id int32 0 299 | prompt stringlengths 93 303 | prompt_original stringlengths 21 1.39k | intent stringlengths 25 2.17k | main_tf stringlengths 109 8.28k | checks_rego stringlengths 171 6.45k | plan_json stringlengths 1.41k 174k |
|---|---|---|---|---|---|---|
0 | I need a way to track which lookups are being made against our domain so we can review that activity in a central place, and it should be dependable enough to use for troubleshooting later. | Configure a query log that can create a log stream and put log events using Route 53 resources. Name the zone "primary", the cloudwatch log group "aws_route53_example_com", and the cloudwatch log resource policy "route53-query-logging-policy" | Has one "aws_route53_zone" resource
with "name"
Has one "aws_cloudwatch_log_group" resource
Has one "aws_cloudwatch_log_resource_policy" resource
with "policy_document" enabling "logs:CreateLogStream" and "logs:PutLogEvents"
with "policy_name"
Has one "aws_route53_query_log" resource
with "cloudwatch_log_group_arn" referencing the "aws_cloudwatch_log_group" resource
with "zone_id" referencing the "aws_route53_zone" resource
and depends on the "aws_cloudwatch_log_resource_policy" resource | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "primary" {
name = "example53.com"
}
resource "aws_cloudwatch_log_group" "aws_route53_example_com" {
name = "/aws/route53/${aws_route53_zone.primary.name}"
retention_in_days = 30
}
# Example CloudWatch log resource policy to allow Route53 to write logs
# to any log group under /aws/route53/*
data "aws_iam_policy_document" "route53-query-logging-policy" {
statement {
actions = [
"logs:CreateLogStream",
"logs:PutLogEvents",
]
resources = ["arn:aws:logs:*:*:log-group:/aws/route53/*"]
principals {
identifiers = ["route53.amazonaws.com"]
type = "Service"
}
}
}
resource "aws_cloudwatch_log_resource_policy" "route53-query-logging-policy" {
policy_document = data.aws_iam_policy_document.route53-query-logging-policy.json
policy_name = "route53-query-logging-policy"
}
resource "aws_route53_query_log" "example_com" {
depends_on = [aws_cloudwatch_log_resource_policy.route53-query-logging-policy]
cloudwatch_log_group_arn = aws_cloudwatch_log_group.aws_route53_example_com.arn
zone_id = aws_route53_zone.primary.zone_id
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_cloudwatch_log_group = false
default is_valid_cloudwatch_log_resource_policy = false
default is_valid_route53_query_log = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name
}
is_valid_cloudwatch_log_group {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_cloudwatch_log_group"
}
is_valid_cloudwatch_log_resource_policy {
some i
resource := input.resource_changes[i]
resource.type == "aws_cloudwatch_log_resource_policy"
contains(resource.change.after.policy_document, "logs:PutLogEvents")
contains(resource.change.after.policy_document, "logs:CreateLogStream")
resource.change.after.policy_name
}
is_valid_route53_query_log {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_query_log"
resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id"
resource.expressions.cloudwatch_log_group_arn.references[0] == "aws_cloudwatch_log_group.aws_route53_example_com.arn"
resource.depends_on[0] == "aws_cloudwatch_log_resource_policy.route53-query-logging-policy"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_cloudwatch_log_group
is_valid_cloudwatch_log_resource_policy
is_valid_route53_query_log
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"region":null}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"sensitive_values":{}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"sensitive_values":{}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"kms_key_id":null,"name":"/aws/route53/example53.com","region":"us-east-1","retention_in_days":30,"skip_destroy":false,"tags":null},"after_unknown":{"arn":true,"deletion_protection_enabled":true,"id":true,"log_group_class":true,"name_prefix":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"name":null,"region":null}}},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_document":"{\"Statement\":[{\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"},\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\"}],\"Version\":\"2012-10-17\"}","policy_name":"route53-query-logging-policy","region":"us-east-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{},"after_unknown":{"arn":true,"cloudwatch_log_group_arn":true,"id":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1177966457","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:PutLogEvents\",\n \"logs:CreateLogStream\"\n ],\n \"Resource\": \"arn:aws:logs:*:*:log-group:/aws/route53/*\",\n \"Principal\": {\n \"Service\": \"route53.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"logs:PutLogEvents\",\"logs:CreateLogStream\"],\"Resource\":\"arn:aws:logs:*:*:log-group:/aws/route53/*\",\"Principal\":{\"Service\":\"route53.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["logs:CreateLogStream","logs:PutLogEvents"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["route53.amazonaws.com"],"type":"Service"}],"resources":["arn:aws:logs:*:*:log-group:/aws/route53/*"],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false,false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_cloudwatch_log_group.aws_route53_example_com","mode":"managed","type":"aws_cloudwatch_log_group","name":"aws_route53_example_com","provider_config_key":"aws","expressions":{"name":{"references":["aws_route53_zone.primary.name","aws_route53_zone.primary"]},"retention_in_days":{"constant_value":30}},"schema_version":0},{"address":"aws_cloudwatch_log_resource_policy.route53-query-logging-policy","mode":"managed","type":"aws_cloudwatch_log_resource_policy","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"policy_document":{"references":["data.aws_iam_policy_document.route53-query-logging-policy.json","data.aws_iam_policy_document.route53-query-logging-policy"]},"policy_name":{"constant_value":"route53-query-logging-policy"}},"schema_version":0},{"address":"aws_route53_query_log.example_com","mode":"managed","type":"aws_route53_query_log","name":"example_com","provider_config_key":"aws","expressions":{"cloudwatch_log_group_arn":{"references":["aws_cloudwatch_log_group.aws_route53_example_com.arn","aws_cloudwatch_log_group.aws_route53_example_com"]},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":0,"depends_on":["aws_cloudwatch_log_resource_policy.route53-query-logging-policy"]},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"data.aws_iam_policy_document.route53-query-logging-policy","mode":"data","type":"aws_iam_policy_document","name":"route53-query-logging-policy","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["logs:CreateLogStream","logs:PutLogEvents"]},"principals":[{"identifiers":{"constant_value":["route53.amazonaws.com"]},"type":{"constant_value":"Service"}}],"resources":{"constant_value":["arn:aws:logs:*:*:log-group:/aws/route53/*"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.route53-query-logging-policy","attribute":["json"]},{"resource":"aws_cloudwatch_log_group.aws_route53_example_com","attribute":["arn"]},{"resource":"aws_route53_zone.primary","attribute":["name"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:48Z","applyable":true,"complete":true,"errored":false}
|
1 | I need to make sure one of our internal name‑lookup setups can be used from more than one private network, and it should work even as we add or remove networks over time. | Configure a valid Route 53 zone association resource | Has multiple "aws_vpc" resource
with a specified "cidr_block"
with "enable_dns_hostnames" equal to "true"
with "enable_dns_support" equal to "true"
Has one "aws_route53_zone" resource
with "name"
with a "vpc" block that contains "vpc_id" that references the "aws_vpc" resource
Has one "aws_route53_vpc_association_authorization" resource
with "vpc_id" referencing the "aws_vpc" resource
with "zone_id" referencing the "aws_route53_zone" resource
Has one "aws_route53_zone_association" resource
with "vpc_id" referencing the "aws_route53_vpc_association_authorization" resource
with "zone_id" referencing the "aws_route53_vpc_association_authorization" resource
| provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "example" {
cidr_block = "10.6.0.0/16"
enable_dns_hostnames = true
enable_dns_support = true
}
resource "aws_route53_zone" "example" {
name = "example.com"
vpc {
vpc_id = aws_vpc.example.id
}
}
resource "aws_vpc" "alternate" {
cidr_block = "10.7.0.0/16"
enable_dns_hostnames = true
enable_dns_support = true
}
resource "aws_route53_vpc_association_authorization" "example" {
vpc_id = aws_vpc.alternate.id
zone_id = aws_route53_zone.example.id
}
resource "aws_route53_zone_association" "example" {
vpc_id = aws_route53_vpc_association_authorization.example.vpc_id
zone_id = aws_route53_vpc_association_authorization.example.zone_id
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_vpc = false
default is_valid_zone_association = false
default is_valid_vpc_association = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.vpc[0].vpc_id.references[0]
resource.expressions.name
}
is_valid_vpc {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_vpc"
resource.expressions.cidr_block
resource.expressions.enable_dns_hostnames.constant_value == true
resource.expressions.enable_dns_support.constant_value == true
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_vpc"
resource2.expressions.cidr_block
resource2.expressions.enable_dns_hostnames.constant_value == true
resource2.expressions.enable_dns_support.constant_value == true
}
is_valid_zone_association {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone_association"
resource.expressions.vpc_id.references[0]
resource.expressions.zone_id.references[0]
}
is_valid_vpc_association {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_vpc_association_authorization"
resource.expressions.vpc_id.references[0]
resource.expressions.zone_id.references[0]
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_vpc
is_valid_zone_association
is_valid_vpc_association
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"timeouts":null},"sensitive_values":{}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"timeouts":null},"after_unknown":{"id":true,"owning_account":true,"vpc_id":true,"vpc_region":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.7.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.6.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_vpc_association_authorization.example","mode":"managed","type":"aws_route53_vpc_association_authorization","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.alternate.id","aws_vpc.alternate"]},"zone_id":{"references":["aws_route53_zone.example.id","aws_route53_zone.example"]}},"schema_version":0},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.example.id","aws_vpc.example"]}}]},"schema_version":0},{"address":"aws_route53_zone_association.example","mode":"managed","type":"aws_route53_zone_association","name":"example","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_route53_vpc_association_authorization.example.vpc_id","aws_route53_vpc_association_authorization.example"]},"zone_id":{"references":["aws_route53_vpc_association_authorization.example.zone_id","aws_route53_vpc_association_authorization.example"]}},"schema_version":0},{"address":"aws_vpc.alternate","mode":"managed","type":"aws_vpc","name":"alternate","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.7.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"aws_vpc.example","mode":"managed","type":"aws_vpc","name":"example","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.6.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_route53_vpc_association_authorization.example","attribute":["vpc_id"]},{"resource":"aws_route53_vpc_association_authorization.example","attribute":["zone_id"]},{"resource":"aws_route53_zone.example","attribute":["id"]},{"resource":"aws_vpc.alternate","attribute":["id"]},{"resource":"aws_vpc.example","attribute":["id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
|
2 | I need our site to show up at our main domain and automatically direct visitors to whatever is handling the traffic behind it, and it should stay reliable even if demand spikes. | Configure a Route 53 record with an Elastic Load Balancer resource. Call the zone "primary" and the elb "main" | Has one "aws_route53_zone" resource
with "name"
Has a "aws_elb" resource
with "name"
with "availability_zones"
with a "listener" block with "instance_port", "instance_protocol", "lb_port", "lb_protocol"
Has a "aws_route53_record" resource
with "name"
with "type"
with "ttl"
with "zone_id" referencing the "aws_route53_zone" resource
with an "alias" block with "name" and "zone_id" referencing the "aws_elb" and "evaluate_target_health" equal to true
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "primary" {
name = "example53.com"
}
resource "aws_elb" "main" {
name = "sample"
availability_zones = ["us-east-1c"]
listener {
instance_port = 80
instance_protocol = "http"
lb_port = 80
lb_protocol = "http"
}
}
resource "aws_route53_record" "www" {
zone_id = aws_route53_zone.primary.zone_id
name = "example53.com"
type = "A"
alias {
name = aws_elb.main.dns_name
zone_id = aws_elb.main.zone_id
evaluate_target_health = true
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
default is_valid_elb = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name
}
is_valid_elb {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elb"
resource.expressions.availability_zones
resource.expressions.listener[0]
}
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type
resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id"
resource.expressions.alias[0].name.references[0] == "aws_elb.main.dns_name"
resource.expressions.alias[0].zone_id.references[0] == "aws_elb.main.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_elb
is_valid_r53_record
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_logs":[],"availability_zones":["us-east-1c"],"connection_draining":false,"connection_draining_timeout":300,"cross_zone_load_balancing":true,"desync_mitigation_mode":"defensive","idle_timeout":60,"listener":[{"instance_port":80,"instance_protocol":"http","lb_port":80,"lb_protocol":"http","ssl_certificate_id":""}],"name":"sample","region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"access_logs":[],"arn":true,"availability_zones":[false],"dns_name":true,"health_check":true,"id":true,"instances":true,"internal":true,"listener":[{}],"name_prefix":true,"security_groups":true,"source_security_group":true,"source_security_group_id":true,"subnets":true,"tags_all":true,"zone_id":true},"before_sensitive":false,"after_sensitive":{"access_logs":[],"availability_zones":[false],"health_check":[],"instances":[],"listener":[{}],"security_groups":[],"subnets":[],"tags_all":{}}}},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[{"evaluate_target_health":true}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":null,"set_identifier":null,"timeouts":null,"ttl":null,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[{"name":true,"zone_id":true}],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[{}],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elb.main","mode":"managed","type":"aws_elb","name":"main","provider_config_key":"aws","expressions":{"availability_zones":{"constant_value":["us-east-1c"]},"listener":[{"instance_port":{"constant_value":80},"instance_protocol":{"constant_value":"http"},"lb_port":{"constant_value":80},"lb_protocol":{"constant_value":"http"}}],"name":{"constant_value":"sample"}},"schema_version":0},{"address":"aws_route53_record.www","mode":"managed","type":"aws_route53_record","name":"www","provider_config_key":"aws","expressions":{"alias":[{"evaluate_target_health":{"constant_value":true},"name":{"references":["aws_elb.main.dns_name","aws_elb.main"]},"zone_id":{"references":["aws_elb.main.zone_id","aws_elb.main"]}}],"name":{"constant_value":"example53.com"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elb.main","attribute":["dns_name"]},{"resource":"aws_elb.main","attribute":["zone_id"]},{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:48:51Z","applyable":true,"complete":true,"errored":false}
|
3 | Our main data store is too slow for people overseas, so I want to spread read traffic across a few copies in different parts of the world while keeping things reliable. | Using route 53 resources, configure a weighted routing policy that splits users between three db_instances that are replicas of a main db_instance. Provision the three replica instances in "us-east-1", "eu-central-1", and "ap-southeast-1". Provision the zone and main db_instance in "us-west-1". Call the zone "main", the original db_instance "primary", the three replicas "replica_us_east", "replica_eu_central" and "replica_ap_southeast" respectively, and the provider aliases "main", "us-east", "eu-central", and "ap-southeast". | Has one "aws_route53_zone" resource
with "name"
Has a "aws_db_instance" resource
with "identifier" set to "master"
with "instance_class"
with "allocated_storage"
with "engine"
with "username"
with "password"
with "backup_retention_period" set to a non-zero number
Has multiple "aws_db_instance" resources
with "identifier"
with "replicate_source_db" referencing the main "aws_db_instance" resource
with "instance_class"
Has multiple "aws_route53_record" resources
with "name"
with "type"
with "ttl"
with "zone_id" referencing the "aws_route53_zone" resource
with "weighted_routing_policy" block that contains "weight" as a non-zero number
with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
configuration_aliases = [ aws.main, aws.us_east, aws.eu_central, aws.ap_southeast ]
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
alias = "main"
region = "us-west-2"
}
provider "aws" {
alias = "us_east"
region = "us-east-1" # Example region for US East
}
provider "aws" {
alias = "eu_central"
region = "eu-central-1" # Example region for EU Central
}
provider "aws" {
alias = "ap_southeast"
