id
int32
0
299
prompt
stringlengths
93
303
prompt_original
stringlengths
21
1.39k
intent
stringlengths
25
2.17k
main_tf
stringlengths
109
8.28k
checks_rego
stringlengths
171
6.45k
plan_json
stringlengths
1.41k
174k
0
I need a way to track which lookups are being made against our domain so we can review that activity in a central place, and it should be dependable enough to use for troubleshooting later.
Configure a query log that can create a log stream and put log events using Route 53 resources. Name the zone "primary", the cloudwatch log group "aws_route53_example_com", and the cloudwatch log resource policy "route53-query-logging-policy"
Has one "aws_route53_zone" resource with "name" Has one "aws_cloudwatch_log_group" resource Has one "aws_cloudwatch_log_resource_policy" resource with "policy_document" enabling "logs:CreateLogStream" and "logs:PutLogEvents" with "policy_name" Has one "aws_route53_query_log" resource with "cloudwatch_log_group_arn" referencing the "aws_cloudwatch_log_group" resource with "zone_id" referencing the "aws_route53_zone" resource and depends on the "aws_cloudwatch_log_resource_policy" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" } resource "aws_cloudwatch_log_group" "aws_route53_example_com" { name = "/aws/route53/${aws_route53_zone.primary.name}" retention_in_days = 30 } # Example CloudWatch log resource policy to allow Route53 to write logs # to any log group under /aws/route53/* data "aws_iam_policy_document" "route53-query-logging-policy" { statement { actions = [ "logs:CreateLogStream", "logs:PutLogEvents", ] resources = ["arn:aws:logs:*:*:log-group:/aws/route53/*"] principals { identifiers = ["route53.amazonaws.com"] type = "Service" } } } resource "aws_cloudwatch_log_resource_policy" "route53-query-logging-policy" { policy_document = data.aws_iam_policy_document.route53-query-logging-policy.json policy_name = "route53-query-logging-policy" } resource "aws_route53_query_log" "example_com" { depends_on = [aws_cloudwatch_log_resource_policy.route53-query-logging-policy] cloudwatch_log_group_arn = aws_cloudwatch_log_group.aws_route53_example_com.arn zone_id = aws_route53_zone.primary.zone_id }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_cloudwatch_log_group = false default is_valid_cloudwatch_log_resource_policy = false default is_valid_route53_query_log = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name } is_valid_cloudwatch_log_group { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_cloudwatch_log_group" } is_valid_cloudwatch_log_resource_policy { some i resource := input.resource_changes[i] resource.type == "aws_cloudwatch_log_resource_policy" contains(resource.change.after.policy_document, "logs:PutLogEvents") contains(resource.change.after.policy_document, "logs:CreateLogStream") resource.change.after.policy_name } is_valid_route53_query_log { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_query_log" resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" resource.expressions.cloudwatch_log_group_arn.references[0] == "aws_cloudwatch_log_group.aws_route53_example_com.arn" resource.depends_on[0] == "aws_cloudwatch_log_resource_policy.route53-query-logging-policy" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_cloudwatch_log_group is_valid_cloudwatch_log_resource_policy is_valid_route53_query_log }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"region":null}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"sensitive_values":{}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"sensitive_values":{}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"after_unknown":{"arn":true,"deletion_protection_enabled":true,"id":true,"log_group_class":true,"name_prefix":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"name":null,"region":null}}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{},"after_unknown":{"arn":true,"cloudwatch_log_group_arn":true,"id":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1177966457","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:PutLogEvents\",\n \"logs:CreateLogStream\"\n ],\n \"Resource\": \"arn:aws:logs:*:*:log-group:/aws/route53/*\",\n \"Principal\": {\n \"Service\": \"route53.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["logs:CreateLogStream","logs:PutLogEvents"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["route53.amazonaws.com"],"type":"Service"}],"resources":["arn:aws:logs:*:*:log-group:/aws/route53/*"],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false,false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_config_key":"aws","expressions":{"name":{"references":["aws_route53_zone.primary.name","aws_route53_zone.primary"]},"retention_in_days":{"constant_value":30}},"schema_version":0},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"policy_document":{"references":["data.aws_iam_policy_document.route53-query-logging-policy.json","data.aws_iam_policy_document.route53-query-logging-policy"]},"policy_name":{"constant_value":"route53-query-logging-policy"}},"schema_version":0},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_config_key":"aws","expressions":{"cloudwatch_log_group_arn":{"references":["aws_cloudwatch_log_group.aws_route53_example_com.arn","aws_cloudwatch_log_group.aws_route53_example_com"]},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":0,"depends_on":["aws_cloudwatch_log_resource_policy.route53-query-logging-policy"]},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["logs:CreateLogStream","logs:PutLogEvents"]},"principals":[{"identifiers":{"constant_value":["route53.amazonaws.com"]},"type":{"constant_value":"Service"}}],"resources":{"constant_value":["arn:aws:logs:*:*:log-group:/aws/route53/*"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.route53-query-logging-policy","attribute":["json"]},{"resource":"aws_cloudwatch_log_group.aws_route53_example_com","attribute":["arn"]},{"resource":"aws_route53_zone.primary","attribute":["name"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:48Z","applyable":true,"complete":true,"errored":false}
1
I need to make sure one of our internal name‑lookup setups can be used from more than one private network, and it should work even as we add or remove networks over time.
Configure a valid Route 53 zone association resource
Has multiple "aws_vpc" resource with a specified "cidr_block" with "enable_dns_hostnames" equal to "true" with "enable_dns_support" equal to "true" Has one "aws_route53_zone" resource with "name" with a "vpc" block that contains "vpc_id" that references the "aws_vpc" resource Has one "aws_route53_vpc_association_authorization" resource with "vpc_id" referencing the "aws_vpc" resource with "zone_id" referencing the "aws_route53_zone" resource Has one "aws_route53_zone_association" resource with "vpc_id" referencing the "aws_route53_vpc_association_authorization" resource with "zone_id" referencing the "aws_route53_vpc_association_authorization" resource
provider "aws" { region = "us-east-1" } resource "aws_vpc" "example" { cidr_block = "10.6.0.0/16" enable_dns_hostnames = true enable_dns_support = true } resource "aws_route53_zone" "example" { name = "example.com" vpc { vpc_id = aws_vpc.example.id } } resource "aws_vpc" "alternate" { cidr_block = "10.7.0.0/16" enable_dns_hostnames = true enable_dns_support = true } resource "aws_route53_vpc_association_authorization" "example" { vpc_id = aws_vpc.alternate.id zone_id = aws_route53_zone.example.id } resource "aws_route53_zone_association" "example" { vpc_id = aws_route53_vpc_association_authorization.example.vpc_id zone_id = aws_route53_vpc_association_authorization.example.zone_id }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_vpc = false default is_valid_zone_association = false default is_valid_vpc_association = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.vpc[0].vpc_id.references[0] resource.expressions.name } is_valid_vpc { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_vpc" resource.expressions.cidr_block resource.expressions.enable_dns_hostnames.constant_value == true resource.expressions.enable_dns_support.constant_value == true resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_vpc" resource2.expressions.cidr_block resource2.expressions.enable_dns_hostnames.constant_value == true resource2.expressions.enable_dns_support.constant_value == true } is_valid_zone_association { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone_association" resource.expressions.vpc_id.references[0] resource.expressions.zone_id.references[0] } is_valid_vpc_association { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_vpc_association_authorization" resource.expressions.vpc_id.references[0] resource.expressions.zone_id.references[0] } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_vpc is_valid_zone_association is_valid_vpc_association }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"owning_account":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.alternate.id","aws_vpc.alternate"]},"zone_id":{"references":["aws_route53_zone.example.id","aws_route53_zone.example"]}},"schema_version":0},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.example.id","aws_vpc.example"]}}]},"schema_version":0},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_route53_vpc_association_authorization.example.vpc_id","aws_route53_vpc_association_authorization.example"]},"zone_id":{"references":["aws_route53_vpc_association_authorization.example.zone_id","aws_route53_vpc_association_authorization.example"]}},"schema_version":0},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.7.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.6.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_route53_vpc_association_authorization.example","attribute":["vpc_id"]},{"resource":"aws_route53_vpc_association_authorization.example","attribute":["zone_id"]},{"resource":"aws_route53_zone.example","attribute":["id"]},{"resource":"aws_vpc.alternate","attribute":["id"]},{"resource":"aws_vpc.example","attribute":["id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
2
I need our site to show up at our main domain and automatically direct visitors to whatever is handling the traffic behind it, and it should stay reliable even if demand spikes.
Configure a Route 53 record with an Elastic Load Balancer resource. Call the zone "primary" and the elb "main"
Has one "aws_route53_zone" resource with "name" Has a "aws_elb" resource with "name" with "availability_zones" with a "listener" block with "instance_port", "instance_protocol", "lb_port", "lb_protocol" Has a "aws_route53_record" resource with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with an "alias" block with "name" and "zone_id" referencing the "aws_elb" and "evaluate_target_health" equal to true
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" } resource "aws_elb" "main" { name = "sample" availability_zones = ["us-east-1c"] listener { instance_port = 80 instance_protocol = "http" lb_port = 80 lb_protocol = "http" } } resource "aws_route53_record" "www" { zone_id = aws_route53_zone.primary.zone_id name = "example53.com" type = "A" alias { name = aws_elb.main.dns_name zone_id = aws_elb.main.zone_id evaluate_target_health = true } }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false default is_valid_elb = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name } is_valid_elb { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elb" resource.expressions.availability_zones resource.expressions.listener[0] } is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" resource.expressions.alias[0].name.references[0] == "aws_elb.main.dns_name" resource.expressions.alias[0].zone_id.references[0] == "aws_elb.main.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_elb is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"access_logs":[],"arn":true,"availability_zones":[false],"dns_name":true,"health_check":true,"id":true,"instances":true,"internal":true,"listener":[{}],"name_prefix":true,"security_groups":true,"source_security_group":true,"source_security_group_id":true,"subnets":true,"tags_all":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[{"name":true,"zone_id":true}],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_config_key":"aws","expressions":{"availability_zones":{"constant_value":["us-east-1c"]},"listener":[{"instance_port":{"constant_value":80},"instance_protocol":{"constant_value":"http"},"lb_port":{"constant_value":80},"lb_protocol":{"constant_value":"http"}}],"name":{"constant_value":"sample"}},"schema_version":0},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_config_key":"aws","expressions":{"alias":[{"evaluate_target_health":{"constant_value":true},"name":{"references":["aws_elb.main.dns_name","aws_elb.main"]},"zone_id":{"references":["aws_elb.main.zone_id","aws_elb.main"]}}],"name":{"constant_value":"example53.com"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elb.main","attribute":["dns_name"]},{"resource":"aws_elb.main","attribute":["zone_id"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
3
Our main data store is too slow for people overseas, so I want to spread read traffic across a few copies in different parts of the world while keeping things reliable.
Using route 53 resources, configure a weighted routing policy that splits users between three db_instances that are replicas of a main db_instance. Provision the three replica instances in "us-east-1", "eu-central-1", and "ap-southeast-1". Provision the zone and main db_instance in "us-west-1". Call the zone "main", the original db_instance "primary", the three replicas "replica_us_east", "replica_eu_central" and "replica_ap_southeast" respectively, and the provider aliases "main", "us-east", "eu-central", and "ap-southeast".
Has one "aws_route53_zone" resource with "name" Has a "aws_db_instance" resource with "identifier" set to "master" with "instance_class" with "allocated_storage" with "engine" with "username" with "password" with "backup_retention_period" set to a non-zero number Has multiple "aws_db_instance" resources with "identifier" with "replicate_source_db" referencing the main "aws_db_instance" resource with "instance_class" Has multiple "aws_route53_record" resources with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with "weighted_routing_policy" block that contains "weight" as a non-zero number with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" configuration_aliases = [ aws.main, aws.us_east, aws.eu_central, aws.ap_southeast ] } } required_version = ">= 1.9.0" } provider "aws" { alias = "main" region = "us-west-2" } provider "aws" { alias = "us_east" region = "us-east-1" # Example region for US East } provider "aws" { alias = "eu_central" region = "eu-central-1" # Example region for EU Central } provider "aws" { alias = "ap_southeast" region = "ap-southeast-1" # Example region for AP Southeast } resource "aws_db_instance" "primary" { provider = aws.main identifier = "master" allocated_storage = 20 engine = "postgres" instance_class = "db.t3.micro" username = "dbadmin" password = "your_password_here" skip_final_snapshot = true backup_retention_period = 7 } resource "aws_db_instance" "replica_us_east" { provider = aws.us_east replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-us-east" skip_final_snapshot = true } resource "aws_db_instance" "replica_eu_central" { provider = aws.eu_central replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-eu-central" skip_final_snapshot = true } resource "aws_db_instance" "replica_ap_southeast" { provider = aws.ap_southeast replicate_source_db = aws_db_instance.primary.arn instance_class = "db.t3.micro" identifier = "mydb-replica-ap-southeast" skip_final_snapshot = true } # Route53 Hosted Zone resource "aws_route53_zone" "main" { provider = aws.main name = "example53.com" } # Route53 Records for each RDS Read Replica with a Weighted Routing Policy resource "aws_route53_record" "replica_us_east_cname" { provider = aws.us_east zone_id = aws_route53_zone.main.zone_id name = "us.east.example53.com" type = "CNAME" records = [aws_db_instance.replica_us_east.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-us-east" } resource "aws_route53_record" "replica_eu_central_cname" { provider = aws.eu_central zone_id = aws_route53_zone.main.zone_id name = "eu.central.example53.com" type = "CNAME" records = [aws_db_instance.replica_eu_central.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-eu-central" } resource "aws_route53_record" "replica_ap_southeast_cname" { provider = aws.ap_southeast zone_id = aws_route53_zone.main.zone_id name = "ap.southeast.example53.com" type = "CNAME" records = [aws_db_instance.replica_ap_southeast.endpoint] ttl = "60" weighted_routing_policy { weight = 30 } set_identifier = "replica-ap-southeast" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record_us = false default is_valid_r53_record_eu = false default is_valid_r53_record_ap = false default is_valid_db_instance_main = false default is_valid_db_instance_replicaus = false default is_valid_db_instance_replicaeu = false default is_valid_db_instance_replicaap = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.name == "main" resource.provider_config_key == "aws.main" } # Validate aws_route53_record is_valid_r53_record_us { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.us_east" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_us_east.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_eu { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.eu_central" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_eu_central.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_ap { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.provider_config_key == "aws.ap_southeast" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_ap_southeast.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } # Rule to check if a valid aws_db_instance exists is_valid_db_instance_main { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.provider_config_key == "aws.main" has_required_main_db_arguments } is_valid_db_instance_replicaus { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaus_arguments } is_valid_db_instance_replicaeu { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaeu_arguments } is_valid_db_instance_replicaap { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replicaap_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) # Check for instance_class validity requirement2(resource.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } has_required_db_replicaus_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_us_east" resource.provider_config_key == "aws.us_east" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replicaeu_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_eu_central" resource.provider_config_key == "aws.eu_central" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replicaap_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_ap_southeast" resource.provider_config_key == "aws.ap_southeast" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record_us is_valid_r53_record_eu is_valid_r53_record_ap is_valid_db_instance_main is_valid_db_instance_replicaus is_valid_db_instance_replicaeu is_valid_db_instance_replicaap }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0"},"aws.ap_southeast":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"ap_southeast","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"ap-southeast-1"}}},"aws.eu_central":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"eu_central","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"eu-central-1"}}},"aws.main":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"main","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-west-2"}}},"aws.us_east":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"us_east","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws.main","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"master"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_config_key":"aws.ap_southeast","expressions":{"identifier":{"constant_value":"mydb-replica-ap-southeast"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_config_key":"aws.eu_central","expressions":{"identifier":{"constant_value":"mydb-replica-eu-central"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_config_key":"aws.us_east","expressions":{"identifier":{"constant_value":"mydb-replica-us-east"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_config_key":"aws.ap_southeast","expressions":{"name":{"constant_value":"ap.southeast.example53.com"},"records":{"references":["aws_db_instance.replica_ap_southeast.endpoint","aws_db_instance.replica_ap_southeast"]},"set_identifier":{"constant_value":"replica-ap-southeast"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_config_key":"aws.eu_central","expressions":{"name":{"constant_value":"eu.central.example53.com"},"records":{"references":["aws_db_instance.replica_eu_central.endpoint","aws_db_instance.replica_eu_central"]},"set_identifier":{"constant_value":"replica-eu-central"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_config_key":"aws.us_east","expressions":{"name":{"constant_value":"us.east.example53.com"},"records":{"references":["aws_db_instance.replica_us_east.endpoint","aws_db_instance.replica_us_east"]},"set_identifier":{"constant_value":"replica-us-east"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws.main","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.replica_ap_southeast","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.primary","attribute":["arn"]},{"resource":"aws_db_instance.replica_eu_central","attribute":["endpoint"]},{"resource":"aws_db_instance.replica_us_east","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:48:39Z","applyable":true,"complete":true,"errored":false}
4
I need a setup where people inside our company automatically connect to a different data store than outsiders, and everyone should be able to use simple, human‑friendly names to reach the right place without extra steps.
Configure Route 53 to return different database endpoints to internal versus external users. Internal users are routed to an internal RDS instance, while external users are routed to a publicly accessible one. Name the zones "private" and "public", the databases "internal" and "public", and the subnet group "main"
Has one "aws_vpc" resource with a specified "cidr_block" Has multiple "aws_subnet" resources with "vpc_id" referencing the "aws_vpc" resource with specified "cidr_block" for each with "availability_zone" set Has one "aws_db_subnet_group" resource with "subnet_ids" referencing the IDs of "aws_subnet" resources Has one "aws_route53_zone" resource with "name" Has one "aws_route53_zone" resource with "name" with a "vpc" block with "vpc_id" referencing the "aws_vpc" resource Has one "aws_db_instance" resource for internal use with "allocated_storage" set to a specific size with a specified "engine" with a specified "instance_class" with "username" and "password" with "skip_final_snapshot" set to true with "identifier" with "password" with "db_subnet_group_name" referencing the "aws_db_subnet_group" resource Has one "aws_db_instance" resource for public use with "allocated_storage" set to a specific size with a specified "engine" with a specified "instance_class" with "username" and "password" with "skip_final_snapshot" set to true with "identifier" with "password" with "publicly_accessible" set to true Has two "aws_route53_record" resources with "zone_id" referencing one of the "aws_route53_zone" resources with "type" with "ttl" with "records" referencing one of the "aws_db_instance" resources
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # Create a VPC for internal resources resource "aws_vpc" "main" { cidr_block = "10.0.0.0/24" } # RDS instances resource "aws_db_instance" "internal" { # Internal DB configuration allocated_storage = 20 engine = "mysql" instance_class = "db.t3.micro" identifier = "internal" username = "user" password = "password" db_subnet_group_name = aws_db_subnet_group.main.name skip_final_snapshot = true } resource "aws_db_instance" "public" { # Public DB configuration publicly_accessible = true allocated_storage = 20 engine = "mysql" instance_class = "db.t3.micro" identifier = "public" username = "user" password = "password" skip_final_snapshot = true } resource "aws_db_subnet_group" "main" { name = "mydb-subnet-group" subnet_ids = [aws_subnet.maina.id, aws_subnet.mainb.id] } data "aws_availability_zones" "available" {} # Subnet for RDS resource "aws_subnet" "maina" { vpc_id = aws_vpc.main.id cidr_block = "10.0.0.0/25" availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "mainb" { vpc_id = aws_vpc.main.id cidr_block = "10.0.0.128/25" availability_zone = data.aws_availability_zones.available.names[1] } # Route 53 Public Hosted Zone for external users resource "aws_route53_zone" "public" { name = "example53.com" } # Route 53 Private Hosted Zone for internal users resource "aws_route53_zone" "private" { name = "example53.com" vpc { vpc_id = aws_vpc.main.id } } # Route 53 Record for Public DB (External Endpoint) resource "aws_route53_record" "public_db" { zone_id = aws_route53_zone.public.zone_id name = "public-db.example.com" type = "CNAME" ttl = "300" records = [aws_db_instance.public.address] } # Route 53 Record for Internal DB (Internal Endpoint) resource "aws_route53_record" "internal_db" { zone_id = aws_route53_zone.private.zone_id name = "internal-db.example.com" type = "CNAME" ttl = "300" records = [aws_db_instance.internal.address] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false default is_valid_db_instance = false default is_valid_vpc = false default is_valid_subnet = false default is_valid_subnet_group = false is_valid_r53_zone { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_route53_zone" resource2.expressions.name resource2.expressions.vpc[0].vpc_id.references[0] } is_valid_vpc { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_vpc" resource.expressions.cidr_block } is_valid_r53_record { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.ttl resource.expressions.zone_id.references[0] == "aws_route53_zone.public.zone_id" resource.expressions.records.references[0] == "aws_db_instance.public.address" resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_route53_record" resource2.expressions.name resource2.expressions.type resource2.expressions.ttl resource2.expressions.zone_id.references[0] == "aws_route53_zone.private.zone_id" resource2.expressions.records.references[0] == "aws_db_instance.internal.address" } is_valid_subnet { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_subnet" resource.expressions.cidr_block resource.expressions.availability_zone resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_subnet" resource2.expressions.cidr_block resource2.expressions.availability_zone resource2.expressions.vpc_id.references[0] == resource.expressions.vpc_id.references[0] } is_valid_subnet_group { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_db_subnet_group" resource.expressions.subnet_ids.references[0] } is_valid_db_instance { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_db_instance" has_required_main_db_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_db_instance" resource.expressions.db_subnet_group_name.references[0] == "aws_db_subnet_group.main.name" resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_db_instance" resource2.expressions.publicly_accessible.constant_value == true # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) requirement1(resource2.expressions) # Check for instance_class validity requirement2(resource.expressions) requirement2(resource2.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } # Combine all checks into a final rule is_configuration_valid { is_valid_db_instance is_valid_vpc is_valid_subnet is_valid_subnet_group is_valid_r53_record is_valid_r53_zone }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"name_prefix":true,"subnet_ids":true,"supported_network_types":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":null,"timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"db_subnet_group_name":{"references":["aws_db_subnet_group.main.name","aws_db_subnet_group.main"]},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"internal"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"public"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"publicly_accessible":{"constant_value":true},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"mydb-subnet-group"},"subnet_ids":{"references":["aws_subnet.maina.id","aws_subnet.maina","aws_subnet.mainb.id","aws_subnet.mainb"]}},"schema_version":0},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"internal-db.example.com"},"records":{"references":["aws_db_instance.internal.address","aws_db_instance.internal"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.private.zone_id","aws_route53_zone.private"]}},"schema_version":2},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"public-db.example.com"},"records":{"references":["aws_db_instance.public.address","aws_db_instance.public"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.public.zone_id","aws_route53_zone.public"]}},"schema_version":2},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}}]},"schema_version":0},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.0/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.128/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/24"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.internal","attribute":["address"]},{"resource":"aws_db_instance.public","attribute":["address"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_route53_zone.public","attribute":["zone_id"]},{"resource":"aws_subnet.mainb","attribute":["id"]},{"resource":"aws_db_subnet_group.main","attribute":["name"]},{"resource":"aws_subnet.maina","attribute":["id"]},{"resource":"aws_route53_zone.private","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:01Z","applyable":true,"complete":true,"errored":false}
5
I need to spread read traffic across a couple of copies of our main database so things stay fast and reliable, and I want to be able to nudge more users toward one copy than the other.
Using route 53 resources, configure a weighted routing policy that splits users between two db_instances that are replicas of a main db_instance. Call the zone "main", the original db_instance "primary", and the two replicas "replica-1" and "replica-2" respectively
Has one "aws_route53_zone" resource with "name" Has a "aws_db_instance" resource with "identifier" set to "primary" with "instance_class" with "allocated_storage" with "engine" with "username" with "password" with "backup_retention_period" set to a non-zero number Has multiple "aws_db_instance" resources with "identifier" with "replicate_source_db" referencing the main "aws_db_instance" resource with "instance_class" Has multiple "aws_route53_record" resources with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with "weighted_routing_policy" block that contains "weight" as a non-zero number with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_db_instance" "primary" { identifier = "primary" allocated_storage = 20 engine = "postgres" instance_class = "db.t3.micro" username = "dbadmin" password = "your_password_here" skip_final_snapshot = true backup_retention_period = 7 } resource "aws_db_instance" "replica_1" { replicate_source_db = aws_db_instance.primary.identifier instance_class = "db.t3.micro" identifier = "mydb-replica-1" skip_final_snapshot = true } resource "aws_db_instance" "replica_2" { replicate_source_db = aws_db_instance.primary.identifier instance_class = "db.t3.micro" identifier = "mydb-replica-2" skip_final_snapshot = true } # Route53 Hosted Zone resource "aws_route53_zone" "main" { name = "example53.com" } # Route53 Records for each RDS Read Replica with a Weighted Routing Policy resource "aws_route53_record" "replica_1_cname" { zone_id = aws_route53_zone.main.zone_id name = "replica1.example53.com" type = "CNAME" records = [aws_db_instance.replica_1.endpoint] ttl = "60" weighted_routing_policy { weight = 10 } set_identifier = "replica-1-record" } resource "aws_route53_record" "replica_2_cname" { zone_id = aws_route53_zone.main.zone_id name = "replica2.example53.com" type = "CNAME" records = [aws_db_instance.replica_2.endpoint] ttl = "60" weighted_routing_policy { weight = 20 } set_identifier = "replica-2-record" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record_primary = false default is_valid_r53_record_secondary = false default is_valid_db_instance_main = false default is_valid_db_instance_replica1 = false default is_valid_db_instance_replica2 = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.name == "main" } # Validate aws_route53_record is_valid_r53_record_primary { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type.constant_value == "CNAME" resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_1.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } is_valid_r53_record_secondary { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.weighted_routing_policy[0].weight resource.expressions.type.constant_value == "CNAME" resource.expressions.ttl resource.expressions.records.references[0] == "aws_db_instance.replica_2.endpoint" resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id" } # Rule to check if a valid aws_db_instance exists is_valid_db_instance_main { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_main_db_arguments } is_valid_db_instance_replica1 { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replica1_arguments } is_valid_db_instance_replica2 { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" has_required_db_replica2_arguments } # Helper rule to check if all required arguments are present and valid has_required_main_db_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" # Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot requirement1(resource.expressions) # Check for instance_class validity requirement2(resource.expressions) } # 1, allocated_storage and engine or snapshot_identifier or replace_source_db requirement1(expressions) { expressions.allocated_storage expressions.engine expressions.username expressions.password is_valid_engine(expressions.engine.constant_value) } requirement1(expressions) { expressions.snapshot_identifier } # Check for instance_class validity requirement2(expressions) { expressions.instance_class is_valid_instance_class(expressions.instance_class.constant_value) } # Helper rule to validate engine value is_valid_engine(engine) { engine_set := { "mysql", "postgres", "mariadb", "oracle-se", "oracle-se1", "oracle-se2", "oracle-ee", "sqlserver-ee", "sqlserver-se", "sqlserver-ex", "sqlserver-web" } engine_set[engine] } # Helper rule to validate instance class type is_valid_instance_class(instance_class) { instance_class_starts_with(instance_class, "db.") } # Helper rule to check prefix of instance class instance_class_starts_with(instance_class, prefix) { startswith(instance_class, prefix) } has_required_db_replica1_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_1" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } has_required_db_replica2_arguments { resource := input.configuration.root_module.resources[_] resource.type == "aws_db_instance" resource.name == "replica_2" resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier" is_valid_instance_class(resource.expressions.instance_class.constant_value) resource.expressions.skip_final_snapshot } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record_primary is_valid_r53_record_secondary is_valid_db_instance_main is_valid_db_instance_replica1 is_valid_db_instance_replica2 }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"primary"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-1"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-2"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica1.example53.com"},"records":{"references":["aws_db_instance.replica_1.endpoint","aws_db_instance.replica_1"]},"set_identifier":{"constant_value":"replica-1-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":10}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica2.example53.com"},"records":{"references":["aws_db_instance.replica_2.endpoint","aws_db_instance.replica_2"]},"set_identifier":{"constant_value":"replica-2-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":20}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.primary","attribute":["identifier"]},{"resource":"aws_db_instance.replica_1","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.replica_2","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:49:09Z","applyable":true,"complete":true,"errored":false}
6
I need a simple way to run and manage a web app in the cloud without handling servers myself, and it should have the right permissions to operate smoothly while keeping the setup pretty minimal.
Create a basic elastic beanstalk environment with a elastic beanstalk application. Name the iam_role "eb_ec2_role", the instance profile "eb_ec2_profile", and the elastic beanstalk application "my_application"
Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "ec2.amazonaws.com" Has one "aws_iam_role_policy_attachment" resource with "role" referencing the "aws_iam_role" with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" Has one "aws_iam_instance_profile" resource with "name" with "role" referencing the "aws_iam_role" resource Has one "aws_elastic_beanstalk_application" resource with "name" Has one "aws_elastic_beanstalk_environment" resource with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name" with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # IAM role for Elastic Beanstalk EC2 instances resource "aws_iam_role" "eb_ec2_role" { name = "elastic_beanstalk_ec2_role_eb1" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "ec2.amazonaws.com" }, }, ] }) } # Attach the AWS managed policy for Elastic Beanstalk to the role resource "aws_iam_role_policy_attachment" "eb_managed_policy" { role = aws_iam_role.eb_ec2_role.name policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Create an instance profile tied to the role resource "aws_iam_instance_profile" "eb_ec2_profile" { name = "elastic_beanstalk_ec2_profile" role = aws_iam_role.eb_ec2_role.name } # Elastic Beanstalk Application resource "aws_elastic_beanstalk_application" "my_application" { name = "my-three-tier-app" } # Elastic Beanstalk Environment for the web tier resource "aws_elastic_beanstalk_environment" "web_tier" { name = "my-web-tier-env" application = aws_elastic_beanstalk_application.my_application.name solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9" setting { namespace = "aws:autoscaling:launchconfiguration" name = "IamInstanceProfile" value = aws_iam_instance_profile.eb_ec2_profile.name } }
package terraform.validation default is_configuration_valid = false default is_valid_iam_instance_profile = false default is_valid_iam_role = false default is_valid_iam_role_policy_attachment = false default is_valid_eb_app = false default is_valid_eb_env = false is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com") } is_valid_iam_role_policy_attachment { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_role_policy_attachment" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Validate aws_iam_instance_profile resource is_valid_iam_instance_profile { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_instance_profile" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" } # Validate aws_eb_app is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } # Validate aws_eb_env is_valid_eb_env { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_environment" resource.expressions.name resource.expressions.application.references[0] == "aws_elastic_beanstalk_application.my_application.name" resource.expressions.solution_stack_name resource.expressions.setting[0].value.references[0] == "aws_iam_instance_profile.eb_ec2_profile.name" } # Combine all checks into a final rule is_configuration_valid { is_valid_iam_role is_valid_iam_role_policy_attachment is_valid_iam_instance_profile is_valid_eb_app is_valid_eb_env }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true,"version_label":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-three-tier-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.my_application.name","aws_elastic_beanstalk_application.my_application"]},"name":{"constant_value":"my-web-tier-env"},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role_eb1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.my_application","attribute":["name"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]}],"timestamp":"2026-02-18T20:49:15Z","applyable":true,"complete":true,"errored":false}
7
I want to be able to shift my app’s traffic gradually between two different versions so I can roll out updates safely and switch back quickly if something goes wrong.
Configure Blue/Green deployment with Route53 resources to navigate traffic between Elastic Beanstalk Environments. Name the environments "blue" and "green" and implement a Weighted Routing Policy for the records
Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "ec2.amazonaws.com" Has one "aws_iam_role_policy_attachment" resource with "role" referencing the "aws_iam_role" with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" Has one "aws_iam_instance_profile" resource with "name" with "role" referencing the "aws_iam_role" resource Has one "aws_elastic_beanstalk_application" resource with "name" Has two "aws_elastic_beanstalk_environment" resources each are provisioned in different regions with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name" with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource Has one "aws_route53_zone" resource with "name" Has two "aws_route53_record" resources each are provisioned in different regions with "name" with "type" with "ttl" with "zone_id" referencing the "aws_route53_zone" resource with "set_identifier" with "weighted_routing_policy" block that contains "weight" as a non-zero number with "records" referencing one of the "aws_elastic_beanstalk_environment" resources
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "eb_ec2_role" { name = "elastic_beanstalk_ec2_role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "ec2.amazonaws.com" }, }, ] }) } # Attach the AWS managed policy for Elastic Beanstalk to the role resource "aws_iam_role_policy_attachment" "eb_managed_policy" { role = aws_iam_role.eb_ec2_role.name policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Create an instance profile tied to the role resource "aws_iam_instance_profile" "eb_ec2_profile" { name = "elastic_beanstalk_ec2_profile" role = aws_iam_role.eb_ec2_role.name } resource "aws_s3_bucket" "sample_bucket" { bucket_prefix = "sample-" } resource "aws_s3_object" "examplebucket_blue_object" { key = "blue_app" bucket = aws_s3_bucket.sample_bucket.id source = "./supplement/app.zip" } resource "aws_s3_object" "examplebucket_green_object" { key = "green_app" bucket = aws_s3_bucket.sample_bucket.id source = "./supplement/app.zip" } # Elastic Beanstalk application resource "aws_elastic_beanstalk_application" "blue_app" { name = "blue-app" description = "An application for Blue deployment." } resource "aws_elastic_beanstalk_application_version" "blue_version" { name = "v1" application = aws_elastic_beanstalk_application.blue_app.name bucket = aws_s3_object.examplebucket_blue_object.bucket key = aws_s3_object.examplebucket_blue_object.key } resource "aws_elastic_beanstalk_application" "green_app" { name = "green-app" description = "An application for Green deployment." } resource "aws_elastic_beanstalk_application_version" "green_version" { name = "v2" application = aws_elastic_beanstalk_application.green_app.name bucket = aws_s3_object.examplebucket_green_object.bucket key = aws_s3_object.examplebucket_green_object.key } # Blue environment resource "aws_elastic_beanstalk_environment" "blue" { name = "${aws_elastic_beanstalk_application.blue_app.name}" application = aws_elastic_beanstalk_application.blue_app.name solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9" version_label = aws_elastic_beanstalk_application_version.blue_version.name setting { namespace = "aws:autoscaling:launchconfiguration" name = "IamInstanceProfile" value = aws_iam_instance_profile.eb_ec2_profile.name } } # Green environment (New version) resource "aws_elastic_beanstalk_environment" "green" { name = "${aws_elastic_beanstalk_application.green_app.name}-green" application = aws_elastic_beanstalk_application.green_app.name solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9" version_label = aws_elastic_beanstalk_application_version.green_version.name setting { namespace = "aws:autoscaling:launchconfiguration" name = "IamInstanceProfile" value = aws_iam_instance_profile.eb_ec2_profile.name } } # Route53 Hosted Zone resource "aws_route53_zone" "main" { name = "example53.com" } # Weighted DNS records for Blue and Green environments resource "aws_route53_record" "blue" { zone_id = aws_route53_zone.main.zone_id name = "app.example.com" type = "CNAME" ttl = "60" weighted_routing_policy { weight = 120 } set_identifier = "BlueEnvironment" records = [ aws_elastic_beanstalk_environment.blue.cname ] } resource "aws_route53_record" "green" { zone_id = aws_route53_zone.main.zone_id name = "app.example.com" type = "CNAME" ttl = "60" weighted_routing_policy { weight = 60 } set_identifier = "GreenEnvironment" records = [ aws_elastic_beanstalk_environment.green.cname ] }
package terraform.validation default is_configuration_valid = false default is_valid_iam_instance_profile = false default is_valid_iam_role = false default is_valid_iam_role_policy_attachment = false default is_valid_eb_app = false default is_valid_eb_env = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.name } # Validate aws_route53_record is_valid_r53_record { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.ttl resource.expressions.set_identifier resource.expressions.weighted_routing_policy resource.expressions.records.references[0] == "aws_elastic_beanstalk_environment.blue.cname" resource.expressions.zone_id.references[0] resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_route53_record" resource2.expressions.name resource2.expressions.type resource2.expressions.ttl resource2.expressions.records.references[0] == "aws_elastic_beanstalk_environment.green.cname" resource2.expressions.zone_id.references[0] resource2.expressions.set_identifier resource2.expressions.weighted_routing_policy } is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com") } is_valid_iam_role_policy_attachment { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_role_policy_attachment" resource.expressions.role.references[0] resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Validate aws_iam_instance_profile resource is_valid_iam_instance_profile { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_instance_profile" resource.expressions.role.references[0] } # Validate aws_eb_app is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } # Validate aws_eb_env is_valid_eb_env { some i, j resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_environment" resource.expressions.name resource.expressions.application.references[0] resource.expressions.solution_stack_name some a resource.expressions.setting[a].value.references[0] resource2 := input.configuration.root_module.resources[j] resource2.type == "aws_elastic_beanstalk_environment" resource2.expressions.name resource2.expressions.application.references[0] resource2.expressions.solution_stack_name some b resource2.expressions.setting[b].value.references[0] } # Combine all checks into a final rule is_configuration_valid { is_valid_iam_role is_valid_iam_role_policy_attachment is_valid_iam_instance_profile is_valid_r53_zone is_valid_r53_record is_valid_eb_app is_valid_eb_env }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"An application for Blue deployment.","name":"blue-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"An application for Green deployment.","name":"green-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"blue-app","description":null,"force_delete":false,"key":"blue_app","name":"v1","process":false,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"green-app","description":null,"force_delete":false,"key":"green_app","name":"v2","process":false,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"blue-app","description":null,"name":"blue-app","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v1","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"green-app","description":null,"name":"green-app-green","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v2","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"BlueEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":120}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"GreenEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":60}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"sample-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"blue_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"override_provider":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"green_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"override_provider":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"An application for Blue deployment.","name":"blue-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"An application for Green deployment.","name":"green-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"blue-app","description":null,"force_delete":false,"key":"blue_app","name":"v1","process":false,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"bucket":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"green-app","description":null,"force_delete":false,"key":"green_app","name":"v2","process":false,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"bucket":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"blue-app","description":null,"name":"blue-app","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v1","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"green-app","description":null,"name":"green-app-green","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v2","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"BlueEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":120}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"GreenEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":60}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"sample-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"blue_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"acl":true,"arn":true,"bucket":true,"bucket_key_enabled":true,"checksum_crc32":true,"checksum_crc32c":true,"checksum_crc64nvme":true,"checksum_sha1":true,"checksum_sha256":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"override_provider":[],"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"override_provider":[],"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"green_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"acl":true,"arn":true,"bucket":true,"bucket_key_enabled":true,"checksum_crc32":true,"checksum_crc32c":true,"checksum_crc64nvme":true,"checksum_sha1":true,"checksum_sha256":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"override_provider":[],"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"override_provider":[],"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_config_key":"aws","expressions":{"description":{"constant_value":"An application for Blue deployment."},"name":{"constant_value":"blue-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_config_key":"aws","expressions":{"description":{"constant_value":"An application for Green deployment."},"name":{"constant_value":"green-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"bucket":{"references":["aws_s3_object.examplebucket_blue_object.bucket","aws_s3_object.examplebucket_blue_object"]},"key":{"references":["aws_s3_object.examplebucket_blue_object.key","aws_s3_object.examplebucket_blue_object"]},"name":{"constant_value":"v1"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"bucket":{"references":["aws_s3_object.examplebucket_green_object.bucket","aws_s3_object.examplebucket_green_object"]},"key":{"references":["aws_s3_object.examplebucket_green_object.key","aws_s3_object.examplebucket_green_object"]},"name":{"constant_value":"v2"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"name":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"version_label":{"references":["aws_elastic_beanstalk_application_version.blue_version.name","aws_elastic_beanstalk_application_version.blue_version"]}},"schema_version":1},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"name":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"version_label":{"references":["aws_elastic_beanstalk_application_version.green_version.name","aws_elastic_beanstalk_application_version.green_version"]}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_config_key":"aws","expressions":{"name":{"constant_value":"app.example.com"},"records":{"references":["aws_elastic_beanstalk_environment.blue.cname","aws_elastic_beanstalk_environment.blue"]},"set_identifier":{"constant_value":"BlueEnvironment"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":120}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_config_key":"aws","expressions":{"name":{"constant_value":"app.example.com"},"records":{"references":["aws_elastic_beanstalk_environment.green.cname","aws_elastic_beanstalk_environment.green"]},"set_identifier":{"constant_value":"GreenEnvironment"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":60}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"sample-"}},"schema_version":0},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.sample_bucket.id","aws_s3_bucket.sample_bucket"]},"key":{"constant_value":"blue_app"},"source":{"constant_value":"./supplement/app.zip"}},"schema_version":0},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.sample_bucket.id","aws_s3_bucket.sample_bucket"]},"key":{"constant_value":"green_app"},"source":{"constant_value":"./supplement/app.zip"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.blue_app","attribute":["name"]},{"resource":"aws_s3_bucket.sample_bucket","attribute":["id"]},{"resource":"aws_elastic_beanstalk_application_version.green_version","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_blue_object","attribute":["bucket"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_elastic_beanstalk_application.green_app","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_blue_object","attribute":["key"]},{"resource":"aws_s3_object.examplebucket_green_object","attribute":["bucket"]},{"resource":"aws_elastic_beanstalk_application_version.blue_version","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_green_object","attribute":["key"]},{"resource":"aws_elastic_beanstalk_environment.blue","attribute":["cname"]},{"resource":"aws_elastic_beanstalk_environment.green","attribute":["cname"]}],"timestamp":"2026-02-18T20:49:15Z","applyable":true,"complete":true,"errored":false}
8
I need our main site to show up when people type in our custom name, and it should lead them to the right place reliably.
