { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replica1_arguments } is_valid_db_instance_replica2 { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replica2_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) # Check for instance_class validity requirement2(resource.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } has_required_db_replica1_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_1" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replica2_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_2" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record_primary is_valid_r53_record_secondary is_valid_db_instance_main is_valid_db_instance_replica1 is_valid_db_instance_replica2 }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"primary"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-1"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-2"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica1.example53.com"},"records":{"references":["aws_db_instance.replica_1.endpoint","aws_db_instance.replica_1"]},"set_identifier":{"constant_value":"replica-1-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":10}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica2.example53.com"},"records":{"references":["aws_db_instance.replica_2.endpoint","aws_db_instance.replica_2"]},"set_identifier":{"constant_value":"replica-2-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":20}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.primary","attribute":["identifier"]},{"resource":"aws_db_instance.replica_1","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.replica_2","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:49:09Z","applyable":true,"complete":true,"errored":false}
6
I need a simple way to run and manage a web app in the cloud without handling servers myself, and it should have the right permissions to operate smoothly while keeping the setup pretty minimal.
Create a basic elastic beanstalk environment with a elastic beanstalk application. Name the iam_role "eb_ec2_role", the instance profile "eb_ec2_profile", and the elastic beanstalk application "my_application"
Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "ec2.amazonaws.com" Has one "aws_iam_role_policy_attachment" resource with "role" referencing the "aws_iam_role" with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" Has one "aws_iam_instance_profile" resource with "name" with "role" referencing the "aws_iam_role" resource Has one "aws_elastic_beanstalk_application" resource with "name" Has one "aws_elastic_beanstalk_environment" resource with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name" with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # IAM role for Elastic Beanstalk EC2 instances resource "aws_iam_role" "eb_ec2_role" { name = "elastic_beanstalk_ec2_role_eb1" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "ec2.amazonaws.com" }, }, ] }) } # Attach the AWS managed policy for Elastic Beanstalk to the role resource "aws_iam_role_policy_attachment" "eb_managed_policy" { role = aws_iam_role.eb_ec2_role.name policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Create an instance profile tied to the role resource "aws_iam_instance_profile" "eb_ec2_profile" { name = "elastic_beanstalk_ec2_profile" role = aws_iam_role.eb_ec2_role.name } # Elastic Beanstalk Application resource "aws_elastic_beanstalk_application" "my_application" { name = "my-three-tier-app" } # Elastic Beanstalk Environment for the web tier resource "aws_elastic_beanstalk_environment" "web_tier" { name = "my-web-tier-env" application = aws_elastic_beanstalk_application.my_application.name solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9" setting { namespace = "aws:autoscaling:launchconfiguration" name = "IamInstanceProfile" value = aws_iam_instance_profile.eb_ec2_profile.name } }
package terraform.validation default is_configuration_valid = false default is_valid_iam_instance_profile = false default is_valid_iam_role = false default is_valid_iam_role_policy_attachment = false default is_valid_eb_app = false default is_valid_eb_env = false is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com") } is_valid_iam_role_policy_attachment { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_role_policy_attachment" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Validate aws_iam_instance_profile resource is_valid_iam_instance_profile { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_instance_profile" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" } # Validate aws_eb_app is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } # Validate aws_eb_env is_valid_eb_env { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_environment" resource.expressions.name resource.expressions.application.references[0] == "aws_elastic_beanstalk_application.my_application.name" resource.expressions.solution_stack_name resource.expressions.setting[0].value.references[0] == "aws_iam_instance_profile.eb_ec2_profile.name" } # Combine all checks into a final rule is_configuration_valid { is_valid_iam_role is_valid_iam_role_policy_attachment is_valid_iam_instance_profile is_valid_eb_app is_valid_eb_env }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true,"version_label":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-three-tier-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.my_application.name","aws_elastic_beanstalk_application.my_application"]},"name":{"constant_value":"my-web-tier-env"},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role_eb1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.my_application","attribute":["name"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]}],"timestamp":"2026-02-18T20:49:15Z","applyable":true,"complete":true,"errored":false}
7
"I want to be able to shift my app’s traffic gradually between two different versions so I can rol(...TRUNCATED)
"Configure Blue/Green deployment with Route53 resources to navigate traffic between Elastic Beanstal(...TRUNCATED)
"Has one \"aws_iam_role\" resource\n with \"name\"\n with \"assume_role_policy\" and \"Service(...TRUNCATED)
"terraform {\n required_providers {\n aws = {\n source = \"hashicorp/aws\"\n version (...TRUNCATED)
"package terraform.validation\n\ndefault is_configuration_valid = false\n\ndefault is_valid_iam_inst(...TRUNCATED)
"{\"format_version\":\"1.2\",\"terraform_version\":\"1.14.3\",\"planned_values\":{\"root_module\":{\(...TRUNCATED)
8
"I need our main site to show up when people type in our custom name, and it should lead them to the(...TRUNCATED)
Set up a record that maps a domain name to an IPv4 address using Route 53 resources
"Has one \"aws_route53_zone\" resource\n with \"name\" set to \"example53.com\"\n\nHas one \"aws_(...TRUNCATED)
"provider \"aws\" {\n region = \"us-east-1\"\n}\n\nresource \"aws_route53_zone\" \"example53\" {\n (...TRUNCATED)
"package terraform.validation\n\ndefault is_configuration_valid = false\n\ndefault is_valid_r53_zone(...TRUNCATED)
"{\"format_version\":\"1.2\",\"terraform_version\":\"1.14.3\",\"planned_values\":{\"root_module\":{\(...TRUNCATED)
9
"I want our main domain to be reachable using modern addressing so people on newer networks can acce(...TRUNCATED)
Set up a record that maps a domain name to an IPv6 address using Route 53 resources
"Has one \"aws_route53_zone\" resource\n with \"name\" set to \"example53.com\"\n\nHas one \"aws_(...TRUNCATED)
"provider \"aws\" {\n region = \"us-east-1\"\n}\n\nresource \"aws_route53_zone\" \"example53\" {\n (...TRUNCATED)
"package terraform.validation\n\ndefault is_configuration_valid = false\n\ndefault is_valid_r53_zone(...TRUNCATED)
"{\"format_version\":\"1.2\",\"terraform_version\":\"1.14.3\",\"planned_values\":{\"root_module\":{\(...TRUNCATED)
End of preview. Expand in Data Studio