region = "ap-southeast-1" # Example region for AP Southeast
}
resource "aws_db_instance" "primary" {
provider = aws.main
identifier = "master"
allocated_storage = 20
engine = "postgres"
instance_class = "db.t3.micro"
username = "dbadmin"
password = "your_password_here"
skip_final_snapshot = true
backup_retention_period = 7
}
resource "aws_db_instance" "replica_us_east" {
provider = aws.us_east
replicate_source_db = aws_db_instance.primary.arn
instance_class = "db.t3.micro"
identifier = "mydb-replica-us-east"
skip_final_snapshot = true
}
resource "aws_db_instance" "replica_eu_central" {
provider = aws.eu_central
replicate_source_db = aws_db_instance.primary.arn
instance_class = "db.t3.micro"
identifier = "mydb-replica-eu-central"
skip_final_snapshot = true
}
resource "aws_db_instance" "replica_ap_southeast" {
provider = aws.ap_southeast
replicate_source_db = aws_db_instance.primary.arn
instance_class = "db.t3.micro"
identifier = "mydb-replica-ap-southeast"
skip_final_snapshot = true
}
# Route53 Hosted Zone
resource "aws_route53_zone" "main" {
provider = aws.main
name = "example53.com"
}
# Route53 Records for each RDS Read Replica with a Weighted Routing Policy
resource "aws_route53_record" "replica_us_east_cname" {
provider = aws.us_east
zone_id = aws_route53_zone.main.zone_id
name = "us.east.example53.com"
type = "CNAME"
records = [aws_db_instance.replica_us_east.endpoint]
ttl = "60"
weighted_routing_policy {
weight = 30
}
set_identifier = "replica-us-east"
}
resource "aws_route53_record" "replica_eu_central_cname" {
provider = aws.eu_central
zone_id = aws_route53_zone.main.zone_id
name = "eu.central.example53.com"
type = "CNAME"
records = [aws_db_instance.replica_eu_central.endpoint]
ttl = "60"
weighted_routing_policy {
weight = 30
}
set_identifier = "replica-eu-central"
}
resource "aws_route53_record" "replica_ap_southeast_cname" {
provider = aws.ap_southeast
zone_id = aws_route53_zone.main.zone_id
name = "ap.southeast.example53.com"
type = "CNAME"
records = [aws_db_instance.replica_ap_southeast.endpoint]
ttl = "60"
weighted_routing_policy {
weight = 30
}
set_identifier = "replica-ap-southeast"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record_us = false
default is_valid_r53_record_eu = false
default is_valid_r53_record_ap = false
default is_valid_db_instance_main = false
default is_valid_db_instance_replicaus = false
default is_valid_db_instance_replicaeu = false
default is_valid_db_instance_replicaap = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.name == "main"
resource.provider_config_key == "aws.main"
}
# Validate aws_route53_record
is_valid_r53_record_us {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.provider_config_key == "aws.us_east"
resource.expressions.name
resource.expressions.weighted_routing_policy[0].weight
resource.expressions.type
resource.expressions.ttl
resource.expressions.records.references[0] == "aws_db_instance.replica_us_east.endpoint"
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id"
}
is_valid_r53_record_eu {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.provider_config_key == "aws.eu_central"
resource.expressions.name
resource.expressions.weighted_routing_policy[0].weight
resource.expressions.type
resource.expressions.ttl
resource.expressions.records.references[0] == "aws_db_instance.replica_eu_central.endpoint"
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id"
}
is_valid_r53_record_ap {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.provider_config_key == "aws.ap_southeast"
resource.expressions.name
resource.expressions.weighted_routing_policy[0].weight
resource.expressions.type
resource.expressions.ttl
resource.expressions.records.references[0] == "aws_db_instance.replica_ap_southeast.endpoint"
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id"
}
# Rule to check if a valid aws_db_instance exists
is_valid_db_instance_main {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.provider_config_key == "aws.main"
has_required_main_db_arguments
}
is_valid_db_instance_replicaus {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_db_replicaus_arguments
}
is_valid_db_instance_replicaeu {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_db_replicaeu_arguments
}
is_valid_db_instance_replicaap {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_db_replicaap_arguments
}
# Helper rule to check if all required arguments are present and valid
has_required_main_db_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
# Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot
requirement1(resource.expressions)
# Check for instance_class validity
requirement2(resource.expressions)
}
# 1, allocated_storage and engine or snapshot_identifier or replace_source_db
requirement1(expressions) {
expressions.allocated_storage
expressions.engine
expressions.username
expressions.password
is_valid_engine(expressions.engine.constant_value)
}
requirement1(expressions) {
expressions.snapshot_identifier
}
# Check for instance_class validity
requirement2(expressions) {
expressions.instance_class
is_valid_instance_class(expressions.instance_class.constant_value)
}
# Helper rule to validate engine value
is_valid_engine(engine) {
engine_set := {
"mysql",
"postgres",
"mariadb",
"oracle-se",
"oracle-se1",
"oracle-se2",
"oracle-ee",
"sqlserver-ee",
"sqlserver-se",
"sqlserver-ex",
"sqlserver-web"
}
engine_set[engine]
}
# Helper rule to validate instance class type
is_valid_instance_class(instance_class) {
instance_class_starts_with(instance_class, "db.")
}
# Helper rule to check prefix of instance class
instance_class_starts_with(instance_class, prefix) {
startswith(instance_class, prefix)
}
has_required_db_replicaus_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.name == "replica_us_east"
resource.provider_config_key == "aws.us_east"
resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn"
is_valid_instance_class(resource.expressions.instance_class.constant_value)
resource.expressions.skip_final_snapshot
}
has_required_db_replicaeu_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.name == "replica_eu_central"
resource.provider_config_key == "aws.eu_central"
resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn"
is_valid_instance_class(resource.expressions.instance_class.constant_value)
resource.expressions.skip_final_snapshot
}
has_required_db_replicaap_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.name == "replica_ap_southeast"
resource.provider_config_key == "aws.ap_southeast"
resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.arn"
is_valid_instance_class(resource.expressions.instance_class.constant_value)
resource.expressions.skip_final_snapshot
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record_us
is_valid_r53_record_eu
is_valid_r53_record_ap
is_valid_db_instance_main
is_valid_db_instance_replicaus
is_valid_db_instance_replicaeu
is_valid_db_instance_replicaap
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"master","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-west-2","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-ap-southeast","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"ap-southeast-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-eu-central","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"eu-central-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-us-east","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"replicate_source_db":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"ap.southeast.example53.com","set_identifier":"replica-ap-southeast","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"eu.central.example53.com","set_identifier":"replica-eu-central","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"us.east.example53.com","set_identifier":"replica-us-east","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":30}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0"},"aws.ap_southeast":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"ap_southeast","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"ap-southeast-1"}}},"aws.eu_central":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"eu_central","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"eu-central-1"}}},"aws.main":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"main","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-west-2"}}},"aws.us_east":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","alias":"us_east","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws.main","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"master"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_ap_southeast","mode":"managed","type":"aws_db_instance","name":"replica_ap_southeast","provider_config_key":"aws.ap_southeast","expressions":{"identifier":{"constant_value":"mydb-replica-ap-southeast"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_eu_central","mode":"managed","type":"aws_db_instance","name":"replica_eu_central","provider_config_key":"aws.eu_central","expressions":{"identifier":{"constant_value":"mydb-replica-eu-central"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_us_east","mode":"managed","type":"aws_db_instance","name":"replica_us_east","provider_config_key":"aws.us_east","expressions":{"identifier":{"constant_value":"mydb-replica-us-east"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.arn","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_ap_southeast_cname","mode":"managed","type":"aws_route53_record","name":"replica_ap_southeast_cname","provider_config_key":"aws.ap_southeast","expressions":{"name":{"constant_value":"ap.southeast.example53.com"},"records":{"references":["aws_db_instance.replica_ap_southeast.endpoint","aws_db_instance.replica_ap_southeast"]},"set_identifier":{"constant_value":"replica-ap-southeast"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_eu_central_cname","mode":"managed","type":"aws_route53_record","name":"replica_eu_central_cname","provider_config_key":"aws.eu_central","expressions":{"name":{"constant_value":"eu.central.example53.com"},"records":{"references":["aws_db_instance.replica_eu_central.endpoint","aws_db_instance.replica_eu_central"]},"set_identifier":{"constant_value":"replica-eu-central"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_us_east_cname","mode":"managed","type":"aws_route53_record","name":"replica_us_east_cname","provider_config_key":"aws.us_east","expressions":{"name":{"constant_value":"us.east.example53.com"},"records":{"references":["aws_db_instance.replica_us_east.endpoint","aws_db_instance.replica_us_east"]},"set_identifier":{"constant_value":"replica-us-east"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":30}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws.main","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.replica_ap_southeast","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.primary","attribute":["arn"]},{"resource":"aws_db_instance.replica_eu_central","attribute":["endpoint"]},{"resource":"aws_db_instance.replica_us_east","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:48:39Z","applyable":true,"complete":true,"errored":false}
|
4 | I need a setup where people inside our company automatically connect to a different data store than outsiders, and everyone should be able to use simple, human‑friendly names to reach the right place without extra steps. | Configure Route 53 to return different database endpoints to internal versus external users. Internal users are routed to an internal RDS instance, while external users are routed to a publicly accessible one. Name the zones "private" and "public", the databases "internal" and "public", and the subnet group "main" | Has one "aws_vpc" resource
with a specified "cidr_block"
Has multiple "aws_subnet" resources
with "vpc_id" referencing the "aws_vpc" resource
with specified "cidr_block" for each
with "availability_zone" set
Has one "aws_db_subnet_group" resource
with "subnet_ids" referencing the IDs of "aws_subnet" resources
Has one "aws_route53_zone" resource
with "name"
Has one "aws_route53_zone" resource
with "name"
with a "vpc" block with "vpc_id" referencing the "aws_vpc" resource
Has one "aws_db_instance" resource for internal use
with "allocated_storage" set to a specific size
with a specified "engine"
with a specified "instance_class"
with "username" and "password"
with "skip_final_snapshot" set to true
with "identifier"
with "password"
with "db_subnet_group_name" referencing the "aws_db_subnet_group" resource
Has one "aws_db_instance" resource for public use
with "allocated_storage" set to a specific size
with a specified "engine"
with a specified "instance_class"
with "username" and "password"
with "skip_final_snapshot" set to true
with "identifier"
with "password"
with "publicly_accessible" set to true
Has two "aws_route53_record" resources
with "zone_id" referencing one of the "aws_route53_zone" resources
with "type"
with "ttl"
with "records" referencing one of the "aws_db_instance" resources
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
# Create a VPC for internal resources
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/24"
}
# RDS instances
resource "aws_db_instance" "internal" {
# Internal DB configuration
allocated_storage = 20
engine = "mysql"
instance_class = "db.t3.micro"
identifier = "internal"
username = "user"
password = "password"
db_subnet_group_name = aws_db_subnet_group.main.name
skip_final_snapshot = true
}
resource "aws_db_instance" "public" {
# Public DB configuration
publicly_accessible = true
allocated_storage = 20
engine = "mysql"
instance_class = "db.t3.micro"
identifier = "public"
username = "user"
password = "password"
skip_final_snapshot = true
}
resource "aws_db_subnet_group" "main" {
name = "mydb-subnet-group"
subnet_ids = [aws_subnet.maina.id, aws_subnet.mainb.id]
}
data "aws_availability_zones" "available" {}
# Subnet for RDS
resource "aws_subnet" "maina" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.0.0/25"
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "mainb" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.0.128/25"
availability_zone = data.aws_availability_zones.available.names[1]
}
# Route 53 Public Hosted Zone for external users
resource "aws_route53_zone" "public" {
name = "example53.com"
}
# Route 53 Private Hosted Zone for internal users
resource "aws_route53_zone" "private" {
name = "example53.com"
vpc {
vpc_id = aws_vpc.main.id
}
}
# Route 53 Record for Public DB (External Endpoint)
resource "aws_route53_record" "public_db" {
zone_id = aws_route53_zone.public.zone_id
name = "public-db.example.com"
type = "CNAME"
ttl = "300"
records = [aws_db_instance.public.address]
}
# Route 53 Record for Internal DB (Internal Endpoint)
resource "aws_route53_record" "internal_db" {
zone_id = aws_route53_zone.private.zone_id
name = "internal-db.example.com"
type = "CNAME"
ttl = "300"
records = [aws_db_instance.internal.address]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
default is_valid_db_instance = false
default is_valid_vpc = false
default is_valid_subnet = false
default is_valid_subnet_group = false
is_valid_r53_zone {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_route53_zone"
resource2.expressions.name
resource2.expressions.vpc[0].vpc_id.references[0]
}
is_valid_vpc {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_vpc"
resource.expressions.cidr_block
}
is_valid_r53_record {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type
resource.expressions.ttl
resource.expressions.zone_id.references[0] == "aws_route53_zone.public.zone_id"
resource.expressions.records.references[0] == "aws_db_instance.public.address"
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_route53_record"
resource2.expressions.name
resource2.expressions.type
resource2.expressions.ttl
resource2.expressions.zone_id.references[0] == "aws_route53_zone.private.zone_id"
resource2.expressions.records.references[0] == "aws_db_instance.internal.address"
}
is_valid_subnet {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_subnet"
resource.expressions.cidr_block
resource.expressions.availability_zone
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_subnet"
resource2.expressions.cidr_block
resource2.expressions.availability_zone
resource2.expressions.vpc_id.references[0] == resource.expressions.vpc_id.references[0]
}
is_valid_subnet_group {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_db_subnet_group"
resource.expressions.subnet_ids.references[0]
}
is_valid_db_instance {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_db_instance"
has_required_main_db_arguments
}
# Helper rule to check if all required arguments are present and valid
has_required_main_db_arguments {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_db_instance"
resource.expressions.db_subnet_group_name.references[0] == "aws_db_subnet_group.main.name"
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_db_instance"
resource2.expressions.publicly_accessible.constant_value == true
# Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot
requirement1(resource.expressions)
requirement1(resource2.expressions)
# Check for instance_class validity
requirement2(resource.expressions)
requirement2(resource2.expressions)
}
# 1, allocated_storage and engine or snapshot_identifier or replace_source_db
requirement1(expressions) {
expressions.allocated_storage
expressions.engine
expressions.username
expressions.password
is_valid_engine(expressions.engine.constant_value)
}
requirement1(expressions) {
expressions.snapshot_identifier
}
# Check for instance_class validity
requirement2(expressions) {
expressions.instance_class
is_valid_instance_class(expressions.instance_class.constant_value)
}
# Helper rule to validate engine value
is_valid_engine(engine) {
engine_set := {
"mysql",
"postgres",
"mariadb",
"oracle-se",
"oracle-se1",
"oracle-se2",
"oracle-ee",
"sqlserver-ee",
"sqlserver-se",
"sqlserver-ex",
"sqlserver-web"
}
engine_set[engine]
}
# Helper rule to validate instance class type
is_valid_instance_class(instance_class) {
instance_class_starts_with(instance_class, "db.")