Set up a record that maps a domain name to an IPv4 address using Route 53 resources
Has one "aws_route53_zone" resource with "name" set to "example53.com" Has one "aws_route53_record" resource with "name" with "type" set to "A" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "example53" { name = "example53.com" } resource "aws_route53_record" "example53_A" { zone_id = aws_route53_zone.example53.zone_id name = "example53.com" type = "A" ttl = "300" records = ["192.0.2.1"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "example53.com" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type.constant_value == "A" resource.expressions.ttl resource.expressions.records resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["192.0.2.1"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:27Z","applyable":true,"complete":true,"errored":false}
9
I want our main domain to be reachable using modern addressing so people on newer networks can access it reliably.
Set up a record that maps a domain name to an IPv6 address using Route 53 resources
Has one "aws_route53_zone" resource with "name" set to "example53.com" Has one "aws_route53_record" resource with "name" with "type" set to "AAAA" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "example53" { name = "example53.com" } resource "aws_route53_record" "example53_A" { zone_id = aws_route53_zone.example53.zone_id name = "example53.com" type = "AAAA" ttl = "300" records = ["2001:0db8:85a3:0000:0000:8a2e:0370:7334"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "example53.com" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type.constant_value == "AAAA" resource.expressions.ttl resource.expressions.records resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"AAAA","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"AAAA","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"AAAA"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:33Z","applyable":true,"complete":true,"errored":false}
10
I need a way for one of our machines to clearly identify itself when others look it up by its address, and it should be set up in a way that’s easy to manage going forward.
Set up a Pointer record for reverse DNS using Route 53 resources. The domain name should be "host.example53.com" and name the zone "reverse_zone"
Has one "aws_route53_zone" resource with "name" ending in ".in-addr.arpa" Has one "aws_route53_record" resource with "name" with "type" set to "PTR" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } # Create Reverse DNS Hosted Zone resource "aws_route53_zone" "reverse_zone" { name = "2.0.192.in-addr.arpa" } # Create a PTR Record for a specific IP address within that zone resource "aws_route53_record" "ptr_record" { zone_id = aws_route53_zone.reverse_zone.zone_id name = "53.2.0.192.in-addr.arpa" type = "PTR" ttl = "3600" records = ["host.example.com"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "2.0.192.in-addr.arpa" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type.constant_value == "PTR" resource.expressions.ttl resource.expressions.records.constant_value[0] == "host.example.com" resource.expressions.zone_id.references[0] == "aws_route53_zone.reverse_zone.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"53.2.0.192.in-addr.arpa","records":["host.example.com"],"set_identifier":null,"timeouts":null,"ttl":3600,"type":"PTR","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"2.0.192.in-addr.arpa","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"53.2.0.192.in-addr.arpa","records":["host.example.com"],"set_identifier":null,"timeouts":null,"ttl":3600,"type":"PTR","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"2.0.192.in-addr.arpa","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_config_key":"aws","expressions":{"name":{"constant_value":"53.2.0.192.in-addr.arpa"},"records":{"constant_value":["host.example.com"]},"ttl":{"constant_value":"3600"},"type":{"constant_value":"PTR"},"zone_id":{"references":["aws_route53_zone.reverse_zone.zone_id","aws_route53_zone.reverse_zone"]}},"schema_version":2},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_config_key":"aws","expressions":{"name":{"constant_value":"2.0.192.in-addr.arpa"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.reverse_zone","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:39Z","applyable":true,"complete":true,"errored":false}
11
I need to prove that we control our domain by adding a small piece of text that an external service can check, and it should be easy to update later if needed.
Set up a TXT recordfor domain ownership verification purposes using Route 53 resources. The verification string should be "passwordpassword" and the name of the zone should be "example"
Has one "aws_route53_zone" resource with "name" set to "example53.com" Has one "aws_route53_record" resource with "name" with "type" set to "TXT" with "ttl" with "records" set to a string with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "example" { name = "example53.com" } # TXT Record for domain verification or other purposes resource "aws_route53_record" "example_txt" { zone_id = aws_route53_zone.example.zone_id name = "sub.example53.com" type = "TXT" ttl = "300" records = ["passwordpassword"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "example53.com" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type.constant_value == "TXT" resource.expressions.ttl resource.expressions.records.constant_value[0] == "passwordpassword" resource.expressions.zone_id.references[0] == "aws_route53_zone.example.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"sub.example53.com","records":["passwordpassword"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"TXT","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"sub.example53.com","records":["passwordpassword"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"TXT","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_config_key":"aws","expressions":{"name":{"constant_value":"sub.example53.com"},"records":{"constant_value":["passwordpassword"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"TXT"},"zone_id":{"references":["aws_route53_zone.example.zone_id","aws_route53_zone.example"]}},"schema_version":2},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:43Z","applyable":true,"complete":true,"errored":false}
12
I need an easy way to run and manage a web app without dealing with a lot of server setup, and it should scale automatically and run with the right access to other parts of our system.
Create an elastic beanstalk WebServer environment with a elastic beanstalk application. Name the iam_role "eb_ec2_role", the instance profile "eb_ec2_profile", and the elastic beanstalk application "my_application"
Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "ec2.amazonaws.com" Has one "aws_iam_role_policy_attachment" resource with "role" referencing the "aws_iam_role" with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" Has one "aws_iam_instance_profile" resource with "name" with "role" referencing the "aws_iam_role" resource Has one "aws_elastic_beanstalk_application" resource with "name" Has one "aws_elastic_beanstalk_environment" resource with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name" with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # IAM role for Elastic Beanstalk EC2 instances resource "aws_iam_role" "eb_ec2_role" { name = "elastic_beanstalk_ec2_role_eb1" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "ec2.amazonaws.com" }, }, ] }) } # Attach the AWS managed policy for Elastic Beanstalk to the role resource "aws_iam_role_policy_attachment" "eb_managed_policy" { role = aws_iam_role.eb_ec2_role.name policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Create an instance profile tied to the role resource "aws_iam_instance_profile" "eb_ec2_profile" { name = "elastic_beanstalk_ec2_profile" role = aws_iam_role.eb_ec2_role.name } # Elastic Beanstalk Application resource "aws_elastic_beanstalk_application" "my_application" { name = "my-three-tier-app" } # Elastic Beanstalk Environment for the web tier resource "aws_elastic_beanstalk_environment" "web_tier" { name = "my-web-tier-env" application = aws_elastic_beanstalk_application.my_application.name solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9" tier = "WebServer" setting { namespace = "aws:autoscaling:launchconfiguration" name = "IamInstanceProfile" value = aws_iam_instance_profile.eb_ec2_profile.name } }
package terraform.validation default is_configuration_valid = false default is_valid_iam_instance_profile = false default is_valid_iam_role = false default is_valid_iam_role_policy_attachment = false default is_valid_eb_app = false default is_valid_eb_env = false is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com") } is_valid_iam_role_policy_attachment { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_role_policy_attachment" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier" } # Validate aws_iam_instance_profile resource is_valid_iam_instance_profile { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_iam_instance_profile" resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name" } # Validate aws_eb_app is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } # Validate aws_eb_env is_valid_eb_env { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_environment" resource.expressions.name resource.expressions.application.references[0] == "aws_elastic_beanstalk_application.my_application.name" resource.expressions.solution_stack_name resource.expressions.tier.constant_value == "WebServer" resource.expressions.setting[0].value.references[0] == "aws_iam_instance_profile.eb_ec2_profile.name" } # Combine all checks into a final rule is_configuration_valid { is_valid_iam_role is_valid_iam_role_policy_attachment is_valid_iam_instance_profile is_valid_eb_app is_valid_eb_env }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true,"version_label":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-three-tier-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.my_application.name","aws_elastic_beanstalk_application.my_application"]},"name":{"constant_value":"my-web-tier-env"},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"tier":{"constant_value":"WebServer"}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role_eb1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.my_application","attribute":["name"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]}],"timestamp":"2026-02-18T20:49:52Z","applyable":true,"complete":true,"errored":false}
13
I need a reusable setup blueprint for one of our apps so we can spin up environments consistently without doing all the settings by hand.
Create a template of an elastic beanstalk application
Has one "aws_elastic_beanstalk_application" resource with "name" Has one "aws_elastic_beanstalk_configuration_template" resource with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name"
provider "aws" { region = "us-east-1" } resource "aws_elastic_beanstalk_application" "tftest" { name = "tf-test-name" description = "tf-test-desc" } resource "aws_elastic_beanstalk_configuration_template" "tf_template" { name = "tf-test-template-config" application = aws_elastic_beanstalk_application.tftest.name solution_stack_name = "64bit Amazon Linux 2023 v4.0.9 running Python 3.11" }
package terraform.validation default is_configuration_valid = false default is_valid_eb_app = false default is_valid_eb_app_template = false is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } is_valid_eb_app_template { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_configuration_template" resource.expressions.name resource.expressions.solution_stack_name startswith(resource.expressions.application.references[0], "aws_elastic_beanstalk_application") } is_configuration_valid { is_valid_eb_app is_valid_eb_app_template }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"},"sensitive_values":{"setting":[]}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"},"after_unknown":{"id":true,"setting":true},"before_sensitive":false,"after_sensitive":{"setting":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.tftest.name","aws_elastic_beanstalk_application.tftest"]},"name":{"constant_value":"tf-test-template-config"},"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.tftest","attribute":["name"]}],"timestamp":"2026-02-18T20:49:58Z","applyable":true,"complete":true,"errored":false}
14
I need a reusable setup for running a Go-based service in our environment so new deployments stay consistent and easy to spin up.
Create a template of an elastic beanstalk application that is running a version of Go
Has one "aws_elastic_beanstalk_application" resource with "name" Has one "aws_elastic_beanstalk_configuration_template" resource with "name" with "application" referencing the "aws_elastic_beanstalk_application" resource with "solution_stack_name" that references a valid "Go" version
provider "aws" { region = "us-east-1" } resource "aws_elastic_beanstalk_application" "tftest" { name = "tf-test-name" description = "tf-test-desc" } resource "aws_elastic_beanstalk_configuration_template" "tf_template" { name = "tf-test-template-config" application = aws_elastic_beanstalk_application.tftest.name solution_stack_name = "64bit Amazon Linux 2 v3.10.1 running Go 1" }
package terraform.validation default is_configuration_valid = false default is_valid_eb_app = false default is_valid_eb_app_template = false is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } is_valid_eb_app_template { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_configuration_template" resource.expressions.name endswith(resource.expressions.solution_stack_name.constant_value, "Go 1") startswith(resource.expressions.application.references[0], "aws_elastic_beanstalk_application") } is_configuration_valid { is_valid_eb_app is_valid_eb_app_template }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2 v3.10.1 running Go 1"},"sensitive_values":{"setting":[]}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2 v3.10.1 running Go 1"},"after_unknown":{"id":true,"setting":true},"before_sensitive":false,"after_sensitive":{"setting":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.tftest.name","aws_elastic_beanstalk_application.tftest"]},"name":{"constant_value":"tf-test-template-config"},"solution_stack_name":{"constant_value":"64bit Amazon Linux 2 v3.10.1 running Go 1"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.tftest","attribute":["name"]}],"timestamp":"2026-02-18T20:50:01Z","applyable":true,"complete":true,"errored":false}
15
I need a simple way to run my app in the cloud so it can grow as usage increases, without me having to manage the underlying servers.
Provision a resource to deploy and scale a web application that was developed with supported programming languages.
Has one "aws_elastic_beanstalk_application" resource with "name"
provider "aws" { region = "us-east-1" } resource "aws_elastic_beanstalk_application" "tftest" { name = "tf-test-name" description = "tf-test-desc" }
package terraform.validation default is_configuration_valid = false default is_valid_eb_app = false is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name } is_configuration_valid { is_valid_eb_app }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:50:05Z","applyable":true,"complete":true,"errored":false}
16
I need a simple way to manage new releases of my app so old versions don’t pile up, but still keep things running smoothly and securely.
Create an Elastic Beanstalk application with an app version lifecycle
Has one "aws_elastic_beanstalk_application" resource with "name" with "appversion_lifecycle" block Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "elasticbeanstalk.amazonaws.com"
provider "aws" { region = "us-east-1" } resource "aws_iam_role" "beanstalk_service" { name = "tf-test-beanstalk-service-role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "elasticbeanstalk.amazonaws.com" }, }, ] }) } resource "aws_elastic_beanstalk_application" "tftest" { name = "tf-test-name" description = "tf-test-desc" appversion_lifecycle { service_role = aws_iam_role.beanstalk_service.arn max_count = 128 delete_source_from_s3 = true } }
package terraform.validation default is_configuration_valid = false default is_valid_eb_app = false default is_valid_iam_role = false is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name resource.expressions.appversion_lifecycle[0].service_role.references[0] } is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"elasticbeanstalk.amazonaws.com") } is_configuration_valid { is_valid_eb_app is_valid_iam_role }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":null,"max_count":128}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[{}],"tags_all":{}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":null,"max_count":128}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[{"service_role":true}],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[{}],"tags_all":{}}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"appversion_lifecycle":[{"delete_source_from_s3":{"constant_value":true},"max_count":{"constant_value":128},"service_role":{"references":["aws_iam_role.beanstalk_service.arn","aws_iam_role.beanstalk_service"]}}],"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"tf-test-beanstalk-service-role"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.beanstalk_service","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:11Z","applyable":true,"complete":true,"errored":false}
17
I need a place to run and update my app where older releases get cleaned up automatically after a few days so things don’t pile up.
Create an Elastic Beanstalk application with an app version lifecycle. Retain the version for 5 days
Has one "aws_elastic_beanstalk_application" resource with "name" with "appversion_lifecycle" block Has one "aws_iam_role" resource with "name" with "assume_role_policy" and "Service" set to "elasticbeanstalk.amazonaws.com"
provider "aws" { region = "us-east-1" } resource "aws_iam_role" "beanstalk_service" { name = "tf-test-beanstalk-service-role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "elasticbeanstalk.amazonaws.com" }, }, ] }) } resource "aws_elastic_beanstalk_application" "tftest" { name = "tf-test-name" description = "tf-test-desc" appversion_lifecycle { service_role = aws_iam_role.beanstalk_service.arn max_age_in_days = 5 delete_source_from_s3 = true } }
package terraform.validation default is_configuration_valid = false default is_valid_eb_app = false default is_valid_iam_role = false is_valid_eb_app { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_elastic_beanstalk_application" resource.expressions.name resource.expressions.appversion_lifecycle[0].service_role.references[0] resource.expressions.appversion_lifecycle[0].max_age_in_days.constant_value == 5 } is_valid_iam_role { some i resource := input.resource_changes[i] resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"elasticbeanstalk.amazonaws.com") } is_configuration_valid { is_valid_eb_app is_valid_iam_role }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":5,"max_count":null}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[{}],"tags_all":{}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":5,"max_count":null}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[{"service_role":true}],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[{}],"tags_all":{}}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"appversion_lifecycle":[{"delete_source_from_s3":{"constant_value":true},"max_age_in_days":{"constant_value":5},"service_role":{"references":["aws_iam_role.beanstalk_service.arn","aws_iam_role.beanstalk_service"]}}],"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"tf-test-beanstalk-service-role"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.beanstalk_service","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:18Z","applyable":true,"complete":true,"errored":false}
18
I need an automated way to run my build steps whenever my code changes, using a setup that can pull from my existing repo and run in a simple, lightweight environment.
create a Basic AWS codebuild project resource with example iam role and an example GITHUB source
Has one "aws_iam_role" resource and one "aws_codebuild_project" resource with the "type" argument within the "source" block equal to "GITHUB"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } data "aws_iam_policy_document" "assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["codebuild.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "test_role" { name = "test_role" assume_role_policy = data.aws_iam_policy_document.assume_role.json } resource "aws_codebuild_project" "example" { name = "test-project" service_role = aws_iam_role.test_role.arn artifacts { type = "NO_ARTIFACTS" } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" } source { type = "GITHUB" location = "github.com/source-location" git_clone_depth = 1 } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.name resource.values.source[_].type == "GITHUB" role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"github.com/source-location","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"github.com/source-location","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1229436035","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codebuild.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["codebuild.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project"},"service_role":{"references":["aws_iam_role.test_role.arn","aws_iam_role.test_role"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"github.com/source-location"},"type":{"constant_value":"GITHUB"}}]},"schema_version":0},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"test_role"}},"schema_version":0},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["codebuild.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.test_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:22Z","applyable":true,"complete":true,"errored":false}
19
I need an automated system that can pull our code from an online repo, run our builds with some custom settings, and keep things snappy by reusing work where possible.
create a AWS codebuild project resource with example iam role, an example GITHUB source, environment variables, and a cache
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "cache" block, at least one "environment_variable" within the "environment" block, and the "type" argument within the "source" block equal to "GITHUB"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "example" { name = "example" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_codebuild_project" "example" { name = "Row2CodeBuild" description = "Row2CodeBuild" build_timeout = 5 service_role = aws_iam_role.example.arn artifacts { type = "NO_ARTIFACTS" } cache { type = "LOCAL" modes = ["LOCAL_DOCKER_LAYER_CACHE", "LOCAL_SOURCE_CACHE"] } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" environment_variable { name = "SOME_KEY1" value = "SOME_VALUE1" } environment_variable { name = "SOME_KEY2" value = "SOME_VALUE2" type = "PARAMETER_STORE" } } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 git_submodules_config { fetch_submodules = true } } source_version = "master" }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment[_].environment_variable resource.values.cache resource.values.name resource.values.source[_].type == "GITHUB" role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row2CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row2CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[{"fetch_submodules":true}],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row2CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row2CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[{"fetch_submodules":true}],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[{"modes":[false,false]}],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"build_timeout":{"constant_value":5},"cache":[{"modes":{"constant_value":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"]},"type":{"constant_value":"LOCAL"}}],"description":{"constant_value":"Row2CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"environment_variable":[{"name":{"constant_value":"SOME_KEY1"},"value":{"constant_value":"SOME_VALUE1"}},{"name":{"constant_value":"SOME_KEY2"},"type":{"constant_value":"PARAMETER_STORE"},"value":{"constant_value":"SOME_VALUE2"}}],"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"Row2CodeBuild"},"service_role":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"source":[{"git_clone_depth":{"constant_value":1},"git_submodules_config":[{"fetch_submodules":{"constant_value":true}}],"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:24Z","applyable":true,"complete":true,"errored":false}
20
I need an automated build setup that pulls code from our repo, runs tasks in a controlled environment, and keeps the outputs and any reusable build data organized so things run quickly and reliably.
create a AWS codebuild project resource with example iam role, an example GITHUB source, artifact, and a cache
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "cache" block, the "type" argument within the "artifacts" block not equal to "NO_ARTIFACTS", and the "type" argument within the "source" block equal to "GITHUB"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "example4" { name = "example4" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_s3_bucket" "apriltwentyeight" { bucket = "apriltwentyeight" } resource "aws_codebuild_project" "example4" { name = "Row4CodeBuild" description = "Row4CodeBuild" build_timeout = 5 service_role = aws_iam_role.example4.arn artifacts { type = "S3" location = aws_s3_bucket.apriltwentyeight.bucket name = "results.zip" path = "/" packaging = "ZIP" } cache { type = "LOCAL" modes = ["LOCAL_DOCKER_LAYER_CACHE", "LOCAL_SOURCE_CACHE"] } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } source_version = "master" }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts[_].type != "NO_ARTIFACTS" resource.values.environment resource.values.name resource.values.cache resource.values.source[_].type == "GITHUB" role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyeight","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row4CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row4CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example4","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyeight","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyeight","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row4CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row4CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[{"modes":[false,false]}],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example4","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyeight","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.apriltwentyeight.bucket","aws_s3_bucket.apriltwentyeight"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"build_timeout":{"constant_value":5},"cache":[{"modes":{"constant_value":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"]},"type":{"constant_value":"LOCAL"}}],"description":{"constant_value":"Row4CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"Row4CodeBuild"},"service_role":{"references":["aws_iam_role.example4.arn","aws_iam_role.example4"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example4"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyeight"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example4","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentyeight","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:38Z","applyable":true,"complete":true,"errored":false}
21
I want an automated build process that pulls code from our online repo and keeps track of everything it does, and it should be able to run in a lightweight environment without costing too much.
create a AWS codebuild project resource with example iam role, example GITHUB source, and a logs config
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with the "type" argument within the "source" block equal to "GITHUB" and a "logs_config" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "example5" { name = "example5" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_s3_bucket" "apriltwentynine" { bucket = "apriltwentynine" } resource "aws_codebuild_project" "example5" { name = "Row5CodeBuild" description = "Row5CodeBuild" build_timeout = 5 service_role = aws_iam_role.example5.arn artifacts { type = "NO_ARTIFACTS" } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" } logs_config { cloudwatch_logs { group_name = "log-group" stream_name = "log-stream" } s3_logs { status = "ENABLED" location = "${aws_s3_bucket.apriltwentynine.id}/build-log" } } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } source_version = "master" }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.name resource.values.logs_config[_].cloudwatch_logs[_] resource.values.source[_].type == "GITHUB" role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[],"concurrent_build_limit":null,"description":"Row5CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{"group_name":"log-group","status":"ENABLED","stream_name":"log-stream"}],"s3_logs":[{"bucket_owner_access":null,"encryption_disabled":false,"status":"ENABLED"}]}],"name":"Row5CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{}]}],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example5","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentynine","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[],"concurrent_build_limit":null,"description":"Row5CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{"group_name":"log-group","status":"ENABLED","stream_name":"log-stream"}],"s3_logs":[{"bucket_owner_access":null,"encryption_disabled":false,"status":"ENABLED"}]}],"name":"Row5CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{"location":true}]}],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{}]}],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example5","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentynine","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"build_timeout":{"constant_value":5},"description":{"constant_value":"Row5CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"logs_config":[{"cloudwatch_logs":[{"group_name":{"constant_value":"log-group"},"stream_name":{"constant_value":"log-stream"}}],"s3_logs":[{"location":{"references":["aws_s3_bucket.apriltwentynine.id","aws_s3_bucket.apriltwentynine"]},"status":{"constant_value":"ENABLED"}}]}],"name":{"constant_value":"Row5CodeBuild"},"service_role":{"references":["aws_iam_role.example5.arn","aws_iam_role.example5"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example5"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentynine"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example5","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentynine","attribute":["id"]}],"timestamp":"2026-02-18T20:50:41Z","applyable":true,"complete":true,"errored":false}
22
I want an automated build setup that can pull in code from more than one place and run in a locked‑down environment, keeping things as simple as possible.
create a AWS codebuild project resource with example iam role and secondary sources
Has one "aws_iam_role" resource and one "aws_codebuild_project" resource with a "secondary_sources" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } data "aws_iam_policy_document" "assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["codebuild.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "test_role7" { name = "test_role7" assume_role_policy = data.aws_iam_policy_document.assume_role.json } resource "aws_codebuild_project" "example7" { name = "test-project7" service_role = aws_iam_role.test_role7.arn artifacts { type = "NO_ARTIFACTS" } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" } source { type = "GITHUB" location = "https://github.com/neilbalch/SimplePythonTutorial.git" git_clone_depth = 1 } secondary_sources { source_identifier = "SecondarySource" type = "GITHUB" location = "https://github.com/pH-7/Simple-Java-Calculator.git" git_clone_depth = 1 } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.name resource.values.source[_].type resource.values.secondary_sources[_].type role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project7","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/pH-7/Simple-Java-Calculator.git","report_build_status":null,"source_identifier":"SecondarySource","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/neilbalch/SimplePythonTutorial.git","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role7","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project7","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/pH-7/Simple-Java-Calculator.git","report_build_status":null,"source_identifier":"SecondarySource","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/neilbalch/SimplePythonTutorial.git","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role7","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1229436035","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codebuild.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["codebuild.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project7"},"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/pH-7/Simple-Java-Calculator.git"},"source_identifier":{"constant_value":"SecondarySource"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role7.arn","aws_iam_role.test_role7"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/neilbalch/SimplePythonTutorial.git"},"type":{"constant_value":"GITHUB"}}]},"schema_version":0},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"test_role7"}},"schema_version":0},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["codebuild.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.test_role7","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:46Z","applyable":true,"complete":true,"errored":false}
23
I need an automated build setup that can pull in more than one codebase and produce multiple outputs, all while keeping things organized and secure.
create a AWS codebuild project resource with example iam role and secondary artifiacts
Has one "aws_iam_role" resource, at least one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "secondary_artifacts" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "test_role8" { name = "test_role8" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_s3_bucket" "apriltwentyninth" { bucket = "apriltwentyninth" } resource "aws_s3_bucket" "apriltwentyninth2" { bucket = "apriltwentyninth2" } resource "aws_codebuild_project" "example7" { name = "test-project8" service_role = aws_iam_role.test_role8.arn artifacts { location = aws_s3_bucket.apriltwentyninth.bucket type = "S3" name = "results.zip" path = "/" packaging = "ZIP" } secondary_artifacts { artifact_identifier = "SecondaryArtifact" type = "S3" location = aws_s3_bucket.apriltwentyninth2.bucket } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } source_version = "master" secondary_sources { source_identifier = "source2" type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } secondary_source_version { source_identifier = "source2" source_version = "master" } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.name resource.values.source[_].type resource.values.secondary_artifacts[_].type role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyninth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project8","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"apriltwentyninth2","name":"","namespace_type":"NONE","override_artifact_name":false,"packaging":"NONE","path":"","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role8","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyninth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyninth2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyninth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project8","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"apriltwentyninth2","name":"","namespace_type":"NONE","override_artifact_name":false,"packaging":"NONE","path":"","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role8","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyninth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyninth2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.apriltwentyninth.bucket","aws_s3_bucket.apriltwentyninth"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project8"},"secondary_artifacts":[{"artifact_identifier":{"constant_value":"SecondaryArtifact"},"location":{"references":["aws_s3_bucket.apriltwentyninth2.bucket","aws_s3_bucket.apriltwentyninth2"]},"type":{"constant_value":"S3"}}],"secondary_source_version":[{"source_identifier":{"constant_value":"source2"},"source_version":{"constant_value":"master"}}],"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"source_identifier":{"constant_value":"source2"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role8.arn","aws_iam_role.test_role8"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role8"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyninth"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyninth2"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.test_role8","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentyninth","attribute":["bucket"]},{"resource":"aws_s3_bucket.apriltwentyninth2","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:57Z","applyable":true,"complete":true,"errored":false}
24
I need an automated setup that can take code from our repo, run whatever build steps we define, bundle the output somewhere durable, and also be able to run several builds at once without breaking our limits.
create a AWS codebuild project resource with example iam role and buildbatch configuration
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "build_batch_config" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "test_role9" { name = "test_role9" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_s3_bucket" "aprilthirthieth" { bucket = "aprilthirthieth" } resource "aws_codebuild_project" "example9" { name = "test-project9" service_role = aws_iam_role.test_role9.arn artifacts { location = aws_s3_bucket.aprilthirthieth.bucket name = "results.zip" type = "S3" path = "/" packaging = "ZIP" } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } source_version = "master" build_batch_config { service_role = aws_iam_role.test_role9.arn restrictions { maximum_builds_allowed = 4 } } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.name resource.values.source[_].type resource.values.build_batch_config[_] role := input.configuration.root_module.resources[i] role.expressions.service_role role.expressions.build_batch_config[_].service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthieth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[{"combine_artifacts":null,"restrictions":[{"compute_types_allowed":null,"maximum_builds_allowed":4}],"timeout_in_mins":null}],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project9","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[{"restrictions":[{}]}],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role9","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthieth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthieth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[{"combine_artifacts":null,"restrictions":[{"compute_types_allowed":null,"maximum_builds_allowed":4}],"timeout_in_mins":null}],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project9","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[{"restrictions":[{}],"service_role":true}],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[{"restrictions":[{}]}],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role9","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthieth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.aprilthirthieth.bucket","aws_s3_bucket.aprilthirthieth"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"build_batch_config":[{"restrictions":[{"maximum_builds_allowed":{"constant_value":4}}],"service_role":{"references":["aws_iam_role.test_role9.arn","aws_iam_role.test_role9"]}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project9"},"service_role":{"references":["aws_iam_role.test_role9.arn","aws_iam_role.test_role9"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role9"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthieth"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.test_role9","attribute":["arn"]},{"resource":"aws_s3_bucket.aprilthirthieth","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:58Z","applyable":true,"complete":true,"errored":false}
25
I need an automated build setup that can pull code from more than one place, run with a few custom settings, and save its outputs in multiple locations, all while keeping things simple and secure.
create a AWS codebuild project resource with example iam role, environment variables, secondary sources, secondary artifacts
Has one "aws_iam_role" resource, at least one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "secondary_artifacts" block, with a "secondary_sources" block, and at least one "environment_variable" within the "environment" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "test_role11" { name = "test_role11" assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "codebuild.amazonaws.com" } }, ] }) } resource "aws_s3_bucket" "aprilthirthyfirst" { bucket = "aprilthirthyfirst" } resource "aws_s3_bucket" "aprilthirthyfirst2" { bucket = "aprilthirthyfirst2" } resource "aws_codebuild_project" "example11" { name = "test-project11" service_role = aws_iam_role.test_role11.arn artifacts { location = aws_s3_bucket.aprilthirthyfirst.bucket name = "results.zip" type = "S3" path = "/" packaging = "ZIP" } secondary_artifacts { artifact_identifier = "SecondaryArtifact" location = aws_s3_bucket.aprilthirthyfirst2.bucket name = "results.zip" type = "S3" path = "/" packaging = "ZIP" } environment { compute_type = "BUILD_GENERAL1_SMALL" image = "aws/codebuild/standard:7.0-24.10.29" type = "LINUX_CONTAINER" image_pull_credentials_type = "CODEBUILD" environment_variable { name = "SOME_KEY1" value = "SOME_VALUE1" } environment_variable { name = "SOME_KEY2" value = "SOME_VALUE2" type = "PARAMETER_STORE" } } source { type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } source_version = "master" secondary_sources { source_identifier = "source2" type = "GITHUB" location = "https://github.com/mitchellh/packer.git" git_clone_depth = 1 } secondary_source_version { source_identifier = "source2" source_version = "master" } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for aws_iam_role resource has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com") } has_valid_codebuild { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_codebuild_project" resource.values.artifacts resource.values.environment resource.values.environment[_].environment_variable resource.values.name resource.values.source[_].type resource.values.secondary_artifacts[_].type resource.values.secondary_sources[_].type role := input.configuration.root_module.resources[i] role.expressions.service_role } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_codebuild }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthyfirst","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project11","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"aprilthirthyfirst2","name":"results.zip","namespace_type":"NONE","override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role11","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthyfirst","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthyfirst2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthyfirst","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project11","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"aprilthirthyfirst2","name":"results.zip","namespace_type":"NONE","override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role11","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthyfirst","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthyfirst2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.aprilthirthyfirst.bucket","aws_s3_bucket.aprilthirthyfirst"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"environment_variable":[{"name":{"constant_value":"SOME_KEY1"},"value":{"constant_value":"SOME_VALUE1"}},{"name":{"constant_value":"SOME_KEY2"},"type":{"constant_value":"PARAMETER_STORE"},"value":{"constant_value":"SOME_VALUE2"}}],"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project11"},"secondary_artifacts":[{"artifact_identifier":{"constant_value":"SecondaryArtifact"},"location":{"references":["aws_s3_bucket.aprilthirthyfirst2.bucket","aws_s3_bucket.aprilthirthyfirst2"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"secondary_source_version":[{"source_identifier":{"constant_value":"source2"},"source_version":{"constant_value":"master"}}],"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"source_identifier":{"constant_value":"source2"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role11.arn","aws_iam_role.test_role11"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role11"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthyfirst"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthyfirst2"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.aprilthirthyfirst","attribute":["bucket"]},{"resource":"aws_iam_role.test_role11","attribute":["arn"]},{"resource":"aws_s3_bucket.aprilthirthyfirst2","attribute":["bucket"]}],"timestamp":"2026-02-18T20:51:02Z","applyable":true,"complete":true,"errored":false}
26
I need a simple natural‑language helper that can guide people through placing an order, asking for the details it needs, confirming everything, and handling misunderstandings gracefully.
create an aws_lex_bot
Has one resource "aws_lex_bot" and one resource "aws_lex_intent"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "order_flowers" { name = "OrderFlowers" description = "Intent to order a bouquet of flowers for pick up" sample_utterances = [ "I would like to pick up flowers", "I would like to order some flowers", ] slot { name = "FlowerType" description = "Type of flower to order" slot_constraint = "Required" slot_type = "AMAZON.AlphaNumeric" priority = 1 sample_utterances = ["I would like to get {FlowerType} flower."] value_elicitation_prompt { message { content = "What type of flower would you like?" content_type = "PlainText" } max_attempts = 2 } } slot { name = "PickupDate" description = "Date of flower pickup" slot_constraint = "Required" slot_type = "AMAZON.DATE" priority = 2 value_elicitation_prompt { message { content = "When would you like to pickup your flower?" content_type = "PlainText" } max_attempts = 2 } } confirmation_prompt { max_attempts = 2 message { content = "Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?" content_type = "PlainText" } } fulfillment_activity { type = "ReturnIntent" } rejection_statement { message { content = "Okay, I will not place your order." content_type = "PlainText" } } } resource "aws_lex_bot" "order_flowers" { name = "OrderFlowers" description = "Bot to order flowers on the behalf of a user" locale = "en-US" process_behavior = "BUILD" voice_id = "Salli" child_directed = false create_version = false detect_sentiment = false idle_session_ttl_in_seconds = 600 abort_statement { message { content_type = "PlainText" content = "Sorry, I am not able to assist at this time" } } clarification_prompt { max_attempts = 2 message { content_type = "PlainText" content = "I didn't understand you, what would you like to do?" } } intent { intent_name = aws_lex_intent.order_flowers.name intent_version = aws_lex_intent.order_flowers.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name # is_boolean(resource.values.create_version) # resource.values.description # is_boolean(resource.values.detect_sentiment) # resource.values.idle_session_ttl_in_seconds # resource.values.process_behavior # resource.values.voice_id # resource.values.locale # is_boolean(resource.values.enable_model_improvements) # resource.values.nlu_intent_confidence_threshold } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order flowers on the behalf of a user","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderFlowers"}],"locale":"en-US","name":"OrderFlowers","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Intent to order a bouquet of flowers for pick up","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderFlowers","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Okay, I will not place your order.","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some flowers","I would like to pick up flowers"],"slot":[{"description":"Date of flower pickup","name":"PickupDate","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.DATE","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"When would you like to pickup your flower?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of flower to order","name":"FlowerType","priority":1,"response_card":"","sample_utterances":["I would like to get {FlowerType} flower."],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of flower would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order flowers on the behalf of a user","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderFlowers"}],"locale":"en-US","name":"OrderFlowers","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Intent to order a bouquet of flowers for pick up","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderFlowers","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Okay, I will not place your order.","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some flowers","I would like to pick up flowers"],"slot":[{"description":"Date of flower pickup","name":"PickupDate","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.DATE","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"When would you like to pickup your flower?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of flower to order","name":"FlowerType","priority":1,"response_card":"","sample_utterances":["I would like to get {FlowerType} flower."],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of flower would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist at this time"},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I didn't understand you, what would you like to do?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"description":{"constant_value":"Bot to order flowers on the behalf of a user"},"detect_sentiment":{"constant_value":false},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.order_flowers.name","aws_lex_intent.order_flowers"]},"intent_version":{"references":["aws_lex_intent.order_flowers.version","aws_lex_intent.order_flowers"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"OrderFlowers"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_config_key":"aws","expressions":{"confirmation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Intent to order a bouquet of flowers for pick up"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderFlowers"},"rejection_statement":[{"message":[{"content":{"constant_value":"Okay, I will not place your order."},"content_type":{"constant_value":"PlainText"}}]}],"sample_utterances":{"constant_value":["I would like to pick up flowers","I would like to order some flowers"]},"slot":[{"description":{"constant_value":"Type of flower to order"},"name":{"constant_value":"FlowerType"},"priority":{"constant_value":1},"sample_utterances":{"constant_value":["I would like to get {FlowerType} flower."]},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of flower would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Date of flower pickup"},"name":{"constant_value":"PickupDate"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.DATE"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"When would you like to pickup your flower?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_flowers","attribute":["name"]},{"resource":"aws_lex_intent.order_flowers","attribute":["version"]}],"timestamp":"2026-02-18T20:51:07Z","applyable":true,"complete":true,"errored":false}
27
I want a simple conversational helper that can guide people through giving a few pieces of information step by step, making sure nothing important is missed before confirming their request.