Ambig-IaC: Ambiguous Infrastructure-as-Code Benchmark

A benchmark dataset of 300 tasks designed to evaluate how well AI agents interpret ambiguous natural language requirements and produce correct Terraform configurations.

Dataset Description

Each task presents a deliberately underspecified infrastructure request (e.g., "I need a way to track which lookups are being made against our domain") alongside the fully specified intent, a reference Terraform implementation, and OPA/Rego validation policies.

The gap between the ambiguous prompt and the detailed intent makes this dataset useful for studying:

  • How AI agents handle underspecified requirements
  • Disambiguation strategies for IaC generation
  • Iterative refinement of infrastructure configurations

Fields

Field Type Description
id int Task index (0-299)
prompt string Ambiguous natural language requirement (~60 words avg)
prompt_original string Original detailed requirement with specific resource names
intent string Structured specification listing exact resources and attributes
main_tf string Reference Terraform (HCL) configuration
checks_rego string OPA/Conftest Rego policy for validation
plan_json string Terraform plan JSON output

Usage

from datasets import load_dataset

ds = load_dataset("znyang/ambig-iac")

# Access a task
task = ds["train"][0]
print(task["prompt"])        # Ambiguous requirement
print(task["intent"])        # Detailed specification
print(task["main_tf"])       # Reference Terraform code

Dataset Statistics

  • Tasks: 300
  • Avg prompt length: ~60 words
  • Avg intent length: ~12 lines
  • Avg main.tf length: ~98 lines
  • Avg checks.rego length: ~69 lines
  • Domain: AWS infrastructure (Route 53, CloudWatch, VPC, Kinesis, IAM, etc.)

License

MIT

Downloads last month
7