}
# Helper rule to check prefix of instance class
instance_class_starts_with(instance_class, prefix) {
startswith(instance_class, prefix)
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_db_instance
is_valid_vpc
is_valid_subnet
is_valid_subnet_group
is_valid_r53_record
is_valid_r53_zone
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"db_subnet_group_name":"mydb-subnet-group","dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"internal","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"mysql","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"public","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"password","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":true,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"user"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Managed by Terraform","name":"mydb-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"name_prefix":true,"subnet_ids":true,"supported_network_types":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"supported_network_types":[],"tags_all":{}}}},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"internal-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"public-db.example.com","set_identifier":null,"timeouts":null,"ttl":300,"type":"CNAME","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.0.0/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.0.128/25","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/24","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":null,"timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.internal","mode":"managed","type":"aws_db_instance","name":"internal","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"db_subnet_group_name":{"references":["aws_db_subnet_group.main.name","aws_db_subnet_group.main"]},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"internal"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_instance.public","mode":"managed","type":"aws_db_instance","name":"public","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"engine":{"constant_value":"mysql"},"identifier":{"constant_value":"public"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"password"},"publicly_accessible":{"constant_value":true},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"user"}},"schema_version":2},{"address":"aws_db_subnet_group.main","mode":"managed","type":"aws_db_subnet_group","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"mydb-subnet-group"},"subnet_ids":{"references":["aws_subnet.maina.id","aws_subnet.maina","aws_subnet.mainb.id","aws_subnet.mainb"]}},"schema_version":0},{"address":"aws_route53_record.internal_db","mode":"managed","type":"aws_route53_record","name":"internal_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"internal-db.example.com"},"records":{"references":["aws_db_instance.internal.address","aws_db_instance.internal"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.private.zone_id","aws_route53_zone.private"]}},"schema_version":2},{"address":"aws_route53_record.public_db","mode":"managed","type":"aws_route53_record","name":"public_db","provider_config_key":"aws","expressions":{"name":{"constant_value":"public-db.example.com"},"records":{"references":["aws_db_instance.public.address","aws_db_instance.public"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"CNAME"},"zone_id":{"references":["aws_route53_zone.public.zone_id","aws_route53_zone.public"]}},"schema_version":2},{"address":"aws_route53_zone.private","mode":"managed","type":"aws_route53_zone","name":"private","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}}]},"schema_version":0},{"address":"aws_route53_zone.public","mode":"managed","type":"aws_route53_zone","name":"public","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"aws_subnet.maina","mode":"managed","type":"aws_subnet","name":"maina","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.0/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.mainb","mode":"managed","type":"aws_subnet","name":"mainb","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.0.128/25"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/24"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.internal","attribute":["address"]},{"resource":"aws_db_instance.public","attribute":["address"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_route53_zone.public","attribute":["zone_id"]},{"resource":"aws_subnet.mainb","attribute":["id"]},{"resource":"aws_db_subnet_group.main","attribute":["name"]},{"resource":"aws_subnet.maina","attribute":["id"]},{"resource":"aws_route53_zone.private","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:01Z","applyable":true,"complete":true,"errored":false}
|
5 | I need to spread read traffic across a couple of copies of our main database so things stay fast and reliable, and I want to be able to nudge more users toward one copy than the other. | Using route 53 resources, configure a weighted routing policy that splits users between two db_instances that are replicas of a main db_instance. Call the zone "main", the original db_instance "primary", and the two replicas "replica-1" and "replica-2" respectively | Has one "aws_route53_zone" resource
with "name"
Has a "aws_db_instance" resource
with "identifier" set to "primary"
with "instance_class"
with "allocated_storage"
with "engine"
with "username"
with "password"
with "backup_retention_period" set to a non-zero number
Has multiple "aws_db_instance" resources
with "identifier"
with "replicate_source_db" referencing the main "aws_db_instance" resource
with "instance_class"
Has multiple "aws_route53_record" resources
with "name"
with "type"
with "ttl"
with "zone_id" referencing the "aws_route53_zone" resource
with "weighted_routing_policy" block that contains "weight" as a non-zero number
with "records" containing an endpoint of a corresponding replica of the main "aws_db_instance"
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_db_instance" "primary" {
identifier = "primary"
allocated_storage = 20
engine = "postgres"
instance_class = "db.t3.micro"
username = "dbadmin"
password = "your_password_here"
skip_final_snapshot = true
backup_retention_period = 7
}
resource "aws_db_instance" "replica_1" {
replicate_source_db = aws_db_instance.primary.identifier
instance_class = "db.t3.micro"
identifier = "mydb-replica-1"
skip_final_snapshot = true
}
resource "aws_db_instance" "replica_2" {
replicate_source_db = aws_db_instance.primary.identifier
instance_class = "db.t3.micro"
identifier = "mydb-replica-2"
skip_final_snapshot = true
}
# Route53 Hosted Zone
resource "aws_route53_zone" "main" {
name = "example53.com"
}
# Route53 Records for each RDS Read Replica with a Weighted Routing Policy
resource "aws_route53_record" "replica_1_cname" {
zone_id = aws_route53_zone.main.zone_id
name = "replica1.example53.com"
type = "CNAME"
records = [aws_db_instance.replica_1.endpoint]
ttl = "60"
weighted_routing_policy {
weight = 10
}
set_identifier = "replica-1-record"
}
resource "aws_route53_record" "replica_2_cname" {
zone_id = aws_route53_zone.main.zone_id
name = "replica2.example53.com"
type = "CNAME"
records = [aws_db_instance.replica_2.endpoint]
ttl = "60"
weighted_routing_policy {
weight = 20
}
set_identifier = "replica-2-record"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record_primary = false
default is_valid_r53_record_secondary = false
default is_valid_db_instance_main = false
default is_valid_db_instance_replica1 = false
default is_valid_db_instance_replica2 = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.name == "main"
}
# Validate aws_route53_record
is_valid_r53_record_primary {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.weighted_routing_policy[0].weight
resource.expressions.type.constant_value == "CNAME"
resource.expressions.ttl
resource.expressions.records.references[0] == "aws_db_instance.replica_1.endpoint"
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id"
}
is_valid_r53_record_secondary {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.weighted_routing_policy[0].weight
resource.expressions.type.constant_value == "CNAME"
resource.expressions.ttl
resource.expressions.records.references[0] == "aws_db_instance.replica_2.endpoint"
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.main.zone_id"
}
# Rule to check if a valid aws_db_instance exists
is_valid_db_instance_main {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_main_db_arguments
}
is_valid_db_instance_replica1 {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_db_replica1_arguments
}
is_valid_db_instance_replica2 {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
has_required_db_replica2_arguments
}
# Helper rule to check if all required arguments are present and valid
has_required_main_db_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
# Check for allocated_storage, engine, instance_class, username, password, and skip_final_snapshot
requirement1(resource.expressions)
# Check for instance_class validity
requirement2(resource.expressions)
}
# 1, allocated_storage and engine or snapshot_identifier or replace_source_db
requirement1(expressions) {
expressions.allocated_storage
expressions.engine
expressions.username
expressions.password
is_valid_engine(expressions.engine.constant_value)
}
requirement1(expressions) {
expressions.snapshot_identifier
}
# Check for instance_class validity
requirement2(expressions) {
expressions.instance_class
is_valid_instance_class(expressions.instance_class.constant_value)
}
# Helper rule to validate engine value
is_valid_engine(engine) {
engine_set := {
"mysql",
"postgres",
"mariadb",
"oracle-se",
"oracle-se1",
"oracle-se2",
"oracle-ee",
"sqlserver-ee",
"sqlserver-se",
"sqlserver-ex",
"sqlserver-web"
}
engine_set[engine]
}
# Helper rule to validate instance class type
is_valid_instance_class(instance_class) {
instance_class_starts_with(instance_class, "db.")
}
# Helper rule to check prefix of instance class
instance_class_starts_with(instance_class, prefix) {
startswith(instance_class, prefix)
}
has_required_db_replica1_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.name == "replica_1"
resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier"
is_valid_instance_class(resource.expressions.instance_class.constant_value)
resource.expressions.skip_final_snapshot
}
has_required_db_replica2_arguments {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_db_instance"
resource.name == "replica_2"
resource.expressions.replicate_source_db.references[0] == "aws_db_instance.primary.identifier"
is_valid_instance_class(resource.expressions.instance_class.constant_value)
resource.expressions.skip_final_snapshot
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record_primary
is_valid_r53_record_secondary
is_valid_db_instance_main
is_valid_db_instance_replica1
is_valid_db_instance_replica2
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"sensitive_values":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allocated_storage":20,"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"backup_retention_period":7,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"engine":"postgres","final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"primary","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":"your_password_here","password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":null,"restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null,"username":"dbadmin"},"after_unknown":{"address":true,"arn":true,"availability_zone":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-1","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_major_version_upgrade":null,"apply_immediately":false,"auto_minor_version_upgrade":true,"blue_green_update":[],"copy_tags_to_snapshot":false,"custom_iam_instance_profile":null,"customer_owned_ip_enabled":null,"dedicated_log_volume":false,"delete_automated_backups":true,"deletion_protection":null,"domain":null,"domain_auth_secret_arn":null,"domain_dns_ips":null,"domain_iam_role_name":null,"domain_ou":null,"enabled_cloudwatch_logs_exports":null,"final_snapshot_identifier":null,"iam_database_authentication_enabled":null,"identifier":"mydb-replica-2","instance_class":"db.t3.micro","manage_master_user_password":null,"max_allocated_storage":null,"monitoring_interval":0,"password":null,"password_wo":null,"password_wo_version":null,"performance_insights_enabled":false,"publicly_accessible":false,"region":"us-east-1","replicate_source_db":"primary","restore_to_point_in_time":[],"s3_import":[],"skip_final_snapshot":true,"storage_encrypted":null,"tags":null,"timeouts":null,"upgrade_storage_config":null},"after_unknown":{"address":true,"allocated_storage":true,"arn":true,"availability_zone":true,"backup_retention_period":true,"backup_target":true,"backup_window":true,"blue_green_update":[],"ca_cert_identifier":true,"character_set_name":true,"database_insights_mode":true,"db_name":true,"db_subnet_group_name":true,"domain_fqdn":true,"endpoint":true,"engine":true,"engine_lifecycle_support":true,"engine_version":true,"engine_version_actual":true,"hosted_zone_id":true,"id":true,"identifier_prefix":true,"iops":true,"kms_key_id":true,"latest_restorable_time":true,"license_model":true,"listener_endpoint":true,"maintenance_window":true,"master_user_secret":true,"master_user_secret_kms_key_id":true,"monitoring_role_arn":true,"multi_az":true,"nchar_character_set_name":true,"network_type":true,"option_group_name":true,"parameter_group_name":true,"performance_insights_kms_key_id":true,"performance_insights_retention_period":true,"port":true,"replica_mode":true,"replicas":true,"resource_id":true,"restore_to_point_in_time":[],"s3_import":[],"snapshot_identifier":true,"status":true,"storage_throughput":true,"storage_type":true,"tags_all":true,"timezone":true,"upgrade_rollout_order":true,"username":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"blue_green_update":[],"listener_endpoint":[],"master_user_secret":[],"password":true,"password_wo":true,"replicas":[],"restore_to_point_in_time":[],"s3_import":[],"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica1.example53.com","set_identifier":"replica-1-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":10}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"replica2.example53.com","set_identifier":"replica-2-record","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":20}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_db_instance.primary","mode":"managed","type":"aws_db_instance","name":"primary","provider_config_key":"aws","expressions":{"allocated_storage":{"constant_value":20},"backup_retention_period":{"constant_value":7},"engine":{"constant_value":"postgres"},"identifier":{"constant_value":"primary"},"instance_class":{"constant_value":"db.t3.micro"},"password":{"constant_value":"your_password_here"},"skip_final_snapshot":{"constant_value":true},"username":{"constant_value":"dbadmin"}},"schema_version":2},{"address":"aws_db_instance.replica_1","mode":"managed","type":"aws_db_instance","name":"replica_1","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-1"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_db_instance.replica_2","mode":"managed","type":"aws_db_instance","name":"replica_2","provider_config_key":"aws","expressions":{"identifier":{"constant_value":"mydb-replica-2"},"instance_class":{"constant_value":"db.t3.micro"},"replicate_source_db":{"references":["aws_db_instance.primary.identifier","aws_db_instance.primary"]},"skip_final_snapshot":{"constant_value":true}},"schema_version":2},{"address":"aws_route53_record.replica_1_cname","mode":"managed","type":"aws_route53_record","name":"replica_1_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica1.example53.com"},"records":{"references":["aws_db_instance.replica_1.endpoint","aws_db_instance.replica_1"]},"set_identifier":{"constant_value":"replica-1-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":10}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.replica_2_cname","mode":"managed","type":"aws_route53_record","name":"replica_2_cname","provider_config_key":"aws","expressions":{"name":{"constant_value":"replica2.example53.com"},"records":{"references":["aws_db_instance.replica_2.endpoint","aws_db_instance.replica_2"]},"set_identifier":{"constant_value":"replica-2-record"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":20}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_db_instance.primary","attribute":["identifier"]},{"resource":"aws_db_instance.replica_1","attribute":["endpoint"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_db_instance.replica_2","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:49:09Z","applyable":true,"complete":true,"errored":false}
|
6 | I need a simple way to run and manage a web app in the cloud without handling servers myself, and it should have the right permissions to operate smoothly while keeping the setup pretty minimal. | Create a basic elastic beanstalk environment with a elastic beanstalk application. Name the iam_role "eb_ec2_role", the instance profile "eb_ec2_profile", and the elastic beanstalk application "my_application" | Has one "aws_iam_role" resource
with "name"
with "assume_role_policy" and "Service" set to "ec2.amazonaws.com"
Has one "aws_iam_role_policy_attachment" resource
with "role" referencing the "aws_iam_role"
with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
Has one "aws_iam_instance_profile" resource
with "name"
with "role" referencing the "aws_iam_role" resource
Has one "aws_elastic_beanstalk_application" resource
with "name"
Has one "aws_elastic_beanstalk_environment" resource
with "name"
with "application" referencing the "aws_elastic_beanstalk_application" resource
with "solution_stack_name"
with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
# IAM role for Elastic Beanstalk EC2 instances
resource "aws_iam_role" "eb_ec2_role" {
name = "elastic_beanstalk_ec2_role_eb1"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "ec2.amazonaws.com"
},
},
]
})
}
# Attach the AWS managed policy for Elastic Beanstalk to the role
resource "aws_iam_role_policy_attachment" "eb_managed_policy" {
role = aws_iam_role.eb_ec2_role.name
policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Create an instance profile tied to the role
resource "aws_iam_instance_profile" "eb_ec2_profile" {
name = "elastic_beanstalk_ec2_profile"
role = aws_iam_role.eb_ec2_role.name
}
# Elastic Beanstalk Application
resource "aws_elastic_beanstalk_application" "my_application" {
name = "my-three-tier-app"
}
# Elastic Beanstalk Environment for the web tier
resource "aws_elastic_beanstalk_environment" "web_tier" {
name = "my-web-tier-env"
application = aws_elastic_beanstalk_application.my_application.name
solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9"
setting {
namespace = "aws:autoscaling:launchconfiguration"
name = "IamInstanceProfile"
value = aws_iam_instance_profile.eb_ec2_profile.name
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_iam_instance_profile = false
default is_valid_iam_role = false
default is_valid_iam_role_policy_attachment = false
default is_valid_eb_app = false
default is_valid_eb_env = false
is_valid_iam_role {
some i
resource := input.resource_changes[i]
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com")