create an aws_lex bot with multiple slots
Has one resource "aws_lex_bot" and one resource "aws_lex_intent" with at least 2 slot blocks
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "order_pizza_intent" { name = "OrderPizzaIntent" description = "To order a pizza" sample_utterances = [ "I would like to pick up a pizza", "I would like to order some pizzas", ] fulfillment_activity { type = "ReturnIntent" } slot { name = "PizzaType" description = "Type of pizza to order" slot_constraint = "Required" slot_type = "AMAZON.AlphaNumeric" priority = 1 value_elicitation_prompt { message { content = "What type of pizza would you like?" content_type = "PlainText" } max_attempts = 2 } } slot { name = "PizzaSize" description = "Size of pizza to order" slot_constraint = "Required" slot_type = "AMAZON.NUMBER" priority = 2 value_elicitation_prompt { message { content = "What size of pizza would you like?" content_type = "PlainText" } max_attempts = 2 } } slot { name = "PizzaQuantity" description = "Number of pizzas to order" slot_constraint = "Required" slot_type = "AMAZON.NUMBER" priority = 3 value_elicitation_prompt { message { content = "How many pizzas do you want to order?" content_type = "PlainText" } max_attempts = 2 } } conclusion_statement { message { content = "Your pizza order has been received." content_type = "PlainText" } } } resource "aws_lex_bot" "pizza_ordering_bot" { name = "PizzaOrderingBot" description = "Bot to order pizzas" voice_id = "Joanna" idle_session_ttl_in_seconds = 300 child_directed = false locale = "en-US" process_behavior = "BUILD" clarification_prompt { message { content = "I didn't understand you, what type of pizza would you like to order?" content_type = "PlainText" } max_attempts = 5 } abort_statement { message { content = "Sorry, I am unable to assist at the moment." content_type = "PlainText" } } intent { intent_name = aws_lex_intent.order_pizza_intent.name intent_version = aws_lex_intent.order_pizza_intent.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.slot]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name # is_boolean(resource.values.create_version) # resource.values.description # is_boolean(resource.values.detect_sentiment) # resource.values.idle_session_ttl_in_seconds # resource.values.process_behavior # resource.values.voice_id # resource.values.locale } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Size of pizza to order"},"name":{"constant_value":"PizzaSize"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What size of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Number of pizzas to order"},"name":{"constant_value":"PizzaQuantity"},"priority":{"constant_value":3},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"How many pizzas do you want to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:15Z","applyable":true,"complete":true,"errored":false}
28
I need a simple conversational tool that can take a food order, ask for the details it needs, and then check whether the customer wants to add anything else before wrapping up.
create an aws_lex bot for ordering pizza with a followup question
Has one resource "aws_lex_bot" and one resource "aws_lex_intent" with followup question block (slot block and "aws_lex_slot_type" is not mandatory)
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_bot" "pizza_order_bot" { name = "PizzaOrderBot" description = "Pizza order bot" idle_session_ttl_in_seconds = 600 create_version = false child_directed = false abort_statement { message { content = "Sorry, I am not able to assist." content_type = "PlainText" } } clarification_prompt { max_attempts = 2 message { content = "I'm sorry, I didn't understand that. Can you try again?" content_type = "PlainText" } } intent { intent_name = aws_lex_intent.OrderPizzaIntent.name intent_version = aws_lex_intent.OrderPizzaIntent.version } } resource "aws_lex_intent" "OrderPizzaIntent" { name = "OrderPizzaIntent" create_version = true sample_utterances = [ "I would like to pick up a pizza", "I would like to order some pizzas", ] slot { name = "PizzaType" description = "Type of pizza to order" priority = 1 # must be in [1, 100] slot_type = aws_lex_slot_type.PizzaType.name slot_type_version = aws_lex_slot_type.PizzaType.version slot_constraint = "Required" sample_utterances = ["I want a {PizzaType} pizza.", "A {PizzaType} pizza please."] value_elicitation_prompt { max_attempts = 2 message { content = "What type of pizza would you like to order?" content_type = "PlainText" } } } confirmation_prompt { max_attempts = 2 message { content = "So, you would like to order a pizza. Is that correct?" content_type = "PlainText" } } rejection_statement { message { content = "Sorry, I don't know how to help then" content_type = "PlainText" } } follow_up_prompt { prompt { max_attempts = 2 message { content = "Would you like anything else with your order?" content_type = "PlainText" } } rejection_statement { message { content = "OK, Your pizza is on its way." content_type = "PlainText" } } } fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_slot_type" "PizzaType" { create_version = true description = "Types of pizza available to order" name = "PizzaTypes" enumeration_value { value = "Margherita" } enumeration_value { value = "Pepperoni" } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.follow_up_prompt; intent.values.conclusion_statement == false]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name # is_boolean(resource.values.create_version) # resource.values.description # is_boolean(resource.values.detect_sentiment) # resource.values.idle_session_ttl_in_seconds # resource.values.process_behavior # resource.values.voice_id # resource.values.locale } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand that. Can you try again?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Pizza order bot","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"SAVE","region":"us-east-1","timeouts":null},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"So, you would like to order a pizza. Is that correct?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"max_attempts":2,"message":[{"content":"Would you like anything else with your order?","content_type":"PlainText","group_number":null}],"response_card":null}],"rejection_statement":[{"message":[{"content":"OK, Your pizza is on its way.","content_type":"PlainText","group_number":null}],"response_card":null}]}],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Sorry, I don't know how to help then","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."],"slot_constraint":"Required","slot_type":"PizzaTypes","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"value_elicitation_prompt":[{"message":[{}]}]}]}},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"create_version":true,"description":"Types of pizza available to order","enumeration_value":[{"synonyms":[],"value":"Margherita"},{"synonyms":[],"value":"Pepperoni"}],"name":"PizzaTypes","region":"us-east-1","timeouts":null,"value_selection_strategy":"ORIGINAL_VALUE"},"sensitive_values":{"enumeration_value":[{"synonyms":[]},{"synonyms":[]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand that. Can you try again?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Pizza order bot","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"SAVE","region":"us-east-1","timeouts":null},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true,"voice_id":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"So, you would like to order a pizza. Is that correct?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"max_attempts":2,"message":[{"content":"Would you like anything else with your order?","content_type":"PlainText","group_number":null}],"response_card":null}],"rejection_statement":[{"message":[{"content":"OK, Your pizza is on its way.","content_type":"PlainText","group_number":null}],"response_card":null}]}],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Sorry, I don't know how to help then","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."],"slot_constraint":"Required","slot_type":"PizzaTypes","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"slot_type_version":true,"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"value_elicitation_prompt":[{"message":[{}]}]}]}}},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"create_version":true,"description":"Types of pizza available to order","enumeration_value":[{"synonyms":[],"value":"Margherita"},{"synonyms":[],"value":"Pepperoni"}],"name":"PizzaTypes","region":"us-east-1","timeouts":null,"value_selection_strategy":"ORIGINAL_VALUE"},"after_unknown":{"checksum":true,"created_date":true,"enumeration_value":[{"synonyms":[]},{"synonyms":[]}],"id":true,"last_updated_date":true,"version":true},"before_sensitive":false,"after_sensitive":{"enumeration_value":[{"synonyms":[]},{"synonyms":[]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand that. Can you try again?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"description":{"constant_value":"Pizza order bot"},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.OrderPizzaIntent.name","aws_lex_intent.OrderPizzaIntent"]},"intent_version":{"references":["aws_lex_intent.OrderPizzaIntent.version","aws_lex_intent.OrderPizzaIntent"]}}],"name":{"constant_value":"PizzaOrderBot"}},"schema_version":0},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_config_key":"aws","expressions":{"confirmation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"So, you would like to order a pizza. Is that correct?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":true},"follow_up_prompt":[{"prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"Would you like anything else with your order?"},"content_type":{"constant_value":"PlainText"}}]}],"rejection_statement":[{"message":[{"content":{"constant_value":"OK, Your pizza is on its way."},"content_type":{"constant_value":"PlainText"}}]}]}],"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"rejection_statement":[{"message":[{"content":{"constant_value":"Sorry, I don't know how to help then"},"content_type":{"constant_value":"PlainText"}}]}],"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"sample_utterances":{"constant_value":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."]},"slot_constraint":{"constant_value":"Required"},"slot_type":{"references":["aws_lex_slot_type.PizzaType.name","aws_lex_slot_type.PizzaType"]},"slot_type_version":{"references":["aws_lex_slot_type.PizzaType.version","aws_lex_slot_type.PizzaType"]},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_config_key":"aws","expressions":{"create_version":{"constant_value":true},"description":{"constant_value":"Types of pizza available to order"},"enumeration_value":[{"value":{"constant_value":"Margherita"}},{"value":{"constant_value":"Pepperoni"}}],"name":{"constant_value":"PizzaTypes"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_slot_type.PizzaType","attribute":["name"]},{"resource":"aws_lex_intent.OrderPizzaIntent","attribute":["name"]},{"resource":"aws_lex_slot_type.PizzaType","attribute":["version"]},{"resource":"aws_lex_intent.OrderPizzaIntent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:19Z","applyable":true,"complete":true,"errored":false}
29
I need a simple conversational tool that can guide someone through placing a food order and wrap up with a friendly confirmation message once it has everything it needs.
create an aws_lex_bot for ordering pizzas with a conclusion statement
Has one resource "aws_lex_bot" and at least one resource "aws_lex_intent" with at least one user prompt
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "order_pizza_intent" { name = "OrderPizzaIntent" description = "To order a pizza" sample_utterances = [ "I would like to pick up a pizza", "I would like to order some pizzas", ] fulfillment_activity { type = "ReturnIntent" } slot { name = "PizzaType" description = "Type of pizza to order" slot_constraint = "Required" slot_type = "AMAZON.AlphaNumeric" priority = 1 value_elicitation_prompt { message { content = "What type of pizza would you like?" content_type = "PlainText" } max_attempts = 2 } } slot { name = "PizzaSize" description = "Size of pizza to order" slot_constraint = "Required" slot_type = "AMAZON.NUMBER" priority = 2 value_elicitation_prompt { message { content = "What size of pizza would you like?" content_type = "PlainText" } max_attempts = 2 } } slot { name = "PizzaQuantity" description = "Number of pizzas to order" slot_constraint = "Required" slot_type = "AMAZON.NUMBER" priority = 3 value_elicitation_prompt { message { content = "How many pizzas do you want to order?" content_type = "PlainText" } max_attempts = 2 } } conclusion_statement { message { content = "Your pizza order has been received." content_type = "PlainText" } } } resource "aws_lex_bot" "pizza_ordering_bot" { name = "PizzaOrderingBot" description = "Bot to order pizzas" voice_id = "Joanna" idle_session_ttl_in_seconds = 300 child_directed = false clarification_prompt { message { content = "I didn't understand you, what type of pizza would you like to order?" content_type = "PlainText" } max_attempts = 5 } abort_statement { message { content = "Sorry, I am unable to assist at the moment." content_type = "PlainText" } } locale = "en-US" process_behavior = "BUILD" intent { intent_name = aws_lex_intent.order_pizza_intent.name intent_version = aws_lex_intent.order_pizza_intent.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.conclusion_statement; intent.values.follow_up_prompt == false]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Size of pizza to order"},"name":{"constant_value":"PizzaSize"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What size of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Number of pizzas to order"},"name":{"constant_value":"PizzaQuantity"},"priority":{"constant_value":3},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"How many pizzas do you want to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:31Z","applyable":true,"complete":true,"errored":false}
30
I want a simple conversational helper that can understand when someone wants to plan a trip and guide them through it, with clear fallbacks if it gets confused.
create an aws_lex_bot for booking a trip with all arguments filled
Has one resource "aws_lex_bot" with all arguments initialized and at least one "aws_lex_intent" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "BookTrip" { description = "Book a trip" name = "BookTrip" sample_utterances = [ "I want to book a trip", "I would like to book a trip", ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_bot" "BookTripBot" { description = "Bot for booking trips" idle_session_ttl_in_seconds = 600 locale = "en-US" name = "BookTripBot" process_behavior = "BUILD" voice_id = "Salli" detect_sentiment = false enable_model_improvements = true nlu_intent_confidence_threshold = 0 child_directed = false abort_statement { message { content = "Sorry, I cannot assist you to book the trip right now." content_type = "PlainText" } } clarification_prompt { max_attempts = 3 message { content = "I'm sorry, I didn't understand. Could you please repeat that?" content_type = "PlainText" } } intent { intent_name = aws_lex_intent.BookTrip.name intent_version = aws_lex_intent.BookTrip.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name is_boolean(resource.values.create_version) resource.values.description is_boolean(resource.values.detect_sentiment) resource.values.idle_session_ttl_in_seconds resource.values.process_behavior resource.values.voice_id resource.values.locale is_boolean(resource.values.enable_model_improvements) resource.values.nlu_intent_confidence_threshold } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I cannot assist you to book the trip right now.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":3,"message":[{"content":"I'm sorry, I didn't understand. Could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot for booking trips","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"BookTrip"}],"locale":"en-US","name":"BookTripBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Book a trip","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"BookTrip","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to book a trip","I would like to book a trip"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I cannot assist you to book the trip right now.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":3,"message":[{"content":"I'm sorry, I didn't understand. Could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot for booking trips","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"BookTrip"}],"locale":"en-US","name":"BookTripBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Book a trip","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"BookTrip","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to book a trip","I would like to book a trip"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I cannot assist you to book the trip right now."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":3},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand. Could you please repeat that?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot for booking trips"},"detect_sentiment":{"constant_value":false},"enable_model_improvements":{"constant_value":true},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.BookTrip.name","aws_lex_intent.BookTrip"]},"intent_version":{"references":["aws_lex_intent.BookTrip.version","aws_lex_intent.BookTrip"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"BookTripBot"},"nlu_intent_confidence_threshold":{"constant_value":0},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_config_key":"aws","expressions":{"description":{"constant_value":"Book a trip"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"BookTrip"},"sample_utterances":{"constant_value":["I want to book a trip","I would like to book a trip"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.BookTrip","attribute":["name"]},{"resource":"aws_lex_intent.BookTrip","attribute":["version"]}],"timestamp":"2026-02-18T20:51:29Z","applyable":true,"complete":true,"errored":false}
31
I want to set up a conversational helper that can walk people through ordering food, handle updates or cancellations, answer basic questions, and generally guide them through a few different actions, all while keeping things simple and reliable.
create an aws_lex_bot for ordering pizzas with 5 different intents
Has one resource "aws_lex_bot" with 5 different intent blocks and 5 different "aws_lex_intent" resources
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "OrderPizza" { name = "OrderPizza" description = "Pizza order processing" sample_utterances = [ "I want to order a pizza" ] slot { name = "PizzaType" description = "Type of pizza to order" slot_constraint = "Required" slot_type = "AMAZON.AlphaNumeric" priority = 1 value_elicitation_prompt { message { content = "What type of pizza would you like?" content_type = "PlainText" } max_attempts = 2 } } fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "CancelOrder" { name = "CancelOrder" description = "Cancel an order" sample_utterances = [ "I want to cancel my order" ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "CheckOrderStatus" { name = "CheckOrderStatus" description = "Check status of an order" sample_utterances = [ "What is the status of my order" ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "ModifyOrder" { name = "ModifyOrder" description = "Modify an existing order" sample_utterances = [ "I want to change my order" ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "HelpOrder" { name = "HelpOrder" description = "Provide help for ordering" sample_utterances = [ "I need help", "Can you help me" ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_bot" "PizzaOrderBot" { abort_statement { message { content = "Sorry, I could not assist on this request." content_type = "PlainText" } } name = "PizzaOrderBot" child_directed = false create_version = false idle_session_ttl_in_seconds = 600 process_behavior = "BUILD" locale = "en-US" voice_id = "Salli" clarification_prompt { max_attempts = 2 message { content = "I'm sorry, I didn't understand the request. Can you reformulate?" content_type = "PlainText" } } intent { intent_name = aws_lex_intent.OrderPizza.name intent_version = aws_lex_intent.OrderPizza.version } intent { intent_name = aws_lex_intent.CancelOrder.name intent_version = aws_lex_intent.CancelOrder.version } intent { intent_name = aws_lex_intent.CheckOrderStatus.name intent_version = aws_lex_intent.CheckOrderStatus.version } intent { intent_name = aws_lex_intent.ModifyOrder.name intent_version = aws_lex_intent.ModifyOrder.version } intent { intent_name = aws_lex_intent.HelpOrder.name intent_version = aws_lex_intent.HelpOrder.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I could not assist on this request.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand the request. Can you reformulate?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"CancelOrder"},{"intent_name":"CheckOrderStatus"},{"intent_name":"HelpOrder"},{"intent_name":"ModifyOrder"},{"intent_name":"OrderPizza"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{},{},{}]}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Cancel an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to cancel my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Check status of an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CheckOrderStatus","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["What is the status of my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Provide help for ordering","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"HelpOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["Can you help me","I need help"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Modify an existing order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"ModifyOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to change my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Pizza order processing","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizza","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to order a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I could not assist on this request.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand the request. Can you reformulate?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"CancelOrder"},{"intent_name":"CheckOrderStatus"},{"intent_name":"HelpOrder"},{"intent_name":"ModifyOrder"},{"intent_name":"OrderPizza"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true},{"intent_version":true},{"intent_version":true},{"intent_version":true},{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{},{},{}]}}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Cancel an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to cancel my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Check status of an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CheckOrderStatus","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["What is the status of my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Provide help for ordering","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"HelpOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["Can you help me","I need help"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Modify an existing order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"ModifyOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to change my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Pizza order processing","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizza","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to order a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I could not assist on this request."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand the request. Can you reformulate?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.OrderPizza.name","aws_lex_intent.OrderPizza"]},"intent_version":{"references":["aws_lex_intent.OrderPizza.version","aws_lex_intent.OrderPizza"]}},{"intent_name":{"references":["aws_lex_intent.CancelOrder.name","aws_lex_intent.CancelOrder"]},"intent_version":{"references":["aws_lex_intent.CancelOrder.version","aws_lex_intent.CancelOrder"]}},{"intent_name":{"references":["aws_lex_intent.CheckOrderStatus.name","aws_lex_intent.CheckOrderStatus"]},"intent_version":{"references":["aws_lex_intent.CheckOrderStatus.version","aws_lex_intent.CheckOrderStatus"]}},{"intent_name":{"references":["aws_lex_intent.ModifyOrder.name","aws_lex_intent.ModifyOrder"]},"intent_version":{"references":["aws_lex_intent.ModifyOrder.version","aws_lex_intent.ModifyOrder"]}},{"intent_name":{"references":["aws_lex_intent.HelpOrder.name","aws_lex_intent.HelpOrder"]},"intent_version":{"references":["aws_lex_intent.HelpOrder.version","aws_lex_intent.HelpOrder"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Cancel an order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CancelOrder"},"sample_utterances":{"constant_value":["I want to cancel my order"]}},"schema_version":0},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_config_key":"aws","expressions":{"description":{"constant_value":"Check status of an order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CheckOrderStatus"},"sample_utterances":{"constant_value":["What is the status of my order"]}},"schema_version":0},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Provide help for ordering"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"HelpOrder"},"sample_utterances":{"constant_value":["I need help","Can you help me"]}},"schema_version":0},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Modify an existing order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"ModifyOrder"},"sample_utterances":{"constant_value":["I want to change my order"]}},"schema_version":0},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_config_key":"aws","expressions":{"description":{"constant_value":"Pizza order processing"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizza"},"sample_utterances":{"constant_value":["I want to order a pizza"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.CancelOrder","attribute":["name"]},{"resource":"aws_lex_intent.OrderPizza","attribute":["version"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["version"]},{"resource":"aws_lex_intent.CheckOrderStatus","attribute":["name"]},{"resource":"aws_lex_intent.HelpOrder","attribute":["name"]},{"resource":"aws_lex_intent.ModifyOrder","attribute":["name"]},{"resource":"aws_lex_intent.ModifyOrder","attribute":["version"]},{"resource":"aws_lex_intent.HelpOrder","attribute":["version"]},{"resource":"aws_lex_intent.CheckOrderStatus","attribute":["version"]},{"resource":"aws_lex_intent.OrderPizza","attribute":["name"]}],"timestamp":"2026-02-18T20:51:42Z","applyable":true,"complete":true,"errored":false}
32
I need a friendly, kid‑oriented way for people to talk to an automated helper that can take simple requests, change their mind if needed, and respond politely.
create an aws_lex_bot for ordering pizzas that is meant for kids
Has one resource "aws_lex_bot" with "child_directed" = true and at least one "aws_lex_intent" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_bot" "KidsPizzaOrderBot" { child_directed = true name = "KidsPizzaOrderBot" process_behavior = "BUILD" idle_session_ttl_in_seconds = 300 locale = "en-US" voice_id = "Salli" abort_statement { message { content = "I'm sorry, I can't assist further on this." content_type = "PlainText" } } clarification_prompt { max_attempts = 1 message { content = "I'm sorry, could you please repeat that?" content_type = "PlainText" } } intent { intent_name = aws_lex_intent.PizzaOrder.name intent_version = aws_lex_intent.PizzaOrder.version } intent { intent_name = aws_lex_intent.CancelOrder.name intent_version = aws_lex_intent.CancelOrder.version } intent { intent_name = aws_lex_intent.Appreciation.name intent_version = aws_lex_intent.Appreciation.version } } resource "aws_lex_intent" "PizzaOrder" { name = "PizzaOrder" description = "Intent for ordering pizza" sample_utterances = [ "I would like to order a pizza", ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "CancelOrder" { name = "CancelOrder" description = "Intent for canceling pizza order" sample_utterances = [ "I would like to cancel my order", ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_intent" "Appreciation" { name = "Appreciation" description = "Intent for appreciating the service" sample_utterances = [ "I appreciate your service", ] fulfillment_activity { type = "ReturnIntent" } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" resource.values.child_directed == true resource.values.clarification_prompt resource.values.abort_statement resource.values.name } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"I'm sorry, I can't assist further on this.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":true,"clarification_prompt":[{"max_attempts":1,"message":[{"content":"I'm sorry, could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"Appreciation"},{"intent_name":"CancelOrder"},{"intent_name":"PizzaOrder"}],"locale":"en-US","name":"KidsPizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{}]}},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for appreciating the service","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"Appreciation","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I appreciate your service"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for canceling pizza order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to cancel my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for ordering pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"PizzaOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order a pizza"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"I'm sorry, I can't assist further on this.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":true,"clarification_prompt":[{"max_attempts":1,"message":[{"content":"I'm sorry, could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"Appreciation"},{"intent_name":"CancelOrder"},{"intent_name":"PizzaOrder"}],"locale":"en-US","name":"KidsPizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true},{"intent_version":true},{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{}]}}},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for appreciating the service","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"Appreciation","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I appreciate your service"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for canceling pizza order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to cancel my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for ordering pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"PizzaOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order a pizza"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"I'm sorry, I can't assist further on this."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":true},"clarification_prompt":[{"max_attempts":{"constant_value":1},"message":[{"content":{"constant_value":"I'm sorry, could you please repeat that?"},"content_type":{"constant_value":"PlainText"}}]}],"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.PizzaOrder.name","aws_lex_intent.PizzaOrder"]},"intent_version":{"references":["aws_lex_intent.PizzaOrder.version","aws_lex_intent.PizzaOrder"]}},{"intent_name":{"references":["aws_lex_intent.CancelOrder.name","aws_lex_intent.CancelOrder"]},"intent_version":{"references":["aws_lex_intent.CancelOrder.version","aws_lex_intent.CancelOrder"]}},{"intent_name":{"references":["aws_lex_intent.Appreciation.name","aws_lex_intent.Appreciation"]},"intent_version":{"references":["aws_lex_intent.Appreciation.version","aws_lex_intent.Appreciation"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"KidsPizzaOrderBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for appreciating the service"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"Appreciation"},"sample_utterances":{"constant_value":["I appreciate your service"]}},"schema_version":0},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for canceling pizza order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CancelOrder"},"sample_utterances":{"constant_value":["I would like to cancel my order"]}},"schema_version":0},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for ordering pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"PizzaOrder"},"sample_utterances":{"constant_value":["I would like to order a pizza"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.PizzaOrder","attribute":["name"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["name"]},{"resource":"aws_lex_intent.PizzaOrder","attribute":["version"]},{"resource":"aws_lex_intent.Appreciation","attribute":["name"]},{"resource":"aws_lex_intent.Appreciation","attribute":["version"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["version"]}],"timestamp":"2026-02-18T20:51:45Z","applyable":true,"complete":true,"errored":false}
33
I need a conversational tool that can take simple food orders and should only act on a request when it’s reasonably sure what the person meant, while still being easy for people to interact with.
create an aws_lex_bot for ordering pizzas and set nlu_intent_confidence_threshold to 0.5
Has one resource "aws_lex_bot" with argument "enable_model_improvements" = true and argument "nlu_intent_confidence_threshold" = 0.5 and at least one resource "aws_lex_intent"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_lex_intent" "order_pizza_intent" { name = "OrderPizzaIntent" description = "To order a pizza" sample_utterances = [ "I would like to pick up a pizza", "I would like to order some pizzas", ] fulfillment_activity { type = "ReturnIntent" } conclusion_statement { message { content = "Your pizza order has been received." content_type = "PlainText" } } } resource "aws_lex_bot" "pizza_ordering_bot" { name = "PizzaOrderingBot" description = "Bot to order pizzas" voice_id = "Joanna" idle_session_ttl_in_seconds = "300" child_directed = false enable_model_improvements = true nlu_intent_confidence_threshold = 0.5 locale = "en-US" process_behavior = "BUILD" clarification_prompt { message { content = "I didn't understand you, what type of pizza would you like to order?" content_type = "PlainText" } max_attempts = 5 } abort_statement { message { content = "Sorry, I am unable to assist at the moment." content_type = "PlainText" } } intent { intent_name = aws_lex_intent.order_pizza_intent.name intent_version = aws_lex_intent.order_pizza_intent.version } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name # is_boolean(resource.values.create_version) # resource.values.description # is_boolean(resource.values.detect_sentiment) # resource.values.idle_session_ttl_in_seconds # resource.values.process_behavior # resource.values.voice_id # resource.values.locale resource.values.enable_model_improvements == true resource.values.nlu_intent_confidence_threshold == 0.5 } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0.5,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0.5,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"enable_model_improvements":{"constant_value":true},"idle_session_ttl_in_seconds":{"constant_value":"300"},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"nlu_intent_confidence_threshold":{"constant_value":0.5},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:49Z","applyable":true,"complete":true,"errored":false}
34
I want callers to be able to interact with an automated assistant during support conversations, and I need it wired into our existing setup without a lot of extra complexity.
create an aws_connect_bot_association resource
Has one resource "aws_connect_instance", at least one "aws_lex_intent" resource, one "aws_lex_bot" resource, and one "aws_connnect_bot_association" resource
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } data "aws_region" "current" {} resource "aws_connect_instance" "example" { identity_management_type = "CONNECT_MANAGED" inbound_calls_enabled = true instance_alias = "friendly-name-connect-13" outbound_calls_enabled = true } resource "aws_lex_intent" "example" { create_version = true name = "connect_lex_intent" sample_utterances = [ "I would like to pick up flowers.", ] fulfillment_activity { type = "ReturnIntent" } } resource "aws_lex_bot" "example13" { name = "connect_lex_bot" process_behavior = "BUILD" child_directed = false abort_statement { message { content = "Sorry, I am not able to assist at this time." content_type = "PlainText" } } clarification_prompt { max_attempts = 2 message { content = "I didn't understand you, what would you like to do?" content_type = "PlainText" } } intent { intent_name = aws_lex_intent.example.name intent_version = "1" } } resource "aws_connect_bot_association" "example" { instance_id = aws_connect_instance.example.id lex_bot { lex_region = data.aws_region.current.name name = aws_lex_bot.example13.name } }
package terraform.validation import future.keywords.in default has_valid_resources = false # Rule for multiple aws_lex_intent resources has_valid_lex_intents { count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity]) } has_valid_connect_instance { count([instance | instance := input.planned_values.root_module.resources[_]; instance.type == "aws_connect_instance"; instance.values.identity_management_type; instance.values.inbound_calls_enabled; instance.values.outbound_calls_enabled]) } # Rule for aws_lex_bot resource with specific arguments has_valid_lex_bot_instance { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_lex_bot" is_boolean(resource.values.child_directed) resource.values.clarification_prompt resource.values.abort_statement resource.values.name # is_boolean(resource.values.create_version) # resource.values.description # is_boolean(resource.values.detect_sentiment) # resource.values.idle_session_ttl_in_seconds # resource.values.process_behavior # resource.values.voice_id # resource.values.locale # is_boolean(resource.values.enable_model_improvements) # resource.values.nlu_intent_confidence_threshold } has_valid_connect_bot_association { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_connect_bot_association" resource.values.lex_bot[_].name instance := input.configuration.root_module.resources[i] instance.expressions.instance_id } # Combined rule to ensure all conditions are met has_valid_resources { has_valid_lex_intents has_valid_lex_bot_instance has_valid_connect_instance has_valid_connect_bot_association }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"lex_bot":[{"lex_region":"us-east-1","name":"connect_lex_bot"}],"region":"us-east-1"},"sensitive_values":{"lex_bot":[{}]}},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_resolve_best_voices_enabled":true,"contact_flow_logs_enabled":false,"contact_lens_enabled":true,"directory_id":null,"early_media_enabled":true,"identity_management_type":"CONNECT_MANAGED","inbound_calls_enabled":true,"instance_alias":"friendly-name-connect-13","multi_party_conference_enabled":false,"outbound_calls_enabled":true,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"connect_lex_intent","intent_version":"1"}],"locale":"en-US","name":"connect_lex_bot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"connect_lex_intent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to pick up flowers."],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}]}},"resource_changes":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"lex_bot":[{"lex_region":"us-east-1","name":"connect_lex_bot"}],"region":"us-east-1"},"after_unknown":{"id":true,"instance_id":true,"lex_bot":[{}]},"before_sensitive":false,"after_sensitive":{"lex_bot":[{}]}}},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_resolve_best_voices_enabled":true,"contact_flow_logs_enabled":false,"contact_lens_enabled":true,"directory_id":null,"early_media_enabled":true,"identity_management_type":"CONNECT_MANAGED","inbound_calls_enabled":true,"instance_alias":"friendly-name-connect-13","multi_party_conference_enabled":false,"outbound_calls_enabled":true,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"created_time":true,"id":true,"service_role":true,"status":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"connect_lex_intent","intent_version":"1"}],"locale":"en-US","name":"connect_lex_bot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{}],"last_updated_date":true,"status":true,"version":true,"voice_id":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"connect_lex_intent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to pick up flowers."],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_config_key":"aws","expressions":{"instance_id":{"references":["aws_connect_instance.example.id","aws_connect_instance.example"]},"lex_bot":[{"lex_region":{"references":["data.aws_region.current.name","data.aws_region.current"]},"name":{"references":["aws_lex_bot.example13.name","aws_lex_bot.example13"]}}]},"schema_version":0},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_config_key":"aws","expressions":{"identity_management_type":{"constant_value":"CONNECT_MANAGED"},"inbound_calls_enabled":{"constant_value":true},"instance_alias":{"constant_value":"friendly-name-connect-13"},"outbound_calls_enabled":{"constant_value":true}},"schema_version":0},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist at this time."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I didn't understand you, what would you like to do?"},"content_type":{"constant_value":"PlainText"}}]}],"intent":[{"intent_name":{"references":["aws_lex_intent.example.name","aws_lex_intent.example"]},"intent_version":{"constant_value":"1"}}],"name":{"constant_value":"connect_lex_bot"},"process_behavior":{"constant_value":"BUILD"}},"schema_version":0},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_config_key":"aws","expressions":{"create_version":{"constant_value":true},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"connect_lex_intent"},"sample_utterances":{"constant_value":["I would like to pick up flowers."]}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_region.current","attribute":["name"]},{"resource":"aws_connect_instance.example","attribute":["id"]},{"resource":"aws_lex_bot.example13","attribute":["name"]},{"resource":"aws_lex_intent.example","attribute":["name"]}],"timestamp":"2026-02-18T20:51:52Z","applyable":true,"complete":true,"errored":false}
35
I need a simple way to take in continuous chunks of data so other parts of the system can process them reliably, and it should work even if the volume fluctuates a bit.
Generate a basic Amazon Kinesis stream
Has one "aws_kinesis_stream" resource
provider "aws" { region = "us-west-2" } resource "aws_kinesis_stream" "test_stream" { name = "drow1" shard_count = 1 retention_period = 48 shard_level_metrics = [ "IncomingBytes", "OutgoingBytes", ] stream_mode_details { stream_mode = "PROVISIONED" } tags = { Environment = "test" } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_kinesis_stream { resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_stream" resource.values.name } has_valid_resources { has_valid_kinesis_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"drow1","region":"us-west-2","retention_period":48,"shard_count":1,"shard_level_metrics":["IncomingBytes","OutgoingBytes"],"stream_mode_details":[{"stream_mode":"PROVISIONED"}],"tags":{"Environment":"test"},"tags_all":{"Environment":"test"},"timeouts":null},"sensitive_values":{"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"drow1","region":"us-west-2","retention_period":48,"shard_count":1,"shard_level_metrics":["IncomingBytes","OutgoingBytes"],"stream_mode_details":[{"stream_mode":"PROVISIONED"}],"tags":{"Environment":"test"},"tags_all":{"Environment":"test"},"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_config_key":"aws","expressions":{"name":{"constant_value":"drow1"},"retention_period":{"constant_value":48},"shard_count":{"constant_value":1},"shard_level_metrics":{"constant_value":["IncomingBytes","OutgoingBytes"]},"stream_mode_details":[{"stream_mode":{"constant_value":"PROVISIONED"}}],"tags":{"constant_value":{"Environment":"test"}}},"schema_version":1}]}},"timestamp":"2026-02-18T20:52:09Z","applyable":true,"complete":true,"errored":false}
36
I need a simple setup that can watch a continuous flow of event data and run some lightweight processing on it in a reliable, low‑maintenance way.
Generate a basic Amazon Kinesis Analytics Application with an input kinesis stream
Has one "aws_kinesis_analytics_application" resource with one "aws_kinesis_stream" resource as an input
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } data "aws_iam_policy_document" "StreamReaderWriter" { statement { effect = "Allow" actions = ["kinesis:DescribeStream", "kinesis:GetShardIterator", "kinesis:GetRecords"] resources = [aws_kinesis_stream.test_stream.arn] } } data "aws_iam_policy_document" "KinesisAssume" { statement { effect = "Allow" actions = ["sts:AssumeRole"] principals { type = "Service" identifiers = ["kinesisanalytics.amazonaws.com"] } } } resource "aws_iam_policy" "StreamReaderWriter" { name = "KinesisStreamReaderWriter" policy = data.aws_iam_policy_document.StreamReaderWriter.json } resource "aws_iam_role" "kinesis_role" { name = "kinesis_role" assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json } resource "aws_iam_role_policy_attachment" "attach_kinesis_role" { role = aws_iam_role.kinesis_role.name policy_arn = aws_iam_policy.StreamReaderWriter.arn } resource "aws_kinesis_stream" "test_stream" { name = "events" shard_count = 1 retention_period = 168 } resource "aws_kinesis_analytics_application" "test_application" { name = "kinesis-analytics-application-test" inputs { name_prefix = "test_prefix" kinesis_stream { resource_arn = aws_kinesis_stream.test_stream.arn role_arn = aws_iam_role.kinesis_role.arn } parallelism { count = 1 } schema { record_columns { mapping = "$.test" name = "test" sql_type = "VARCHAR(8)" } record_encoding = "UTF-8" record_format { mapping_parameters { json { record_row_path = "$" } } } } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com") } has_valid_kinesis_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_stream" resource.values.name } has_valid_kinesis_analytics_application { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_analytics_application" resource.values.name resource.values.inputs[_].kinesis_stream } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kinesis_stream has_valid_kinesis_analytics_application }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":null,"name":"KinesisStreamReaderWriter","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"kinesis_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"name_prefix":"test_prefix","parallelism":[{"count":1}],"processing_configuration":[],"schema":[{"record_columns":[{"mapping":"$.test","name":"test","sql_type":"VARCHAR(8)"}],"record_encoding":"UTF-8","record_format":[{"mapping_parameters":[{"csv":[],"json":[{"record_row_path":"$"}]}]}]}]}],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-east-1","start_application":null,"tags":null},"sensitive_values":{"cloudwatch_logging_options":[],"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}]}]}],"starting_position_configuration":[],"stream_names":[]}],"outputs":[],"reference_data_sources":[],"tags_all":{}}},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"events","region":"us-east-1","retention_period":168,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"sensitive_values":{"stream_mode_details":[],"tags_all":{}}},{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["kinesis:DescribeStream","kinesis:GetRecords","kinesis:GetShardIterator"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["kinesis:DescribeStream","kinesis:GetRecords","kinesis:GetShardIterator"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":null,"name":"KinesisStreamReaderWriter","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"kinesis_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"name_prefix":"test_prefix","parallelism":[{"count":1}],"processing_configuration":[],"schema":[{"record_columns":[{"mapping":"$.test","name":"test","sql_type":"VARCHAR(8)"}],"record_encoding":"UTF-8","record_format":[{"mapping_parameters":[{"csv":[],"json":[{"record_row_path":"$"}]}]}]}]}],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-east-1","start_application":null,"tags":null},"after_unknown":{"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"inputs":[{"id":true,"kinesis_firehose":[],"kinesis_stream":[{"resource_arn":true,"role_arn":true}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}],"record_format_type":true}]}],"starting_position_configuration":true,"stream_names":true}],"last_update_timestamp":true,"outputs":[],"reference_data_sources":[],"status":true,"tags_all":true,"version":true},"before_sensitive":false,"after_sensitive":{"cloudwatch_logging_options":[],"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}]}]}],"starting_position_configuration":[],"stream_names":[]}],"outputs":[],"reference_data_sources":[],"tags_all":{}}}},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"events","region":"us-east-1","retention_period":168,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"stream_mode_details":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"stream_mode_details":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_config_key":"aws","expressions":{"name":{"constant_value":"KinesisStreamReaderWriter"},"policy":{"references":["data.aws_iam_policy_document.StreamReaderWriter.json","data.aws_iam_policy_document.StreamReaderWriter"]}},"schema_version":0},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.StreamReaderWriter.arn","aws_iam_policy.StreamReaderWriter"]},"role":{"references":["aws_iam_role.kinesis_role.name","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_config_key":"aws","expressions":{"inputs":[{"kinesis_stream":[{"resource_arn":{"references":["aws_kinesis_stream.test_stream.arn","aws_kinesis_stream.test_stream"]},"role_arn":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}}],"name_prefix":{"constant_value":"test_prefix"},"parallelism":[{"count":{"constant_value":1}}],"schema":[{"record_columns":[{"mapping":{"constant_value":"$.test"},"name":{"constant_value":"test"},"sql_type":{"constant_value":"VARCHAR(8)"}}],"record_encoding":{"constant_value":"UTF-8"},"record_format":[{"mapping_parameters":[{"json":[{"record_row_path":{"constant_value":"$"}}]}]}]}]}],"name":{"constant_value":"kinesis-analytics-application-test"}},"schema_version":0},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_config_key":"aws","expressions":{"name":{"constant_value":"events"},"retention_period":{"constant_value":168},"shard_count":{"constant_value":1}},"schema_version":1},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0},{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["kinesis:DescribeStream","kinesis:GetShardIterator","kinesis:GetRecords"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_kinesis_stream.test_stream.arn","aws_kinesis_stream.test_stream"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]},{"resource":"data.aws_iam_policy_document.StreamReaderWriter","attribute":["json"]},{"resource":"aws_kinesis_stream.test_stream","attribute":["arn"]},{"resource":"aws_iam_policy.StreamReaderWriter","attribute":["arn"]},{"resource":"aws_iam_role.kinesis_role","attribute":["name"]}],"timestamp":"2026-02-18T20:52:03Z","applyable":true,"complete":true,"errored":false}
37
I need to run some continuous data processing logic that can handle streaming workloads reliably, and it should run in a managed environment so I don’t have to deal with the underlying servers.
Generate a basic Amazon Kinesis V2 Analytics Application to manage an Apache Flink Application
Has one "aws_iam_role" resource, and one "aws_kinesisanalyticsv2_application" with argument runtime_environment != "SQL-1_0"
provider "aws" { region = "us-west-2" } data "aws_iam_policy_document" "KinesisAssume" { statement { effect = "Allow" actions = ["sts:AssumeRole"] principals { type = "Service" identifiers = ["kinesisanalytics.amazonaws.com"] } } } resource "aws_iam_role" "kinesis_role" { name = "kinesis_role" assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json } resource "aws_kinesisanalyticsv2_application" "flink_app" { name = "example-application1" runtime_environment = "FLINK-1_13" service_execution_role = aws_iam_role.kinesis_role.arn }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com") } has_valid_kinesisanalyticsv2_application { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesisanalyticsv2_application" resource.values.name resource.values.runtime_environment != "SQL-1_0" role := input.configuration.root_module.resources[i] role.expressions.service_execution_role } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kinesisanalyticsv2_application }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"FLINK-1_13","start_application":null,"tags":null,"timeouts":null},"sensitive_values":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"FLINK-1_13","start_application":null,"tags":null,"timeouts":null},"after_unknown":{"application_configuration":true,"application_mode":true,"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"last_update_timestamp":true,"service_execution_role":true,"status":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-application1"},"runtime_environment":{"constant_value":"FLINK-1_13"},"service_execution_role":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:10Z","applyable":true,"complete":true,"errored":false}
38
We need a way to take in a steady stream of app events, clean them up on the fly, and store them in a long‑term place where the files are automatically organized by things like who they belong to and when they arrived, all while keeping it flexible enough to rearrange later if our data patterns change.
Generate a Kinesis Firehose Delivery Stream with an extended S3 Destination with Dynamic Partitioning enabled
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with the argument "enabled" within the "dynamic_partitioning_configuration" block set to "true"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } # even though this program seems to be problematic, it's copied from https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/kinesis_firehose_delivery_stream # so I'll leave it unmodified data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } resource "aws_s3_bucket" "decemberthirtysecond" { bucket = "decemberthirtysecond" } resource "aws_kinesis_firehose_delivery_stream" "extended_s3_stream" { name = "terraform-kinesis-firehose-extended-s3-test-stream" destination = "extended_s3" extended_s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.decemberthirtysecond.arn buffering_size = 64 # https://docs.aws.amazon.com/firehose/latest/dev/dynamic-partitioning.html dynamic_partitioning_configuration { enabled = "true" } # Example prefix using partitionKeyFromQuery, applicable to JQ processor prefix = "data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/" error_output_prefix = "errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/" processing_configuration { enabled = "true" # Multi-record deaggregation processor example processors { type = "RecordDeAggregation" parameters { parameter_name = "SubRecordType" parameter_value = "JSON" } } # New line delimiter processor example processors { type = "AppendDelimiterToRecord" } # JQ processor example processors { type = "MetadataExtraction" parameters { parameter_name = "JsonParsingEngine" parameter_value = "JQ-1.6" } parameters { parameter_name = "MetadataExtractionQuery" parameter_value = "{customer_id:.customer_id}" } } } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "extended_s3" resource.values.extended_s3_configuration[_].dynamic_partitioning_configuration role := input.configuration.root_module.resources[i] role.expressions.extended_s3_configuration[_].role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":64,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{"enabled":true,"retry_duration":300}],"error_output_prefix":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/","file_extension":null,"kms_key_arn":null,"prefix":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/","processing_configuration":[{"enabled":true,"processors":[{"parameters":[{"parameter_name":"SubRecordType","parameter_value":"JSON"}],"type":"RecordDeAggregation"},{"parameters":[],"type":"AppendDelimiterToRecord"},{"parameters":[{"parameter_name":"JsonParsingEngine","parameter_value":"JQ-1.6"},{"parameter_name":"MetadataExtractionQuery","parameter_value":"{customer_id:.customer_id}"}],"type":"MetadataExtraction"}]}],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"decemberthirtysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":64,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{"enabled":true,"retry_duration":300}],"error_output_prefix":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/","file_extension":null,"kms_key_arn":null,"prefix":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/","processing_configuration":[{"enabled":true,"processors":[{"parameters":[{"parameter_name":"SubRecordType","parameter_value":"JSON"}],"type":"RecordDeAggregation"},{"parameters":[],"type":"AppendDelimiterToRecord"},{"parameters":[{"parameter_name":"JsonParsingEngine","parameter_value":"JQ-1.6"},{"parameter_name":"MetadataExtractionQuery","parameter_value":"{customer_id:.customer_id}"}],"type":"MetadataExtraction"}]}],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"role_arn":true,"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"decemberthirtysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"extended_s3"},"extended_s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.decemberthirtysecond.arn","aws_s3_bucket.decemberthirtysecond"]},"buffering_size":{"constant_value":64},"dynamic_partitioning_configuration":[{"enabled":{"constant_value":"true"}}],"error_output_prefix":{"constant_value":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/"},"prefix":{"constant_value":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/"},"processing_configuration":[{"enabled":{"constant_value":"true"},"processors":[{"parameters":[{"parameter_name":{"constant_value":"SubRecordType"},"parameter_value":{"constant_value":"JSON"}}],"type":{"constant_value":"RecordDeAggregation"}},{"type":{"constant_value":"AppendDelimiterToRecord"}},{"parameters":[{"parameter_name":{"constant_value":"JsonParsingEngine"},"parameter_value":{"constant_value":"JQ-1.6"}},{"parameter_name":{"constant_value":"MetadataExtractionQuery"},"parameter_value":{"constant_value":"{customer_id:.customer_id}"}}],"type":{"constant_value":"MetadataExtraction"}}]}],"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"name":{"constant_value":"terraform-kinesis-firehose-extended-s3-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"decemberthirtysecond"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.decemberthirtysecond","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:15Z","applyable":true,"complete":true,"errored":false}
39
We need a way to take our incoming app data and load it into our analytics system automatically, with a fallback option for storing the raw files in case something goes wrong.
Generate a Kinesis Firehose Delivery Stream with a Redshift cluster destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_redshift_cluster" resource, and one "aws_kinesis_firehose_delivery_stream" resource with a "redshift_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "firehose_role" { name = "firehose_redshift_role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Principal = { Service = "firehose.amazonaws.com" }, Action = "sts:AssumeRole" } ] }) } resource "aws_iam_policy" "firehose_policy" { name = "firehose_redshift_s3_policy" description = "Policy for Kinesis Firehose to access S3 and Redshift" policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Action = [ "s3:PutObject", "s3:PutObjectAcl", "s3:GetBucketLocation", "s3:ListBucket", "s3:GetObject" ], Resource = [ aws_s3_bucket.januarysecond.arn, "${aws_s3_bucket.januarysecond.arn}/*" ] }, { Effect = "Allow", Action = [ "redshift:DescribeClusters", "redshift:GetClusterCredentials", "redshift:CopyFromS3", "redshift:CreateClusterUser" ], Resource = aws_redshift_cluster.test_cluster.arn }, { Effect = "Allow", Action = [ "kms:Decrypt", "kms:GenerateDataKey" ], Resource = "*" } ] }) } resource "aws_iam_role_policy_attachment" "firehose_policy_attach" { role = aws_iam_role.firehose_role.name policy_arn = aws_iam_policy.firehose_policy.arn } resource "aws_s3_bucket" "januarysecond" { bucket = "januarysecond" } resource "aws_redshift_cluster" "test_cluster" { cluster_identifier = "tf-redshift-cluster" database_name = "test" master_username = "testuser" master_password = "T3stPass" node_type = "ra3.xlplus" cluster_type = "single-node" } resource "aws_kinesis_firehose_delivery_stream" "test_stream" { name = "terraform-kinesis-firehose-test-stream" destination = "redshift" redshift_configuration { role_arn = aws_iam_role.firehose_role.arn cluster_jdbcurl = "jdbc:redshift://${aws_redshift_cluster.test_cluster.endpoint}/${aws_redshift_cluster.test_cluster.database_name}" username = "testuser" password = "T3stPass" data_table_name = "test-table" copy_options = "delimiter '|'" # the default delimiter data_table_columns = "test-col" s3_backup_mode = "Disabled" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januarysecond.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_redshift_cluster { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_redshift_cluster" resource.values.cluster_identifier resource.values.node_type } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "redshift" resource.values.redshift_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.redshift_configuration[_].role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_redshift_cluster has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and Redshift","name":"firehose_redshift_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_redshift_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_redshift_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"redshift","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"copy_options":"delimiter '|'","data_table_columns":"test-col","data_table_name":"test-table","password":"T3stPass","processing_configuration":[],"retry_duration":3600,"s3_backup_configuration":[],"s3_backup_mode":"Disabled","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"username":"testuser"}],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":[],"password":true,"processing_configuration":[],"s3_backup_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"test","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"T3stPass","master_password_wo":null,"master_password_wo_version":null,"master_username":"testuser","multi_az":false,"node_type":"ra3.xlplus","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and Redshift","name":"firehose_redshift_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_redshift_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_redshift_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"redshift","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"copy_options":"delimiter '|'","data_table_columns":"test-col","data_table_name":"test-table","password":"T3stPass","processing_configuration":[],"retry_duration":3600,"s3_backup_configuration":[],"s3_backup_mode":"Disabled","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"username":"testuser"}],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":true,"cluster_jdbcurl":true,"processing_configuration":[],"role_arn":true,"s3_backup_configuration":[],"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":[],"password":true,"processing_configuration":[],"s3_backup_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"test","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"T3stPass","master_password_wo":null,"master_password_wo_version":null,"master_username":"testuser","multi_az":false,"node_type":"ra3.xlplus","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and Redshift"},"name":{"constant_value":"firehose_redshift_s3_policy"},"policy":{"references":["aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond","aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond","aws_redshift_cluster.test_cluster.arn","aws_redshift_cluster.test_cluster"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_redshift_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_policy.arn","aws_iam_policy.firehose_policy"]},"role":{"references":["aws_iam_role.firehose_role.name","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"redshift"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"redshift_configuration":[{"cluster_jdbcurl":{"references":["aws_redshift_cluster.test_cluster.endpoint","aws_redshift_cluster.test_cluster","aws_redshift_cluster.test_cluster.database_name","aws_redshift_cluster.test_cluster"]},"copy_options":{"constant_value":"delimiter '|'"},"data_table_columns":{"constant_value":"test-col"},"data_table_name":{"constant_value":"test-table"},"password":{"constant_value":"T3stPass"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_backup_mode":{"constant_value":"Disabled"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"username":{"constant_value":"testuser"}}]},"schema_version":1},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"test"},"master_password":{"constant_value":"T3stPass"},"master_username":{"constant_value":"testuser"},"node_type":{"constant_value":"ra3.xlplus"}},"schema_version":0},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysecond"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_policy.firehose_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["name"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["arn"]},{"resource":"aws_s3_bucket.januarysecond","attribute":["arn"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["database_name"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:52:21Z","applyable":true,"complete":true,"errored":false}
40
We need a way to stream our app’s event data into a search and analytics system in near‑real time, with a fallback location for anything that can’t be processed right away.
Generate a Kinesis Firehose Delivery Stream with a Elasticsearch destination with the appropriate iam role and bucket
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_elasticsearch_domain" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "elasticsearch_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "januarythird" { bucket = "januarythird" } resource "aws_elasticsearch_domain" "test_cluster" { domain_name = "es-test-2" cluster_config { instance_count = 2 zone_awareness_enabled = true instance_type = "t2.small.elasticsearch" } ebs_options { ebs_enabled = true volume_size = 10 } } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } data "aws_iam_policy_document" "firehose-elasticsearch" { statement { effect = "Allow" actions = ["es:*"] resources = [ aws_elasticsearch_domain.test_cluster.arn, "${aws_elasticsearch_domain.test_cluster.arn}/*", ] } } resource "aws_iam_role_policy" "firehose-elasticsearch" { name = "elasticsearch" role = aws_iam_role.firehose_role.id policy = data.aws_iam_policy_document.firehose-elasticsearch.json } resource "aws_elasticsearch_domain_policy" "main" { domain_name = aws_elasticsearch_domain.test_cluster.domain_name access_policies = <<POLICIES { "Version": "2012-10-17", "Statement": [ { "Action": "es:*", "Principal": "*", "Effect": "Allow", "Condition": { "IpAddress": {"aws:SourceIp": "127.0.0.1/32"} }, "Resource": "${aws_elasticsearch_domain.test_cluster.arn}/*" } ] } POLICIES } resource "aws_kinesis_firehose_delivery_stream" "test" { name = "terraform-kinesis-firehose-es" destination = "elasticsearch" elasticsearch_configuration { domain_arn = aws_elasticsearch_domain.test_cluster.arn role_arn = aws_iam_role.firehose_role.arn index_name = "test" type_name = "test" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januarythird.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_elasticsearch_cluster { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_elasticsearch_domain" resource.values.domain_name } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "elasticsearch" resource.values.elasticsearch_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.elasticsearch_configuration[_].role_arn role.expressions.elasticsearch_configuration[_].domain_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_elasticsearch_cluster has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-2","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[]}},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"domain_name":"es-test-2","region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elasticsearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarythird","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-2","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"id":true,"kibana_endpoint":true,"log_publishing_options":[],"node_to_node_encryption":true,"snapshot_options":[],"tags_all":true,"vpc_options":[]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[]}}},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"domain_name":"es-test-2","region":"us-east-1","timeouts":null},"after_unknown":{"access_policies":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elasticsearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[{"cloudwatch_logging_options":true,"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarythird","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"t2.small.elasticsearch"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test-2"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}]},"schema_version":0},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_config_key":"aws","expressions":{"access_policies":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"domain_name":{"references":["aws_elasticsearch_domain.test_cluster.domain_name","aws_elasticsearch_domain.test_cluster"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"elasticsearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-elasticsearch.json","data.aws_iam_policy_document.firehose-elasticsearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"elasticsearch"},"elasticsearch_configuration":[{"domain_arn":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarythird.arn","aws_s3_bucket.januarythird"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"type_name":{"constant_value":"test"}}],"name":{"constant_value":"terraform-kinesis-firehose-es"}},"schema_version":1},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarythird"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster","aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose-elasticsearch","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_s3_bucket.januarythird","attribute":["arn"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["domain_name"]}],"timestamp":"2026-02-18T20:52:35Z","applyable":true,"complete":true,"errored":false}
41
We need a way to funnel a high volume of incoming event data into our search and analytics system in near real time, with some kind of fallback storage in case the main pipeline slows down.
Generate a Kinesis Firehose Delivery Stream with an OpenSearch destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearch_domain" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "opensearch_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "januaryseventh" { bucket = "januaryseventh" } resource "aws_opensearch_domain" "test_cluster" { domain_name = "es-test-3" cluster_config { instance_count = 2 zone_awareness_enabled = true instance_type = "m4.large.search" } ebs_options { ebs_enabled = true volume_size = 10 } } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } data "aws_iam_policy_document" "firehose-opensearch" { statement { effect = "Allow" actions = ["es:*"] resources = [ aws_opensearch_domain.test_cluster.arn, "${aws_opensearch_domain.test_cluster.arn}/*", ] } } resource "aws_iam_role_policy" "firehose-opensearch" { name = "opensearch" role = aws_iam_role.firehose_role.id policy = data.aws_iam_policy_document.firehose-opensearch.json } data "aws_iam_policy_document" "main" { statement { effect = "Allow" principals { type = "*" identifiers = ["*"] } condition { test = "IpAddress" variable = "aws:SourceIp" values = ["127.0.0.1/32"] } actions = ["es:*"] resources = ["${aws_opensearch_domain.test_cluster.arn}/*"] } } # applied at service level, necessary for opensearch access resource "aws_opensearch_domain_policy" "main" { domain_name = aws_opensearch_domain.test_cluster.domain_name access_policies = data.aws_iam_policy_document.main.json } resource "aws_kinesis_firehose_delivery_stream" "test" { depends_on = [aws_iam_role_policy.firehose-opensearch] name = "terraform-kinesis-firehose-os" destination = "opensearch" opensearch_configuration { domain_arn = aws_opensearch_domain.test_cluster.arn role_arn = aws_iam_role.firehose_role.arn index_name = "test" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januaryseventh.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_opensearch_cluster { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_opensearch_domain" resource.values.domain_name } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "opensearch" resource.values.opensearch_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.opensearch_configuration[_].role_arn role.expressions.opensearch_configuration[_].domain_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_opensearch_cluster has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"opensearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-3","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[]}},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"domain_name":"es-test-3","region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryseventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[{"test":"IpAddress","values":["127.0.0.1/32"],"variable":"aws:SourceIp"}],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[{"identifiers":["*"],"type":"*"}],"resources":[null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},"action_reason":"read_because_config_unknown"},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[{"test":"IpAddress","values":["127.0.0.1/32"],"variable":"aws:SourceIp"}],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[{"identifiers":["*"],"type":"*"}],"resources":[null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"opensearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":true,"document_id_options":[],"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-3","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"aiml_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"node_options":true,"zone_awareness_config":[]}],"cognito_options":[],"dashboard_endpoint":true,"dashboard_endpoint_v2":true,"domain_endpoint_options":true,"domain_endpoint_v2_hosted_zone_id":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"endpoint_v2":true,"engine_version":true,"id":true,"identity_center_options":[],"ip_address_type":true,"log_publishing_options":[],"node_to_node_encryption":true,"off_peak_window_options":true,"snapshot_options":[],"software_update_options":true,"tags_all":true,"vpc_options":[]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[]}}},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"domain_name":"es-test-3","region":"us-east-1","timeouts":null},"after_unknown":{"access_policies":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryseventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"opensearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-opensearch.json","data.aws_iam_policy_document.firehose-opensearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearch"},"name":{"constant_value":"terraform-kinesis-firehose-os"},"opensearch_configuration":[{"domain_arn":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryseventh.arn","aws_s3_bucket.januaryseventh"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-opensearch"]},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"m4.large.search"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test-3"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}]},"schema_version":0},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_config_key":"aws","expressions":{"access_policies":{"references":["data.aws_iam_policy_document.main.json","data.aws_iam_policy_document.main"]},"domain_name":{"references":["aws_opensearch_domain.test_cluster.domain_name","aws_opensearch_domain.test_cluster"]}},"schema_version":0},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryseventh"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster","aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"condition":[{"test":{"constant_value":"IpAddress"},"values":{"constant_value":["127.0.0.1/32"]},"variable":{"constant_value":"aws:SourceIp"}}],"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["*"]},"type":{"constant_value":"*"}}],"resources":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose-opensearch","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_s3_bucket.januaryseventh","attribute":["arn"]},{"resource":"data.aws_iam_policy_document.main","attribute":["json"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["domain_name"]}],"timestamp":"2026-02-18T20:52:38Z","applyable":true,"complete":true,"errored":false}
42
We need a way to move our app’s event data into our analytics tool quickly, with a fallback so we don’t lose anything if the primary path has issues.
Generate a Kinesis Firehose Delivery Stream with a Splunk destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "splunk_configuration" block
provider "aws" { region = "us-west-2" } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } resource "aws_s3_bucket" "januaryfifth" { bucket = "januaryfifth" } resource "aws_kinesis_firehose_delivery_stream" "test_stream" { name = "terraform-kinesis-firehose-test-stream" destination = "splunk" splunk_configuration { hec_endpoint = "https://http-inputs-mydomain.splunkcloud.com:443" hec_token = "51D4DA16-C61B-4F5F-8EC7-ED4301342A4A" hec_acknowledgment_timeout = 600 hec_endpoint_type = "Event" s3_backup_mode = "FailedEventsOnly" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januaryfifth.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "splunk" resource.values.splunk_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.splunk_configuration[_].s3_configuration[_].bucket_arn role.expressions.splunk_configuration[_].s3_configuration[_].role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"splunk","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"buffering_interval":60,"buffering_size":5,"hec_acknowledgment_timeout":600,"hec_endpoint":"https://http-inputs-mydomain.splunkcloud.com:443","hec_endpoint_type":"Event","hec_token":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A","processing_configuration":[],"retry_duration":3600,"s3_backup_mode":"FailedEventsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}]}],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"tags_all":{}}},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryfifth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"splunk","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"buffering_interval":60,"buffering_size":5,"hec_acknowledgment_timeout":600,"hec_endpoint":"https://http-inputs-mydomain.splunkcloud.com:443","hec_endpoint_type":"Event","hec_token":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A","processing_configuration":[],"retry_duration":3600,"s3_backup_mode":"FailedEventsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}]}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":true,"processing_configuration":[],"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"tags_all":{}}}},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryfifth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"splunk"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"splunk_configuration":[{"hec_acknowledgment_timeout":{"constant_value":600},"hec_endpoint":{"constant_value":"https://http-inputs-mydomain.splunkcloud.com:443"},"hec_endpoint_type":{"constant_value":"Event"},"hec_token":{"constant_value":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A"},"s3_backup_mode":{"constant_value":"FailedEventsOnly"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryfifth.arn","aws_s3_bucket.januaryfifth"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryfifth"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.januaryfifth","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:36Z","applyable":true,"complete":true,"errored":false}
43
We need a way to take a steady flow of app events and push them into a search-friendly system in near real time, with some kind of fallback storage so we don’t lose data if the main target is slow or unavailable.
Generate a Kinesis Firehose Delivery Stream with a OpenSearch Serverless Destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearchserverless_security_policy" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "opensearchserverless_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } data "aws_region" "current" {} data "aws_caller_identity" "current" {} resource "aws_iam_role" "firehose_role" { name = "firehose_opensearch_role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Principal = { Service = "firehose.amazonaws.com" }, Action = "sts:AssumeRole" } ] }) } resource "aws_iam_policy" "firehose_policy" { name = "firehose_opensearch_s3_policy" description = "Policy for Kinesis Firehose to access S3 and OpenSearch Serverless" policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Action = [ "s3:PutObject", "s3:PutObjectAcl", "s3:GetBucketLocation", "s3:ListBucket", "s3:GetObject" ], Resource = [ aws_s3_bucket.januarysixth.arn, "${aws_s3_bucket.januarysixth.arn}/*" ] }, { Effect = "Allow", Action = [ "es:ESHttpPut", "es:ESHttpPost", "es:ESHttpGet" ], Resource = [ "arn:aws:es:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:collection/${aws_opensearchserverless_collection.test_collection.name}/*", ] } ] }) } resource "aws_iam_role_policy_attachment" "firehose_policy_attach" { role = aws_iam_role.firehose_role.name policy_arn = aws_iam_policy.firehose_policy.arn } resource "aws_s3_bucket" "januarysixth" { bucket = "januarysixth" } resource "aws_opensearchserverless_security_policy" "example" { name = "example" type = "encryption" policy = jsonencode({ "Rules" = [ { "Resource" = [ "collection/example" ], "ResourceType" = "collection" } ], "AWSOwnedKey" = true }) } resource "aws_opensearchserverless_collection" "test_collection" { name = "example" depends_on = [aws_opensearchserverless_security_policy.example] } resource "aws_kinesis_firehose_delivery_stream" "test_stream" { name = "terraform-kinesis-firehose-test-stream" destination = "opensearchserverless" opensearchserverless_configuration { collection_endpoint = aws_opensearchserverless_collection.test_collection.collection_endpoint role_arn = aws_iam_role.firehose_role.arn index_name = "test" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januarysixth.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_opensearchserverless_collection { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_opensearchserverless_collection" resource.values.name } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "opensearchserverless" resource.values.opensearchserverless_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.opensearchserverless_configuration[_].role_arn role.expressions.opensearchserverless_configuration[_].collection_endpoint } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_opensearchserverless_collection has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless","name":"firehose_opensearch_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_opensearch_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_opensearch_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearchserverless","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[{"buffering_interval":300,"buffering_size":5,"index_name":"test","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"vpc_config":[]}],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"name":"example","region":"us-east-1","tags":null,"tags_all":{},"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"name":"example","policy":"{\"AWSOwnedKey\":true,\"Rules\":[{\"Resource\":[\"collection/example\"],\"ResourceType\":\"collection\"}]}","region":"us-east-1","type":"encryption"},"sensitive_values":{}},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysixth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless","name":"firehose_opensearch_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_opensearch_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_opensearch_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearchserverless","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[{"buffering_interval":300,"buffering_size":5,"index_name":"test","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"vpc_config":[]}],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":true,"collection_endpoint":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"example","region":"us-east-1","tags":null,"tags_all":{},"timeouts":null},"after_unknown":{"arn":true,"collection_endpoint":true,"dashboard_endpoint":true,"id":true,"kms_key_arn":true,"standby_replicas":true,"tags_all":{},"type":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"example","policy":"{\"AWSOwnedKey\":true,\"Rules\":[{\"Resource\":[\"collection/example\"],\"ResourceType\":\"collection\"}]}","region":"us-east-1","type":"encryption"},"after_unknown":{"id":true,"policy_version":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysixth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_caller_identity.current","mode":"data","type":"aws_caller_identity","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"account_id":"536697244362","arn":"arn:aws:iam::536697244362:user/ec2-user","id":"536697244362","user_id":"AIDAXZ5NGBLFCHNECOU5B"},"sensitive_values":{}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless"},"name":{"constant_value":"firehose_opensearch_s3_policy"},"policy":{"references":["aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth","aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth","data.aws_region.current.name","data.aws_region.current","data.aws_caller_identity.current.account_id","data.aws_caller_identity.current","aws_opensearchserverless_collection.test_collection.name","aws_opensearchserverless_collection.test_collection"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_opensearch_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_policy.arn","aws_iam_policy.firehose_policy"]},"role":{"references":["aws_iam_role.firehose_role.name","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearchserverless"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"opensearchserverless_configuration":[{"collection_endpoint":{"references":["aws_opensearchserverless_collection.test_collection.collection_endpoint","aws_opensearchserverless_collection.test_collection"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"}},"schema_version":0,"depends_on":["aws_opensearchserverless_security_policy.example"]},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"policy":{},"type":{"constant_value":"encryption"}},"schema_version":0},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysixth"}},"schema_version":0},{"address":"data.aws_caller_identity.current","mode":"data","type":"aws_caller_identity","name":"current","provider_config_key":"aws","schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_policy.firehose_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_opensearchserverless_collection.test_collection","attribute":["collection_endpoint"]},{"resource":"data.aws_caller_identity.current","attribute":["account_id"]},{"resource":"data.aws_region.current","attribute":["name"]},{"resource":"aws_s3_bucket.januarysixth","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["name"]},{"resource":"aws_opensearchserverless_collection.test_collection","attribute":["name"]}],"timestamp":"2026-02-18T20:52:47Z","applyable":true,"complete":true,"errored":false}
44
We need a way to collect a steady stream of app events, move them reliably into our search and analytics system, and keep everything running inside our private network for security.
Generate a Kinesis Firehose Delivery Stream with a Elasticsearch Destination With VPC
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_elasticsearch_domain" resource, one "aws_vpc" resource, two "aws_subnet" resources, one "aws_security_group," and one "aws_kinesis_firehose_delivery_stream" resource with a "vpc_config" block within the "elasticsearch_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "bucket" { bucket_prefix = "my-bucket-" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } # Subnets resource "aws_subnet" "first" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "second" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[1] } resource "aws_internet_gateway" "main" { vpc_id = aws_vpc.main.id } resource "aws_route_table" "main" { vpc_id = aws_vpc.main.id route { cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.main.id } } resource "aws_route_table_association" "first" { subnet_id = aws_subnet.first.id route_table_id = aws_route_table.main.id } resource "aws_route_table_association" "second" { subnet_id = aws_subnet.second.id route_table_id = aws_route_table.main.id } resource "aws_security_group" "first" { name = "test-security-group" description = "Allow traffic for Elasticsearch" vpc_id = aws_vpc.main.id } resource "aws_vpc_security_group_ingress_rule" "ingress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 80 ip_protocol = "tcp" to_port = 80 } resource "aws_vpc_security_group_ingress_rule" "ingress2" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 443 ip_protocol = "tcp" to_port = 443 } resource "aws_vpc_security_group_ingress_rule" "ingress3" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 9200 ip_protocol = "tcp" to_port = 9200 } resource "aws_vpc_security_group_egress_rule" "egress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" ip_protocol = "-1" } resource "aws_elasticsearch_domain" "test_cluster" { domain_name = "es-test" cluster_config { instance_count = 2 zone_awareness_enabled = true instance_type = "t2.small.elasticsearch" } ebs_options { ebs_enabled = true volume_size = 10 } vpc_options { security_group_ids = [aws_security_group.first.id] subnet_ids = [aws_subnet.first.id, aws_subnet.second.id] } } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } data "aws_iam_policy_document" "firehose-elasticsearch" { statement { effect = "Allow" actions = ["es:*"] resources = [ aws_elasticsearch_domain.test_cluster.arn, "${aws_elasticsearch_domain.test_cluster.arn}/*", ] } statement { effect = "Allow" actions = [ "ec2:DescribeVpcs", "ec2:DescribeVpcAttribute", "ec2:DescribeSubnets", "ec2:DescribeSecurityGroups", "ec2:DescribeNetworkInterfaces", "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission", "ec2:DeleteNetworkInterface", ] resources = ["*"] } } resource "aws_iam_role_policy" "firehose-elasticsearch" { name = "elasticsearch" role = aws_iam_role.firehose_role.id policy = data.aws_iam_policy_document.firehose-elasticsearch.json } resource "aws_kinesis_firehose_delivery_stream" "test" { depends_on = [aws_iam_role_policy.firehose-elasticsearch] name = "terraform-kinesis-firehose-es" destination = "elasticsearch" elasticsearch_configuration { domain_arn = aws_elasticsearch_domain.test_cluster.arn role_arn = aws_iam_role.firehose_role.arn index_name = "test" type_name = "test" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.bucket.arn } vpc_config { subnet_ids = [aws_subnet.first.id, aws_subnet.second.id] security_group_ids = [aws_security_group.first.id] role_arn = aws_iam_role.firehose_role.arn } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_elasticsearch_cluster { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_elasticsearch_domain" resource.values.domain_name resource.values.vpc_options } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "elasticsearch" resource.values.elasticsearch_configuration[_].s3_configuration resource.values.elasticsearch_configuration[_].vpc_config role := input.configuration.root_module.resources[i] role.expressions.elasticsearch_configuration[_].role_arn role.expressions.elasticsearch_configuration[_].domain_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_elasticsearch_cluster has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elasticsearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[{}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"sensitive_values":{"tags_all":{}}},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null},{"actions":["ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface","ec2:DescribeNetworkInterfaces","ec2:DescribeSecurityGroups","ec2:DescribeSubnets","ec2:DescribeVpcAttribute","ec2:DescribeVpcs"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":["*"],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null},{"actions":["ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface","ec2:DescribeNetworkInterfaces","ec2:DescribeSecurityGroups","ec2:DescribeSubnets","ec2:DescribeVpcAttribute","ec2:DescribeVpcs"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":["*"],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"id":true,"kibana_endpoint":true,"log_publishing_options":[],"node_to_node_encryption":true,"snapshot_options":[],"tags_all":true,"vpc_options":[{"availability_zones":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elasticsearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[{}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[{"cloudwatch_logging_options":true,"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[{"role_arn":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"t2.small.elasticsearch"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}],"vpc_options":[{"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"elasticsearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-elasticsearch.json","data.aws_iam_policy_document.firehose-elasticsearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"elasticsearch"},"elasticsearch_configuration":[{"domain_arn":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.bucket.arn","aws_s3_bucket.bucket"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"type_name":{"constant_value":"test"},"vpc_config":[{"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]}],"name":{"constant_value":"terraform-kinesis-firehose-es"}},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-elasticsearch"]},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.first.id","aws_subnet.first"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.second.id","aws_subnet.second"]}},"schema_version":0},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"my-bucket-"}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":80},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":80}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":443},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":443}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":9200},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":9200}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster","aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]}},{"actions":{"constant_value":["ec2:DescribeVpcs","ec2:DescribeVpcAttribute","ec2:DescribeSubnets","ec2:DescribeSecurityGroups","ec2:DescribeNetworkInterfaces","ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface"]},"effect":{"constant_value":"Allow"},"resources":{"constant_value":["*"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]},{"resource":"aws_s3_bucket.bucket","attribute":["arn"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_subnet.first","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose-elasticsearch","attribute":["json"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_subnet.second","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]}],"timestamp":"2026-02-18T20:53:07Z","applyable":true,"complete":true,"errored":false}
45
We need a way to send our app’s event data to an external monitoring service in near real‑time, with a fallback so nothing gets lost if the service slows down or goes offline.