}
is_valid_iam_role_policy_attachment {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_role_policy_attachment"
resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name"
resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Validate aws_iam_instance_profile resource
is_valid_iam_instance_profile {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_instance_profile"
resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name"
}
# Validate aws_eb_app
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
# Validate aws_eb_env
is_valid_eb_env {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_environment"
resource.expressions.name
resource.expressions.application.references[0] == "aws_elastic_beanstalk_application.my_application.name"
resource.expressions.solution_stack_name
resource.expressions.setting[0].value.references[0] == "aws_iam_instance_profile.eb_ec2_profile.name"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_iam_role
is_valid_iam_role_policy_attachment
is_valid_iam_instance_profile
is_valid_eb_app
is_valid_eb_env
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true,"version_label":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-three-tier-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.my_application.name","aws_elastic_beanstalk_application.my_application"]},"name":{"constant_value":"my-web-tier-env"},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role_eb1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.my_application","attribute":["name"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]}],"timestamp":"2026-02-18T20:49:15Z","applyable":true,"complete":true,"errored":false}
|
7 | I want to be able to shift my app’s traffic gradually between two different versions so I can roll out updates safely and switch back quickly if something goes wrong. | Configure Blue/Green deployment with Route53 resources to navigate traffic between Elastic Beanstalk Environments. Name the environments "blue" and "green" and implement a Weighted Routing Policy for the records | Has one "aws_iam_role" resource
with "name"
with "assume_role_policy" and "Service" set to "ec2.amazonaws.com"
Has one "aws_iam_role_policy_attachment" resource
with "role" referencing the "aws_iam_role"
with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
Has one "aws_iam_instance_profile" resource
with "name"
with "role" referencing the "aws_iam_role" resource
Has one "aws_elastic_beanstalk_application" resource
with "name"
Has two "aws_elastic_beanstalk_environment" resources
each are provisioned in different regions
with "name"
with "application" referencing the "aws_elastic_beanstalk_application" resource
with "solution_stack_name"
with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
Has one "aws_route53_zone" resource
with "name"
Has two "aws_route53_record" resources
each are provisioned in different regions
with "name"
with "type"
with "ttl"
with "zone_id" referencing the "aws_route53_zone" resource
with "set_identifier"
with "weighted_routing_policy" block that contains "weight" as a non-zero number
with "records" referencing one of the "aws_elastic_beanstalk_environment" resources | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "eb_ec2_role" {
name = "elastic_beanstalk_ec2_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "ec2.amazonaws.com"
},
},
]
})
}
# Attach the AWS managed policy for Elastic Beanstalk to the role
resource "aws_iam_role_policy_attachment" "eb_managed_policy" {
role = aws_iam_role.eb_ec2_role.name
policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Create an instance profile tied to the role
resource "aws_iam_instance_profile" "eb_ec2_profile" {
name = "elastic_beanstalk_ec2_profile"
role = aws_iam_role.eb_ec2_role.name
}
resource "aws_s3_bucket" "sample_bucket" {
bucket_prefix = "sample-"
}
resource "aws_s3_object" "examplebucket_blue_object" {
key = "blue_app"
bucket = aws_s3_bucket.sample_bucket.id
source = "./supplement/app.zip"
}
resource "aws_s3_object" "examplebucket_green_object" {
key = "green_app"
bucket = aws_s3_bucket.sample_bucket.id
source = "./supplement/app.zip"
}
# Elastic Beanstalk application
resource "aws_elastic_beanstalk_application" "blue_app" {
name = "blue-app"
description = "An application for Blue deployment."
}
resource "aws_elastic_beanstalk_application_version" "blue_version" {
name = "v1"
application = aws_elastic_beanstalk_application.blue_app.name
bucket = aws_s3_object.examplebucket_blue_object.bucket
key = aws_s3_object.examplebucket_blue_object.key
}
resource "aws_elastic_beanstalk_application" "green_app" {
name = "green-app"
description = "An application for Green deployment."
}
resource "aws_elastic_beanstalk_application_version" "green_version" {
name = "v2"
application = aws_elastic_beanstalk_application.green_app.name
bucket = aws_s3_object.examplebucket_green_object.bucket
key = aws_s3_object.examplebucket_green_object.key
}
# Blue environment
resource "aws_elastic_beanstalk_environment" "blue" {
name = "${aws_elastic_beanstalk_application.blue_app.name}"
application = aws_elastic_beanstalk_application.blue_app.name
solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9"
version_label = aws_elastic_beanstalk_application_version.blue_version.name
setting {
namespace = "aws:autoscaling:launchconfiguration"
name = "IamInstanceProfile"
value = aws_iam_instance_profile.eb_ec2_profile.name
}
}
# Green environment (New version)
resource "aws_elastic_beanstalk_environment" "green" {
name = "${aws_elastic_beanstalk_application.green_app.name}-green"
application = aws_elastic_beanstalk_application.green_app.name
solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9"
version_label = aws_elastic_beanstalk_application_version.green_version.name
setting {
namespace = "aws:autoscaling:launchconfiguration"
name = "IamInstanceProfile"
value = aws_iam_instance_profile.eb_ec2_profile.name
}
}
# Route53 Hosted Zone
resource "aws_route53_zone" "main" {
name = "example53.com"
}
# Weighted DNS records for Blue and Green environments
resource "aws_route53_record" "blue" {
zone_id = aws_route53_zone.main.zone_id
name = "app.example.com"
type = "CNAME"
ttl = "60"
weighted_routing_policy {
weight = 120
}
set_identifier = "BlueEnvironment"
records = [
aws_elastic_beanstalk_environment.blue.cname
]
}
resource "aws_route53_record" "green" {
zone_id = aws_route53_zone.main.zone_id
name = "app.example.com"
type = "CNAME"
ttl = "60"
weighted_routing_policy {
weight = 60
}
set_identifier = "GreenEnvironment"
records = [
aws_elastic_beanstalk_environment.green.cname
]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_iam_instance_profile = false
default is_valid_iam_role = false
default is_valid_iam_role_policy_attachment = false
default is_valid_eb_app = false
default is_valid_eb_env = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.name
}
# Validate aws_route53_record
is_valid_r53_record {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type
resource.expressions.ttl
resource.expressions.set_identifier
resource.expressions.weighted_routing_policy
resource.expressions.records.references[0] == "aws_elastic_beanstalk_environment.blue.cname"
resource.expressions.zone_id.references[0]
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_route53_record"
resource2.expressions.name
resource2.expressions.type
resource2.expressions.ttl
resource2.expressions.records.references[0] == "aws_elastic_beanstalk_environment.green.cname"
resource2.expressions.zone_id.references[0]
resource2.expressions.set_identifier
resource2.expressions.weighted_routing_policy
}
is_valid_iam_role {
some i
resource := input.resource_changes[i]
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com")
}
is_valid_iam_role_policy_attachment {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_role_policy_attachment"
resource.expressions.role.references[0]
resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Validate aws_iam_instance_profile resource
is_valid_iam_instance_profile {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_instance_profile"
resource.expressions.role.references[0]
}
# Validate aws_eb_app
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
# Validate aws_eb_env
is_valid_eb_env {
some i, j
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_environment"
resource.expressions.name
resource.expressions.application.references[0]
resource.expressions.solution_stack_name
some a
resource.expressions.setting[a].value.references[0]
resource2 := input.configuration.root_module.resources[j]
resource2.type == "aws_elastic_beanstalk_environment"
resource2.expressions.name
resource2.expressions.application.references[0]
resource2.expressions.solution_stack_name
some b
resource2.expressions.setting[b].value.references[0]
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_iam_role
is_valid_iam_role_policy_attachment
is_valid_iam_instance_profile
is_valid_r53_zone
is_valid_r53_record
is_valid_eb_app
is_valid_eb_env
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"An application for Blue deployment.","name":"blue-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"An application for Green deployment.","name":"green-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"blue-app","description":null,"force_delete":false,"key":"blue_app","name":"v1","process":false,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"green-app","description":null,"force_delete":false,"key":"green_app","name":"v2","process":false,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"blue-app","description":null,"name":"blue-app","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v1","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"green-app","description":null,"name":"green-app-green","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v2","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"BlueEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":120}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"GreenEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":60}]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"sample-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"blue_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"override_provider":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"green_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"override_provider":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"An application for Blue deployment.","name":"blue-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"An application for Green deployment.","name":"green-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"blue-app","description":null,"force_delete":false,"key":"blue_app","name":"v1","process":false,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"bucket":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"green-app","description":null,"force_delete":false,"key":"green_app","name":"v2","process":false,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"bucket":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"blue-app","description":null,"name":"blue-app","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v1","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"green-app","description":null,"name":"green-app-green","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","version_label":"v2","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"BlueEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":120}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"app.example.com","set_identifier":"GreenEnvironment","timeouts":null,"ttl":60,"type":"CNAME","weighted_routing_policy":[{"weight":60}]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":true,"weighted_routing_policy":[{}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[],"weighted_routing_policy":[{}]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"sample-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"blue_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"acl":true,"arn":true,"bucket":true,"bucket_key_enabled":true,"checksum_crc32":true,"checksum_crc32c":true,"checksum_crc64nvme":true,"checksum_sha1":true,"checksum_sha256":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"override_provider":[],"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"override_provider":[],"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cache_control":null,"checksum_algorithm":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"green_app","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"override_provider":[],"region":"us-east-1","source":"./supplement/app.zip","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"acl":true,"arn":true,"bucket":true,"bucket_key_enabled":true,"checksum_crc32":true,"checksum_crc32c":true,"checksum_crc64nvme":true,"checksum_sha1":true,"checksum_sha256":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"override_provider":[],"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"override_provider":[],"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.blue_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"blue_app","provider_config_key":"aws","expressions":{"description":{"constant_value":"An application for Blue deployment."},"name":{"constant_value":"blue-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application.green_app","mode":"managed","type":"aws_elastic_beanstalk_application","name":"green_app","provider_config_key":"aws","expressions":{"description":{"constant_value":"An application for Green deployment."},"name":{"constant_value":"green-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application_version.blue_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"blue_version","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"bucket":{"references":["aws_s3_object.examplebucket_blue_object.bucket","aws_s3_object.examplebucket_blue_object"]},"key":{"references":["aws_s3_object.examplebucket_blue_object.key","aws_s3_object.examplebucket_blue_object"]},"name":{"constant_value":"v1"}},"schema_version":0},{"address":"aws_elastic_beanstalk_application_version.green_version","mode":"managed","type":"aws_elastic_beanstalk_application_version","name":"green_version","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"bucket":{"references":["aws_s3_object.examplebucket_green_object.bucket","aws_s3_object.examplebucket_green_object"]},"key":{"references":["aws_s3_object.examplebucket_green_object.key","aws_s3_object.examplebucket_green_object"]},"name":{"constant_value":"v2"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.blue","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"blue","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"name":{"references":["aws_elastic_beanstalk_application.blue_app.name","aws_elastic_beanstalk_application.blue_app"]},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"version_label":{"references":["aws_elastic_beanstalk_application_version.blue_version.name","aws_elastic_beanstalk_application_version.blue_version"]}},"schema_version":1},{"address":"aws_elastic_beanstalk_environment.green","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"green","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"name":{"references":["aws_elastic_beanstalk_application.green_app.name","aws_elastic_beanstalk_application.green_app"]},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"version_label":{"references":["aws_elastic_beanstalk_application_version.green_version.name","aws_elastic_beanstalk_application_version.green_version"]}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_route53_record.blue","mode":"managed","type":"aws_route53_record","name":"blue","provider_config_key":"aws","expressions":{"name":{"constant_value":"app.example.com"},"records":{"references":["aws_elastic_beanstalk_environment.blue.cname","aws_elastic_beanstalk_environment.blue"]},"set_identifier":{"constant_value":"BlueEnvironment"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":120}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_record.green","mode":"managed","type":"aws_route53_record","name":"green","provider_config_key":"aws","expressions":{"name":{"constant_value":"app.example.com"},"records":{"references":["aws_elastic_beanstalk_environment.green.cname","aws_elastic_beanstalk_environment.green"]},"set_identifier":{"constant_value":"GreenEnvironment"},"ttl":{"constant_value":"60"},"type":{"constant_value":"CNAME"},"weighted_routing_policy":[{"weight":{"constant_value":60}}],"zone_id":{"references":["aws_route53_zone.main.zone_id","aws_route53_zone.main"]}},"schema_version":2},{"address":"aws_route53_zone.main","mode":"managed","type":"aws_route53_zone","name":"main","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0},{"address":"aws_s3_bucket.sample_bucket","mode":"managed","type":"aws_s3_bucket","name":"sample_bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"sample-"}},"schema_version":0},{"address":"aws_s3_object.examplebucket_blue_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_blue_object","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.sample_bucket.id","aws_s3_bucket.sample_bucket"]},"key":{"constant_value":"blue_app"},"source":{"constant_value":"./supplement/app.zip"}},"schema_version":0},{"address":"aws_s3_object.examplebucket_green_object","mode":"managed","type":"aws_s3_object","name":"examplebucket_green_object","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.sample_bucket.id","aws_s3_bucket.sample_bucket"]},"key":{"constant_value":"green_app"},"source":{"constant_value":"./supplement/app.zip"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.blue_app","attribute":["name"]},{"resource":"aws_s3_bucket.sample_bucket","attribute":["id"]},{"resource":"aws_elastic_beanstalk_application_version.green_version","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_blue_object","attribute":["bucket"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_route53_zone.main","attribute":["zone_id"]},{"resource":"aws_elastic_beanstalk_application.green_app","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_blue_object","attribute":["key"]},{"resource":"aws_s3_object.examplebucket_green_object","attribute":["bucket"]},{"resource":"aws_elastic_beanstalk_application_version.blue_version","attribute":["name"]},{"resource":"aws_s3_object.examplebucket_green_object","attribute":["key"]},{"resource":"aws_elastic_beanstalk_environment.blue","attribute":["cname"]},{"resource":"aws_elastic_beanstalk_environment.green","attribute":["cname"]}],"timestamp":"2026-02-18T20:49:15Z","applyable":true,"complete":true,"errored":false}
|
8 | I need our main site to show up when people type in our custom name, and it should lead them to the right place reliably. | Set up a record that maps a domain name to an IPv4 address using Route 53 resources | Has one "aws_route53_zone" resource
with "name" set to "example53.com"
Has one "aws_route53_record" resource
with "name"
with "type" set to "A"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "example53" {
name = "example53.com"
}
resource "aws_route53_record" "example53_A" {
zone_id = aws_route53_zone.example53.zone_id
name = "example53.com"
type = "A"
ttl = "300"
records = ["192.0.2.1"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "example53.com"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type.constant_value == "A"
resource.expressions.ttl
resource.expressions.records
resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["192.0.2.1"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:27Z","applyable":true,"complete":true,"errored":false}
|
9 | I want our main domain to be reachable using modern addressing so people on newer networks can access it reliably. | Set up a record that maps a domain name to an IPv6 address using Route 53 resources | Has one "aws_route53_zone" resource
with "name" set to "example53.com"
Has one "aws_route53_record" resource
with "name"
with "type" set to "AAAA"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "example53" {
name = "example53.com"
}
resource "aws_route53_record" "example53_A" {
zone_id = aws_route53_zone.example53.zone_id
name = "example53.com"
type = "AAAA"
ttl = "300"
records = ["2001:0db8:85a3:0000:0000:8a2e:0370:7334"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "example53.com"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type.constant_value == "AAAA"
resource.expressions.ttl
resource.expressions.records
resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"AAAA","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"AAAA","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["2001:0db8:85a3:0000:0000:8a2e:0370:7334"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"AAAA"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:33Z","applyable":true,"complete":true,"errored":false}
|
10 | I need a way for one of our machines to clearly identify itself when others look it up by its address, and it should be set up in a way that’s easy to manage going forward. | Set up a Pointer record for reverse DNS using Route 53 resources. The domain name should be "host.example53.com" and name the zone "reverse_zone" | Has one "aws_route53_zone" resource
with "name" ending in ".in-addr.arpa"
Has one "aws_route53_record" resource
with "name"
with "type" set to "PTR"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
| provider "aws" {
region = "us-east-1"
}
# Create Reverse DNS Hosted Zone
resource "aws_route53_zone" "reverse_zone" {
name = "2.0.192.in-addr.arpa"
}
# Create a PTR Record for a specific IP address within that zone
resource "aws_route53_record" "ptr_record" {
zone_id = aws_route53_zone.reverse_zone.zone_id
name = "53.2.0.192.in-addr.arpa"
type = "PTR"
ttl = "3600"
records = ["host.example.com"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "2.0.192.in-addr.arpa"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type.constant_value == "PTR"
resource.expressions.ttl
resource.expressions.records.constant_value[0] == "host.example.com"
resource.expressions.zone_id.references[0] == "aws_route53_zone.reverse_zone.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"53.2.0.192.in-addr.arpa","records":["host.example.com"],"set_identifier":null,"timeouts":null,"ttl":3600,"type":"PTR","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"2.0.192.in-addr.arpa","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"53.2.0.192.in-addr.arpa","records":["host.example.com"],"set_identifier":null,"timeouts":null,"ttl":3600,"type":"PTR","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"2.0.192.in-addr.arpa","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.ptr_record","mode":"managed","type":"aws_route53_record","name":"ptr_record","provider_config_key":"aws","expressions":{"name":{"constant_value":"53.2.0.192.in-addr.arpa"},"records":{"constant_value":["host.example.com"]},"ttl":{"constant_value":"3600"},"type":{"constant_value":"PTR"},"zone_id":{"references":["aws_route53_zone.reverse_zone.zone_id","aws_route53_zone.reverse_zone"]}},"schema_version":2},{"address":"aws_route53_zone.reverse_zone","mode":"managed","type":"aws_route53_zone","name":"reverse_zone","provider_config_key":"aws","expressions":{"name":{"constant_value":"2.0.192.in-addr.arpa"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.reverse_zone","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:39Z","applyable":true,"complete":true,"errored":false}
|
11 | I need to prove that we control our domain by adding a small piece of text that an external service can check, and it should be easy to update later if needed. | Set up a TXT recordfor domain ownership verification purposes using Route 53 resources. The verification string should be "passwordpassword" and the name of the zone should be "example" | Has one "aws_route53_zone" resource
with "name" set to "example53.com"
Has one "aws_route53_record" resource
with "name"
with "type" set to "TXT"
with "ttl"
with "records" set to a string
with "zone_id" referencing the "aws_route53_zone" resource
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "example" {
name = "example53.com"
}
# TXT Record for domain verification or other purposes
resource "aws_route53_record" "example_txt" {
zone_id = aws_route53_zone.example.zone_id
name = "sub.example53.com"
type = "TXT"
ttl = "300"
records = ["passwordpassword"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "example53.com"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type.constant_value == "TXT"
resource.expressions.ttl
resource.expressions.records.constant_value[0] == "passwordpassword"
resource.expressions.zone_id.references[0] == "aws_route53_zone.example.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"sub.example53.com","records":["passwordpassword"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"TXT","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"sub.example53.com","records":["passwordpassword"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"TXT","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example_txt","mode":"managed","type":"aws_route53_record","name":"example_txt","provider_config_key":"aws","expressions":{"name":{"constant_value":"sub.example53.com"},"records":{"constant_value":["passwordpassword"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"TXT"},"zone_id":{"references":["aws_route53_zone.example.zone_id","aws_route53_zone.example"]}},"schema_version":2},{"address":"aws_route53_zone.example","mode":"managed","type":"aws_route53_zone","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:49:43Z","applyable":true,"complete":true,"errored":false}
|
12 | I need an easy way to run and manage a web app without dealing with a lot of server setup, and it should scale automatically and run with the right access to other parts of our system. | Create an elastic beanstalk WebServer environment with a elastic beanstalk application. Name the iam_role "eb_ec2_role", the instance profile "eb_ec2_profile", and the elastic beanstalk application "my_application" | Has one "aws_iam_role" resource
with "name"
with "assume_role_policy" and "Service" set to "ec2.amazonaws.com"
Has one "aws_iam_role_policy_attachment" resource
with "role" referencing the "aws_iam_role"
with "policy_arn" set to "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
Has one "aws_iam_instance_profile" resource
with "name"
with "role" referencing the "aws_iam_role" resource
Has one "aws_elastic_beanstalk_application" resource
with "name"
Has one "aws_elastic_beanstalk_environment" resource
with "name"
with "application" referencing the "aws_elastic_beanstalk_application" resource
with "solution_stack_name"
with one "setting" block which has a "value" that references the "aws_iam_instance_profile" resource
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
# IAM role for Elastic Beanstalk EC2 instances
resource "aws_iam_role" "eb_ec2_role" {
name = "elastic_beanstalk_ec2_role_eb1"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "ec2.amazonaws.com"
},
},
]
})
}
# Attach the AWS managed policy for Elastic Beanstalk to the role
resource "aws_iam_role_policy_attachment" "eb_managed_policy" {
role = aws_iam_role.eb_ec2_role.name
policy_arn = "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Create an instance profile tied to the role
resource "aws_iam_instance_profile" "eb_ec2_profile" {
name = "elastic_beanstalk_ec2_profile"
role = aws_iam_role.eb_ec2_role.name
}
# Elastic Beanstalk Application
resource "aws_elastic_beanstalk_application" "my_application" {
name = "my-three-tier-app"
}
# Elastic Beanstalk Environment for the web tier
resource "aws_elastic_beanstalk_environment" "web_tier" {
name = "my-web-tier-env"
application = aws_elastic_beanstalk_application.my_application.name
solution_stack_name = "64bit Amazon Linux 2023 v4.3.0 running Python 3.9"
tier = "WebServer"
setting {
namespace = "aws:autoscaling:launchconfiguration"
name = "IamInstanceProfile"
value = aws_iam_instance_profile.eb_ec2_profile.name
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_iam_instance_profile = false
default is_valid_iam_role = false
default is_valid_iam_role_policy_attachment = false
default is_valid_eb_app = false
default is_valid_eb_env = false
is_valid_iam_role {
some i
resource := input.resource_changes[i]
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"ec2.amazonaws.com")
}
is_valid_iam_role_policy_attachment {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_role_policy_attachment"
resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name"
resource.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"
}
# Validate aws_iam_instance_profile resource
is_valid_iam_instance_profile {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_iam_instance_profile"
resource.expressions.role.references[0] == "aws_iam_role.eb_ec2_role.name"
}
# Validate aws_eb_app
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
# Validate aws_eb_env
is_valid_eb_env {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_environment"
resource.expressions.name
resource.expressions.application.references[0] == "aws_elastic_beanstalk_application.my_application.name"
resource.expressions.solution_stack_name
resource.expressions.tier.constant_value == "WebServer"
resource.expressions.setting[0].value.references[0] == "aws_iam_instance_profile.eb_ec2_profile.name"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_iam_role
is_valid_iam_role_policy_attachment
is_valid_iam_instance_profile
is_valid_eb_app
is_valid_eb_env
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"sensitive_values":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":null,"name":"my-three-tier-app","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"my-three-tier-app","description":null,"name":"my-web-tier-env","poll_interval":null,"region":"us-east-1","setting":[{"name":"IamInstanceProfile","namespace":"aws:autoscaling:launchconfiguration","resource":"","value":"elastic_beanstalk_ec2_profile"}],"solution_stack_name":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9","tags":null,"template_name":null,"tier":"WebServer","wait_for_ready_timeout":"20m"},"after_unknown":{"all_settings":true,"arn":true,"autoscaling_groups":true,"cname":true,"cname_prefix":true,"endpoint_url":true,"id":true,"instances":true,"launch_configurations":true,"load_balancers":true,"platform_arn":true,"queues":true,"setting":[{}],"tags_all":true,"triggers":true,"version_label":true},"before_sensitive":false,"after_sensitive":{"all_settings":[],"autoscaling_groups":[],"instances":[],"launch_configurations":[],"load_balancers":[],"queues":[],"setting":[{}],"tags_all":{},"triggers":[]}}},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elastic_beanstalk_ec2_profile","path":"/","role":"elastic_beanstalk_ec2_role_eb1","tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"elastic_beanstalk_ec2_role_eb1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier","role":"elastic_beanstalk_ec2_role_eb1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.my_application","mode":"managed","type":"aws_elastic_beanstalk_application","name":"my_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-three-tier-app"}},"schema_version":0},{"address":"aws_elastic_beanstalk_environment.web_tier","mode":"managed","type":"aws_elastic_beanstalk_environment","name":"web_tier","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.my_application.name","aws_elastic_beanstalk_application.my_application"]},"name":{"constant_value":"my-web-tier-env"},"setting":[{"name":{"constant_value":"IamInstanceProfile"},"namespace":{"constant_value":"aws:autoscaling:launchconfiguration"},"value":{"references":["aws_iam_instance_profile.eb_ec2_profile.name","aws_iam_instance_profile.eb_ec2_profile"]}}],"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.3.0 running Python 3.9"},"tier":{"constant_value":"WebServer"}},"schema_version":1},{"address":"aws_iam_instance_profile.eb_ec2_profile","mode":"managed","type":"aws_iam_instance_profile","name":"eb_ec2_profile","provider_config_key":"aws","expressions":{"name":{"constant_value":"elastic_beanstalk_ec2_profile"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0},{"address":"aws_iam_role.eb_ec2_role","mode":"managed","type":"aws_iam_role","name":"eb_ec2_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"elastic_beanstalk_ec2_role_eb1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eb_managed_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eb_managed_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AWSElasticBeanstalkWebTier"},"role":{"references":["aws_iam_role.eb_ec2_role.name","aws_iam_role.eb_ec2_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.my_application","attribute":["name"]},{"resource":"aws_iam_role.eb_ec2_role","attribute":["name"]},{"resource":"aws_iam_instance_profile.eb_ec2_profile","attribute":["name"]}],"timestamp":"2026-02-18T20:49:52Z","applyable":true,"complete":true,"errored":false}
|
13 | I need a reusable setup blueprint for one of our apps so we can spin up environments consistently without doing all the settings by hand. | Create a template of an elastic beanstalk application | Has one "aws_elastic_beanstalk_application" resource
with "name"
Has one "aws_elastic_beanstalk_configuration_template" resource
with "name"
with "application" referencing the "aws_elastic_beanstalk_application" resource
with "solution_stack_name" | provider "aws" {
region = "us-east-1"
}
resource "aws_elastic_beanstalk_application" "tftest" {
name = "tf-test-name"
description = "tf-test-desc"
}
resource "aws_elastic_beanstalk_configuration_template" "tf_template" {
name = "tf-test-template-config"
application = aws_elastic_beanstalk_application.tftest.name
solution_stack_name = "64bit Amazon Linux 2023 v4.0.9 running Python 3.11"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_eb_app = false
default is_valid_eb_app_template = false
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
is_valid_eb_app_template {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_configuration_template"
resource.expressions.name
resource.expressions.solution_stack_name
startswith(resource.expressions.application.references[0], "aws_elastic_beanstalk_application")
}
is_configuration_valid {
is_valid_eb_app
is_valid_eb_app_template
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"},"sensitive_values":{"setting":[]}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"},"after_unknown":{"id":true,"setting":true},"before_sensitive":false,"after_sensitive":{"setting":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.tftest.name","aws_elastic_beanstalk_application.tftest"]},"name":{"constant_value":"tf-test-template-config"},"solution_stack_name":{"constant_value":"64bit Amazon Linux 2023 v4.0.9 running Python 3.11"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.tftest","attribute":["name"]}],"timestamp":"2026-02-18T20:49:58Z","applyable":true,"complete":true,"errored":false}
|
14 | I need a reusable setup for running a Go-based service in our environment so new deployments stay consistent and easy to spin up. | Create a template of an elastic beanstalk application that is running a version of Go | Has one "aws_elastic_beanstalk_application" resource
with "name"
Has one "aws_elastic_beanstalk_configuration_template" resource
with "name"
with "application" referencing the "aws_elastic_beanstalk_application" resource
with "solution_stack_name" that references a valid "Go" version | provider "aws" {
region = "us-east-1"
}
resource "aws_elastic_beanstalk_application" "tftest" {
name = "tf-test-name"
description = "tf-test-desc"
}
resource "aws_elastic_beanstalk_configuration_template" "tf_template" {
name = "tf-test-template-config"
application = aws_elastic_beanstalk_application.tftest.name
solution_stack_name = "64bit Amazon Linux 2 v3.10.1 running Go 1"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_eb_app = false
default is_valid_eb_app_template = false
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
is_valid_eb_app_template {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_configuration_template"
resource.expressions.name
endswith(resource.expressions.solution_stack_name.constant_value, "Go 1")
startswith(resource.expressions.application.references[0], "aws_elastic_beanstalk_application")
}
is_configuration_valid {
is_valid_eb_app
is_valid_eb_app_template
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2 v3.10.1 running Go 1"},"sensitive_values":{"setting":[]}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"application":"tf-test-name","description":null,"environment_id":null,"name":"tf-test-template-config","region":"us-east-1","solution_stack_name":"64bit Amazon Linux 2 v3.10.1 running Go 1"},"after_unknown":{"id":true,"setting":true},"before_sensitive":false,"after_sensitive":{"setting":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_elastic_beanstalk_configuration_template.tf_template","mode":"managed","type":"aws_elastic_beanstalk_configuration_template","name":"tf_template","provider_config_key":"aws","expressions":{"application":{"references":["aws_elastic_beanstalk_application.tftest.name","aws_elastic_beanstalk_application.tftest"]},"name":{"constant_value":"tf-test-template-config"},"solution_stack_name":{"constant_value":"64bit Amazon Linux 2 v3.10.1 running Go 1"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elastic_beanstalk_application.tftest","attribute":["name"]}],"timestamp":"2026-02-18T20:50:01Z","applyable":true,"complete":true,"errored":false}
|
15 | I need a simple way to run my app in the cloud so it can grow as usage increases, without me having to manage the underlying servers. | Provision a resource to deploy and scale a web application that was developed with supported programming languages. | Has one "aws_elastic_beanstalk_application" resource
with "name" | provider "aws" {
region = "us-east-1"
}
resource "aws_elastic_beanstalk_application" "tftest" {
name = "tf-test-name"
description = "tf-test-desc"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_eb_app = false
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
}
is_configuration_valid {
is_valid_eb_app
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:50:05Z","applyable":true,"complete":true,"errored":false}
|
16 | I need a simple way to manage new releases of my app so old versions don’t pile up, but still keep things running smoothly and securely. | Create an Elastic Beanstalk application with an app version lifecycle | Has one "aws_elastic_beanstalk_application" resource