Generate a Kinesis Firehose Delivery Stream with a HTTP Endpoint (e.g., New Relic) Destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "http_endpoint_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "firehose_role2" { name = "firehose_http_s3_role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Principal = { Service = "firehose.amazonaws.com" }, Action = "sts:AssumeRole" } ] }) } resource "aws_iam_policy" "firehose_http_s3_policy" { name = "firehose_http_s3_policy" description = "Policy for Kinesis Firehose to access S3 and HTTP endpoint" policy = jsonencode({ Version = "2012-10-17", Statement = [ { Effect = "Allow", Action = [ "s3:PutObject", "s3:PutObjectAcl", "s3:GetBucketLocation", "s3:ListBucket", "s3:GetObject" ], Resource = [ aws_s3_bucket.januaryeleventh.arn, "${aws_s3_bucket.januaryeleventh.arn}/*" ] }, { Effect = "Allow", Action = [ "firehose:PutRecord", "firehose:PutRecordBatch" ], Resource = "*" }, { Effect = "Allow", Action = [ "firehose:DescribeDeliveryStream", "firehose:ListDeliveryStreams", "firehose:DescribeDestinations", "firehose:DescribeHttpEndpointDestination", "firehose:UpdateDestination" ], Resource = "*" } ] }) } resource "aws_iam_role_policy_attachment" "firehose_http_s3_policy_attach" { role = aws_iam_role.firehose_role2.name policy_arn = aws_iam_policy.firehose_http_s3_policy.arn } resource "aws_s3_bucket" "januaryeleventh" { bucket = "januaryeleventh" } resource "aws_kinesis_firehose_delivery_stream" "test_stream" { name = "terraform-kinesis-firehose-test-stream" destination = "http_endpoint" http_endpoint_configuration { url = "https://aws-api.newrelic.com/firehose/v1" name = "New Relic" access_key = "my-key" buffering_size = 15 buffering_interval = 600 role_arn = aws_iam_role.firehose_role2.arn s3_backup_mode = "FailedDataOnly" s3_configuration { role_arn = aws_iam_role.firehose_role2.arn bucket_arn = aws_s3_bucket.januaryeleventh.arn buffering_size = 10 buffering_interval = 400 compression_format = "GZIP" } request_configuration { content_encoding = "GZIP" common_attributes { name = "testname" value = "testvalue" } common_attributes { name = "testname2" value = "testvalue2" } } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "http_endpoint" resource.values.http_endpoint_configuration[_] resource.values.http_endpoint_configuration[_].s3_configuration role := input.configuration.root_module.resources[i] role.expressions.http_endpoint_configuration[_].role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and HTTP endpoint","name":"firehose_http_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_http_s3_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_http_s3_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"http_endpoint","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":"my-key","buffering_interval":600,"buffering_size":15,"name":"New Relic","processing_configuration":[],"request_configuration":[{"common_attributes":[{"name":"testname","value":"testvalue"},{"name":"testname2","value":"testvalue2"}],"content_encoding":"GZIP"}],"retry_duration":300,"s3_backup_mode":"FailedDataOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"url":"https://aws-api.newrelic.com/firehose/v1"}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":true,"cloudwatch_logging_options":[],"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryeleventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and HTTP endpoint","name":"firehose_http_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_http_s3_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_http_s3_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"http_endpoint","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":"my-key","buffering_interval":600,"buffering_size":15,"name":"New Relic","processing_configuration":[],"request_configuration":[{"common_attributes":[{"name":"testname","value":"testvalue"},{"name":"testname2","value":"testvalue2"}],"content_encoding":"GZIP"}],"retry_duration":300,"s3_backup_mode":"FailedDataOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"url":"https://aws-api.newrelic.com/firehose/v1"}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"cloudwatch_logging_options":true,"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":true,"cloudwatch_logging_options":[],"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryeleventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and HTTP endpoint"},"name":{"constant_value":"firehose_http_s3_policy"},"policy":{"references":["aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh","aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_http_s3_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_http_s3_policy.arn","aws_iam_policy.firehose_http_s3_policy"]},"role":{"references":["aws_iam_role.firehose_role2.name","aws_iam_role.firehose_role2"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"http_endpoint"},"http_endpoint_configuration":[{"access_key":{"constant_value":"my-key"},"buffering_interval":{"constant_value":600},"buffering_size":{"constant_value":15},"name":{"constant_value":"New Relic"},"request_configuration":[{"common_attributes":[{"name":{"constant_value":"testname"},"value":{"constant_value":"testvalue"}},{"name":{"constant_value":"testname2"},"value":{"constant_value":"testvalue2"}}],"content_encoding":{"constant_value":"GZIP"}}],"role_arn":{"references":["aws_iam_role.firehose_role2.arn","aws_iam_role.firehose_role2"]},"s3_backup_mode":{"constant_value":"FailedDataOnly"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role2.arn","aws_iam_role.firehose_role2"]}}],"url":{"constant_value":"https://aws-api.newrelic.com/firehose/v1"}}],"name":{"constant_value":"terraform-kinesis-firehose-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryeleventh"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_policy.firehose_http_s3_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role2","attribute":["name"]},{"resource":"aws_iam_role.firehose_role2","attribute":["arn"]},{"resource":"aws_s3_bucket.januaryeleventh","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:21Z","applyable":true,"complete":true,"errored":false}
46
We need a way to move our app’s streaming data into our search and analytics tool in near real time, and the whole thing has to run inside our private network for security.
Generate a Kinesis Firehose Delivery Stream with OpenSearch Destination With VPC
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearch_domain" resource, one "aws_vpc" resource, two "aws_subnet" resources, one "aws_security_group," and one "aws_kinesis_firehose_delivery_stream" resource with a "vpc_config" block within the "opensearch_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "bucket" { bucket_prefix = "my-bucket-" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } # Subnets resource "aws_subnet" "first" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "second" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[1] } resource "aws_internet_gateway" "main" { vpc_id = aws_vpc.main.id } resource "aws_route_table" "main" { vpc_id = aws_vpc.main.id route { cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.main.id } } resource "aws_route_table_association" "first" { subnet_id = aws_subnet.first.id route_table_id = aws_route_table.main.id } resource "aws_route_table_association" "second" { subnet_id = aws_subnet.second.id route_table_id = aws_route_table.main.id } resource "aws_security_group" "first" { name = "test-security-group" description = "Allow traffic for Elasticsearch" vpc_id = aws_vpc.main.id } resource "aws_vpc_security_group_ingress_rule" "ingress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 80 ip_protocol = "tcp" to_port = 80 } resource "aws_vpc_security_group_ingress_rule" "ingress2" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 443 ip_protocol = "tcp" to_port = 443 } resource "aws_vpc_security_group_ingress_rule" "ingress3" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" from_port = 9200 ip_protocol = "tcp" to_port = 9200 } resource "aws_vpc_security_group_egress_rule" "egress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" ip_protocol = "-1" } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } resource "aws_iam_role_policy" "firehose-opensearch" { name = "opensearch" role = aws_iam_role.firehose_role.id policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "es:*" ], "Resource": [ "${aws_opensearch_domain.test_cluster.arn}", "${aws_opensearch_domain.test_cluster.arn}/*" ] }, { "Effect": "Allow", "Action": [ "ec2:DescribeVpcs", "ec2:DescribeVpcAttribute", "ec2:DescribeSubnets", "ec2:DescribeSecurityGroups", "ec2:DescribeNetworkInterfaces", "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission", "ec2:DeleteNetworkInterface" ], "Resource": [ "*" ] } ] } EOF } resource "aws_opensearch_domain" "test_cluster" { domain_name = "es-test" cluster_config { instance_count = 2 zone_awareness_enabled = true instance_type = "m4.large.search" } ebs_options { ebs_enabled = true volume_size = 10 } vpc_options { security_group_ids = [aws_security_group.first.id] subnet_ids = [aws_subnet.first.id, aws_subnet.second.id] } } resource "aws_kinesis_firehose_delivery_stream" "test" { depends_on = [aws_iam_role_policy.firehose-opensearch] name = "terraform-kinesis-firehose-os" destination = "opensearch" opensearch_configuration { domain_arn = aws_opensearch_domain.test_cluster.arn role_arn = aws_iam_role.firehose_role.arn index_name = "test" s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.bucket.arn } vpc_config { subnet_ids = [aws_subnet.first.id, aws_subnet.second.id] security_group_ids = [aws_security_group.first.id] role_arn = aws_iam_role.firehose_role.arn } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_opensearch_cluster { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_opensearch_domain" resource.values.domain_name resource.values.vpc_options } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "opensearch" resource.values.opensearch_configuration[_].s3_configuration resource.values.opensearch_configuration[_].vpc_config role := input.configuration.root_module.resources[i] role.expressions.opensearch_configuration[_].role_arn role.expressions.opensearch_configuration[_].domain_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_opensearch_cluster has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"opensearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[{}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"opensearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[{}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":true,"document_id_options":[],"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[{"role_arn":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"aiml_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"node_options":true,"zone_awareness_config":[]}],"cognito_options":[],"dashboard_endpoint":true,"dashboard_endpoint_v2":true,"domain_endpoint_options":true,"domain_endpoint_v2_hosted_zone_id":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"endpoint_v2":true,"engine_version":true,"id":true,"identity_center_options":[],"ip_address_type":true,"log_publishing_options":[],"node_to_node_encryption":true,"off_peak_window_options":true,"snapshot_options":[],"software_update_options":true,"tags_all":true,"vpc_options":[{"availability_zones":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"opensearch"},"policy":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster","aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearch"},"name":{"constant_value":"terraform-kinesis-firehose-os"},"opensearch_configuration":[{"domain_arn":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.bucket.arn","aws_s3_bucket.bucket"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"vpc_config":[{"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]}]},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-opensearch"]},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"m4.large.search"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}],"vpc_options":[{"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]},"schema_version":0},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.first.id","aws_subnet.first"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.second.id","aws_subnet.second"]}},"schema_version":0},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"my-bucket-"}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":80},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":80}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":443},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":443}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":9200},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":9200}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]},{"resource":"aws_subnet.first","attribute":["id"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_subnet.second","attribute":["id"]},{"resource":"aws_s3_bucket.bucket","attribute":["arn"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:53:13Z","applyable":true,"complete":true,"errored":false}
47
I need a simple place where I can send live video feeds so they can be stored briefly and accessed by whatever needs to process them.
Generate a basic Kinesis Video Stream resource
Has one "aws_kinesis_video_stream" resource
provider "aws" { region = "us-east-1" } resource "aws_kinesis_video_stream" "default" { name = "terraform-kinesis-video-stream" data_retention_in_hours = 1 device_name = "kinesis-video-device-name" media_type = "video/h264" tags = { Name = "terraform-kinesis-video-stream" } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_kinesis_video_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_video_stream" resource.values.name } has_valid_resources { has_valid_kinesis_video_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"data_retention_in_hours":1,"device_name":"kinesis-video-device-name","media_type":"video/h264","name":"terraform-kinesis-video-stream","region":"us-east-1","tags":{"Name":"terraform-kinesis-video-stream"},"tags_all":{"Name":"terraform-kinesis-video-stream"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"data_retention_in_hours":1,"device_name":"kinesis-video-device-name","media_type":"video/h264","name":"terraform-kinesis-video-stream","region":"us-east-1","tags":{"Name":"terraform-kinesis-video-stream"},"tags_all":{"Name":"terraform-kinesis-video-stream"},"timeouts":null},"after_unknown":{"arn":true,"creation_time":true,"id":true,"kms_key_id":true,"tags":{},"tags_all":{},"version":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_config_key":"aws","expressions":{"data_retention_in_hours":{"constant_value":1},"device_name":{"constant_value":"kinesis-video-device-name"},"media_type":{"constant_value":"video/h264"},"name":{"constant_value":"terraform-kinesis-video-stream"},"tags":{"constant_value":{"Name":"terraform-kinesis-video-stream"}}},"schema_version":0}]}},"timestamp":"2026-02-18T20:53:21Z","applyable":true,"complete":true,"errored":false}
48
I need a way for one of our background services to reliably tap into a stream of incoming events so it can process them in real time without missing anything.
Generate a resource to manage a Kinesis Stream Consumer
Has one "aws_kinesis_stream" resource and one "aws_kinesis_stream_consumer" resource
provider "aws" { region = "us-west-2" } resource "aws_kinesis_stream" "example" { name = "example-stream" shard_count = 1 } resource "aws_kinesis_stream_consumer" "example" { name = "example-consumer" stream_arn = aws_kinesis_stream.example.arn }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_kinesis_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_stream" resource.values.name } has_valid_kinesis_stream_consumer { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_stream_consumer" resource.values.name role := input.configuration.root_module.resources[i] role.expressions.stream_arn } has_valid_resources { has_valid_kinesis_stream has_valid_kinesis_stream_consumer }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"example-stream","region":"us-west-2","retention_period":24,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"sensitive_values":{"stream_mode_details":[],"tags_all":{}}},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"example-consumer","region":"us-west-2","tags":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"example-stream","region":"us-west-2","retention_period":24,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"stream_mode_details":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"stream_mode_details":[],"tags_all":{}}}},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"example-consumer","region":"us-west-2","tags":null},"after_unknown":{"arn":true,"creation_timestamp":true,"id":true,"stream_arn":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-stream"},"shard_count":{"constant_value":1}},"schema_version":1},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-consumer"},"stream_arn":{"references":["aws_kinesis_stream.example.arn","aws_kinesis_stream.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_kinesis_stream.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:25Z","applyable":true,"complete":true,"errored":false}
49
We need a way to funnel high‑volume app data into long‑term storage automatically, with something that can smooth out traffic spikes and keep things reliable without much manual work.
Generate a Kinesis Firehose Delivery Stream with an extended S3 Destination
Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "extended_s3_configuration" block
provider "aws" { region = "us-west-2" } resource "aws_s3_bucket" "januarysixteenth" { bucket = "januarysixteenth" } data "aws_iam_policy_document" "firehose_assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["firehose.amazonaws.com"] } actions = ["sts:AssumeRole"] } } resource "aws_iam_role" "firehose_role" { name = "firehose_test_role" assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json } resource "aws_kinesis_firehose_delivery_stream" "extended_s3_stream" { name = "terraform-kinesis-firehose-extended-s3-test-stream" destination = "extended_s3" extended_s3_configuration { role_arn = aws_iam_role.firehose_role.arn bucket_arn = aws_s3_bucket.januarysixteenth.arn } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com") } has_valid_bucket { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket" } has_valid_firehose_delivery_stream { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_firehose_delivery_stream" resource.values.name resource.values.destination == "extended_s3" resource.values.extended_s3_configuration[_] role := input.configuration.root_module.resources[i] role.expressions.extended_s3_configuration[_].role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_bucket has_valid_firehose_delivery_stream }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"error_output_prefix":null,"file_extension":null,"kms_key_arn":null,"prefix":null,"processing_configuration":[],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysixteenth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"error_output_prefix":null,"file_extension":null,"kms_key_arn":null,"prefix":null,"processing_configuration":[],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"role_arn":true,"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysixteenth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"extended_s3"},"extended_s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysixteenth.arn","aws_s3_bucket.januarysixteenth"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"name":{"constant_value":"terraform-kinesis-firehose-extended-s3-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysixteenth"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.januarysixteenth","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:30Z","applyable":true,"complete":true,"errored":false}
50
I need a simple way to analyze streaming data as it comes in, nothing fancy, just enough to get something running quickly.
Generate a basic Amazon Kinesis Analytics Application
Has one "aws_kinesis_analytics_application" resource
provider "aws" { region = "us-west-2" } resource "aws_kinesis_analytics_application" "test_application" { name = "kinesis-analytics-application-test" }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_kinesis_analytics_application { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesis_analytics_application" resource.values.name } has_valid_resources { has_valid_kinesis_analytics_application }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-west-2","start_application":null,"tags":null},"sensitive_values":{"cloudwatch_logging_options":[],"inputs":[],"outputs":[],"reference_data_sources":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-west-2","start_application":null,"tags":null},"after_unknown":{"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"inputs":[],"last_update_timestamp":true,"outputs":[],"reference_data_sources":[],"status":true,"tags_all":true,"version":true},"before_sensitive":false,"after_sensitive":{"cloudwatch_logging_options":[],"inputs":[],"outputs":[],"reference_data_sources":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"kinesis-analytics-application-test"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:53:43Z","applyable":true,"complete":true,"errored":false}
51
I need a small setup that can run some ongoing data queries for me, without requiring much maintenance and able to scale as needed.
Generate a basic Amazon Kinesis V2 Analytics Application to manage a SQL application
Has one "aws_iam_role" resource, and one "aws_kinesisanalyticsv2_application" with argument runtime_environment == "SQL-1_0"
provider "aws" { region = "us-west-2" } data "aws_iam_policy_document" "KinesisAssume" { statement { effect = "Allow" actions = ["sts:AssumeRole"] principals { type = "Service" identifiers = ["kinesisanalytics.amazonaws.com"] } } } resource "aws_iam_role" "kinesis_role" { name = "kinesis_role" assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json } resource "aws_kinesisanalyticsv2_application" "flink_app" { name = "example-application1" runtime_environment = "SQL-1_0" service_execution_role = aws_iam_role.kinesis_role.arn }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com") } has_valid_kinesisanalyticsv2_application { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kinesisanalyticsv2_application" resource.values.name resource.values.runtime_environment == "SQL-1_0" role := input.configuration.root_module.resources[i] role.expressions.service_execution_role } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kinesisanalyticsv2_application }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"SQL-1_0","start_application":null,"tags":null,"timeouts":null},"sensitive_values":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"SQL-1_0","start_application":null,"tags":null,"timeouts":null},"after_unknown":{"application_configuration":true,"application_mode":true,"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"last_update_timestamp":true,"service_execution_role":true,"status":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-application1"},"runtime_environment":{"constant_value":"SQL-1_0"},"service_execution_role":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:47Z","applyable":true,"complete":true,"errored":false}
52
I need to pull information from a site our system can’t reach directly, and it should grab the content automatically on a regular basis while going through our own network path for security.
Generate a Kendra data source resource with a proxy configuration
Has one "aws_iam_role" resource, one "aws_kendra_index" resource, and one "aws_kendra_data_source" resource with a "proxy_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "role" { name = "Kendra-Role" assume_role_policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Principal": { "Service": "kendra.amazonaws.com" }, "Effect": "Allow", "Sid": "" } ] } EOF } resource "aws_iam_role_policy" "policy" { name = "Kendra-Policy" role = aws_iam_role.role.id policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": "*" } ] } EOF } resource "aws_kendra_index" "example" { name = "example" description = "example" edition = "DEVELOPER_EDITION" role_arn = aws_iam_role.role.arn } resource "aws_kendra_data_source" "example" { index_id = aws_kendra_index.example.id name = "example" type = "WEBCRAWLER" role_arn = aws_iam_role.role.arn configuration { web_crawler_configuration { proxy_configuration { host = "a.example.com" port = "443" } urls { seed_url_configuration { seed_urls = [ "https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html" ] } } } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com") } has_valid_kendra_index { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_index" resource.values.name role := input.configuration.root_module.resources[i] role.expressions.role_arn } has_valid_kendra_data_source{ some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_data_source" resource.values.name resource.values.type resource.values.configuration[_].web_crawler_configuration[_].proxy_configuration role := input.configuration.root_module.resources[i] role.expressions.role_arn role.expressions.index_id } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kendra_index has_valid_kendra_data_source }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[{"credentials":null,"host":"a.example.com","port":443}],"url_exclusion_patterns":null,"url_inclusion_patterns":null,"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"sensitive_values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[{"credentials":null,"host":"a.example.com","port":443}],"url_exclusion_patterns":null,"url_inclusion_patterns":null,"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"after_unknown":{"arn":true,"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"created_at":true,"custom_document_enrichment_configuration":[],"data_source_id":true,"error_message":true,"id":true,"index_id":true,"language_code":true,"role_arn":true,"status":true,"tags_all":true,"updated_at":true},"before_sensitive":false,"after_sensitive":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_config_key":"aws","expressions":{"configuration":[{"web_crawler_configuration":[{"proxy_configuration":[{"host":{"constant_value":"a.example.com"},"port":{"constant_value":"443"}}],"urls":[{"seed_url_configuration":[{"seed_urls":{"constant_value":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"]}}]}]}]}],"index_id":{"references":["aws_kendra_index.example.id","aws_kendra_index.example"]},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"type":{"constant_value":"WEBCRAWLER"}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"description":{"constant_value":"example"},"edition":{"constant_value":"DEVELOPER_EDITION"},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]},{"resource":"aws_kendra_index.example","attribute":["id"]}],"timestamp":"2026-02-18T20:53:49Z","applyable":true,"complete":true,"errored":false}
53
I need a system that can scan information from a site we point it to, but only pay attention to certain parts of it while ignoring others, and it should be easy to control what gets included or skipped.
Generate a Kendra data source resource With URL Exclusion and Inclusion Patterns
Has one "aws_iam_role" resource, one "aws_kendra_index" resource, and one "aws_kendra_data_source" resource with "url_exclusion_patterns" and "url_inclusion_patterns"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "role" { name = "Kendra-Role" assume_role_policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Principal": { "Service": "kendra.amazonaws.com" }, "Effect": "Allow", "Sid": "" } ] } EOF } resource "aws_iam_role_policy" "policy" { name = "Kendra-Policy" role = aws_iam_role.role.id policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": "*" } ] } EOF } resource "aws_kendra_index" "example" { name = "example" description = "example" edition = "DEVELOPER_EDITION" role_arn = aws_iam_role.role.arn } resource "aws_kendra_data_source" "example" { index_id = aws_kendra_index.example.id name = "example" type = "WEBCRAWLER" role_arn = aws_iam_role.role.arn configuration { web_crawler_configuration { url_exclusion_patterns = ["example"] url_inclusion_patterns = ["hello"] urls { seed_url_configuration { seed_urls = [ "https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html" ] } } } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com") } has_valid_kendra_index { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_index" resource.values.name role := input.configuration.root_module.resources[i] role.expressions.role_arn } has_valid_kendra_data_source{ some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_data_source" resource.values.name resource.values.type resource.values.configuration[_].web_crawler_configuration[_].url_exclusion_patterns resource.values.configuration[_].web_crawler_configuration[_].url_inclusion_patterns role := input.configuration.root_module.resources[i] role.expressions.role_arn role.expressions.index_id } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kendra_index has_valid_kendra_data_source }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[],"url_exclusion_patterns":["example"],"url_inclusion_patterns":["hello"],"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"sensitive_values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[],"url_exclusion_patterns":["example"],"url_inclusion_patterns":["hello"],"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"after_unknown":{"arn":true,"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"created_at":true,"custom_document_enrichment_configuration":[],"data_source_id":true,"error_message":true,"id":true,"index_id":true,"language_code":true,"role_arn":true,"status":true,"tags_all":true,"updated_at":true},"before_sensitive":false,"after_sensitive":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_config_key":"aws","expressions":{"configuration":[{"web_crawler_configuration":[{"url_exclusion_patterns":{"constant_value":["example"]},"url_inclusion_patterns":{"constant_value":["hello"]},"urls":[{"seed_url_configuration":[{"seed_urls":{"constant_value":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"]}}]}]}]}],"index_id":{"references":["aws_kendra_index.example.id","aws_kendra_index.example"]},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"type":{"constant_value":"WEBCRAWLER"}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"description":{"constant_value":"example"},"edition":{"constant_value":"DEVELOPER_EDITION"},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]},{"resource":"aws_kendra_index.example","attribute":["id"]}],"timestamp":"2026-02-18T20:53:53Z","applyable":true,"complete":true,"errored":false}
54
I need a searchable place for all our internal content, and it should understand a few basic details about each item so results feel reasonably relevant without me having to fine‑tune anything.
Generate a basic Kendra index resource with the default Document Metadata Configuration Updates
Has one "aws_iam_role" resource and one "aws_kendra_index" resource with all default "document_metadata_configuration_updates" set
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "role" { name = "Kendra-Role" assume_role_policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Principal": { "Service": "kendra.amazonaws.com" }, "Effect": "Allow", "Sid": "" } ] } EOF } resource "aws_iam_role_policy" "policy" { name = "Kendra-Policy" role = aws_iam_role.role.id policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": "*" } ] } EOF } resource "aws_kendra_index" "example" { name = "example" role_arn = aws_iam_role.role.arn document_metadata_configuration_updates { name = "_authors" type = "STRING_LIST_VALUE" search { displayable = false facetable = false searchable = false sortable = false } relevance { importance = 1 } } document_metadata_configuration_updates { name = "_category" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_created_at" type = "DATE_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { freshness = false importance = 1 duration = "25920000s" rank_order = "ASCENDING" } } document_metadata_configuration_updates { name = "_data_source_id" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_document_title" type = "STRING_VALUE" search { displayable = true facetable = false searchable = true sortable = true } relevance { importance = 2 values_importance_map = {} } } document_metadata_configuration_updates { name = "_excerpt_page_number" type = "LONG_VALUE" search { displayable = false facetable = false searchable = false sortable = false } relevance { importance = 2 rank_order = "ASCENDING" } } document_metadata_configuration_updates { name = "_faq_id" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_file_type" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_language_code" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_last_updated_at" type = "DATE_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { freshness = false importance = 1 duration = "25920000s" rank_order = "ASCENDING" } } document_metadata_configuration_updates { name = "_source_uri" type = "STRING_VALUE" search { displayable = true facetable = false searchable = false sortable = false } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_tenant_id" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_version" type = "STRING_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 values_importance_map = {} } } document_metadata_configuration_updates { name = "_view_count" type = "LONG_VALUE" search { displayable = false facetable = false searchable = false sortable = true } relevance { importance = 1 rank_order = "ASCENDING" } } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com") } has_valid_kendra_index { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_index" resource.values.name resource.values.document_metadata_configuration_updates role := input.configuration.root_module.resources[i] role.expressions.role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kendra_index }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"document_metadata_configuration_updates":[{"name":"_authors","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_LIST_VALUE"},{"name":"_category","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_created_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_data_source_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_document_title","relevance":[{"importance":2}],"search":[{"displayable":true,"facetable":false,"searchable":true,"sortable":true}],"type":"STRING_VALUE"},{"name":"_excerpt_page_number","relevance":[{"importance":2,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"LONG_VALUE"},{"name":"_faq_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_file_type","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_language_code","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_last_updated_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_source_uri","relevance":[{"importance":1}],"search":[{"displayable":true,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_VALUE"},{"name":"_tenant_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_version","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_view_count","relevance":[{"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"LONG_VALUE"}],"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]}],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"document_metadata_configuration_updates":[{"name":"_authors","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_LIST_VALUE"},{"name":"_category","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_created_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_data_source_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_document_title","relevance":[{"importance":2}],"search":[{"displayable":true,"facetable":false,"searchable":true,"sortable":true}],"type":"STRING_VALUE"},{"name":"_excerpt_page_number","relevance":[{"importance":2,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"LONG_VALUE"},{"name":"_faq_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_file_type","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_language_code","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_last_updated_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_source_uri","relevance":[{"importance":1}],"search":[{"displayable":true,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_VALUE"},{"name":"_tenant_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_version","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_view_count","relevance":[{"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"LONG_VALUE"}],"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":[{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"values_importance_map":true}],"search":[{}]}],"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]}],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"document_metadata_configuration_updates":[{"name":{"constant_value":"_authors"},"relevance":[{"importance":{"constant_value":1}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"STRING_LIST_VALUE"}},{"name":{"constant_value":"_category"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_created_at"},"relevance":[{"duration":{"constant_value":"25920000s"},"freshness":{"constant_value":false},"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"DATE_VALUE"}},{"name":{"constant_value":"_data_source_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_document_title"},"relevance":[{"importance":{"constant_value":2},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":true},"facetable":{"constant_value":false},"searchable":{"constant_value":true},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_excerpt_page_number"},"relevance":[{"importance":{"constant_value":2},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"LONG_VALUE"}},{"name":{"constant_value":"_faq_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_file_type"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_language_code"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_last_updated_at"},"relevance":[{"duration":{"constant_value":"25920000s"},"freshness":{"constant_value":false},"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"DATE_VALUE"}},{"name":{"constant_value":"_source_uri"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":true},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_tenant_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_version"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_view_count"},"relevance":[{"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"LONG_VALUE"}}],"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]}],"timestamp":"2026-02-18T20:54:00Z","applyable":true,"complete":true,"errored":false}
55
I need a searchable knowledge hub for our internal content, and it should understand who’s allowed to see what based on our existing team structure.
Generate a basic Kendra index resource With user group resolution configuration
Has one "aws_iam_role" resource and one "aws_kendra_index" resource with the "user_group_resolution_configuration" block
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "role" { name = "Kendra-Role" assume_role_policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Principal": { "Service": "kendra.amazonaws.com" }, "Effect": "Allow", "Sid": "" } ] } EOF } resource "aws_iam_role_policy" "policy" { name = "Kendra-Policy" role = aws_iam_role.role.id policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": "*" } ] } EOF } resource "aws_kendra_index" "example" { name = "example" role_arn = aws_iam_role.role.arn user_group_resolution_configuration { user_group_resolution_mode = "AWS_SSO" } }
package terraform.validation import future.keywords.in default has_valid_resources = false has_valid_iam_role(resources) { some resource in resources resource.type == "aws_iam_role" contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com") } has_valid_kendra_index { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_kendra_index" resource.values.name resource.values.user_group_resolution_configuration role := input.configuration.root_module.resources[i] role.expressions.role_arn } has_valid_resources { has_valid_iam_role(input.resource_changes) has_valid_kendra_index }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[{"user_group_resolution_mode":"AWS_SSO"}],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[{}],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[{"user_group_resolution_mode":"AWS_SSO"}],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[{}],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[{}],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"user_group_resolution_configuration":[{"user_group_resolution_mode":{"constant_value":"AWS_SSO"}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]}],"timestamp":"2026-02-18T20:54:04Z","applyable":true,"complete":true,"errored":false}
56
I need our custom domain to be recognized and managed so we can start using it for our online services.
Set up an aws_route_53 zone named "example53.com"
Has one "aws_route53_zone" resource with "name" set to "example53.com"
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "example53.com" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:54:11Z","applyable":true,"complete":true,"errored":false}
57
I need my main domain to direct visitors to a specific place where our app is running, keeping the setup straightforward.
Set up a non-alias aws_route_53 record that is linked to an aws_route53_zone resource named "example53.com"
Has one "aws_route53_zone" resource with "name" set to "example53.com" Has one "aws_route53_record" resource with "name" with "type" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "example53" { name = "example53.com" } resource "aws_route53_record" "example53_A" { zone_id = aws_route53_zone.example53.zone_id name = "example53.com" type = "A" ttl = "300" records = ["192.0.2.1"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "example53.com" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.ttl resource.expressions.records resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["192.0.2.1"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:54:16Z","applyable":true,"complete":true,"errored":false}
58
I need a way for systems inside our internal network to look up a specific service by a stable name, and it should only be reachable from within that network.
Set up a non-alias aws_route_53 record that is linked to an aws_route53_zone resource called "private_zone" whose name paramter is set to "internal.example53.com" and has an aws_vpc resource called "main" attached to it
Has one "aws_vpc" resource with a specified "cidr_block" Has one "aws_route53_zone" resource with "name" set to "internal.example53.com" with a "vpc" block that contains "vpc_id" that references the "aws_vpc" resource Has one "aws_route53_record" resource with "name" with "type" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource
provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" tags = { Name = "main-vpc" } } resource "aws_route53_zone" "private_zone" { name = "internal.example53.com" vpc { vpc_id = aws_vpc.main.id } } resource "aws_route53_record" "internal_record" { zone_id = aws_route53_zone.private_zone.zone_id name = "api.internal.example53.com" type = "A" ttl = "300" records = ["10.0.1.101"] }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record = false default is_valid_vpc = false # Validate aws_vpc resource is_valid_vpc { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_vpc" resource.expressions.cidr_block != null } # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" resource.expressions.name.constant_value == "internal.example53.com" resource.expressions.vpc[0].vpc_id.references[0] == "aws_vpc.main.id" } # Validate aws_route53_record is_valid_r53_record { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.type resource.expressions.ttl resource.expressions.records resource.expressions.zone_id.references[0] == "aws_route53_zone.private_zone.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_vpc is_valid_r53_zone is_valid_r53_record }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"api.internal.example53.com","records":["10.0.1.101"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"internal.example53.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"api.internal.example53.com","records":["10.0.1.101"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"internal.example53.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_config_key":"aws","expressions":{"name":{"constant_value":"api.internal.example53.com"},"records":{"constant_value":["10.0.1.101"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.private_zone.zone_id","aws_route53_zone.private_zone"]}},"schema_version":2},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_config_key":"aws","expressions":{"name":{"constant_value":"internal.example53.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}}]},"schema_version":0},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"tags":{"constant_value":{"Name":"main-vpc"}}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_route53_zone.private_zone","attribute":["zone_id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:54:26Z","applyable":true,"complete":true,"errored":false}
59
I need a way to automatically flag when one of our machines is working too hard and have that status feed into whatever system is watching over our app’s overall well‑being, but it should err on the side of saying things are fine if there isn’t enough info.
Configure a health check with route 53 that uses a cloudwatch metric alarm called "foobar". Set the metric_name to "CPUUtilization", namespace to "AWS/EC2", statistic to "Average", period to "120", and comparison_operator to "GreaterThanOrEqualToThreshold". If the health check doesn't have enough info about the alarm, the status should be "Healthy". All resources should be provisioned in "us-east-1"
Has one "aws_cloudwatch_metric_alarm"" resources with "alarm_name" with "comparison_operator" set to "GreaterThanOrEqualToThreshold" with "evaluation_periods" with "namespace" set to "AWS/EC2" with "period" set to "120" with "statistic" set to "Average" with "metric_name" set to "CPUUtilization" with "threshold" Has one "aws_route53_health_check" resources with "cloudwatch_alarm_name" referencing the "aws_cloudwatch_metric_alarm" resource with "cloudwatch_alarm_region" with "insufficient_data_health_status" set to "Healthy" with "type" equal to "CLOUDWATCH"
provider "aws" { region = "us-east-1" } resource "aws_cloudwatch_metric_alarm" "foobar" { alarm_name = "terraform-test-foobar5" comparison_operator = "GreaterThanOrEqualToThreshold" evaluation_periods = "2" metric_name = "CPUUtilization" namespace = "AWS/EC2" period = "120" statistic = "Average" threshold = "80" alarm_description = "This metric monitors ec2 cpu utilization" } resource "aws_route53_health_check" "foo" { type = "CLOUDWATCH_METRIC" cloudwatch_alarm_name = aws_cloudwatch_metric_alarm.foobar.alarm_name cloudwatch_alarm_region = "us-east-1" insufficient_data_health_status = "Healthy" }
package terraform.validation default is_configuration_valid = false default is_valid_r53_health_check = false default is_valid_cloud_watch_alarm = false # Validate aws_route53_health_check is_valid_r53_health_check { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_health_check" resource.expressions.type.constant_value == "CLOUDWATCH_METRIC" resource.expressions.cloudwatch_alarm_name.references[0] == "aws_cloudwatch_metric_alarm.foobar.alarm_name" resource.expressions.cloudwatch_alarm_region.constant_value == "us-east-1" resource.expressions.insufficient_data_health_status.constant_value = "Healthy" } is_valid_cloud_watch_alarm { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_cloudwatch_metric_alarm" resource.expressions.alarm_name resource.expressions.comparison_operator.constant_value == "GreaterThanOrEqualToThreshold" resource.expressions.evaluation_periods resource.expressions.metric_name.constant_value == "CPUUtilization" resource.expressions.namespace.constant_value == "AWS/EC2" resource.expressions.period.constant_value == "120" resource.expressions.statistic.constant_value == "Average" resource.expressions.threshold } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_health_check is_valid_cloud_watch_alarm }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"actions_enabled":true,"alarm_actions":null,"alarm_description":"This metric monitors ec2 cpu utilization","alarm_name":"terraform-test-foobar5","comparison_operator":"GreaterThanOrEqualToThreshold","datapoints_to_alarm":null,"dimensions":null,"evaluation_periods":2,"extended_statistic":null,"insufficient_data_actions":null,"metric_name":"CPUUtilization","metric_query":[],"namespace":"AWS/EC2","ok_actions":null,"period":120,"region":"us-east-1","statistic":"Average","tags":null,"threshold":80,"threshold_metric_id":null,"treat_missing_data":"missing","unit":null},"sensitive_values":{"metric_query":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"alarm_name":null,"region":null}},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"child_health_threshold":null,"child_healthchecks":null,"cloudwatch_alarm_name":"terraform-test-foobar5","cloudwatch_alarm_region":"us-east-1","disabled":false,"fqdn":null,"insufficient_data_health_status":"Healthy","invert_healthcheck":null,"ip_address":null,"measure_latency":false,"port":null,"reference_name":null,"request_interval":null,"resource_path":null,"routing_control_arn":null,"search_string":null,"tags":null,"type":"CLOUDWATCH_METRIC"},"sensitive_values":{"regions":[],"tags_all":{},"triggers":{}}}]}},"resource_changes":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"actions_enabled":true,"alarm_actions":null,"alarm_description":"This metric monitors ec2 cpu utilization","alarm_name":"terraform-test-foobar5","comparison_operator":"GreaterThanOrEqualToThreshold","datapoints_to_alarm":null,"dimensions":null,"evaluation_periods":2,"extended_statistic":null,"insufficient_data_actions":null,"metric_name":"CPUUtilization","metric_query":[],"namespace":"AWS/EC2","ok_actions":null,"period":120,"region":"us-east-1","statistic":"Average","tags":null,"threshold":80,"threshold_metric_id":null,"treat_missing_data":"missing","unit":null},"after_unknown":{"arn":true,"evaluate_low_sample_count_percentiles":true,"id":true,"metric_query":[],"tags_all":true},"before_sensitive":false,"after_sensitive":{"metric_query":[],"tags_all":{}},"after_identity":{"account_id":null,"alarm_name":null,"region":null}}},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"child_health_threshold":null,"child_healthchecks":null,"cloudwatch_alarm_name":"terraform-test-foobar5","cloudwatch_alarm_region":"us-east-1","disabled":false,"fqdn":null,"insufficient_data_health_status":"Healthy","invert_healthcheck":null,"ip_address":null,"measure_latency":false,"port":null,"reference_name":null,"request_interval":null,"resource_path":null,"routing_control_arn":null,"search_string":null,"tags":null,"type":"CLOUDWATCH_METRIC"},"after_unknown":{"arn":true,"enable_sni":true,"failure_threshold":true,"id":true,"regions":true,"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"regions":[],"tags_all":{},"triggers":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_config_key":"aws","expressions":{"alarm_description":{"constant_value":"This metric monitors ec2 cpu utilization"},"alarm_name":{"constant_value":"terraform-test-foobar5"},"comparison_operator":{"constant_value":"GreaterThanOrEqualToThreshold"},"evaluation_periods":{"constant_value":"2"},"metric_name":{"constant_value":"CPUUtilization"},"namespace":{"constant_value":"AWS/EC2"},"period":{"constant_value":"120"},"statistic":{"constant_value":"Average"},"threshold":{"constant_value":"80"}},"schema_version":1},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_config_key":"aws","expressions":{"cloudwatch_alarm_name":{"references":["aws_cloudwatch_metric_alarm.foobar.alarm_name","aws_cloudwatch_metric_alarm.foobar"]},"cloudwatch_alarm_region":{"constant_value":"us-east-1"},"insufficient_data_health_status":{"constant_value":"Healthy"},"type":{"constant_value":"CLOUDWATCH_METRIC"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_cloudwatch_metric_alarm.foobar","attribute":["alarm_name"]}],"timestamp":"2026-02-18T20:54:40Z","applyable":true,"complete":true,"errored":false}
60
I need users to reach our service through our main domain in a way that automatically sends them to whichever location can respond the quickest, even as traffic conditions change.