with "name"
with "appversion_lifecycle" block
Has one "aws_iam_role" resource
with "name"
with "assume_role_policy" and "Service" set to "elasticbeanstalk.amazonaws.com" | provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "beanstalk_service" {
name = "tf-test-beanstalk-service-role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "elasticbeanstalk.amazonaws.com"
},
},
]
})
}
resource "aws_elastic_beanstalk_application" "tftest" {
name = "tf-test-name"
description = "tf-test-desc"
appversion_lifecycle {
service_role = aws_iam_role.beanstalk_service.arn
max_count = 128
delete_source_from_s3 = true
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_eb_app = false
default is_valid_iam_role = false
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
resource.expressions.appversion_lifecycle[0].service_role.references[0]
}
is_valid_iam_role {
some i
resource := input.resource_changes[i]
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"elasticbeanstalk.amazonaws.com")
}
is_configuration_valid {
is_valid_eb_app
is_valid_iam_role
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":null,"max_count":128}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[{}],"tags_all":{}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":null,"max_count":128}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[{"service_role":true}],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[{}],"tags_all":{}}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"appversion_lifecycle":[{"delete_source_from_s3":{"constant_value":true},"max_count":{"constant_value":128},"service_role":{"references":["aws_iam_role.beanstalk_service.arn","aws_iam_role.beanstalk_service"]}}],"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"tf-test-beanstalk-service-role"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.beanstalk_service","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:11Z","applyable":true,"complete":true,"errored":false}
|
17 | I need a place to run and update my app where older releases get cleaned up automatically after a few days so things don’t pile up. | Create an Elastic Beanstalk application with an app version lifecycle. Retain the version for 5 days | Has one "aws_elastic_beanstalk_application" resource
with "name"
with "appversion_lifecycle" block
Has one "aws_iam_role" resource
with "name"
with "assume_role_policy" and "Service" set to "elasticbeanstalk.amazonaws.com" | provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "beanstalk_service" {
name = "tf-test-beanstalk-service-role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "elasticbeanstalk.amazonaws.com"
},
},
]
})
}
resource "aws_elastic_beanstalk_application" "tftest" {
name = "tf-test-name"
description = "tf-test-desc"
appversion_lifecycle {
service_role = aws_iam_role.beanstalk_service.arn
max_age_in_days = 5
delete_source_from_s3 = true
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_eb_app = false
default is_valid_iam_role = false
is_valid_eb_app {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_elastic_beanstalk_application"
resource.expressions.name
resource.expressions.appversion_lifecycle[0].service_role.references[0]
resource.expressions.appversion_lifecycle[0].max_age_in_days.constant_value == 5
}
is_valid_iam_role {
some i
resource := input.resource_changes[i]
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"elasticbeanstalk.amazonaws.com")
}
is_configuration_valid {
is_valid_eb_app
is_valid_iam_role
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":5,"max_count":null}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"sensitive_values":{"appversion_lifecycle":[{}],"tags_all":{}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"appversion_lifecycle":[{"delete_source_from_s3":true,"max_age_in_days":5,"max_count":null}],"description":"tf-test-desc","name":"tf-test-name","region":"us-east-1","tags":null},"after_unknown":{"appversion_lifecycle":[{"service_role":true}],"arn":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"appversion_lifecycle":[{}],"tags_all":{}}}},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"elasticbeanstalk.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"tf-test-beanstalk-service-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elastic_beanstalk_application.tftest","mode":"managed","type":"aws_elastic_beanstalk_application","name":"tftest","provider_config_key":"aws","expressions":{"appversion_lifecycle":[{"delete_source_from_s3":{"constant_value":true},"max_age_in_days":{"constant_value":5},"service_role":{"references":["aws_iam_role.beanstalk_service.arn","aws_iam_role.beanstalk_service"]}}],"description":{"constant_value":"tf-test-desc"},"name":{"constant_value":"tf-test-name"}},"schema_version":0},{"address":"aws_iam_role.beanstalk_service","mode":"managed","type":"aws_iam_role","name":"beanstalk_service","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"tf-test-beanstalk-service-role"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.beanstalk_service","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:18Z","applyable":true,"complete":true,"errored":false}
|
18 | I need an automated way to run my build steps whenever my code changes, using a setup that can pull from my existing repo and run in a simple, lightweight environment. | create a Basic AWS codebuild project resource with example iam role and an example GITHUB source | Has one "aws_iam_role" resource and one "aws_codebuild_project" resource with the "type" argument within the "source" block equal to "GITHUB" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
data "aws_iam_policy_document" "assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["codebuild.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "test_role" {
name = "test_role"
assume_role_policy = data.aws_iam_policy_document.assume_role.json
}
resource "aws_codebuild_project" "example" {
name = "test-project"
service_role = aws_iam_role.test_role.arn
artifacts {
type = "NO_ARTIFACTS"
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
}
source {
type = "GITHUB"
location = "github.com/source-location"
git_clone_depth = 1
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.name
resource.values.source[_].type == "GITHUB"
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"github.com/source-location","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"github.com/source-location","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1229436035","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codebuild.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["codebuild.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project"},"service_role":{"references":["aws_iam_role.test_role.arn","aws_iam_role.test_role"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"github.com/source-location"},"type":{"constant_value":"GITHUB"}}]},"schema_version":0},{"address":"aws_iam_role.test_role","mode":"managed","type":"aws_iam_role","name":"test_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"test_role"}},"schema_version":0},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["codebuild.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.test_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:22Z","applyable":true,"complete":true,"errored":false}
|
19 | I need an automated system that can pull our code from an online repo, run our builds with some custom settings, and keep things snappy by reusing work where possible. | create a AWS codebuild project resource with example iam role, an example GITHUB source, environment variables, and a cache | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "cache" block, at least one "environment_variable" within the "environment" block, and the "type" argument within the "source" block equal to "GITHUB" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "example" {
name = "example"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_codebuild_project" "example" {
name = "Row2CodeBuild"
description = "Row2CodeBuild"
build_timeout = 5
service_role = aws_iam_role.example.arn
artifacts {
type = "NO_ARTIFACTS"
}
cache {
type = "LOCAL"
modes = ["LOCAL_DOCKER_LAYER_CACHE", "LOCAL_SOURCE_CACHE"]
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
environment_variable {
name = "SOME_KEY1"
value = "SOME_VALUE1"
}
environment_variable {
name = "SOME_KEY2"
value = "SOME_VALUE2"
type = "PARAMETER_STORE"
}
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
git_submodules_config {
fetch_submodules = true
}
}
source_version = "master"
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment[_].environment_variable
resource.values.cache
resource.values.name
resource.values.source[_].type == "GITHUB"
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row2CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row2CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[{"fetch_submodules":true}],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row2CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row2CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[{"fetch_submodules":true}],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[{"modes":[false,false]}],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[{}]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example","mode":"managed","type":"aws_codebuild_project","name":"example","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"build_timeout":{"constant_value":5},"cache":[{"modes":{"constant_value":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"]},"type":{"constant_value":"LOCAL"}}],"description":{"constant_value":"Row2CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"environment_variable":[{"name":{"constant_value":"SOME_KEY1"},"value":{"constant_value":"SOME_VALUE1"}},{"name":{"constant_value":"SOME_KEY2"},"type":{"constant_value":"PARAMETER_STORE"},"value":{"constant_value":"SOME_VALUE2"}}],"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"Row2CodeBuild"},"service_role":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"source":[{"git_clone_depth":{"constant_value":1},"git_submodules_config":[{"fetch_submodules":{"constant_value":true}}],"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:24Z","applyable":true,"complete":true,"errored":false}
|
20 | I need an automated build setup that pulls code from our repo, runs tasks in a controlled environment, and keeps the outputs and any reusable build data organized so things run quickly and reliably. | create a AWS codebuild project resource with example iam role, an example GITHUB source, artifact, and a cache | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "cache" block, the "type" argument within the "artifacts" block not equal to "NO_ARTIFACTS", and the "type" argument within the "source" block equal to "GITHUB" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "example4" {
name = "example4"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_s3_bucket" "apriltwentyeight" {
bucket = "apriltwentyeight"
}
resource "aws_codebuild_project" "example4" {
name = "Row4CodeBuild"
description = "Row4CodeBuild"
build_timeout = 5
service_role = aws_iam_role.example4.arn
artifacts {
type = "S3"
location = aws_s3_bucket.apriltwentyeight.bucket
name = "results.zip"
path = "/"
packaging = "ZIP"
}
cache {
type = "LOCAL"
modes = ["LOCAL_DOCKER_LAYER_CACHE", "LOCAL_SOURCE_CACHE"]
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
source_version = "master"
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts[_].type != "NO_ARTIFACTS"
resource.values.environment
resource.values.name
resource.values.cache
resource.values.source[_].type == "GITHUB"
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyeight","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row4CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row4CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example4","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyeight","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyeight","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[{"cache_namespace":null,"location":null,"modes":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"],"type":"LOCAL"}],"concurrent_build_limit":null,"description":"Row4CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"Row4CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[{"modes":[false,false]}],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[{"modes":[false,false]}],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example4","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyeight","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example4","mode":"managed","type":"aws_codebuild_project","name":"example4","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.apriltwentyeight.bucket","aws_s3_bucket.apriltwentyeight"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"build_timeout":{"constant_value":5},"cache":[{"modes":{"constant_value":["LOCAL_DOCKER_LAYER_CACHE","LOCAL_SOURCE_CACHE"]},"type":{"constant_value":"LOCAL"}}],"description":{"constant_value":"Row4CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"Row4CodeBuild"},"service_role":{"references":["aws_iam_role.example4.arn","aws_iam_role.example4"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example4","mode":"managed","type":"aws_iam_role","name":"example4","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example4"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyeight","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyeight","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyeight"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example4","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentyeight","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:38Z","applyable":true,"complete":true,"errored":false}
|
21 | I want an automated build process that pulls code from our online repo and keeps track of everything it does, and it should be able to run in a lightweight environment without costing too much. | create a AWS codebuild project resource with example iam role, example GITHUB source, and a logs config | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with the "type" argument within the "source" block equal to "GITHUB" and a "logs_config" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "example5" {
name = "example5"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_s3_bucket" "apriltwentynine" {
bucket = "apriltwentynine"
}
resource "aws_codebuild_project" "example5" {
name = "Row5CodeBuild"
description = "Row5CodeBuild"
build_timeout = 5
service_role = aws_iam_role.example5.arn
artifacts {
type = "NO_ARTIFACTS"
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
}
logs_config {
cloudwatch_logs {
group_name = "log-group"
stream_name = "log-stream"
}
s3_logs {
status = "ENABLED"
location = "${aws_s3_bucket.apriltwentynine.id}/build-log"
}
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
source_version = "master"
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.name
resource.values.logs_config[_].cloudwatch_logs[_]
resource.values.source[_].type == "GITHUB"
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[],"concurrent_build_limit":null,"description":"Row5CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{"group_name":"log-group","status":"ENABLED","stream_name":"log-stream"}],"s3_logs":[{"bucket_owner_access":null,"encryption_disabled":false,"status":"ENABLED"}]}],"name":"Row5CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{}]}],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example5","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentynine","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":5,"cache":[],"concurrent_build_limit":null,"description":"Row5CodeBuild","environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{"group_name":"log-group","status":"ENABLED","stream_name":"log-stream"}],"s3_logs":[{"bucket_owner_access":null,"encryption_disabled":false,"status":"ENABLED"}]}],"name":"Row5CodeBuild","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{"location":true}]}],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[{"cloudwatch_logs":[{}],"s3_logs":[{}]}],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example5","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentynine","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example5","mode":"managed","type":"aws_codebuild_project","name":"example5","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"build_timeout":{"constant_value":5},"description":{"constant_value":"Row5CodeBuild"},"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"logs_config":[{"cloudwatch_logs":[{"group_name":{"constant_value":"log-group"},"stream_name":{"constant_value":"log-stream"}}],"s3_logs":[{"location":{"references":["aws_s3_bucket.apriltwentynine.id","aws_s3_bucket.apriltwentynine"]},"status":{"constant_value":"ENABLED"}}]}],"name":{"constant_value":"Row5CodeBuild"},"service_role":{"references":["aws_iam_role.example5.arn","aws_iam_role.example5"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.example5","mode":"managed","type":"aws_iam_role","name":"example5","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"example5"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentynine","mode":"managed","type":"aws_s3_bucket","name":"apriltwentynine","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentynine"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example5","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentynine","attribute":["id"]}],"timestamp":"2026-02-18T20:50:41Z","applyable":true,"complete":true,"errored":false}
|
22 | I want an automated build setup that can pull in code from more than one place and run in a locked‑down environment, keeping things as simple as possible. | create a AWS codebuild project resource with example iam role and secondary sources | Has one "aws_iam_role" resource and one "aws_codebuild_project" resource with a "secondary_sources" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
data "aws_iam_policy_document" "assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["codebuild.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "test_role7" {
name = "test_role7"
assume_role_policy = data.aws_iam_policy_document.assume_role.json
}
resource "aws_codebuild_project" "example7" {
name = "test-project7"
service_role = aws_iam_role.test_role7.arn
artifacts {
type = "NO_ARTIFACTS"
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
}
source {
type = "GITHUB"
location = "https://github.com/neilbalch/SimplePythonTutorial.git"
git_clone_depth = 1
}
secondary_sources {
source_identifier = "SecondarySource"
type = "GITHUB"
location = "https://github.com/pH-7/Simple-Java-Calculator.git"
git_clone_depth = 1
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.name
resource.values.source[_].type
resource.values.secondary_sources[_].type