Configure a routing policy that navigates users to the least congested endpoint of a route 53 zone using Route 53 resources. Call the zone "primary" and use "us-east-1" and "eu-central-1" regions
Has one "aws_route53_zone" resource with "name" Has two "aws_route53_record" resources The first "aws_route53_record" with "name" with "type" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource with "set_identifier" with "latency_routing_policy" block that contains "region" set to "us-east-1" The second "aws_route53_record" with "name" with "type" with "ttl" with "records" with "zone_id" referencing the "aws_route53_zone" resource with "set_identifier" with "latency_routing_policy" block that contains "region" set to "eu-central-1"
provider "aws" { region = "us-east-1" } resource "aws_route53_zone" "primary" { name = "example53.com" } # Record for the EC2 instance in the US East region resource "aws_route53_record" "us_east_record" { zone_id = aws_route53_zone.primary.zone_id name = "service.example53.com" type = "A" ttl = "60" records = ["192.0.2.101"] set_identifier = "US East N. Virginia" latency_routing_policy { region = "us-east-1" } } # Record for the EC2 instance in the EU region resource "aws_route53_record" "eu_central_record" { zone_id = aws_route53_zone.primary.zone_id name = "service.example53.com" type = "A" ttl = "60" records = ["192.0.2.102"] set_identifier = "EU Frankfurt" latency_routing_policy { region = "eu-central-1" } }
package terraform.validation default is_configuration_valid = false default is_valid_r53_zone = false default is_valid_r53_record_na = false default is_valid_r53_record_eu = false # Validate aws_route53_zone resource is_valid_r53_zone { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_zone" } # Validate aws_route53_record is_valid_r53_record_na { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.latency_routing_policy[0].region.constant_value == "us-east-1" resource.expressions.type resource.expressions.ttl resource.expressions.records resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" } is_valid_r53_record_eu { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_record" resource.expressions.name resource.expressions.latency_routing_policy[0].region.constant_value == "eu-central-1" resource.expressions.type resource.expressions.ttl resource.expressions.records resource.expressions.set_identifier resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id" } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_zone is_valid_r53_record_na is_valid_r53_record_eu }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"eu-central-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.102"],"set_identifier":"EU Frankfurt","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"us-east-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.101"],"set_identifier":"US East N. Virginia","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"eu-central-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.102"],"set_identifier":"EU Frankfurt","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"us-east-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.101"],"set_identifier":"US East N. Virginia","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_config_key":"aws","expressions":{"latency_routing_policy":[{"region":{"constant_value":"eu-central-1"}}],"name":{"constant_value":"service.example53.com"},"records":{"constant_value":["192.0.2.102"]},"set_identifier":{"constant_value":"EU Frankfurt"},"ttl":{"constant_value":"60"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_config_key":"aws","expressions":{"latency_routing_policy":[{"region":{"constant_value":"us-east-1"}}],"name":{"constant_value":"service.example53.com"},"records":{"constant_value":["192.0.2.101"]},"set_identifier":{"constant_value":"US East N. Virginia"},"ttl":{"constant_value":"60"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:54:46Z","applyable":true,"complete":true,"errored":false}
61
I want a simple way to control how people reach our service through our domain, with room to change the routing logic later without much effort.
route 53 traffic policy
Has one "aws_route53_traffic_policy" resource with "name"
provider "aws" { region = "us-east-1" } resource "aws_route53_traffic_policy" "example" { name = "example" comment = "example comment" document = <<EOF { "AWSPolicyFormatVersion": "2015-10-01", "RecordType": "A", "Endpoints": { "endpoint-start-NkPh": { "Type": "value", "Value": "10.0.0.2" } }, "StartEndpoint": "endpoint-start-NkPh" } EOF }
package terraform.validation default is_configuration_valid = false default is_valid_r53_traffic_policy = false # Validate aws_route53_zone resource is_valid_r53_traffic_policy { some i resource := input.configuration.root_module.resources[i] resource.type == "aws_route53_traffic_policy" resource.expressions.name resource.expressions.comment resource.expressions.document } # Combine all checks into a final rule is_configuration_valid { is_valid_r53_traffic_policy }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"example comment","document":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n","name":"example"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"example comment","document":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n","name":"example"},"after_unknown":{"arn":true,"id":true,"type":true,"version":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_config_key":"aws","expressions":{"comment":{"constant_value":"example comment"},"document":{"constant_value":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n"},"name":{"constant_value":"example"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:54:53Z","applyable":true,"complete":true,"errored":false}
62
I need an easy way to spin up and tear down a shared environment for running containerized workloads, making sure it has its own isolated network space and the right access rules, plus some automatic setup so my command‑line tools can talk to it while it exists.
Define a variable 'cluster_name' of type string. Create an AWS EKS cluster named based on the provided cluster name variable, associating it with an IAM role. Configure the EKS cluster with VPC subnet IDs for networking. Ensure that IAM role permissions are handled before and after EKS cluster management for proper resource handling. Use local-exec provisioners to manage kubectl configuration during cluster creation and destruction. Define an IAM role with a policy attachment for Amazon EKS cluster and service policies.
has one "aws_eks_cluster" resource with one "name" with one "role_arn" with one "subnet_ids" in "vpc_config" with multiple "depends_on" dependencies with multiple "local-exec" provisioners with a "command" with a "when" has one "aws_iam_role" resource with one "name" with one "assume_role_policy" has one "aws_iam_role_policy_attachment" resource for "eks_cluster_policy" with one "policy_arn" with one "role" has one "aws_iam_role_policy_attachment" resource for "eks_service_policy" with one "policy_arn" with one "role"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } variable "cluster_name" { type = string default = "test-cluster" } data "aws_region" "current" {} resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } resource "aws_subnet" "test_eks_1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "test_eks_2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" availability_zone = data.aws_availability_zones.available.names[1] } resource "aws_iam_role" "example" { name = "${var.cluster_name}-eks" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = var.cluster_name role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] } # Ensure that IAM Role permissions are created before and deleted after EKS Cluster handling. # Otherwise, EKS will not be able to properly delete EKS managed EC2 infrastructure such as Security Groups. depends_on = [ aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy, ] # Manage kubectl configuration provisioner "local-exec" { command = "aws eks --region ${data.aws_region.current.name} update-kubeconfig --name ${self.name}" } provisioner "local-exec" { when = destroy command = "kubectl config unset users.${self.arn}" } provisioner "local-exec" { when = destroy command = "kubectl config unset clusters.${self.arn}" } provisioner "local-exec" { when = destroy command = "kubectl config unset contexts.${self.arn}" } }
package terraform.validation default has_aws_eks_cluster = false default has_aws_iam_role = false default has_aws_iam_role_policy_attachment_eks_cluster = false default has_aws_iam_role_policy_attachment_eks_service = false has_aws_eks_cluster { some i eks_cluster := input.configuration.root_module.resources[i] eks_cluster.type == "aws_eks_cluster" eks_cluster.expressions.name != null eks_cluster.expressions.role_arn != null eks_cluster.expressions.vpc_config[_].subnet_ids != null count(eks_cluster.expressions.vpc_config[_].subnet_ids) > 0 count(eks_cluster.depends_on) > 0 has_local_exec_provisioners(eks_cluster) } has_local_exec_provisioners(resource) { resource.provisioners != null local_exec_count := [provisioner | provisioner := resource.provisioners[_]; provisioner.type == "local-exec" ] count(local_exec_count) > 0 has_local_exec_command(local_exec_count) } has_local_exec_command(provisioners) { some i provisioners[i].expressions.command != null } has_aws_iam_role { some i iam_role := input.planned_values.root_module.resources[i] iam_role.type == "aws_iam_role" iam_role.values.name != null iam_role.values.assume_role_policy != null } has_aws_iam_role_policy_attachment_eks_cluster { some i policy_attachment := input.planned_values.root_module.resources[i] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" } has_aws_iam_role_policy_attachment_eks_service { some i policy_attachment := input.planned_values.root_module.resources[i] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" } valid_configuration { has_aws_eks_cluster has_aws_iam_role has_aws_iam_role_policy_attachment_eks_cluster has_aws_iam_role_policy_attachment_eks_service }
{"format_version":"1.2","terraform_version":"1.14.3","variables":{"cluster_name":{"value":"test-cluster"}},"planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["data.aws_region.current.name","data.aws_region.current","self.name","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}}],"expressions":{"name":{"references":["var.cluster_name"]},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"references":["var.cluster_name"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}],"variables":{"cluster_name":{"default":"test-cluster"}}}},"relevant_attributes":[{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]}],"timestamp":"2026-02-18T20:55:08Z","applyable":true,"complete":true,"errored":false}
63
I need a place to run containerized apps in a managed, scalable way, with its own network space and the right access setup, and I want my local tools to be able to talk to it securely and reliably.
Set up an AWS provider for the specified region. Retrieve the current caller identity using 'aws_caller_identity'. Optionally, fetch the latest stable ECR image tagged as 'stable' from the specified repository. Define local variables including an image tag, AWS tags, and workspace name. Instantiate an EKS module with configurations for cluster setup, IAM policies, instance types, and node count. Retrieve information about the created EKS cluster and its authentication data. Configure Helm and Kubernetes providers using the EKS cluster's details for cluster communication.
has one "aws_caller_identity" data source named "current" has one "aws_ecr_image" with one "repository_name" with one "image_tag" has multiple local variables defining: "image_tag" "aws_tags" "workspace_name" has one module named "eks" has one "aws_eks_cluster" data source named "aptos" with one "name" with a "depends_on" has one "aws_eks_cluster_auth" with one "name" has one "helm" provider has one "kubernetes" provider
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } variable "cluster_name" { type = string default = "test-cluster" } data "aws_region" "current" {} resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } resource "aws_subnet" "test_eks_1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "test_eks_2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" availability_zone = data.aws_availability_zones.available.names[1] } resource "aws_iam_role" "example" { name = "${var.cluster_name}-eks" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = var.cluster_name role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] } # Ensure that IAM Role permissions are created before and deleted after EKS Cluster handling. # Otherwise, EKS will not be able to properly delete EKS managed EC2 infrastructure such as Security Groups. depends_on = [ aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy, ] # Manage kubectl configuration provisioner "local-exec" { command = "aws eks --region ${data.aws_region.current.name} update-kubeconfig --name ${self.name}" } provisioner "local-exec" { when = destroy command = "kubectl config unset users.${self.arn}" } provisioner "local-exec" { when = destroy command = "kubectl config unset clusters.${self.arn}" } provisioner "local-exec" { when = destroy command = "kubectl config unset contexts.${self.arn}" } }
package terraform.validation default has_aws_eks_cluster = false default has_aws_iam_role = false default has_aws_iam_role_policy_attachment_eks_cluster = false default has_aws_iam_role_policy_attachment_eks_service = false has_aws_eks_cluster { some i eks_cluster := input.configuration.root_module.resources[i] eks_cluster.type == "aws_eks_cluster" eks_cluster.expressions.name != null eks_cluster.expressions.role_arn != null eks_cluster.expressions.vpc_config[_].subnet_ids != null count(eks_cluster.expressions.vpc_config[_].subnet_ids) > 0 count(eks_cluster.depends_on) > 0 has_local_exec_provisioners(eks_cluster) } has_local_exec_provisioners(resource) { resource.provisioners != null local_exec_count := [provisioner | provisioner := resource.provisioners[_]; provisioner.type == "local-exec" ] count(local_exec_count) > 0 has_local_exec_command(local_exec_count) } has_local_exec_command(provisioners) { some i provisioners[i].expressions.command != null } has_aws_iam_role { some i iam_role := input.planned_values.root_module.resources[i] iam_role.type == "aws_iam_role" iam_role.values.name != null iam_role.values.assume_role_policy != null } has_aws_iam_role_policy_attachment_eks_cluster { some i policy_attachment := input.planned_values.root_module.resources[i] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" } has_aws_iam_role_policy_attachment_eks_service { some i policy_attachment := input.planned_values.root_module.resources[i] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" } valid_configuration { has_aws_eks_cluster has_aws_iam_role has_aws_iam_role_policy_attachment_eks_cluster has_aws_iam_role_policy_attachment_eks_service }
{"format_version":"1.2","terraform_version":"1.14.3","variables":{"cluster_name":{"value":"test-cluster"}},"planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["data.aws_region.current.name","data.aws_region.current","self.name","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}}],"expressions":{"name":{"references":["var.cluster_name"]},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"references":["var.cluster_name"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}],"variables":{"cluster_name":{"default":"test-cluster"}}}},"relevant_attributes":[{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:08Z","applyable":true,"complete":true,"errored":false}
64
I need to make sure some of our system-level services in the cluster can run in an isolated, pay‑as‑you‑go compute setup, and also apply a small configuration tweak to one of the built‑in components once that environment is ready, keeping everything tied cleanly into the network we already have.
Create an IAM role for EKS Fargate profiles with the necessary policies for pod execution. Attach the AmazonEKSFargatePodExecutionRolePolicy to the IAM role. Define an AWS EKS Fargate profile for the 'kube-system' namespace, associating it with the EKS cluster and specifying the pod execution role ARN. Ensure that the specified subnets have the required resource tag for cluster association. Use a null_resource to patch the Kubernetes deployment 'coredns' in the 'kube-system' namespace, using the EKS cluster's endpoint, certificate authority, and authentication token for communication.
Resource "aws_iam_role" "eks-fargate-profile" has one "name" has one "assume_role_policy" Resource "aws_iam_role_policy_attachment" "eks-fargate-profile" has one "policy_arn" has one "role" Resource "aws_eks_fargate_profile" "kube-system" has one "cluster_name" has one "fargate_profile_name" has one "pod_execution_role_arn" has one "subnet_ids" has one "namespace" in "selector" Data "aws_eks_cluster_auth" "eks" has one "name" Resource "null_resource" "k8s_patcher" has multiple "triggers" (endpoint, ca_crt, token) uses a "local-exec" provisioner to execute a command that patches the Kubernetes deployment has a "lifecycle" policy to ignore changes in "triggers"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } resource "aws_subnet" "test_eks_1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" availability_zone = data.aws_availability_zones.available.names[0] tags = { "kubernetes.io/cluster/test" = "shared" } } resource "aws_subnet" "test_eks_2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" availability_zone = data.aws_availability_zones.available.names[1] tags = { "kubernetes.io/cluster/test" = "shared" } } resource "aws_iam_role" "eks-cluster" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.eks-cluster.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.eks-cluster.name } resource "aws_eks_cluster" "cluster" { name = "test" role_arn = aws_iam_role.eks-cluster.arn vpc_config { subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] } depends_on = [ aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy, ] } resource "aws_iam_role" "eks-fargate-profile" { name = "eks-fargate-profile" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks-fargate-pods.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "eks-fargate-profile" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy" role = aws_iam_role.eks-fargate-profile.name } resource "aws_eks_fargate_profile" "kube-system" { cluster_name = aws_eks_cluster.cluster.name fargate_profile_name = "kube-system" pod_execution_role_arn = aws_iam_role.eks-fargate-profile.arn subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] selector { namespace = "kube-system" } depends_on = [ aws_iam_role_policy_attachment.eks-fargate-profile ] } data "aws_eks_cluster_auth" "eks" { name = aws_eks_cluster.cluster.id } resource "null_resource" "k8s_patcher" { depends_on = [aws_eks_fargate_profile.kube-system] triggers = { endpoint = aws_eks_cluster.cluster.endpoint ca_crt = base64decode(aws_eks_cluster.cluster.certificate_authority[0].data) token = data.aws_eks_cluster_auth.eks.token } provisioner "local-exec" { command = <<EOH cat >/tmp/ca.crt <<EOF ${base64decode(aws_eks_cluster.cluster.certificate_authority[0].data)} EOF kubectl \ --server="${aws_eks_cluster.cluster.endpoint}" \ --certificate_authority=/tmp/ca.crt \ --token="${data.aws_eks_cluster_auth.eks.token}" \ patch deployment coredns \ -n kube-system --type json \ -p='[{"op": "remove", "path": "/spec/template/metadata/annotations/eks.amazonaws.com~1compute-type"}]' EOH } lifecycle { ignore_changes = [triggers] } }
package terraform.validation default has_aws_iam_role_fargate = false default has_aws_iam_role_policy_attachment_fargate = false default has_aws_eks_fargate_profile = false default has_aws_eks_cluster_auth = false default has_null_resource_k8s_patcher = false has_aws_iam_role_fargate { role := input.planned_values.root_module.resources[_] role.type == "aws_iam_role" role.name == "eks-fargate-profile" role.values.name == "eks-fargate-profile" role.values.assume_role_policy != null } has_aws_iam_role_policy_attachment_fargate { attachment := input.planned_values.root_module.resources[_] attachment.type == "aws_iam_role_policy_attachment" attachment.name == "eks-fargate-profile" attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy" attachment.values.role == input.planned_values.root_module.resources[_].values.name # Ensure role is correctly referenced } has_aws_eks_fargate_profile { fargate_profile := input.configuration.root_module.resources[_] fargate_profile.type == "aws_eks_fargate_profile" fargate_profile.name == "kube-system" fargate_profile.expressions.cluster_name != null fargate_profile.expressions.fargate_profile_name.constant_value == "kube-system" fargate_profile.expressions.pod_execution_role_arn != null count(fargate_profile.expressions.subnet_ids.references) == 4 # Ensure there are two subnet IDs fargate_profile.expressions.selector[_].namespace.constant_value == "kube-system" } has_aws_eks_cluster_auth { cluster_auth := input.configuration.root_module.resources[_] cluster_auth.type == "aws_eks_cluster_auth" cluster_auth.name != null # Check for proper referencing } has_null_resource_k8s_patcher { k8s_patcher := input.configuration.root_module.resources[_] k8s_patcher.type == "null_resource" k8s_patcher.name == "k8s_patcher" k8s_patcher.depends_on != null count(k8s_patcher.expressions.triggers.references) == 8 # Check for three triggers k8s_patcher.provisioners[0].type == "local-exec" k8s_patcher.provisioners[0].expressions.command != null } valid_configuration { has_aws_iam_role_fargate has_aws_iam_role_policy_attachment_fargate has_aws_eks_fargate_profile has_aws_eks_cluster_auth has_null_resource_k8s_patcher }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"test","fargate_profile_name":"kube-system","region":"us-east-1","selector":[{"labels":null,"namespace":"kube-system"}],"tags":null,"timeouts":null},"sensitive_values":{"selector":[{}],"subnet_ids":[],"tags_all":{}}},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"sensitive_values":{"token":true}},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_name":"registry.terraform.io/hashicorp/null","schema_version":0,"values":{"triggers":{}},"sensitive_values":{"triggers":{"token":true}}}]}},"resource_changes":[{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{},"after_unknown":{"id":true,"name":true,"region":true,"token":true},"before_sensitive":false,"after_sensitive":{"token":true}},"action_reason":"read_because_config_unknown"},{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"test","fargate_profile_name":"kube-system","region":"us-east-1","selector":[{"labels":null,"namespace":"kube-system"}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"pod_execution_role_arn":true,"selector":[{}],"status":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"selector":[{}],"subnet_ids":[],"tags_all":{}}}},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_name":"registry.terraform.io/hashicorp/null","change":{"actions":["create"],"before":null,"after":{"triggers":{}},"after_unknown":{"id":true,"triggers":{"ca_crt":true,"endpoint":true,"token":true}},"before_sensitive":false,"after_sensitive":{"triggers":{"token":true}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}},"null":{"name":"null","full_name":"registry.terraform.io/hashicorp/null"}},"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.eks-cluster.arn","aws_iam_role.eks-cluster"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.cluster.name","aws_eks_cluster.cluster"]},"fargate_profile_name":{"constant_value":"kube-system"},"pod_execution_role_arn":{"references":["aws_iam_role.eks-fargate-profile.arn","aws_iam_role.eks-fargate-profile"]},"selector":[{"namespace":{"constant_value":"kube-system"}}],"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}},"schema_version":0,"depends_on":["aws_iam_role_policy_attachment.eks-fargate-profile"]},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.eks-fargate-profile.name","aws_iam_role.eks-fargate-profile"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.eks-cluster.name","aws_iam_role.eks-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.eks-cluster.name","aws_iam_role.eks-cluster"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"tags":{"constant_value":{"kubernetes.io/cluster/test":"shared"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"tags":{"constant_value":{"kubernetes.io/cluster/test":"shared"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_config_key":"null","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["aws_eks_cluster.cluster.certificate_authority[0].data","aws_eks_cluster.cluster.certificate_authority[0]","aws_eks_cluster.cluster.certificate_authority","aws_eks_cluster.cluster","aws_eks_cluster.cluster.endpoint","aws_eks_cluster.cluster","data.aws_eks_cluster_auth.eks.token","data.aws_eks_cluster_auth.eks"]}}}],"expressions":{"triggers":{"references":["aws_eks_cluster.cluster.endpoint","aws_eks_cluster.cluster","aws_eks_cluster.cluster.certificate_authority[0].data","aws_eks_cluster.cluster.certificate_authority[0]","aws_eks_cluster.cluster.certificate_authority","aws_eks_cluster.cluster","data.aws_eks_cluster_auth.eks.token","data.aws_eks_cluster_auth.eks"]}},"schema_version":0,"depends_on":["aws_eks_fargate_profile.kube-system"]},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_config_key":"aws","expressions":{"name":{"references":["aws_eks_cluster.cluster.id","aws_eks_cluster.cluster"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.eks-cluster","attribute":["arn"]},{"resource":"aws_eks_cluster.cluster","attribute":["id"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_eks_cluster.cluster","attribute":["certificate_authority",0,"data"]},{"resource":"aws_eks_cluster.cluster","attribute":["endpoint"]},{"resource":"aws_eks_cluster.cluster","attribute":["name"]},{"resource":"aws_iam_role.eks-cluster","attribute":["name"]},{"resource":"aws_iam_role.eks-fargate-profile","attribute":["name"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_eks_cluster_auth.eks","attribute":["token"]},{"resource":"aws_iam_role.eks-fargate-profile","attribute":["arn"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]}],"timestamp":"2026-02-18T20:55:09Z","applyable":true,"complete":true,"errored":false}
65
I need to let a specific team or system interact with our container platform in a controlled way, making sure they get the right level of access without overcomplicating things.
Create a Terraform script for an AWS EKS access entry with name "example". Define a resource to grant access to an EKS cluster using the cluster's name and a principal's ARN. Include assigning specific Kubernetes groups and set the access type to 'STANDARD'.
has one "aws_eks_access_entry" resource with one "cluster_name" with one "principal_arn" with one "kubernetes_groups" with one "type"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "private-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = "test" version = "test-version" role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [ aws_subnet.private-us-east-1a.id, ] } } resource "aws_eks_access_entry" "example" { cluster_name = aws_eks_cluster.example.name principal_arn = aws_iam_role.example.arn kubernetes_groups = ["group-1", "group-2"] type = "STANDARD" }
package terraform.validation default has_aws_eks_access_entry_example = false has_aws_eks_access_entry_example { entry := input.planned_values.root_module.resources[_] entry.type == "aws_eks_access_entry" entry.name == "example" entry.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it's the correct reference to aws_eks_cluster.example entry.values.kubernetes_groups == ["group-1", "group-2"] entry.values.type == "STANDARD" }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"test","kubernetes_groups":["group-1","group-2"],"region":"us-east-1","tags":null,"timeouts":null,"type":"STANDARD"},"sensitive_values":{"kubernetes_groups":[false,false],"tags_all":{}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"test","kubernetes_groups":["group-1","group-2"],"region":"us-east-1","tags":null,"timeouts":null,"type":"STANDARD"},"after_unknown":{"access_entry_arn":true,"created_at":true,"id":true,"kubernetes_groups":[false,false],"modified_at":true,"principal_arn":true,"tags_all":true,"user_name":true},"before_sensitive":false,"after_sensitive":{"kubernetes_groups":[false,false],"tags_all":{}}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"kubernetes_groups":{"constant_value":["group-1","group-2"]},"principal_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:12Z","applyable":true,"complete":true,"errored":false}
66
I need to let a specific person see only a limited part of our app’s shared computing space, keeping their permissions tightly scoped to just one area.
Create a Terraform script to associate an access policy with name "example", with an AWS EKS cluster. Define a resource linking the cluster's name to a specific policy ARN and a principal's ARN. Include settings for an access scope limited to a specific namespace.
has one "aws_eks_access_policy_association" resource with one "cluster_name" with one "policy_arn" with one "principal_arn" with one "access_scope"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "private-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = "test" version = "test-version" role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [ aws_subnet.private-us-east-1a.id, ] } } resource "aws_iam_user" "example" { name = "eks-test" } resource "aws_eks_access_policy_association" "example" { cluster_name = aws_eks_cluster.example.name policy_arn = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" principal_arn = aws_iam_user.example.arn access_scope { type = "namespace" namespaces = ["example-namespace"] } }
package terraform.validation default has_aws_eks_access_policy_association_example = false has_aws_eks_access_policy_association_example { policy_assoc := input.planned_values.root_module.resources[_] policy_assoc.type == "aws_eks_access_policy_association" policy_assoc.name == "example" policy_assoc.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it references aws_eks_cluster.example policy_assoc.values.policy_arn == "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" policy_assoc.values.access_scope[_].type == "namespace" policy_assoc.values.access_scope[_].namespaces == ["example-namespace"] }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_scope":[{"namespaces":["example-namespace"],"type":"namespace"}],"cluster_name":"test","policy_arn":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy","region":"us-east-1","timeouts":null},"sensitive_values":{"access_scope":[{"namespaces":[false]}]}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"force_destroy":false,"name":"eks-test","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_scope":[{"namespaces":["example-namespace"],"type":"namespace"}],"cluster_name":"test","policy_arn":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy","region":"us-east-1","timeouts":null},"after_unknown":{"access_scope":[{"namespaces":[false]}],"associated_at":true,"id":true,"modified_at":true,"principal_arn":true},"before_sensitive":false,"after_sensitive":{"access_scope":[{"namespaces":[false]}]}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"force_destroy":false,"name":"eks-test","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"id":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_config_key":"aws","expressions":{"access_scope":[{"namespaces":{"constant_value":["example-namespace"]},"type":{"constant_value":"namespace"}}],"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"policy_arn":{"constant_value":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"},"principal_arn":{"references":["aws_iam_user.example.arn","aws_iam_user.example"]}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"eks-test"}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_user.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:55:26Z","applyable":true,"complete":true,"errored":false}
67
I need to extend our container-orchestration setup with one of the optional system components it supports so we get better networking behavior, and it should plug cleanly into the existing cluster without adding much complexity.
Generate a Terraform script to add an addon with name "example", to an AWS EKS cluster. Define a resource that specifies the cluster's name and sets the addon name to 'vpc-cni'.
has one "aws_eks_addon" resource with one "cluster_name" with one "addon_name"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "private-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = "test" version = "test-version" role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [ aws_subnet.private-us-east-1a.id, ] } } resource "aws_eks_addon" "example" { cluster_name = aws_eks_cluster.example.name addon_name = "vpc-cni" }
package terraform.validation default has_aws_eks_addon_example = false has_aws_eks_addon_example { addon := input.planned_values.root_module.resources[_] addon.type == "aws_eks_addon" addon.name == "example" addon.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it references aws_eks_cluster.example correctly addon.values.addon_name == "vpc-cni" }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"addon_name":"vpc-cni","cluster_name":"test","pod_identity_association":[],"preserve":null,"region":"us-east-1","resolve_conflicts_on_create":null,"resolve_conflicts_on_update":null,"service_account_role_arn":null,"tags":null,"timeouts":null},"sensitive_values":{"pod_identity_association":[],"tags_all":{}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"addon_name":"vpc-cni","cluster_name":"test","pod_identity_association":[],"preserve":null,"region":"us-east-1","resolve_conflicts_on_create":null,"resolve_conflicts_on_update":null,"service_account_role_arn":null,"tags":null,"timeouts":null},"after_unknown":{"addon_version":true,"arn":true,"configuration_values":true,"created_at":true,"id":true,"modified_at":true,"pod_identity_association":[],"tags_all":true},"before_sensitive":false,"after_sensitive":{"pod_identity_association":[],"tags_all":{}}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_config_key":"aws","expressions":{"addon_name":{"constant_value":"vpc-cni"},"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:34Z","applyable":true,"complete":true,"errored":false}
68
I want to run certain lightweight workloads without having to manage any underlying machines, and have them launch only within a specific part of our environment for security and cost control.
Generate a Terraform script to create an AWS EKS Fargate profile. Define a resource that links to an EKS cluster (with name set to "example") by name, sets a Fargate profile name, and assigns a pod execution role ARN (tied to an IAM role with name "example"). Specify subnet IDs and include a selector for the namespace 'example'.
has one "aws_eks_fargate_profile" resource with one "cluster_name" with one "fargate_profile_name" with one "pod_execution_role_arn" with one "subnet_ids" with one "selector" containing "namespace"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "example1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_subnet" "example2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_iam_role" "example-fargate" { name = "eks-fargate-profile-example" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks-fargate-pods.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "example-AmazonEKSFargatePodExecutionRolePolicy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy" role = aws_iam_role.example-fargate.name } resource "aws_eks_cluster" "example" { name = "example" role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id] } } resource "aws_eks_fargate_profile" "example" { cluster_name = aws_eks_cluster.example.name fargate_profile_name = "example" pod_execution_role_arn = aws_iam_role.example-fargate.arn subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id] selector { namespace = "example" } }
package terraform.validation default has_aws_eks_fargate_profile_example = false has_aws_eks_fargate_profile_example { fargate_profile := input.configuration.root_module.resources[_] fargate_profile.type == "aws_eks_fargate_profile" fargate_profile.name == "example" contains(fargate_profile.expressions.cluster_name.references[_], "aws_eks_cluster.example") # Ensures it references aws_eks_cluster.example correctly fargate_profile.expressions.fargate_profile_name.constant_value == "example" contains(fargate_profile.expressions.pod_execution_role_arn.references[_], "aws_iam_role.example") # Ensures it references aws_iam_role.example correctly count(fargate_profile.expressions.subnet_ids.references) > 0 # Ensure that subnet_ids is populated fargate_profile.expressions.selector[_].namespace.constant_value == "example" }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","fargate_profile_name":"example","region":"us-east-1","selector":[{"labels":null,"namespace":"example"}],"tags":null,"timeouts":null},"sensitive_values":{"selector":[{}],"subnet_ids":[],"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","fargate_profile_name":"example","region":"us-east-1","selector":[{"labels":null,"namespace":"example"}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"pod_execution_role_arn":true,"selector":[{}],"status":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"selector":[{}],"subnet_ids":[],"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"fargate_profile_name":{"constant_value":"example"},"pod_execution_role_arn":{"references":["aws_iam_role.example-fargate.arn","aws_iam_role.example-fargate"]},"selector":[{"namespace":{"constant_value":"example"}}],"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile-example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.example-fargate.name","aws_iam_role.example-fargate"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example-fargate","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example-fargate","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_subnet.example2","attribute":["id"]}],"timestamp":"2026-02-18T20:55:36Z","applyable":true,"complete":true,"errored":false}
69
I need a secure way for certain automated workloads in our compute platform to run with just the permissions they need, without giving them broader access than necessary.
Create a Terraform script for an AWS IAM role designed for EKS Fargate profiles. Define a role with a specific name (with the name attribute set to "eks-fargate-profile-example") and an assume role policy that allows actions from 'eks-fargate-pods.amazonaws.com'. Also, attach a predefined Amazon EKS Fargate Pod Execution Role Policy to this role.
has one "aws_iam_role" resource with one "name" with one "assume_role_policy" has one "aws_iam_role_policy_attachment" resource with one "policy_arn" with one "role"
provider "aws" { region = "us-east-1" } resource "aws_iam_role" "example" { name = "eks-fargate-profile-example" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks-fargate-pods.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "example-AmazonEKSFargatePodExecutionRolePolicy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy" role = aws_iam_role.example.name }
package terraform.validation default has_aws_iam_role_example = false default has_aws_iam_role_policy_attachment_example = false has_aws_iam_role_example { role := input.planned_values.root_module.resources[_] role.type == "aws_iam_role" role.values.name == "eks-fargate-profile-example" # Ensure the assume role policy is correctly configured role.values.assume_role_policy == "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}" } has_aws_iam_role_policy_attachment_example { attachment := input.planned_values.root_module.resources[_] attachment.type == "aws_iam_role_policy_attachment" attachment.name == "example-AmazonEKSFargatePodExecutionRolePolicy" attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy" # Check if the role is correctly referenced attachment.values.role == input.planned_values.root_module.resources[_].values.name } valid_configuration { has_aws_iam_role_example has_aws_iam_role_policy_attachment_example }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile-example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:38Z","applyable":true,"complete":true,"errored":false}
70
I need to let an external authentication system securely verify who can access my container platform, and I want this to plug into the cluster’s built‑in access controls without adding too much complexity.
Generate a Terraform script to configure an OIDC identity provider for an AWS EKS cluster (where the cluster has it's name attribute set to "example"). Define a resource that links to the cluster by name and sets up OIDC with specific parameters including client ID, identity provider config name, and issuer URL.
has one "aws_eks_identity_provider_config" resource with one "cluster_name" with one "oidc" block containing: one "client_id" one "identity_provider_config_name" one "issuer_url"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "example1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_subnet" "example2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "example" { name = "example" role_arn = aws_iam_role.example.arn vpc_config { subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id] } } resource "aws_eks_identity_provider_config" "example" { cluster_name = aws_eks_cluster.example.name oidc { client_id = "your client_id" identity_provider_config_name = "example" issuer_url = "https://www.sampleurl.com" } }
package terraform.validation default has_aws_eks_identity_provider_config_example = false has_aws_eks_identity_provider_config_example { identity_provider_config := input.planned_values.root_module.resources[_] identity_provider_config.type == "aws_eks_identity_provider_config" identity_provider_config.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Check OIDC configuration identity_provider_config.values.oidc[_].client_id != null identity_provider_config.values.oidc[_].identity_provider_config_name != null identity_provider_config.values.oidc[_].issuer_url != null }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","oidc":[{"client_id":"your client_id","groups_claim":null,"groups_prefix":null,"identity_provider_config_name":"example","issuer_url":"https://www.sampleurl.com","required_claims":null,"username_claim":null,"username_prefix":null}],"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"oidc":[{}],"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","oidc":[{"client_id":"your client_id","groups_claim":null,"groups_prefix":null,"identity_provider_config_name":"example","issuer_url":"https://www.sampleurl.com","required_claims":null,"username_claim":null,"username_prefix":null}],"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"oidc":[{}],"status":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"oidc":[{}],"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"oidc":[{"client_id":{"constant_value":"your client_id"},"identity_provider_config_name":{"constant_value":"example"},"issuer_url":{"constant_value":"https://www.sampleurl.com"}}]},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.example2","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:50Z","applyable":true,"complete":true,"errored":false}
71
I need to add a pool of machines that can join our container platform, scale up and down automatically, and have whatever access they need to pull images and handle networking, while keeping the setup simple and reliable.
Create a Terraform script for an AWS EKS node group (with name attribute set to "example") linked to a specific EKS cluster (with name attribute set to "example"). Define a resource with details including the node group name, node role ARN, and subnet IDs. Configure scaling parameters (desired size is 1, max size is 2, and min size is 1, with max unavailable set to 1) and update settings for node management. Include dependencies on IAM role policy attachments to ensure proper permissions management during lifecycle events of EC2 instances and network interfaces (in particular, make sure the EKS worker node policy, the EKS CNI policy, and the EC2 container registry read only policy are attached).
has one "aws_eks_node_group" resource with one "cluster_name" with one "node_group_name" with one "node_role_arn" with one "subnet_ids" with one "scaling_config" containing: one "desired_size" one "max_size" one "min_size" with one "update_config" containing: one "max_unavailable" with dependencies on three IAM role policy attachments
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } data "aws_availability_zones" "available" { state = "available" } resource "aws_subnet" "test_eks_1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[0] } resource "aws_subnet" "test_eks_2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" map_public_ip_on_launch = true availability_zone = data.aws_availability_zones.available.names[1] } resource "aws_internet_gateway" "main" { vpc_id = aws_vpc.main.id } resource "aws_route_table" "main" { vpc_id = aws_vpc.main.id route { cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.main.id } } resource "aws_route_table_association" "first" { subnet_id = aws_subnet.test_eks_1.id route_table_id = aws_route_table.main.id } resource "aws_route_table_association" "second" { subnet_id = aws_subnet.test_eks_2.id route_table_id = aws_route_table.main.id } resource "aws_security_group" "first" { name = "test-security-group" description = "Allow traffic for Elasticsearch" vpc_id = aws_vpc.main.id } resource "aws_vpc_security_group_ingress_rule" "ingress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" ip_protocol = "-1" } resource "aws_vpc_security_group_egress_rule" "egress1" { security_group_id = aws_security_group.first.id cidr_ipv4 = "0.0.0.0/0" ip_protocol = "-1" } resource "aws_iam_role" "example-cluster" { name = "eks-cluster-role" assume_role_policy = jsonencode({ Statement = [{ Action = "sts:AssumeRole" Effect = "Allow" Principal = { Service = "eks.amazonaws.com" } }] Version = "2012-10-17" }) } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example-cluster.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example-cluster.name } resource "aws_eks_cluster" "example" { name = "example" role_arn = aws_iam_role.example-cluster.arn vpc_config { subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] } } resource "aws_iam_role" "example-group" { name = "eks-cluster-group-role" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": ["eks.amazonaws.com", "ec2.amazonaws.com"] }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "example-AmazonEKSWorkerNodePolicy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy" role = aws_iam_role.example-group.name } resource "aws_iam_role_policy_attachment" "example-AmazonEKS_CNI_Policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy" role = aws_iam_role.example-group.name } resource "aws_iam_role_policy_attachment" "example-AmazonEC2ContainerRegistryReadOnly" { policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" role = aws_iam_role.example-group.name } resource "aws_eks_node_group" "example" { cluster_name = aws_eks_cluster.example.name node_group_name = "example" node_role_arn = aws_iam_role.example-group.arn subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ] scaling_config { desired_size = 1 max_size = 2 min_size = 1 } update_config { max_unavailable = 1 } # Ensure that IAM Role permissions are created before and deleted after EKS Node Group handling. # Otherwise, EKS will not be able to properly delete EC2 Instances and Elastic Network Interfaces. depends_on = [ aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy, aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy, aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly, ] }
package terraform.validation default has_aws_eks_node_group_example = false has_aws_eks_node_group_example { node_group := input.planned_values.root_module.resources[_] node_group.type == "aws_eks_node_group" node_group.values.cluster_name == input.planned_values.root_module.resources[_].values.name node_group.values.node_group_name == "example" node_group.values.scaling_config[_].desired_size == 1 node_group.values.scaling_config[_].max_size == 2 node_group.values.scaling_config[_].min_size == 1 node_group.values.update_config[_].max_unavailable == 1 node_group2 := input.configuration.root_module.resources[_] node_group2.expressions.node_role_arn.references != null node_group2.expressions.subnet_ids != null count(node_group2.depends_on) == 3 # Checking for AmazonEKSWorkerNodePolicy: worker_policy := input.configuration.root_module.resources[_] contains(node_group2.depends_on[_], worker_policy.name) contains(worker_policy.expressions.policy_arn.constant_value, "AmazonEKSWorkerNodePolicy") # Checking for AmazonEKS_CNI_Policy: worker_policy2 := input.configuration.root_module.resources[_] contains(node_group2.depends_on[_], worker_policy2.name) contains(worker_policy2.expressions.policy_arn.constant_value, "AmazonEKS_CNI_Policy") # Checking for AmazonEC2ContainerRegistryReadOnly: worker_policy3 := input.configuration.root_module.resources[_] contains(node_group2.depends_on[_], worker_policy3.name) contains(worker_policy3.expressions.policy_arn.constant_value, "AmazonEC2ContainerRegistryReadOnly") }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","force_update_version":null,"labels":null,"launch_template":[],"node_group_name":"example","region":"us-east-1","remote_access":[],"scaling_config":[{"desired_size":1,"max_size":2,"min_size":1}],"tags":null,"taint":[],"timeouts":null,"update_config":[{"max_unavailable":1,"max_unavailable_percentage":null,"update_strategy":null}]},"sensitive_values":{"instance_types":[],"launch_template":[],"node_repair_config":[],"remote_access":[],"resources":[],"scaling_config":[{}],"subnet_ids":[],"tags_all":{},"taint":[],"update_config":[{}]}},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"eks.amazonaws.com\",\"ec2.amazonaws.com\"]}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-group-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","force_update_version":null,"labels":null,"launch_template":[],"node_group_name":"example","region":"us-east-1","remote_access":[],"scaling_config":[{"desired_size":1,"max_size":2,"min_size":1}],"tags":null,"taint":[],"timeouts":null,"update_config":[{"max_unavailable":1,"max_unavailable_percentage":null,"update_strategy":null}]},"after_unknown":{"ami_type":true,"arn":true,"capacity_type":true,"disk_size":true,"id":true,"instance_types":true,"launch_template":[],"node_group_name_prefix":true,"node_repair_config":true,"node_role_arn":true,"release_version":true,"remote_access":[],"resources":true,"scaling_config":[{}],"status":true,"subnet_ids":true,"tags_all":true,"taint":[],"update_config":[{}],"version":true},"before_sensitive":false,"after_sensitive":{"instance_types":[],"launch_template":[],"node_repair_config":[],"remote_access":[],"resources":[],"scaling_config":[{}],"subnet_ids":[],"tags_all":{},"taint":[],"update_config":[{}]}}},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"eks.amazonaws.com\",\"ec2.amazonaws.com\"]}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-group-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example-cluster.arn","aws_iam_role.example-cluster"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"node_group_name":{"constant_value":"example"},"node_role_arn":{"references":["aws_iam_role.example-group.arn","aws_iam_role.example-group"]},"scaling_config":[{"desired_size":{"constant_value":1},"max_size":{"constant_value":2},"min_size":{"constant_value":1}}],"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]},"update_config":[{"max_unavailable":{"constant_value":1}}]},"schema_version":0,"depends_on":["aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly"]},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-cluster-role"}},"schema_version":0},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\"eks.amazonaws.com\", \"ec2.amazonaws.com\"]\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-group-role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example-cluster.name","aws_iam_role.example-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example-cluster.name","aws_iam_role.example-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example-cluster","attribute":["name"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_iam_role.example-cluster","attribute":["arn"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example-group","attribute":["arn"]},{"resource":"aws_iam_role.example-group","attribute":["name"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:54Z","applyable":true,"complete":true,"errored":false}
72
I need certain workloads in our container platform to be able to pull data from our storage system, but only with tightly scoped permissions, and tied to a specific app identity so everything stays secure and easy to manage.
Create a Terraform script for an AWS EKS setup with pod identity management. Start by defining an IAM policy document (called "example") for assuming a role by EKS pods. Then, create an IAM role (called "example") using this policy. Attach a policy for S3 read-only access to this role. Finally, define an EKS pod identity association linking the role to a specific EKS cluster (called "example"), namespace, and service account.
has one "data" block for "aws_iam_policy_document" named "assume_role" with one "statement" block containing: one "effect" one "principals" block with "type" and "identifiers" one "actions" list has one "aws_iam_role" resource named "example" with one "name" with one "assume_role_policy" referencing the data block has one "aws_iam_role_policy_attachment" resource named "example_s3" with one "policy_arn" with one "role" referencing the "aws_iam_role.example.name" has one "aws_eks_pod_identity_association" resource named "example" with one "cluster_name" with one "namespace" with one "service_account" with one "role_arn" referencing the "aws_iam_role.example.arn"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "example1" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_subnet" "example2" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" } resource "aws_iam_role" "example1" { name = "eks-cluster-1" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example1.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example1.name } resource "aws_eks_cluster" "example" { name = "example" role_arn = aws_iam_role.example1.arn vpc_config { subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id] } depends_on = [ aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy, ] } data "aws_iam_policy_document" "assume_role" { statement { effect = "Allow" principals { type = "Service" identifiers = ["pods.eks.amazonaws.com"] } actions = [ "sts:AssumeRole", "sts:TagSession" ] } } resource "aws_iam_role" "example" { name = "eks-pod-identity-example" assume_role_policy = data.aws_iam_policy_document.assume_role.json } resource "aws_iam_role_policy_attachment" "example_s3" { policy_arn = "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess" role = aws_iam_role.example.name } resource "aws_eks_pod_identity_association" "example" { cluster_name = aws_eks_cluster.example.name namespace = "example" service_account = "example-sa" role_arn = aws_iam_role.example.arn }
package terraform.validation default has_aws_iam_policy_document_assume_role = false default has_aws_iam_role_example = false default has_aws_iam_role_policy_attachment_example_s3 = false default has_aws_eks_pod_identity_association_example = false has_aws_iam_policy_document_assume_role { assume_role := input.configuration.root_module.resources[_] assume_role.type == "aws_iam_policy_document" assume_role.expressions.statement[_].effect.constant_value == "Allow" assume_role.expressions.statement[_].principals[_].type.constant_value == "Service" assume_role.expressions.statement[_].principals[_].identifiers.constant_value[_] == "pods.eks.amazonaws.com" count(assume_role.expressions.statement[_].actions.constant_value) == 2 assume_role.expressions.statement[_].actions.constant_value[_] == "sts:AssumeRole" assume_role.expressions.statement[_].actions.constant_value[_] == "sts:TagSession" } has_aws_iam_role_example { role := input.configuration.root_module.resources[_] role.type == "aws_iam_role" role.name == "example" role.expressions.assume_role_policy != null } has_aws_iam_role_policy_attachment_example_s3 { policy_attachment := input.configuration.root_module.resources[_] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.name == "example_s3" policy_attachment.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess" policy_attachment.expressions.role.references[_] == "aws_iam_role.example.name" } has_aws_eks_pod_identity_association_example { pod_identity := input.configuration.root_module.resources[_] pod_identity.type == "aws_eks_pod_identity_association" pod_identity.expressions.cluster_name.references[_] == "aws_eks_cluster.example.name" pod_identity.expressions.namespace.constant_value == "example" pod_identity.expressions.role_arn.references[_] == "aws_iam_role.example.arn" } valid_configuration { has_aws_iam_policy_document_assume_role has_aws_iam_role_example has_aws_iam_role_policy_attachment_example_s3 has_aws_eks_pod_identity_association_example }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","disable_session_tags":false,"namespace":"example","region":"us-east-1","service_account":"example-sa","tags":null,"tags_all":{},"target_role_arn":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-pod-identity-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"eks-pod-identity-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","disable_session_tags":false,"namespace":"example","region":"us-east-1","service_account":"example-sa","tags":null,"tags_all":{},"target_role_arn":null},"after_unknown":{"association_arn":true,"association_id":true,"external_id":true,"id":true,"role_arn":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-pod-identity-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"eks-pod-identity-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"819195744","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sts:TagSession\",\n \"sts:AssumeRole\"\n ],\n \"Principal\": {\n \"Service\": \"pods.eks.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole","sts:TagSession"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["pods.eks.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false,false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example1.arn","aws_iam_role.example1"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"namespace":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"service_account":{"constant_value":"example-sa"}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"eks-pod-identity-example"}},"schema_version":0},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example1.name","aws_iam_role.example1"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example1.name","aws_iam_role.example1"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole","sts:TagSession"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["pods.eks.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.example2","attribute":["id"]},{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.example1","attribute":["name"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example1","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:58Z","applyable":true,"complete":true,"errored":false}
73
I need to spin up a managed container environment that can reach the rest of our cloud network, and it should be reachable from outside our private network while keeping the setup simple and secure.
Create a Terraform configuration to provision an AWS IAM role with attribute name set to "example" for an Amazon EKS cluster. The role's assume role policy should allow access for EKS services. Attach the AmazonEKSClusterPolicy to this role. Additionally, define an AWS EKS cluster with a name set to "example", with a subnet and attached VPC. Ensure proper dependency handling for the IAM role's policy attachment during the EKS cluster creation process. The EKS cluster's endpoint private access should be set to false, and endpoint public access set to true
has one "aws_iam_role" with one "name" with one "assume_role_policy" has one "aws_iam_role_policy_attachment" with one "policy_arn" with one "role" referencing the "aws_iam_role.eks.name" has one "aws_eks_cluster" with one "name" with one "version" with one "role_arn" with one "vpc_config" containing "endpoint_private_access", "endpoint_public_access", and "subnet_ids"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "private-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_subnet" "public-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" } resource "aws_iam_role" "example" { name = "example" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "eks" { name = "example" version = "test-version" role_arn = aws_iam_role.example.arn vpc_config { endpoint_private_access = false endpoint_public_access = true subnet_ids = [ aws_subnet.private-us-east-1a.id, aws_subnet.public-us-east-1a.id ] } depends_on = [aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy] }
package terraform.analysis default has_aws_iam_role = false default has_aws_iam_role_policy_attachment = false default has_aws_eks_cluster = false has_aws_iam_role { r := input.configuration.root_module.resources[_] r.type == "aws_iam_role" r.expressions.name.constant_value == "example" r.expressions.assume_role_policy } has_aws_iam_role_policy_attachment { r := input.configuration.root_module.resources[_] r.type == "aws_iam_role_policy_attachment" r.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" r.expressions.role.references != null } has_aws_eks_cluster { r := input.configuration.root_module.resources[_] r.type == "aws_eks_cluster" r.expressions.role_arn r.expressions.vpc_config[_].endpoint_private_access.constant_value == false r.expressions.vpc_config[_].endpoint_public_access.constant_value == true count(r.expressions.vpc_config[_].subnet_ids.references) == 4 } valid_config { has_aws_iam_role has_aws_iam_role_policy_attachment has_aws_eks_cluster }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"endpoint_private_access":{"constant_value":false},"endpoint_public_access":{"constant_value":true},"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a","aws_subnet.public-us-east-1a.id","aws_subnet.public-us-east-1a"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_subnet.public-us-east-1a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:01Z","applyable":true,"complete":true,"errored":false}
74
I need to spin up a managed environment for running containerized workloads, and it should plug into my network and be reachable from the outside while keeping the setup straightforward and secure.
Generate Terraform code to set up an AWS IAM role named 'eks-cluster' for an Amazon EKS cluster. Ensure the role's assume role policy allows access for EKS services and attach the AmazonEKSClusterPolicy to this role. Create an AWS EKS cluster with a name and version, attaching it to a subnet and VPC from us-east-1. Ensure proper dependency handling for the IAM role's policy attachment during EKS cluster creation. The EKS cluster's endpoint private access should be set to false, and endpoint public access set to true
has one "aws_iam_role" with one "name" with one "assume_role_policy" has one "aws_iam_role_policy_attachment" with one "policy_arn" with one "role" referencing the "aws_iam_role.eks.name" has one "aws_eks_cluster" with one "name" with one "version" with one "role_arn" with one "vpc_config" containing "endpoint_private_access", "endpoint_public_access", and "subnet_ids"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "private-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" } resource "aws_subnet" "public-us-east-1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" } resource "aws_iam_role" "example" { name = "eks-cluster" assume_role_policy = <<POLICY { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "eks.amazonaws.com" }, "Action": "sts:AssumeRole" } ] } POLICY } resource "aws_iam_role_policy_attachment" "eks_cluster_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" role = aws_iam_role.example.name } resource "aws_iam_role_policy_attachment" "eks_service_policy" { policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = aws_iam_role.example.name } resource "aws_eks_cluster" "cluster" { name = "test" version = "1.22" role_arn = aws_iam_role.example.arn vpc_config { endpoint_private_access = false endpoint_public_access = true public_access_cidrs = ["0.0.0.0/0"] subnet_ids = [ aws_subnet.private-us-east-1a.id, aws_subnet.public-us-east-1a.id, ] } depends_on = [aws_iam_role_policy_attachment.eks_cluster_policy, aws_iam_role_policy_attachment.eks_service_policy] }
package terraform.analysis default has_aws_iam_role = false default has_aws_iam_role_policy_attachment = false default has_aws_eks_cluster = false has_aws_iam_role { role := input.configuration.root_module.resources[_] role.type == "aws_iam_role" role.expressions.assume_role_policy } has_aws_iam_role_policy_attachment { policy_attachment := input.configuration.root_module.resources[_] policy_attachment.type == "aws_iam_role_policy_attachment" policy_attachment.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" policy_attachment.expressions.role } has_aws_eks_cluster { cluster := input.configuration.root_module.resources[_] cluster.type = "aws_eks_cluster" cluster.expressions.name cluster.expressions.version cluster.expressions.role_arn cluster.expressions.vpc_config[_].endpoint_private_access.constant_value == false cluster.expressions.vpc_config[_].endpoint_public_access.constant_value == true cluster.expressions.vpc_config[_].subnet_ids count(cluster.expressions.vpc_config[_].subnet_ids.references) >= 4 } valid_config { has_aws_iam_role has_aws_iam_role_policy_attachment has_aws_eks_cluster }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"1.22","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"public_access_cidrs":["0.0.0.0/0"],"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[false],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"1.22","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"public_access_cidrs":["0.0.0.0/0"],"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":[false],"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[false],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"1.22"},"vpc_config":[{"endpoint_private_access":{"constant_value":false},"endpoint_public_access":{"constant_value":true},"public_access_cidrs":{"constant_value":["0.0.0.0/0"]},"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a","aws_subnet.public-us-east-1a.id","aws_subnet.public-us-east-1a"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.public-us-east-1a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:08Z","applyable":true,"complete":true,"errored":false}
75
I need a place to keep some files, but it has to block anyone coming from a certain network, and I want the access rules written down clearly so they’re easy to manage later.
Create an AWS S3 bucket named 'my_bucket' and define an S3 bucket policy to deny access from a specific IP address. Ensure that the S3 bucket policy includes a version number, an identifier, and a statement that denies all S3 actions for the specified IP address. Use the 'jsonencode' function to encode the policy in JSON format.
has one "aws_s3_bucket" resource with one "bucket" has one "aws_s3_bucket_policy" with one "bucket" with one "policy"
provider "aws" { region = "us-west-1" } resource "aws_s3_bucket" "a" { bucket = "test_bucket" } resource "aws_s3_bucket_policy" "b" { bucket = aws_s3_bucket.a.id policy = jsonencode({ "Version" : "2012-10-17", "Id" : "my_policy", "Statement" : [ { "Sid" : "IPAllow", "Effect" : "Deny", "Principal" : "*", "Action" : "s3:*", "Resource" : "arn:aws:s3:::test_bucket/*", "Condition" : { "IpAddress" : { "aws:SourceIp" : "1.2.3.4/32" } } } ] }) }
package terraform.validation default valid_configuration = false default has_s3_bucket = false default has_s3_bucket_policy = false # Check for if any aws_s3_bucket with "bucket" has_s3_bucket { resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket" resource.expressions.bucket.constant_value != null } # Check for if any aws_s3_bucket_policy with "bucket" "policy" has_s3_bucket_policy{ resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket_policy" resource.expressions.bucket.references != null has_policy(resource.name) } has_policy(policy_name){ resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket_policy" resource.name == policy_name resource.expressions.policy != null } valid_configuration{ has_s3_bucket has_s3_bucket_policy }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"test_bucket","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy":"{\"Id\":\"my_policy\",\"Statement\":[{\"Action\":\"s3:*\",\"Condition\":{\"IpAddress\":{\"aws:SourceIp\":\"1.2.3.4/32\"}},\"Effect\":\"Deny\",\"Principal\":\"*\",\"Resource\":\"arn:aws:s3:::test_bucket/*\",\"Sid\":\"IPAllow\"}],\"Version\":\"2012-10-17\"}","region":"us-west-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"test_bucket","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy":"{\"Id\":\"my_policy\",\"Statement\":[{\"Action\":\"s3:*\",\"Condition\":{\"IpAddress\":{\"aws:SourceIp\":\"1.2.3.4/32\"}},\"Effect\":\"Deny\",\"Principal\":\"*\",\"Resource\":\"arn:aws:s3:::test_bucket/*\",\"Sid\":\"IPAllow\"}],\"Version\":\"2012-10-17\"}","region":"us-west-1"},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"test_bucket"}},"schema_version":0},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.a.id","aws_s3_bucket.a"]},"policy":{}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:13Z","applyable":true,"complete":true,"errored":false}
76
I need a secure place to store some files where everything stays private by default, is encrypted automatically, and can’t accidentally be exposed to the public.
Create an AWS S3 bucket named 'test-bucket' with preventive destruction measures, private ACLs, AES256 server-side encryption, and a public access block restricting public access.
has one "aws_s3_bucket" resource with one "bucket" has one "aws_s3_bucket_acl" with one "bucket" with one "acl" or "access_control_policy" has one "aws_s3_bucket_public_access_block" with one "bucket" has one "aws_s3_bucket_server_side_encryption_configuration" with one "bucket" with one "rule"
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "backstage" { bucket_prefix = "test-bucket-" } resource "aws_s3_bucket_ownership_controls" "example" { bucket = aws_s3_bucket.backstage.id rule { object_ownership = "BucketOwnerPreferred" } } resource "aws_s3_bucket_acl" "backstage_acl" { depends_on = [ aws_s3_bucket_ownership_controls.example ] bucket = aws_s3_bucket.backstage.id acl = "private" } resource "aws_s3_bucket_server_side_encryption_configuration" "backstage_server_side_encription" { bucket = aws_s3_bucket.backstage.id rule { apply_server_side_encryption_by_default { sse_algorithm = "AES256" } } } resource "aws_s3_bucket_public_access_block" "backstage" { bucket = aws_s3_bucket.backstage.id block_public_acls = true block_public_policy = true ignore_public_acls = true restrict_public_buckets = true }
package terraform.validation default valid_configuration = false default has_s3_bucket = false default has_aws_s3_bucket_acl = false default has_aws_s3_bucket_public_access_block = false default has_aws_s3_bucket_server_side_encryption_configuration = false has_s3_bucket { resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket" # resource.name == "backstage" # some i # resource.expressions.bucket.references[i] == "var.bucket_name" } has_aws_s3_bucket_acl{ resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket_acl" # resource.name == "backstage" resource.expressions.acl.constant_value != null } has_aws_s3_bucket_public_access_block{ resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket_public_access_block" resource.expressions.bucket.references != null } has_aws_s3_bucket_server_side_encryption_configuration{ resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket_server_side_encryption_configuration" # resource.name == "backstage" # some i, j, k # resource.expressions.server_side_encryption_configuration[i].rule[j].apply_server_side_encryption_by_default[k].sse_algorithm.constant_value == "AES256" != null some i, j resource.expressions.rule[i].apply_server_side_encryption_by_default[j].sse_algorithm.constant_value == "AES256" } valid_configuration{ has_s3_bucket has_aws_s3_bucket_acl has_aws_s3_bucket_public_access_block has_aws_s3_bucket_server_side_encryption_configuration }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"test-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"acl":"private","expected_bucket_owner":null,"region":"us-east-1"},"sensitive_values":{"access_control_policy":[]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","rule":[{"object_ownership":"BucketOwnerPreferred"}]},"sensitive_values":{"rule":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"sensitive_values":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"test-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"acl":"private","expected_bucket_owner":null,"region":"us-east-1"},"after_unknown":{"access_control_policy":true,"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{"access_control_policy":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","rule":[{"object_ownership":"BucketOwnerPreferred"}]},"after_unknown":{"bucket":true,"id":true,"rule":[{}]},"before_sensitive":false,"after_sensitive":{"rule":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"after_unknown":{"bucket":true,"id":true,"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"before_sensitive":false,"after_sensitive":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"test-bucket-"}},"schema_version":0},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_config_key":"aws","expressions":{"acl":{"constant_value":"private"},"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]}},"schema_version":0,"depends_on":["aws_s3_bucket_ownership_controls.example"]},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"rule":[{"object_ownership":{"constant_value":"BucketOwnerPreferred"}}]},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"rule":[{"apply_server_side_encryption_by_default":[{"sse_algorithm":{"constant_value":"AES256"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.backstage","attribute":["id"]}],"timestamp":"2026-02-18T20:56:23Z","applyable":true,"complete":true,"errored":false}
77
I need a place to keep files where old versions are preserved automatically, and it should be locked down so only our own account is recognized as the owner.
Create a bucket "sample". Implement versioning resource for the AWS S3 bucket named 'sample' with the versioning status set to 'Enabled' and specify the expected_bucket_owner as '123456789012' to ensure ownership consistency.
has one aws_s3_bucket resource with bucket has one "aws_s3_bucket_versioning" resource with bucket with versionaning_configuration with status
provider "aws" { region = "us-west-1" } resource "aws_s3_bucket" "sample" { bucket = "sample" } resource "aws_s3_bucket_versioning" "sample" { bucket = "sample" versioning_configuration { status = "Enabled" } expected_bucket_owner = "123456789012" }
package terraform.validation default has_s3_bucket_versioning = false default has_s3_bucket = false default valid_configuration = false has_s3_bucket { resource := input.configuration.root_module.resources[_] resource.type == "aws_s3_bucket" resource.name == "sample" } has_s3_bucket_versioning { versioning := input.planned_values.root_module.resources[_] versioning.type == "aws_s3_bucket_versioning" versioning.values.bucket == "sample" versioning.values.expected_bucket_owner == "123456789012" versioning.values.versioning_configuration[_].status == "Enabled" } valid_configuration { has_s3_bucket has_s3_bucket_versioning }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"sample","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"sample","expected_bucket_owner":"123456789012","mfa":null,"region":"us-west-1","versioning_configuration":[{"status":"Enabled"}]},"sensitive_values":{"versioning_configuration":[{}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"sample","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"sample","expected_bucket_owner":"123456789012","mfa":null,"region":"us-west-1","versioning_configuration":[{"status":"Enabled"}]},"after_unknown":{"id":true,"versioning_configuration":[{"mfa_delete":true}]},"before_sensitive":false,"after_sensitive":{"versioning_configuration":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"sample"}},"schema_version":0},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"sample"},"expected_bucket_owner":{"constant_value":"123456789012"},"versioning_configuration":[{"status":{"constant_value":"Enabled"}}]},"schema_version":0}]}},"timestamp":"2026-02-18T20:56:22Z","applyable":true,"complete":true,"errored":false}
78
I need a reliable place to keep my infrastructure setup files so changes don’t get lost, plus some way to prevent multiple people from editing them at the same time, and it all needs to be protected against accidental removal and kept private.
Set up an AWS S3 bucket and DynamoDB table for Terraform state management. Ensure the S3 bucket has preventive measures against accidental deletion and is configured with versioning enabled, server-side encryption using AES256, and public access restrictions. Create a DynamoDB table with a hash key named 'LockID' using 'PAY_PER_REQUEST' billing mode for Terraform locking.
has one aws_s3_bucket_versioning resource with bucket with status has one aws_dynamodb_table resource with name with hash_key has one aws_s3_bucket_lifecycle_configuration resource with bucket with rule with id with status with action with transition with days with storage_class has one aws_s3_bucket_server_side_encryption_configuration resource with bucket with rule with apply_server_side_encryption_by_default with sse_algorithm has one aws_s3_bucket_public_access_block resource with bucket with block_public_acls (boolean) with block_public_policy (boolean) with ignore_public_acls (boolean) with restrict_public_buckets(boolean) has one aws_dynamodb_table resource with name with hash_key with attribute with name with type
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_s3_bucket" "terraform_state" { bucket = "iac-misc-terraform-state" } resource "aws_s3_bucket_versioning" "enabled" { bucket = aws_s3_bucket.terraform_state.id versioning_configuration { status = "Enabled" } } resource "aws_s3_bucket_server_side_encryption_configuration" "default" { bucket = aws_s3_bucket.terraform_state.id rule { apply_server_side_encryption_by_default { sse_algorithm = "AES256" } } } resource "aws_s3_bucket_public_access_block" "public_access" { bucket = aws_s3_bucket.terraform_state.id block_public_acls = true block_public_policy = true ignore_public_acls = true restrict_public_buckets = true } resource "aws_dynamodb_table" "terraform_locks" { name = "iac-misc-terraform-locks" billing_mode = "PAY_PER_REQUEST" hash_key = "LockID" attribute { name = "LockID" type = "S" } }
package terraform.validation default has_s3_bucket_versioning = false default has_dynamodb_table = false default has_s3_bucket_server_side_encryption_configuration = false default has_s3_bucket_public_access_block = false default valid_configuration = false # Check for aws_s3_bucket_versioning resource with 'bucket' and 'status' has_s3_bucket_versioning { versioning := input.planned_values.root_module.resources[_] versioning.type == "aws_s3_bucket_versioning" versioning.values.versioning_configuration[_].status == "Enabled" } # Check for aws_dynamodb_table resource with 'name' and 'hash_key' has_dynamodb_table { some i table := input.planned_values.root_module.resources[i] table.type == "aws_dynamodb_table" table.values.name != null table.values.hash_key != null } # Check for aws_s3_bucket_server_side_encryption_configuration resource with 'bucket', 'rule', and 'sse_algorithm' has_s3_bucket_server_side_encryption_configuration { some i encryption := input.planned_values.root_module.resources[i] encryption.type == "aws_s3_bucket_server_side_encryption_configuration" encryption.values.rule != null encryption.values.rule[0].apply_server_side_encryption_by_default != null encryption.values.rule[0].apply_server_side_encryption_by_default[0].sse_algorithm != null } # Check for aws_s3_bucket_public_access_block resource with 'bucket' and boolean flags has_s3_bucket_public_access_block { some i access_block := input.planned_values.root_module.resources[i] access_block.type == "aws_s3_bucket_public_access_block" access_block.values.block_public_acls == true access_block.values.block_public_policy == true access_block.values.ignore_public_acls == true access_block.values.restrict_public_buckets == true } # Combined validation rule valid_configuration { has_s3_bucket_versioning has_dynamodb_table has_s3_bucket_server_side_encryption_configuration has_s3_bucket_public_access_block }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"attribute":[{"name":"LockID","type":"S"}],"billing_mode":"PAY_PER_REQUEST","deletion_protection_enabled":null,"hash_key":"LockID","import_table":[],"local_secondary_index":[],"name":"iac-misc-terraform-locks","on_demand_throughput":[],"range_key":null,"region":"us-east-1","replica":[],"restore_date_time":null,"restore_source_name":null,"restore_source_table_arn":null,"restore_to_latest_time":null,"stream_enabled":null,"table_class":null,"tags":null,"timeouts":null},"sensitive_values":{"attribute":[{}],"global_secondary_index":[],"global_table_witness":[],"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":[],"replica":[],"server_side_encryption":[],"tags_all":{},"ttl":[],"warm_throughput":[]}},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"iac-misc-terraform-state","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"sensitive_values":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"mfa":null,"region":"us-east-1","versioning_configuration":[{"status":"Enabled"}]},"sensitive_values":{"versioning_configuration":[{}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"attribute":[{"name":"LockID","type":"S"}],"billing_mode":"PAY_PER_REQUEST","deletion_protection_enabled":null,"hash_key":"LockID","import_table":[],"local_secondary_index":[],"name":"iac-misc-terraform-locks","on_demand_throughput":[],"range_key":null,"region":"us-east-1","replica":[],"restore_date_time":null,"restore_source_name":null,"restore_source_table_arn":null,"restore_to_latest_time":null,"stream_enabled":null,"table_class":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"attribute":[{}],"global_secondary_index":true,"global_table_witness":true,"id":true,"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":true,"read_capacity":true,"replica":[],"server_side_encryption":true,"stream_arn":true,"stream_label":true,"stream_view_type":true,"tags_all":true,"ttl":true,"warm_throughput":true,"write_capacity":true},"before_sensitive":false,"after_sensitive":{"attribute":[{}],"global_secondary_index":[],"global_table_witness":[],"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":[],"replica":[],"server_side_encryption":[],"tags_all":{},"ttl":[],"warm_throughput":[]}}},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"iac-misc-terraform-state","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"after_unknown":{"bucket":true,"id":true,"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"before_sensitive":false,"after_sensitive":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"mfa":null,"region":"us-east-1","versioning_configuration":[{"status":"Enabled"}]},"after_unknown":{"bucket":true,"id":true,"versioning_configuration":[{"mfa_delete":true}]},"before_sensitive":false,"after_sensitive":{"versioning_configuration":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_config_key":"aws","expressions":{"attribute":[{"name":{"constant_value":"LockID"},"type":{"constant_value":"S"}}],"billing_mode":{"constant_value":"PAY_PER_REQUEST"},"hash_key":{"constant_value":"LockID"},"name":{"constant_value":"iac-misc-terraform-locks"}},"schema_version":1},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"iac-misc-terraform-state"}},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"rule":[{"apply_server_side_encryption_by_default":[{"sse_algorithm":{"constant_value":"AES256"}}]}]},"schema_version":0},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"versioning_configuration":[{"status":{"constant_value":"Enabled"}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.terraform_state","attribute":["id"]}],"timestamp":"2026-02-18T20:56:43Z","applyable":true,"complete":true,"errored":false}
79
I need a place to store files where the people downloading them, not us, should cover the access costs, and it should be simple to manage.
create a bucket 'pike-680235478471'. Set up request payment configuration for an AWS S3 bucket named 'pike-680235478471', specifying the payer as 'Requester'.
has one aws_s3_bucket resource with bucket has one aws_s3_bucket_request_payment_configuration resource with bucket with payer (BucketOwner or Requester)
provider "aws" { region = "us-west-1" } resource "aws_s3_bucket" "a" { bucket = "pike-680235478471" } resource "aws_s3_bucket_request_payment_configuration" "pike" { bucket = "pike-680235478471" payer = "Requester" }
package terraform.validation default has_s3_bucket = false default has_s3_bucket_request_payment_configuration = false default valid_configuration = false has_s3_bucket { some i bucket := input.planned_values.root_module.resources[i] bucket.type == "aws_s3_bucket" bucket.values.bucket == "pike-680235478471" } has_s3_bucket_request_payment_configuration { some i payment_config := input.planned_values.root_module.resources[i] payment_config.type == "aws_s3_bucket_request_payment_configuration" payment_config.values.bucket == "pike-680235478471" payment_config.values.payer == "Requester" } valid_configuration { has_s3_bucket has_s3_bucket_request_payment_configuration }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","expected_bucket_owner":null,"payer":"Requester","region":"us-west-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","expected_bucket_owner":null,"payer":"Requester","region":"us-west-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"}},"schema_version":0},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"},"payer":{"constant_value":"Requester"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:56:50Z","applyable":true,"complete":true,"errored":false}
80
I need to make sure that a place where we keep files isn’t accidentally exposed to the outside world, and it should default to being as locked down as possible.
Implement public access block settings for an AWS S3 bucket named 'pike-680235478471' to block public ACLs, public policies, and restrict public buckets.
has one aws_s3_bucket resource with bucket has one aws_s3_bucket_public_access_block resource with bucket with block_public_acls (boolean) with block_public_policy (boolean) with ignore_public_acls (boolean) with restrict_public_buckets (boolean)
provider "aws" { region = "us-west-1" } resource "aws_s3_bucket" "a" { bucket = "pike-680235478471" } resource "aws_s3_bucket_public_access_block" "example" { bucket = "pike-680235478471" block_public_acls = true block_public_policy = true ignore_public_acls = true restrict_public_buckets = true }
package terraform.validation default has_s3_bucket = false default has_s3_bucket_public_access_block = false default valid_configuration = false has_s3_bucket { resource := input.planned_values.root_module.resources[_] resource.type == "aws_s3_bucket" resource.values.bucket == "pike-680235478471" } has_s3_bucket_public_access_block { some i resource := input.planned_values.root_module.resources[i] resource.type == "aws_s3_bucket_public_access_block" resource.values.bucket == "pike-680235478471" resource.values.block_public_acls == true resource.values.block_public_policy == true resource.values.ignore_public_acls == true resource.values.restrict_public_buckets == true } valid_configuration { has_s3_bucket has_s3_bucket_public_access_block }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"bucket":"pike-680235478471","ignore_public_acls":true,"region":"us-west-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"bucket":"pike-680235478471","ignore_public_acls":true,"region":"us-west-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"}},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"constant_value":"pike-680235478471"},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:01Z","applyable":true,"complete":true,"errored":false}
81
I need to place a new file into our cloud storage in a way that keeps things simple and lets me control where it goes.
Craft a Terraform configuration for creating an AWS S3 bucket object. Define an S3 bucket object (with value "object") with specific attributes including the bucket name (with value "your_bucket_name"), object key (with value "new_object_key"), and the path to the source file (with value "path/to/file").
Resource "aws_s3_bucket_object" has one "bucket" has one "key" has one "source" has one "etag"
provider "aws" { region = "us-west-1" } resource "aws_s3_bucket_object" "object" { bucket = "your_bucket_name" key = "new_object_key" source = "path/to/file" }
package terraform.validation default has_aws_s3_bucket_object = false has_aws_s3_bucket_object { object := input.planned_values.root_module.resources[_] object.type == "aws_s3_bucket_object" object.name == "object" object.values.bucket == "your_bucket_name" object.values.key == "new_object_key" object.values.source == "path/to/file" } valid_configuration { has_aws_s3_bucket_object }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"acl":"private","bucket":"your_bucket_name","cache_control":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"new_object_key","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"region":"us-west-1","source":"path/to/file","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"acl":"private","bucket":"your_bucket_name","cache_control":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"new_object_key","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"region":"us-west-1","source":"path/to/file","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"arn":true,"bucket_key_enabled":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"your_bucket_name"},"key":{"constant_value":"new_object_key"},"source":{"constant_value":"path/to/file"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:11Z","applyable":true,"complete":true,"errored":false}
82
I need a way to automatically pick the newest stable system image for our servers so we’re always starting from an up‑to‑date base without having to track it manually.
Create an AWS aws_ami resource for the latest Amazon Linux 2 AMI
create aws_ami resource with name = any
provider "aws" { region = "us-east-1" } data "aws_ami" "latest_amazon_linux_2" { most_recent = true owners = ["amazon"] filter { name = "name" values = ["amzn2-ami-hvm-*-x86_64-gp2"] } }
package terraform default ami_latest_amazon_linux_2 = false ami_latest_amazon_linux_2 { resource := input.configuration.root_module.resources[_] resource.type == "aws_ami" resource.name == "latest_amazon_linux_2" resource.expressions.filter[_].name.constant_value == "name" resource.expressions.filter[_].values.constant_value[_] == "amzn2-ami-hvm-*-x86_64-gp2" resource.expressions.most_recent.constant_value == true resource.expressions.owners.constant_value[_] == "amazon" }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{}},"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_unsafe_filter":null,"architecture":"x86_64","arn":"arn:aws:ec2:us-east-1::image/ami-0e349888043265b96","block_device_mappings":[{"device_name":"/dev/xvda","ebs":{"delete_on_termination":"true","encrypted":"false","iops":"0","snapshot_id":"snap-0a7144882096adc05","throughput":"0","volume_initialization_rate":"0","volume_size":"8","volume_type":"gp2"},"no_device":"","virtual_name":""}],"boot_mode":"","creation_date":"2026-02-04T02:08:09.000Z","deprecation_time":"2026-05-05T02:13:00.000Z","description":"Amazon Linux 2 AMI 2.0.20260202.2 x86_64 HVM gp2","ena_support":true,"executable_users":null,"filter":[{"name":"name","values":["amzn2-ami-hvm-*-x86_64-gp2"]}],"hypervisor":"xen","id":"ami-0e349888043265b96","image_id":"ami-0e349888043265b96","image_location":"amazon/amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","image_owner_alias":"amazon","image_type":"machine","imds_support":"","include_deprecated":false,"kernel_id":"","last_launched_time":"","most_recent":true,"name":"amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","name_regex":null,"owner_id":"137112412989","owners":["amazon"],"platform":"","platform_details":"Linux/UNIX","product_codes":[],"public":true,"ramdisk_id":"","region":"us-east-1","root_device_name":"/dev/xvda","root_device_type":"ebs","root_snapshot_id":"snap-0a7144882096adc05","sriov_net_support":"simple","state":"available","state_reason":{"code":"UNSET","message":"UNSET"},"tags":{},"timeouts":null,"tpm_support":"","uefi_data":null,"usage_operation":"RunInstances","virtualization_type":"hvm"},"sensitive_values":{"block_device_mappings":[{"ebs":{}}],"filter":[{"values":[false]}],"owners":[false],"product_codes":[],"state_reason":{},"tags":{}}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_config_key":"aws","expressions":{"filter":[{"name":{"constant_value":"name"},"values":{"constant_value":["amzn2-ami-hvm-*-x86_64-gp2"]}}],"most_recent":{"constant_value":true},"owners":{"constant_value":["amazon"]}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:18Z","applyable":false,"complete":true,"errored":false}
83
I need a way to automatically pull in the newest version of our base system image so our servers always start from an up‑to‑date foundation.