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project7","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/pH-7/Simple-Java-Calculator.git","report_build_status":null,"source_identifier":"SecondarySource","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/neilbalch/SimplePythonTutorial.git","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role7","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":null,"name":null,"namespace_type":null,"override_artifact_name":false,"packaging":null,"path":null,"type":"NO_ARTIFACTS"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project7","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/pH-7/Simple-Java-Calculator.git","report_build_status":null,"source_identifier":"SecondarySource","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/neilbalch/SimplePythonTutorial.git","report_build_status":null,"type":"GITHUB"}],"source_version":null,"tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role7","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"1229436035","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"codebuild.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["codebuild.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_config_key":"aws","expressions":{"artifacts":[{"type":{"constant_value":"NO_ARTIFACTS"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project7"},"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/pH-7/Simple-Java-Calculator.git"},"source_identifier":{"constant_value":"SecondarySource"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role7.arn","aws_iam_role.test_role7"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/neilbalch/SimplePythonTutorial.git"},"type":{"constant_value":"GITHUB"}}]},"schema_version":0},{"address":"aws_iam_role.test_role7","mode":"managed","type":"aws_iam_role","name":"test_role7","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"test_role7"}},"schema_version":0},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["codebuild.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.test_role7","attribute":["arn"]}],"timestamp":"2026-02-18T20:50:46Z","applyable":true,"complete":true,"errored":false}
|
23 | I need an automated build setup that can pull in more than one codebase and produce multiple outputs, all while keeping things organized and secure. | create a AWS codebuild project resource with example iam role and secondary artifiacts | Has one "aws_iam_role" resource, at least one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "secondary_artifacts" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "test_role8" {
name = "test_role8"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_s3_bucket" "apriltwentyninth" {
bucket = "apriltwentyninth"
}
resource "aws_s3_bucket" "apriltwentyninth2" {
bucket = "apriltwentyninth2"
}
resource "aws_codebuild_project" "example7" {
name = "test-project8"
service_role = aws_iam_role.test_role8.arn
artifacts {
location = aws_s3_bucket.apriltwentyninth.bucket
type = "S3"
name = "results.zip"
path = "/"
packaging = "ZIP"
}
secondary_artifacts {
artifact_identifier = "SecondaryArtifact"
type = "S3"
location = aws_s3_bucket.apriltwentyninth2.bucket
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
source_version = "master"
secondary_sources {
source_identifier = "source2"
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
secondary_source_version {
source_identifier = "source2"
source_version = "master"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.name
resource.values.source[_].type
resource.values.secondary_artifacts[_].type
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyninth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project8","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"apriltwentyninth2","name":"","namespace_type":"NONE","override_artifact_name":false,"packaging":"NONE","path":"","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role8","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyninth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"apriltwentyninth2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"apriltwentyninth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project8","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"apriltwentyninth2","name":"","namespace_type":"NONE","override_artifact_name":false,"packaging":"NONE","path":"","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role8","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyninth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"apriltwentyninth2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example7","mode":"managed","type":"aws_codebuild_project","name":"example7","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.apriltwentyninth.bucket","aws_s3_bucket.apriltwentyninth"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project8"},"secondary_artifacts":[{"artifact_identifier":{"constant_value":"SecondaryArtifact"},"location":{"references":["aws_s3_bucket.apriltwentyninth2.bucket","aws_s3_bucket.apriltwentyninth2"]},"type":{"constant_value":"S3"}}],"secondary_source_version":[{"source_identifier":{"constant_value":"source2"},"source_version":{"constant_value":"master"}}],"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"source_identifier":{"constant_value":"source2"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role8.arn","aws_iam_role.test_role8"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role8","mode":"managed","type":"aws_iam_role","name":"test_role8","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role8"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyninth","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyninth"}},"schema_version":0},{"address":"aws_s3_bucket.apriltwentyninth2","mode":"managed","type":"aws_s3_bucket","name":"apriltwentyninth2","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"apriltwentyninth2"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.test_role8","attribute":["arn"]},{"resource":"aws_s3_bucket.apriltwentyninth","attribute":["bucket"]},{"resource":"aws_s3_bucket.apriltwentyninth2","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:57Z","applyable":true,"complete":true,"errored":false}
|
24 | I need an automated setup that can take code from our repo, run whatever build steps we define, bundle the output somewhere durable, and also be able to run several builds at once without breaking our limits. | create a AWS codebuild project resource with example iam role and buildbatch configuration | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "build_batch_config" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "test_role9" {
name = "test_role9"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_s3_bucket" "aprilthirthieth" {
bucket = "aprilthirthieth"
}
resource "aws_codebuild_project" "example9" {
name = "test-project9"
service_role = aws_iam_role.test_role9.arn
artifacts {
location = aws_s3_bucket.aprilthirthieth.bucket
name = "results.zip"
type = "S3"
path = "/"
packaging = "ZIP"
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
source_version = "master"
build_batch_config {
service_role = aws_iam_role.test_role9.arn
restrictions {
maximum_builds_allowed = 4
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.name
resource.values.source[_].type
resource.values.build_batch_config[_]
role := input.configuration.root_module.resources[i]
role.expressions.service_role
role.expressions.build_batch_config[_].service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthieth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[{"combine_artifacts":null,"restrictions":[{"compute_types_allowed":null,"maximum_builds_allowed":4}],"timeout_in_mins":null}],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project9","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[{"restrictions":[{}]}],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role9","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthieth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthieth","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[{"combine_artifacts":null,"restrictions":[{"compute_types_allowed":null,"maximum_builds_allowed":4}],"timeout_in_mins":null}],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project9","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[{"restrictions":[{}],"service_role":true}],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[{"restrictions":[{}]}],"cache":[],"environment":[{"docker_server":[],"environment_variable":[],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[],"secondary_source_version":[],"secondary_sources":[],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role9","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthieth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example9","mode":"managed","type":"aws_codebuild_project","name":"example9","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.aprilthirthieth.bucket","aws_s3_bucket.aprilthirthieth"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"build_batch_config":[{"restrictions":[{"maximum_builds_allowed":{"constant_value":4}}],"service_role":{"references":["aws_iam_role.test_role9.arn","aws_iam_role.test_role9"]}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project9"},"service_role":{"references":["aws_iam_role.test_role9.arn","aws_iam_role.test_role9"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role9","mode":"managed","type":"aws_iam_role","name":"test_role9","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role9"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthieth","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthieth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthieth"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.test_role9","attribute":["arn"]},{"resource":"aws_s3_bucket.aprilthirthieth","attribute":["bucket"]}],"timestamp":"2026-02-18T20:50:58Z","applyable":true,"complete":true,"errored":false}
|
25 | I need an automated build setup that can pull code from more than one place, run with a few custom settings, and save its outputs in multiple locations, all while keeping things simple and secure. | create a AWS codebuild project resource with example iam role, environment variables, secondary sources, secondary artifacts | Has one "aws_iam_role" resource, at least one "aws_s3_bucket" resource, and one "aws_codebuild_project" resource with a "secondary_artifacts" block, with a "secondary_sources" block, and at least one "environment_variable" within the "environment" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "test_role11" {
name = "test_role11"
assume_role_policy = jsonencode({
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
Service = "codebuild.amazonaws.com"
}
},
]
})
}
resource "aws_s3_bucket" "aprilthirthyfirst" {
bucket = "aprilthirthyfirst"
}
resource "aws_s3_bucket" "aprilthirthyfirst2" {
bucket = "aprilthirthyfirst2"
}
resource "aws_codebuild_project" "example11" {
name = "test-project11"
service_role = aws_iam_role.test_role11.arn
artifacts {
location = aws_s3_bucket.aprilthirthyfirst.bucket
name = "results.zip"
type = "S3"
path = "/"
packaging = "ZIP"
}
secondary_artifacts {
artifact_identifier = "SecondaryArtifact"
location = aws_s3_bucket.aprilthirthyfirst2.bucket
name = "results.zip"
type = "S3"
path = "/"
packaging = "ZIP"
}
environment {
compute_type = "BUILD_GENERAL1_SMALL"
image = "aws/codebuild/standard:7.0-24.10.29"
type = "LINUX_CONTAINER"
image_pull_credentials_type = "CODEBUILD"
environment_variable {
name = "SOME_KEY1"
value = "SOME_VALUE1"
}
environment_variable {
name = "SOME_KEY2"
value = "SOME_VALUE2"
type = "PARAMETER_STORE"
}
}
source {
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
source_version = "master"
secondary_sources {
source_identifier = "source2"
type = "GITHUB"
location = "https://github.com/mitchellh/packer.git"
git_clone_depth = 1
}
secondary_source_version {
source_identifier = "source2"
source_version = "master"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for aws_iam_role resource
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"codebuild.amazonaws.com")
}
has_valid_codebuild {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_codebuild_project"
resource.values.artifacts
resource.values.environment
resource.values.environment[_].environment_variable
resource.values.name
resource.values.source[_].type
resource.values.secondary_artifacts[_].type
resource.values.secondary_sources[_].type
role := input.configuration.root_module.resources[i]
role.expressions.service_role
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_codebuild
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthyfirst","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project11","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"aprilthirthyfirst2","name":"results.zip","namespace_type":"NONE","override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"sensitive_values":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role11","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthyfirst","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"aprilthirthyfirst2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"artifacts":[{"artifact_identifier":null,"bucket_owner_access":null,"encryption_disabled":false,"location":"aprilthirthyfirst","name":"results.zip","namespace_type":null,"override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"badge_enabled":false,"build_batch_config":[],"build_timeout":60,"cache":[],"concurrent_build_limit":null,"environment":[{"certificate":null,"compute_type":"BUILD_GENERAL1_SMALL","docker_server":[],"environment_variable":[{"name":"SOME_KEY1","type":"PLAINTEXT","value":"SOME_VALUE1"},{"name":"SOME_KEY2","type":"PARAMETER_STORE","value":"SOME_VALUE2"}],"fleet":[],"image":"aws/codebuild/standard:7.0-24.10.29","image_pull_credentials_type":"CODEBUILD","privileged_mode":false,"registry_credential":[],"type":"LINUX_CONTAINER"}],"file_system_locations":[],"logs_config":[],"name":"test-project11","project_visibility":"PRIVATE","queued_timeout":480,"region":"us-east-1","resource_access_role":null,"secondary_artifacts":[{"artifact_identifier":"SecondaryArtifact","bucket_owner_access":"","encryption_disabled":false,"location":"aprilthirthyfirst2","name":"results.zip","namespace_type":"NONE","override_artifact_name":false,"packaging":"ZIP","path":"/","type":"S3"}],"secondary_source_version":[{"source_identifier":"source2","source_version":"master"}],"secondary_sources":[{"auth":[],"build_status_config":[],"buildspec":"","git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"source_identifier":"source2","type":"GITHUB"}],"source":[{"auth":[],"build_status_config":[],"buildspec":null,"git_clone_depth":1,"git_submodules_config":[],"insecure_ssl":null,"location":"https://github.com/mitchellh/packer.git","report_build_status":null,"type":"GITHUB"}],"source_version":"master","tags":null,"vpc_config":[]},"after_unknown":{"arn":true,"artifacts":[{}],"auto_retry_limit":true,"badge_url":true,"build_batch_config":[],"cache":[],"description":true,"encryption_key":true,"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"id":true,"logs_config":[],"public_project_alias":true,"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"service_role":true,"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":true,"vpc_config":[]},"before_sensitive":false,"after_sensitive":{"artifacts":[{}],"build_batch_config":[],"cache":[],"environment":[{"docker_server":[],"environment_variable":[{},{}],"fleet":[],"registry_credential":[]}],"file_system_locations":[],"logs_config":[],"secondary_artifacts":[{}],"secondary_source_version":[{}],"secondary_sources":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"source":[{"auth":[],"build_status_config":[],"git_submodules_config":[]}],"tags_all":{},"vpc_config":[]},"after_identity":{"arn":null}}},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"codebuild.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test_role11","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthyfirst","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"aprilthirthyfirst2","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_codebuild_project.example11","mode":"managed","type":"aws_codebuild_project","name":"example11","provider_config_key":"aws","expressions":{"artifacts":[{"location":{"references":["aws_s3_bucket.aprilthirthyfirst.bucket","aws_s3_bucket.aprilthirthyfirst"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"environment":[{"compute_type":{"constant_value":"BUILD_GENERAL1_SMALL"},"environment_variable":[{"name":{"constant_value":"SOME_KEY1"},"value":{"constant_value":"SOME_VALUE1"}},{"name":{"constant_value":"SOME_KEY2"},"type":{"constant_value":"PARAMETER_STORE"},"value":{"constant_value":"SOME_VALUE2"}}],"image":{"constant_value":"aws/codebuild/standard:7.0-24.10.29"},"image_pull_credentials_type":{"constant_value":"CODEBUILD"},"type":{"constant_value":"LINUX_CONTAINER"}}],"name":{"constant_value":"test-project11"},"secondary_artifacts":[{"artifact_identifier":{"constant_value":"SecondaryArtifact"},"location":{"references":["aws_s3_bucket.aprilthirthyfirst2.bucket","aws_s3_bucket.aprilthirthyfirst2"]},"name":{"constant_value":"results.zip"},"packaging":{"constant_value":"ZIP"},"path":{"constant_value":"/"},"type":{"constant_value":"S3"}}],"secondary_source_version":[{"source_identifier":{"constant_value":"source2"},"source_version":{"constant_value":"master"}}],"secondary_sources":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"source_identifier":{"constant_value":"source2"},"type":{"constant_value":"GITHUB"}}],"service_role":{"references":["aws_iam_role.test_role11.arn","aws_iam_role.test_role11"]},"source":[{"git_clone_depth":{"constant_value":1},"location":{"constant_value":"https://github.com/mitchellh/packer.git"},"type":{"constant_value":"GITHUB"}}],"source_version":{"constant_value":"master"}},"schema_version":0},{"address":"aws_iam_role.test_role11","mode":"managed","type":"aws_iam_role","name":"test_role11","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"test_role11"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthyfirst","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthyfirst"}},"schema_version":0},{"address":"aws_s3_bucket.aprilthirthyfirst2","mode":"managed","type":"aws_s3_bucket","name":"aprilthirthyfirst2","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"aprilthirthyfirst2"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.aprilthirthyfirst","attribute":["bucket"]},{"resource":"aws_iam_role.test_role11","attribute":["arn"]},{"resource":"aws_s3_bucket.aprilthirthyfirst2","attribute":["bucket"]}],"timestamp":"2026-02-18T20:51:02Z","applyable":true,"complete":true,"errored":false}
|
26 | I need a simple natural‑language helper that can guide people through placing an order, asking for the details it needs, confirming everything, and handling misunderstandings gracefully. | create an aws_lex_bot | Has one resource "aws_lex_bot" and one resource "aws_lex_intent" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "order_flowers" {
name = "OrderFlowers"
description = "Intent to order a bouquet of flowers for pick up"
sample_utterances = [
"I would like to pick up flowers",
"I would like to order some flowers",
]
slot {
name = "FlowerType"
description = "Type of flower to order"
slot_constraint = "Required"
slot_type = "AMAZON.AlphaNumeric"
priority = 1
sample_utterances = ["I would like to get {FlowerType} flower."]