Create an AWS aws_ami for the latest Amazon Linux 2 AMI
create aws_ami resource with name = any
provider "aws" { region = "us-east-1" } data "aws_ami" "latest_amazon_linux_2" { most_recent = true owners = ["amazon"] filter { name = "name" values = ["amzn2-ami-hvm-*-x86_64-gp2"] } }
package terraform default ami_latest_amazon_linux_2 = false ami_latest_amazon_linux_2 { resource := input.configuration.root_module.resources[_] resource.type == "aws_ami" resource.name == "latest_amazon_linux_2" resource.expressions.filter[_].name.constant_value == "name" resource.expressions.filter[_].values.constant_value[_] == "amzn2-ami-hvm-*-x86_64-gp2" resource.expressions.most_recent.constant_value == true resource.expressions.owners.constant_value[_] == "amazon" }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{}},"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_unsafe_filter":null,"architecture":"x86_64","arn":"arn:aws:ec2:us-east-1::image/ami-0e349888043265b96","block_device_mappings":[{"device_name":"/dev/xvda","ebs":{"delete_on_termination":"true","encrypted":"false","iops":"0","snapshot_id":"snap-0a7144882096adc05","throughput":"0","volume_initialization_rate":"0","volume_size":"8","volume_type":"gp2"},"no_device":"","virtual_name":""}],"boot_mode":"","creation_date":"2026-02-04T02:08:09.000Z","deprecation_time":"2026-05-05T02:13:00.000Z","description":"Amazon Linux 2 AMI 2.0.20260202.2 x86_64 HVM gp2","ena_support":true,"executable_users":null,"filter":[{"name":"name","values":["amzn2-ami-hvm-*-x86_64-gp2"]}],"hypervisor":"xen","id":"ami-0e349888043265b96","image_id":"ami-0e349888043265b96","image_location":"amazon/amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","image_owner_alias":"amazon","image_type":"machine","imds_support":"","include_deprecated":false,"kernel_id":"","last_launched_time":"","most_recent":true,"name":"amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","name_regex":null,"owner_id":"137112412989","owners":["amazon"],"platform":"","platform_details":"Linux/UNIX","product_codes":[],"public":true,"ramdisk_id":"","region":"us-east-1","root_device_name":"/dev/xvda","root_device_type":"ebs","root_snapshot_id":"snap-0a7144882096adc05","sriov_net_support":"simple","state":"available","state_reason":{"code":"UNSET","message":"UNSET"},"tags":{},"timeouts":null,"tpm_support":"","uefi_data":null,"usage_operation":"RunInstances","virtualization_type":"hvm"},"sensitive_values":{"block_device_mappings":[{"ebs":{}}],"filter":[{"values":[false]}],"owners":[false],"product_codes":[],"state_reason":{},"tags":{}}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_config_key":"aws","expressions":{"filter":[{"name":{"constant_value":"name"},"values":{"constant_value":["amzn2-ami-hvm-*-x86_64-gp2"]}}],"most_recent":{"constant_value":true},"owners":{"constant_value":["amazon"]}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:26Z","applyable":false,"complete":true,"errored":false}
84
I need a super-fast, in-memory place to stash frequently used data so my app can handle bursts of traffic without slowing down.
Provide a Memcached Cluster
requires cluster id, engine=memcached, node_type, num_cache_nodes, parameter_group_name
provider "aws" { region="us-east-1" } resource "aws_elasticache_cluster" "example" { cluster_id = "cluster-example" engine = "memcached" node_type = "cache.m4.large" num_cache_nodes = 2 parameter_group_name = "default.memcached1.4" port = 11211 }
package main import future.keywords.in default allow = false aws_elasticache_cluster_valid(resources) { some resource in resources resource.type == "aws_elasticache_cluster" resource.change.after.engine == "memcached" } # Aggregate all checks allow { aws_elasticache_cluster_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"memcached","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":2,"outpost_mode":null,"parameter_group_name":"default.memcached1.4","port":11211,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"sensitive_values":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"memcached","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":2,"outpost_mode":null,"parameter_group_name":"default.memcached1.4","port":11211,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"after_unknown":{"apply_immediately":true,"arn":true,"availability_zone":true,"az_mode":true,"cache_nodes":true,"cluster_address":true,"configuration_endpoint":true,"engine_version":true,"engine_version_actual":true,"id":true,"ip_discovery":true,"log_delivery_configuration":[],"maintenance_window":true,"network_type":true,"preferred_outpost_arn":true,"replication_group_id":true,"security_group_ids":true,"snapshot_window":true,"subnet_group_name":true,"tags_all":true,"transit_encryption_enabled":true},"before_sensitive":false,"after_sensitive":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_id":{"constant_value":"cluster-example"},"engine":{"constant_value":"memcached"},"node_type":{"constant_value":"cache.m4.large"},"num_cache_nodes":{"constant_value":2},"parameter_group_name":{"constant_value":"default.memcached1.4"},"port":{"constant_value":11211}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:50Z","applyable":true,"complete":true,"errored":false}
85
I need a super fast place to temporarily store frequently used data so my app can respond quickly, but I want to keep the setup pretty simple.
Provide a Redis Instance
requires cluster id, engine=redis, node_type, num_cache_nodes, parameter_group_name
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_cluster" "example" { cluster_id = "cluster-example" engine = "redis" node_type = "cache.m4.large" num_cache_nodes = 1 parameter_group_name = "default.redis3.2" engine_version = "3.2.10" port = 6379 }
package main import future.keywords.in default allow = false aws_elasticache_cluster_valid(resources) { some resource in resources resource.type == "aws_elasticache_cluster" resource.change.after.engine == "redis" } # Aggregate all checks allow { aws_elasticache_cluster_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"redis","engine_version":"3.2.10","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":1,"outpost_mode":null,"parameter_group_name":"default.redis3.2","port":6379,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"sensitive_values":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"redis","engine_version":"3.2.10","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":1,"outpost_mode":null,"parameter_group_name":"default.redis3.2","port":6379,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"after_unknown":{"apply_immediately":true,"arn":true,"availability_zone":true,"az_mode":true,"cache_nodes":true,"cluster_address":true,"configuration_endpoint":true,"engine_version_actual":true,"id":true,"ip_discovery":true,"log_delivery_configuration":[],"maintenance_window":true,"network_type":true,"preferred_outpost_arn":true,"replication_group_id":true,"security_group_ids":true,"snapshot_window":true,"subnet_group_name":true,"tags_all":true,"transit_encryption_enabled":true},"before_sensitive":false,"after_sensitive":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_id":{"constant_value":"cluster-example"},"engine":{"constant_value":"redis"},"engine_version":{"constant_value":"3.2.10"},"node_type":{"constant_value":"cache.m4.large"},"num_cache_nodes":{"constant_value":1},"parameter_group_name":{"constant_value":"default.redis3.2"},"port":{"constant_value":6379}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:57Z","applyable":true,"complete":true,"errored":false}
86
I need a way for certain parts of our system to interact with our fast in‑memory data layer, but only with tightly limited permissions for security.
Provide an ElastiCache user resource with redis
requires access string, engine = REDIS, user id and user name
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_user" "test" { user_id = "testUserId" user_name = "testUserName" access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember" engine = "REDIS" passwords = ["password123456789"] }
package main import future.keywords.in default allow = false aws_elasticache_user_valid(resources) { some resource in resources resource.type == "aws_elasticache_user" resource.change.after.engine == "REDIS" } # Aggregate all checks allow { aws_elasticache_user_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:04Z","applyable":true,"complete":true,"errored":false}
87
I need to set up a way for a specific person or system to safely interact with our fast in‑memory data layer, using our existing identity setup to control what they can do.
Provide an ElastiCache user resource with iam
requires access string, engine = REDIS, user id and user name, authentication_mode {type = "iam"}
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_user" "test" { user_id = "testUserId" user_name = "testUserName" access_string = "on ~* +@all" engine = "REDIS" authentication_mode { type = "iam" } }
package main import future.keywords.in default allow = false aws_elasticache_user_valid(resources) { some resource in resources resource.type == "aws_elasticache_user" resource.change.after.authentication_mode[_].type == "iam" } # Aggregate all checks allow { aws_elasticache_user_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":null,"type":"iam"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":null,"type":"iam"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":[{"password_count":true}],"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~* +@all"},"authentication_mode":[{"type":{"constant_value":"iam"}}],"engine":{"constant_value":"REDIS"},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:14Z","applyable":true,"complete":true,"errored":false}
88
I need a way to control who can interact with our in‑memory data layer, using a setup that requires people to log in securely.
Provide an ElastiCache user resource with password.
requires access string, engine = REDIS, user id and user name, authentication_mode {type= "password", passwords = ["password1", "password2"]}
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_user" "test" { user_id = "testUserId" user_name = "testUserName" access_string = "on ~* +@all" engine = "REDIS" authentication_mode { type = "password" passwords = ["password1", "password2"] } }
package main import future.keywords.in default allow = false aws_elasticache_user_valid(resources) { some resource in resources resource.type == "aws_elasticache_user" resource.change.after.authentication_mode[_].type == "password" } # Aggregate all checks allow { aws_elasticache_user_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":["password1","password2"],"type":"password"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":["password1","password2"],"type":"password"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":[{"password_count":true,"passwords":[false,false]}],"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~* +@all"},"authentication_mode":[{"passwords":{"constant_value":["password1","password2"]},"type":{"constant_value":"password"}}],"engine":{"constant_value":"REDIS"},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:19Z","applyable":true,"complete":true,"errored":false}
89
I need a way to manage who can do what in our shared in‑memory data service so we can keep things secure without making access too complicated.
Provide an ElastiCache user group resource.
creates elasticache user resources(requires access string, engine = REDIS, user id and user name) and sets engine , creates group resource using the user ids
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_user" "test" { user_id = "testUserId" user_name = "default" access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember" engine = "REDIS" passwords = ["password123456789"] } resource "aws_elasticache_user_group" "test" { engine = "REDIS" user_group_id = "userGroupId" user_ids = [aws_elasticache_user.test.user_id] }
package main import future.keywords.in default allow = false aws_elasticache_user_group_valid(resources) { some resource in resources resource.type == "aws_elasticache_user_group" } # Aggregate all checks allow { aws_elasticache_user_group_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"default"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["testUserId"]},"sensitive_values":{"tags_all":{},"user_ids":[false]}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"default"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["testUserId"]},"after_unknown":{"arn":true,"id":true,"tags_all":true,"user_ids":[false]},"before_sensitive":false,"after_sensitive":{"tags_all":{},"user_ids":[false]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"default"}},"schema_version":0},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_config_key":"aws","expressions":{"engine":{"constant_value":"REDIS"},"user_group_id":{"constant_value":"userGroupId"},"user_ids":{"references":["aws_elasticache_user.test.user_id","aws_elasticache_user.test"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elasticache_user.test","attribute":["user_id"]}],"timestamp":"2026-02-18T20:58:21Z","applyable":true,"complete":true,"errored":false}
90
I need to make sure one of our app’s user accounts is included in the right collection of permissions so it can access shared data safely without over‑privilege.
Associate an existing ElastiCache user and an existing user group.
creates elasticache user group and a user resource then associates the 2 using ids
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_elasticache_user" "default" { user_id = "defaultUserID" user_name = "default" access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember" engine = "REDIS" passwords = ["password123456789"] } resource "aws_elasticache_user_group" "example"{ engine = "REDIS" user_group_id = "userGroupId" user_ids = [aws_elasticache_user.default.user_id] lifecycle { ignore_changes = [user_ids] } } resource "aws_elasticache_user" "example" { user_id = "exampleUserID" user_name = "exampleuser" access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember" engine = "REDIS" passwords = ["password123456789"] } resource "aws_elasticache_user_group_association" "example" { user_group_id = aws_elasticache_user_group.example.user_group_id user_id = aws_elasticache_user.example.user_id }
package main import future.keywords.in default allow = false # Check if AWS ElastiCache user group exists aws_elasticache_user_group_exists(resources) { some resource in resources resource.type == "aws_elasticache_user_group" resource.change.actions[_] == "create" } # Check if AWS ElastiCache user exists aws_elasticache_user_exists(resources) { some resource in resources resource.type == "aws_elasticache_user" resource.change.actions[_] == "create" } # Check if AWS ElastiCache user group association is valid aws_elasticache_user_group_association_valid(resources) { aws_elasticache_user_exists(resources) aws_elasticache_user_group_exists(resources) some resource in resources resource.type == "aws_elasticache_user_group_association" resource.change.actions[_] == "create" user_id := resource.change.after.user_id group_id := resource.change.after.user_group_id user_id_exists(user_id, resources) group_id_exists(group_id, resources) } # Helper functions to check if user_id and group_id exist in the resources user_id_exists(user_id, resources) { some resource in resources resource.type == "aws_elasticache_user" resource.change.after.user_id == user_id } group_id_exists(group_id, resources) { some resource in resources resource.type == "aws_elasticache_user_group" resource.change.after.user_group_id == group_id } # Aggregate all checks allow { aws_elasticache_user_group_association_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"defaultUserID","user_name":"default"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"exampleUserID","user_name":"exampleuser"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["defaultUserID"]},"sensitive_values":{"tags_all":{},"user_ids":[false]}},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","timeouts":null,"user_group_id":"userGroupId","user_id":"exampleUserID"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"defaultUserID","user_name":"default"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"exampleUserID","user_name":"exampleuser"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["defaultUserID"]},"after_unknown":{"arn":true,"id":true,"tags_all":true,"user_ids":[false]},"before_sensitive":false,"after_sensitive":{"tags_all":{},"user_ids":[false]}}},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","timeouts":null,"user_group_id":"userGroupId","user_id":"exampleUserID"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"defaultUserID"},"user_name":{"constant_value":"default"}},"schema_version":0},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"exampleUserID"},"user_name":{"constant_value":"exampleuser"}},"schema_version":0},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_config_key":"aws","expressions":{"engine":{"constant_value":"REDIS"},"user_group_id":{"constant_value":"userGroupId"},"user_ids":{"references":["aws_elasticache_user.default.user_id","aws_elasticache_user.default"]}},"schema_version":0},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_config_key":"aws","expressions":{"user_group_id":{"references":["aws_elasticache_user_group.example.user_group_id","aws_elasticache_user_group.example"]},"user_id":{"references":["aws_elasticache_user.example.user_id","aws_elasticache_user.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elasticache_user.default","attribute":["user_id"]},{"resource":"aws_elasticache_user.example","attribute":["user_id"]},{"resource":"aws_elasticache_user_group.example","attribute":["user_group_id"]}],"timestamp":"2026-02-18T20:58:25Z","applyable":true,"complete":true,"errored":false}
91
I need a place to run analytics on our data without setting up a bunch of machines, and it should stay simple for now.
Create a RedShift cluster resource with a single node
Has an aws_redshift_cluster resource and check cluster_type is "single_node" or number of nodes is 1
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_redshift_cluster" "example" { cluster_identifier = "tf-redshift-cluster" database_name = "mydb" master_username = "exampleuser" master_password = "Mustbe8characters" node_type = "dc2.large" cluster_type = "single-node" }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 1 } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"exampleuser","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"exampleuser","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"exampleuser"},"node_type":{"constant_value":"dc2.large"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:33Z","applyable":true,"complete":true,"errored":false}
92
I need a data warehouse that can handle spikes in demand but only for a short, controlled period so costs don’t get out of hand.
Create a 2 node RedShift cluster and limit the concurrency scaling to 60 minutes
Has an aws_redshift_cluster resource and check cluster_type is "single_node" or number of nodes is 2, check there is a aws_redshift_usage_limit resouce where the feature type is concurrency_scaling, limit_type is "time", and amount is 60
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" number_of_nodes = 2 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" skip_final_snapshot = true } resource "aws_redshift_usage_limit" "example" { cluster_identifier = aws_redshift_cluster.example.id feature_type = "concurrency-scaling" limit_type = "time" amount = 60 }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 2 } aws_redshift_usage_limit_valid(resources) { some resource in resources resource.type == "aws_redshift_usage_limit" resource.change.after.feature_type == "concurrency-scaling" resource.change.after.limit_type == "time" resource.change.after.amount == 60 } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) aws_redshift_usage_limit_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"amount":60,"breach_action":"log","feature_type":"concurrency-scaling","limit_type":"time","period":"monthly","region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"amount":60,"breach_action":"log","feature_type":"concurrency-scaling","limit_type":"time","period":"monthly","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"cluster_identifier":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_config_key":"aws","expressions":{"amount":{"constant_value":60},"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"feature_type":{"constant_value":"concurrency-scaling"},"limit_type":{"constant_value":"time"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["id"]}],"timestamp":"2026-02-18T20:58:40Z","applyable":true,"complete":true,"errored":false}
93
I need a shared analytics workspace that can handle heavier queries, and I also need to let a specific outside account connect to it securely.
Create a 2 node RedShift cluster and create a new Amazon Redshift endpoint authorization for an account with AWS id 012345678910
Has an aws_redshift_resouce with 2 nodes and creates a aws_redshift_endpoint_authorization resource with account =012345678910
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" number_of_nodes = 2 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" skip_final_snapshot = true } resource "aws_redshift_endpoint_authorization" "example" { account = "012345678910" cluster_identifier = aws_redshift_cluster.example.cluster_identifier }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 2 } # Function to check if Redshift snapshot schedule is every 12 hours aws_redshift_endpoint_authorization_valid(resources) { some resource in resources resource.type == "aws_redshift_endpoint_authorization" resource.change.after.account == "012345678910" } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) aws_redshift_endpoint_authorization_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"account":"012345678910","cluster_identifier":"redshift-cluster-1","force_delete":false,"region":"us-east-1","vpc_ids":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"account":"012345678910","cluster_identifier":"redshift-cluster-1","force_delete":false,"region":"us-east-1","vpc_ids":null},"after_unknown":{"allowed_all_vpcs":true,"endpoint_count":true,"grantee":true,"grantor":true,"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_config_key":"aws","expressions":{"account":{"constant_value":"012345678910"},"cluster_identifier":{"references":["aws_redshift_cluster.example.cluster_identifier","aws_redshift_cluster.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["cluster_identifier"]}],"timestamp":"2026-02-18T20:58:47Z","applyable":true,"complete":true,"errored":false}
94
I need a small analytical data system set up for internal use, and it should save its state on a regular schedule so we can recover quickly if something goes wrong.
Create a 1 node RedShift cluster and automatically create a snapshot every 12 hours
Has an aws_redshift resouce with 1 node and aws_redshift_snapshot_schedule resource with rate set to 12 hours. Then have a aws_redshift_snapshot_schedle_association to conect the 2
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" number_of_nodes = 1 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" skip_final_snapshot = true } resource "aws_redshift_snapshot_schedule" "default" { identifier = "tf-redshift-snapshot-schedule" definitions = [ "rate(12 hours)", ] } resource "aws_redshift_snapshot_schedule_association" "default" { cluster_identifier = aws_redshift_cluster.example.id schedule_identifier = aws_redshift_snapshot_schedule.default.id }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 1 } # Function to check if Redshift snapshot schedule is every 12 hours aws_redshift_snapshot_schedule_valid(resources) { some resource in resources resource.type == "aws_redshift_snapshot_schedule" resource.change.after.definitions[_] == "rate(12 hours)" } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) aws_redshift_snapshot_schedule_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"definitions":["rate(12 hours)"],"description":null,"force_destroy":false,"identifier":"tf-redshift-snapshot-schedule","region":"us-east-1","tags":null},"sensitive_values":{"definitions":[false],"tags_all":{}}},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"definitions":["rate(12 hours)"],"description":null,"force_destroy":false,"identifier":"tf-redshift-snapshot-schedule","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"definitions":[false],"id":true,"identifier_prefix":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"definitions":[false],"tags_all":{}}}},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1"},"after_unknown":{"cluster_identifier":true,"id":true,"schedule_identifier":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":1},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_config_key":"aws","expressions":{"definitions":{"constant_value":["rate(12 hours)"]},"identifier":{"constant_value":"tf-redshift-snapshot-schedule"}},"schema_version":0},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"schedule_identifier":{"references":["aws_redshift_snapshot_schedule.default.id","aws_redshift_snapshot_schedule.default"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["id"]},{"resource":"aws_redshift_snapshot_schedule.default","attribute":["id"]}],"timestamp":"2026-02-18T20:58:30Z","applyable":true,"complete":true,"errored":false}
95
I need a private network for some data tools we’re setting up, and it should work across a couple of separate locations so it stays reliable even if part of the system has issues.
Create a VPC in us-east-1 and create subnets in east-1a and east-1b. Create a RedShift subnet group with a subnet in east-1a and east-1b
Create a VPC, create 2 subnets (1 in east1a and 1 in east1b) then create a redshift_subnet_group
provider "aws" { region = "us-east-1" } resource "aws_vpc" "main" { cidr_block = "10.0.0.0/16" enable_dns_support = true enable_dns_hostnames = true tags = { Name = "main-vpc" } } resource "aws_subnet" "subnet_east_1a" { vpc_id = aws_vpc.main.id cidr_block = "10.0.1.0/24" availability_zone = "us-east-1a" tags = { Name = "subnet-east-1a" } } resource "aws_subnet" "subnet_east_1b" { vpc_id = aws_vpc.main.id cidr_block = "10.0.2.0/24" availability_zone = "us-east-1b" tags = { Name = "subnet-east-1b" } } resource "aws_redshift_subnet_group" "redshift_subnet_group" { name = "my-redshift-subnet-group" subnet_ids = [aws_subnet.subnet_east_1a.id, aws_subnet.subnet_east_1b.id] tags = { Name = "my-redshift-subnet-group" } }
package main import future.keywords.in default allow = false # Function to check if a VPC is created in us-east-1 aws_vpc_valid(resources) { some resource in resources resource.type == "aws_vpc" resource.change.after.cidr_block == "10.0.0.0/16" } # Function to check if subnets are created in east-1a and east-1b aws_subnets_valid(resources) { some resource in resources resource.type == "aws_subnet" resource.change.after.availability_zone in {"us-east-1a", "us-east-1b"} resource.change.after.cidr_block == "10.0.1.0/24" } # Function to check if a Redshift subnet group is created with subnets in east-1a and east-1b aws_redshift_subnet_group_valid(root_module_resources) { some resource in root_module_resources resource.type == "aws_redshift_subnet_group" count(resource.expressions.subnet_ids.references) == 4 } # Aggregate all checks allow { aws_vpc_valid(input.resource_changes) aws_subnets_valid(input.resource_changes) aws_redshift_subnet_group_valid(input.configuration.root_module.resources) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Managed by Terraform","name":"my-redshift-subnet-group","region":"us-east-1","tags":{"Name":"my-redshift-subnet-group"},"tags_all":{"Name":"my-redshift-subnet-group"}},"sensitive_values":{"subnet_ids":[],"tags":{},"tags_all":{}}},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1a"},"tags_all":{"Name":"subnet-east-1a"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1b"},"tags_all":{"Name":"subnet-east-1b"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Managed by Terraform","name":"my-redshift-subnet-group","region":"us-east-1","tags":{"Name":"my-redshift-subnet-group"},"tags_all":{"Name":"my-redshift-subnet-group"}},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags":{},"tags_all":{}}}},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1a"},"tags_all":{"Name":"subnet-east-1a"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1b"},"tags_all":{"Name":"subnet-east-1b"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-redshift-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_east_1a.id","aws_subnet.subnet_east_1a","aws_subnet.subnet_east_1b.id","aws_subnet.subnet_east_1b"]},"tags":{"constant_value":{"Name":"my-redshift-subnet-group"}}},"schema_version":0},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_config_key":"aws","expressions":{"availability_zone":{"constant_value":"us-east-1a"},"cidr_block":{"constant_value":"10.0.1.0/24"},"tags":{"constant_value":{"Name":"subnet-east-1a"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_config_key":"aws","expressions":{"availability_zone":{"constant_value":"us-east-1b"},"cidr_block":{"constant_value":"10.0.2.0/24"},"tags":{"constant_value":{"Name":"subnet-east-1b"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true},"tags":{"constant_value":{"Name":"main-vpc"}}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_subnet.subnet_east_1a","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.subnet_east_1b","attribute":["id"]}],"timestamp":"2026-02-18T20:58:58Z","applyable":true,"complete":true,"errored":false}
96
I need a data warehouse setup that can keep running smoothly even if part of the underlying infrastructure has an outage.
Set up a highly available Amazon Redshift cluster across multiple us-east-1a and us-east-1b
Create a VPC, create internet_gateway,create 2 subnets (1 in east1a and 1 in east1b) then create a redshift_subnet_group
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "example_vpc" { cidr_block = "10.0.0.0/16" enable_dns_support = true enable_dns_hostnames = true } resource "aws_internet_gateway" "gw" { vpc_id = aws_vpc.example_vpc.id } data "aws_availability_zones" "azs" { state = "available" } # Create subnet in us-east-1a resource "aws_subnet" "subnet_a" { vpc_id = aws_vpc.example_vpc.id cidr_block = "10.0.1.0/24" availability_zone = data.aws_availability_zones.azs.names[0] map_public_ip_on_launch = true } # Create subnet in us-east-1b resource "aws_subnet" "subnet_b" { vpc_id = aws_vpc.example_vpc.id cidr_block = "10.0.2.0/24" availability_zone = data.aws_availability_zones.azs.names[1] map_public_ip_on_launch = true } # Create the Redshift subnet group resource "aws_redshift_subnet_group" "example_subnet_group" { name = "example-subnet-group" description = "Example Redshift subnet group" subnet_ids = [aws_subnet.subnet_a.id, aws_subnet.subnet_b.id] } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" cluster_type = "multi-node" number_of_nodes = 2 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" cluster_subnet_group_name = aws_redshift_subnet_group.example_subnet_group.name skip_final_snapshot = true }
package main import future.keywords.in default allow = false # Function to check if Redshift cluster is set up for high availability aws_redshift_cluster_ha_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.cluster_type == "multi-node" resource.change.after.number_of_nodes > 1 resource.change.after.cluster_subnet_group_name != null } aws_internet_gateway_valid(resources) { some resource in resources resource.type == "aws_internet_gateway" } # Function to check if subnets are created in east-1a and east-1b aws_subnets_valid(resources) { subnet_a_valid(resources) subnet_b_valid(resources) } subnet_a_valid(resources) { some resource in resources resource.type == "aws_subnet" resource.change.after.availability_zone == "us-east-1a" } subnet_b_valid(resources) { some resource in resources resource.type == "aws_subnet" resource.change.after.availability_zone == "us-east-1b" } # Function to check if a Redshift subnet group spans across us-east-1a and us-east-1b aws_redshift_subnet_group_valid(root_module_resources) { some resource in root_module_resources resource.type == "aws_redshift_subnet_group" count(resource.expressions.subnet_ids.references) == 4 } # Aggregate all checks allow { aws_redshift_cluster_ha_valid(input.resource_changes) aws_internet_gateway_valid(input.resource_changes) aws_subnets_valid(input.resource_changes) aws_redshift_subnet_group_valid(input.configuration.root_module.resources) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_subnet_group_name":"example-subnet-group","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"tags_all":{}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_subnet_group_name":"example-subnet-group","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags_all":{}}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"},"s3_use_path_style":{"constant_value":true},"skip_credentials_validation":{"constant_value":true},"skip_metadata_api_check":{"constant_value":true},"skip_requesting_account_id":{"constant_value":true}}},"awscc":{"name":"awscc","full_name":"registry.terraform.io/hashicorp/awscc","expressions":{"skip_metadata_api_check":{"constant_value":true}}}},"root_module":{"resources":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":0},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_subnet_group_name":{"references":["aws_redshift_subnet_group.example_subnet_group.name","aws_redshift_subnet_group.example_subnet_group"]},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_config_key":"aws","expressions":{"description":{"constant_value":"Example Redshift subnet group"},"name":{"constant_value":"example-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_a.id","aws_subnet.subnet_a","aws_subnet.subnet_b.id","aws_subnet.subnet_b"]}},"schema_version":0},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[0]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[1]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_subnet_group.example_subnet_group","attribute":["name"]},{"resource":"aws_subnet.subnet_b","attribute":["id"]},{"resource":"data.aws_availability_zones.azs","attribute":["names",0]},{"resource":"data.aws_availability_zones.azs","attribute":["names",1]},{"resource":"aws_vpc.example_vpc","attribute":["id"]},{"resource":"aws_subnet.subnet_a","attribute":["id"]}],"timestamp":"2026-02-18T20:58:40Z","applyable":true,"complete":true,"errored":false}
97
I need a data warehouse that can pull information from our storage system automatically, and it should have the right access setup so it can read what it needs without exposing anything else.
Create an IAM role and a redshift cluster and associate the IAM role with the RedShift cluster.
Create a aws_iam_role, aws_redshift_cluster, and attach the role to the cluster
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_iam_role" "redshift_role" { name = "redshift_role" assume_role_policy = jsonencode({ Version = "2012-10-17", Statement = [ { Action = "sts:AssumeRole", Effect = "Allow", Principal = { Service = "redshift.amazonaws.com" }, }, ], }) } resource "aws_iam_role_policy_attachment" "redshift_s3_read_only" { role = aws_iam_role.redshift_role.name policy_arn = "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess" } resource "aws_redshift_cluster" "example" { cluster_identifier = "tf-redshift-cluster" database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" node_type = "dc2.large" cluster_type = "single-node" depends_on = [aws_iam_role.redshift_role] } resource "aws_redshift_cluster_iam_roles" "example" { cluster_identifier = aws_redshift_cluster.example.id iam_role_arns = [aws_iam_role.redshift_role.arn] }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 1 } iam_role_vaild(resources) { some resource in resources resource.type == "aws_iam_role" } aws_iam_role_policy_attachment(resources) { some resource in resources resource.type == "aws_iam_role_policy_attachment" } aws_redshift_cluster_iam_roles_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster_iam_roles" } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) iam_role_vaild(input.resource_changes) aws_iam_role_policy_attachment(input.resource_changes) aws_redshift_cluster_iam_roles_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"redshift.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"redshift_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"redshift_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","timeouts":null},"sensitive_values":{"iam_role_arns":[]}}]}},"resource_changes":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"redshift.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"redshift_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"redshift_role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","timeouts":null},"after_unknown":{"cluster_identifier":true,"default_iam_role_arn":true,"iam_role_arns":true,"id":true},"before_sensitive":false,"after_sensitive":{"iam_role_arns":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"redshift_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"},"role":{"references":["aws_iam_role.redshift_role.name","aws_iam_role.redshift_role"]}},"schema_version":0},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"}},"schema_version":0,"depends_on":["aws_iam_role.redshift_role"]},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"iam_role_arns":{"references":["aws_iam_role.redshift_role.arn","aws_iam_role.redshift_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.redshift_role","attribute":["arn"]},{"resource":"aws_iam_role.redshift_role","attribute":["name"]},{"resource":"aws_redshift_cluster.example","attribute":["id"]}],"timestamp":"2026-02-18T20:59:00Z","applyable":true,"complete":true,"errored":false}
98
I need a shared analytics workspace that can handle moderate workloads across multiple machines, and it should allow certain external systems to plug into it securely.
Create a 2-node RedShift cluster and attach a resource policy to it.
Create a redshift cluster and a aws_reedshift_resource_poliicy attached to it
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.0" } } } provider "aws" { region = "us-east-1" } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" cluster_type = "multi-node" number_of_nodes = 2 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" skip_final_snapshot = true } resource "aws_redshift_resource_policy" "example" { resource_arn = aws_redshift_cluster.example.cluster_namespace_arn policy = jsonencode({ Version = "2012-10-17" Statement = [{ Effect = "Allow" Principal = { AWS = "arn:aws:iam::12345678901:root" } Action = "redshift:CreateInboundIntegration" Resource = aws_redshift_cluster.example.cluster_namespace_arn Sid = "" }] }) }
package main import future.keywords.in default allow = false aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 2 } aws_redshift_resource_policy_valid(resources) { some resource in resources resource.type == "aws_redshift_resource_policy" } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) aws_redshift_resource_policy_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1"},"after_unknown":{"id":true,"policy":true,"resource_arn":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_config_key":"aws","expressions":{"policy":{"references":["aws_redshift_cluster.example.cluster_namespace_arn","aws_redshift_cluster.example"]},"resource_arn":{"references":["aws_redshift_cluster.example.cluster_namespace_arn","aws_redshift_cluster.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["cluster_namespace_arn"]}],"timestamp":"2026-02-18T20:59:15Z","applyable":true,"complete":true,"errored":false}
99
I need a data warehouse that can handle bigger analytical workloads, and it should be reachable from inside our private network so our other systems can work with it securely.
Create a RedShift cluster with 2 nodes and create an endpoint access for it
Create a cluster and a endpoint associated with it
terraform { required_providers { aws = { source = "hashicorp/aws" version = ">= 5.75" } } required_version = ">= 1.9.0" } provider "aws" { region = "us-east-1" } resource "aws_vpc" "example_vpc" { cidr_block = "10.0.0.0/16" enable_dns_support = true enable_dns_hostnames = true } data "aws_availability_zones" "azs" { state = "available" } resource "aws_subnet" "subnet_a" { vpc_id = aws_vpc.example_vpc.id cidr_block = "10.0.1.0/24" availability_zone = data.aws_availability_zones.azs.names[0] map_public_ip_on_launch = true } resource "aws_subnet" "subnet_b" { vpc_id = aws_vpc.example_vpc.id cidr_block = "10.0.2.0/24" availability_zone = data.aws_availability_zones.azs.names[1] map_public_ip_on_launch = true } # Create the Redshift subnet group resource "aws_redshift_subnet_group" "example_subnet_group" { name = "example-subnet-group" description = "Example Redshift subnet group" subnet_ids = [aws_subnet.subnet_a.id, aws_subnet.subnet_b.id] } resource "aws_redshift_cluster" "example" { cluster_identifier = "redshift-cluster-1" node_type = "dc2.large" cluster_type = "multi-node" number_of_nodes = 2 database_name = "mydb" master_username = "foo" master_password = "Mustbe8characters" skip_final_snapshot = true } resource "aws_redshift_endpoint_access" "example" { endpoint_name = "example" subnet_group_name = aws_redshift_subnet_group.example_subnet_group.id cluster_identifier = aws_redshift_cluster.example.cluster_identifier }
package main import future.keywords.in default allow = false # Check if AWS Redshift cluster with 2 nodes is being created aws_redshift_cluster_valid(resources) { some resource in resources resource.type == "aws_redshift_cluster" resource.change.after.number_of_nodes == 2 } # Check if AWS Redshift endpoint access is being created aws_redshift_endpoint_access_valid(resources) { some resource in resources resource.type == "aws_redshift_endpoint_access" } # Aggregate all checks allow { aws_redshift_cluster_valid(input.resource_changes) aws_redshift_endpoint_access_valid(input.resource_changes) }
{"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_identifier":"redshift-cluster-1","endpoint_name":"example","region":"us-east-1"},"sensitive_values":{"vpc_endpoint":[],"vpc_security_group_ids":[]}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"tags_all":{}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_identifier":"redshift-cluster-1","endpoint_name":"example","region":"us-east-1"},"after_unknown":{"address":true,"id":true,"port":true,"resource_owner":true,"subnet_group_name":true,"vpc_endpoint":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"vpc_endpoint":[],"vpc_security_group_ids":[]}}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags_all":{}}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"},"s3_use_path_style":{"constant_value":true},"skip_credentials_validation":{"constant_value":true},"skip_metadata_api_check":{"constant_value":true},"skip_requesting_account_id":{"constant_value":true}}},"awscc":{"name":"awscc","full_name":"registry.terraform.io/hashicorp/awscc","expressions":{"skip_metadata_api_check":{"constant_value":true}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.cluster_identifier","aws_redshift_cluster.example"]},"endpoint_name":{"constant_value":"example"},"subnet_group_name":{"references":["aws_redshift_subnet_group.example_subnet_group.id","aws_redshift_subnet_group.example_subnet_group"]}},"schema_version":0},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_config_key":"aws","expressions":{"description":{"constant_value":"Example Redshift subnet group"},"name":{"constant_value":"example-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_a.id","aws_subnet.subnet_a","aws_subnet.subnet_b.id","aws_subnet.subnet_b"]}},"schema_version":0},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[0]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[1]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_availability_zones.azs","attribute":["names",0]},{"resource":"data.aws_availability_zones.azs","attribute":["names",1]},{"resource":"aws_subnet.subnet_a","attribute":["id"]},{"resource":"aws_redshift_cluster.example","attribute":["cluster_identifier"]},{"resource":"aws_subnet.subnet_b","attribute":["id"]},{"resource":"aws_redshift_subnet_group.example_subnet_group","attribute":["id"]},{"resource":"aws_vpc.example_vpc","attribute":["id"]}],"timestamp":"2026-02-18T20:58:53Z","applyable":true,"complete":true,"errored":false}