value_elicitation_prompt {
message {
content = "What type of flower would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
slot {
name = "PickupDate"
description = "Date of flower pickup"
slot_constraint = "Required"
slot_type = "AMAZON.DATE"
priority = 2
value_elicitation_prompt {
message {
content = "When would you like to pickup your flower?"
content_type = "PlainText"
}
max_attempts = 2
}
}
confirmation_prompt {
max_attempts = 2
message {
content = "Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?"
content_type = "PlainText"
}
}
fulfillment_activity {
type = "ReturnIntent"
}
rejection_statement {
message {
content = "Okay, I will not place your order."
content_type = "PlainText"
}
}
}
resource "aws_lex_bot" "order_flowers" {
name = "OrderFlowers"
description = "Bot to order flowers on the behalf of a user"
locale = "en-US"
process_behavior = "BUILD"
voice_id = "Salli"
child_directed = false
create_version = false
detect_sentiment = false
idle_session_ttl_in_seconds = 600
abort_statement {
message {
content_type = "PlainText"
content = "Sorry, I am not able to assist at this time"
}
}
clarification_prompt {
max_attempts = 2
message {
content_type = "PlainText"
content = "I didn't understand you, what would you like to do?"
}
}
intent {
intent_name = aws_lex_intent.order_flowers.name
intent_version = aws_lex_intent.order_flowers.version
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
# is_boolean(resource.values.create_version)
# resource.values.description
# is_boolean(resource.values.detect_sentiment)
# resource.values.idle_session_ttl_in_seconds
# resource.values.process_behavior
# resource.values.voice_id
# resource.values.locale
# is_boolean(resource.values.enable_model_improvements)
# resource.values.nlu_intent_confidence_threshold
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order flowers on the behalf of a user","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderFlowers"}],"locale":"en-US","name":"OrderFlowers","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Intent to order a bouquet of flowers for pick up","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderFlowers","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Okay, I will not place your order.","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some flowers","I would like to pick up flowers"],"slot":[{"description":"Date of flower pickup","name":"PickupDate","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.DATE","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"When would you like to pickup your flower?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of flower to order","name":"FlowerType","priority":1,"response_card":"","sample_utterances":["I would like to get {FlowerType} flower."],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of flower would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order flowers on the behalf of a user","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderFlowers"}],"locale":"en-US","name":"OrderFlowers","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Intent to order a bouquet of flowers for pick up","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderFlowers","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Okay, I will not place your order.","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some flowers","I would like to pick up flowers"],"slot":[{"description":"Date of flower pickup","name":"PickupDate","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.DATE","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"When would you like to pickup your flower?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of flower to order","name":"FlowerType","priority":1,"response_card":"","sample_utterances":["I would like to get {FlowerType} flower."],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of flower would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[false],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.order_flowers","mode":"managed","type":"aws_lex_bot","name":"order_flowers","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist at this time"},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I didn't understand you, what would you like to do?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"description":{"constant_value":"Bot to order flowers on the behalf of a user"},"detect_sentiment":{"constant_value":false},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.order_flowers.name","aws_lex_intent.order_flowers"]},"intent_version":{"references":["aws_lex_intent.order_flowers.version","aws_lex_intent.order_flowers"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"OrderFlowers"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.order_flowers","mode":"managed","type":"aws_lex_intent","name":"order_flowers","provider_config_key":"aws","expressions":{"confirmation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"Okay, your {FlowerType} will be ready for pickup on {PickupDate}. Does this sound okay?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Intent to order a bouquet of flowers for pick up"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderFlowers"},"rejection_statement":[{"message":[{"content":{"constant_value":"Okay, I will not place your order."},"content_type":{"constant_value":"PlainText"}}]}],"sample_utterances":{"constant_value":["I would like to pick up flowers","I would like to order some flowers"]},"slot":[{"description":{"constant_value":"Type of flower to order"},"name":{"constant_value":"FlowerType"},"priority":{"constant_value":1},"sample_utterances":{"constant_value":["I would like to get {FlowerType} flower."]},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of flower would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Date of flower pickup"},"name":{"constant_value":"PickupDate"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.DATE"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"When would you like to pickup your flower?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_flowers","attribute":["name"]},{"resource":"aws_lex_intent.order_flowers","attribute":["version"]}],"timestamp":"2026-02-18T20:51:07Z","applyable":true,"complete":true,"errored":false}
|
27 | I want a simple conversational helper that can guide people through giving a few pieces of information step by step, making sure nothing important is missed before confirming their request. | create an aws_lex bot with multiple slots | Has one resource "aws_lex_bot" and one resource "aws_lex_intent" with at least 2 slot blocks | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "order_pizza_intent" {
name = "OrderPizzaIntent"
description = "To order a pizza"
sample_utterances = [
"I would like to pick up a pizza",
"I would like to order some pizzas",
]
fulfillment_activity {
type = "ReturnIntent"
}
slot {
name = "PizzaType"
description = "Type of pizza to order"
slot_constraint = "Required"
slot_type = "AMAZON.AlphaNumeric"
priority = 1
value_elicitation_prompt {
message {
content = "What type of pizza would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
slot {
name = "PizzaSize"
description = "Size of pizza to order"
slot_constraint = "Required"
slot_type = "AMAZON.NUMBER"
priority = 2
value_elicitation_prompt {
message {
content = "What size of pizza would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
slot {
name = "PizzaQuantity"
description = "Number of pizzas to order"
slot_constraint = "Required"
slot_type = "AMAZON.NUMBER"
priority = 3
value_elicitation_prompt {
message {
content = "How many pizzas do you want to order?"
content_type = "PlainText"
}
max_attempts = 2
}
}
conclusion_statement {
message {
content = "Your pizza order has been received."
content_type = "PlainText"
}
}
}
resource "aws_lex_bot" "pizza_ordering_bot" {
name = "PizzaOrderingBot"
description = "Bot to order pizzas"
voice_id = "Joanna"
idle_session_ttl_in_seconds = 300
child_directed = false
locale = "en-US"
process_behavior = "BUILD"
clarification_prompt {
message {
content = "I didn't understand you, what type of pizza would you like to order?"
content_type = "PlainText"
}
max_attempts = 5
}
abort_statement {
message {
content = "Sorry, I am unable to assist at the moment."
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.order_pizza_intent.name
intent_version = aws_lex_intent.order_pizza_intent.version
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.slot])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
# is_boolean(resource.values.create_version)
# resource.values.description
# is_boolean(resource.values.detect_sentiment)
# resource.values.idle_session_ttl_in_seconds
# resource.values.process_behavior
# resource.values.voice_id
# resource.values.locale
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Size of pizza to order"},"name":{"constant_value":"PizzaSize"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What size of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Number of pizzas to order"},"name":{"constant_value":"PizzaQuantity"},"priority":{"constant_value":3},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"How many pizzas do you want to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:15Z","applyable":true,"complete":true,"errored":false}
|
28 | I need a simple conversational tool that can take a food order, ask for the details it needs, and then check whether the customer wants to add anything else before wrapping up. | create an aws_lex bot for ordering pizza with a followup question | Has one resource "aws_lex_bot" and one resource "aws_lex_intent" with followup question block (slot block and "aws_lex_slot_type" is not mandatory) | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_bot" "pizza_order_bot" {
name = "PizzaOrderBot"
description = "Pizza order bot"
idle_session_ttl_in_seconds = 600
create_version = false
child_directed = false
abort_statement {
message {
content = "Sorry, I am not able to assist."
content_type = "PlainText"
}
}
clarification_prompt {
max_attempts = 2
message {
content = "I'm sorry, I didn't understand that. Can you try again?"
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.OrderPizzaIntent.name
intent_version = aws_lex_intent.OrderPizzaIntent.version
}
}
resource "aws_lex_intent" "OrderPizzaIntent" {
name = "OrderPizzaIntent"
create_version = true
sample_utterances = [
"I would like to pick up a pizza",
"I would like to order some pizzas",
]
slot {
name = "PizzaType"
description = "Type of pizza to order"
priority = 1 # must be in [1, 100]
slot_type = aws_lex_slot_type.PizzaType.name
slot_type_version = aws_lex_slot_type.PizzaType.version
slot_constraint = "Required"
sample_utterances = ["I want a {PizzaType} pizza.", "A {PizzaType} pizza please."]
value_elicitation_prompt {
max_attempts = 2
message {
content = "What type of pizza would you like to order?"
content_type = "PlainText"
}
}
}
confirmation_prompt {
max_attempts = 2
message {
content = "So, you would like to order a pizza. Is that correct?"
content_type = "PlainText"
}
}
rejection_statement {
message {
content = "Sorry, I don't know how to help then"
content_type = "PlainText"
}
}
follow_up_prompt {
prompt {
max_attempts = 2
message {
content = "Would you like anything else with your order?"
content_type = "PlainText"
}
}
rejection_statement {
message {
content = "OK, Your pizza is on its way."
content_type = "PlainText"
}
}
}
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_slot_type" "PizzaType" {
create_version = true
description = "Types of pizza available to order"
name = "PizzaTypes"
enumeration_value {
value = "Margherita"
}
enumeration_value {
value = "Pepperoni"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.follow_up_prompt; intent.values.conclusion_statement == false])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
# is_boolean(resource.values.create_version)
# resource.values.description
# is_boolean(resource.values.detect_sentiment)
# resource.values.idle_session_ttl_in_seconds
# resource.values.process_behavior
# resource.values.voice_id
# resource.values.locale
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand that. Can you try again?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Pizza order bot","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"SAVE","region":"us-east-1","timeouts":null},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"So, you would like to order a pizza. Is that correct?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"max_attempts":2,"message":[{"content":"Would you like anything else with your order?","content_type":"PlainText","group_number":null}],"response_card":null}],"rejection_statement":[{"message":[{"content":"OK, Your pizza is on its way.","content_type":"PlainText","group_number":null}],"response_card":null}]}],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Sorry, I don't know how to help then","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."],"slot_constraint":"Required","slot_type":"PizzaTypes","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"value_elicitation_prompt":[{"message":[{}]}]}]}},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"create_version":true,"description":"Types of pizza available to order","enumeration_value":[{"synonyms":[],"value":"Margherita"},{"synonyms":[],"value":"Pepperoni"}],"name":"PizzaTypes","region":"us-east-1","timeouts":null,"value_selection_strategy":"ORIGINAL_VALUE"},"sensitive_values":{"enumeration_value":[{"synonyms":[]},{"synonyms":[]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand that. Can you try again?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Pizza order bot","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"SAVE","region":"us-east-1","timeouts":null},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true,"voice_id":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[{"max_attempts":2,"message":[{"content":"So, you would like to order a pizza. Is that correct?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"max_attempts":2,"message":[{"content":"Would you like anything else with your order?","content_type":"PlainText","group_number":null}],"response_card":null}],"rejection_statement":[{"message":[{"content":"OK, Your pizza is on its way.","content_type":"PlainText","group_number":null}],"response_card":null}]}],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[{"message":[{"content":"Sorry, I don't know how to help then","content_type":"PlainText","group_number":null}],"response_card":null}],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."],"slot_constraint":"Required","slot_type":"PizzaTypes","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"slot_type_version":true,"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[{"message":[{}]}],"dialog_code_hook":[],"follow_up_prompt":[{"prompt":[{"message":[{}]}],"rejection_statement":[{"message":[{}]}]}],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[{"message":[{}]}],"sample_utterances":[false,false],"slot":[{"sample_utterances":[false,false],"value_elicitation_prompt":[{"message":[{}]}]}]}}},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"create_version":true,"description":"Types of pizza available to order","enumeration_value":[{"synonyms":[],"value":"Margherita"},{"synonyms":[],"value":"Pepperoni"}],"name":"PizzaTypes","region":"us-east-1","timeouts":null,"value_selection_strategy":"ORIGINAL_VALUE"},"after_unknown":{"checksum":true,"created_date":true,"enumeration_value":[{"synonyms":[]},{"synonyms":[]}],"id":true,"last_updated_date":true,"version":true},"before_sensitive":false,"after_sensitive":{"enumeration_value":[{"synonyms":[]},{"synonyms":[]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_order_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_order_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand that. Can you try again?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"description":{"constant_value":"Pizza order bot"},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.OrderPizzaIntent.name","aws_lex_intent.OrderPizzaIntent"]},"intent_version":{"references":["aws_lex_intent.OrderPizzaIntent.version","aws_lex_intent.OrderPizzaIntent"]}}],"name":{"constant_value":"PizzaOrderBot"}},"schema_version":0},{"address":"aws_lex_intent.OrderPizzaIntent","mode":"managed","type":"aws_lex_intent","name":"OrderPizzaIntent","provider_config_key":"aws","expressions":{"confirmation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"So, you would like to order a pizza. Is that correct?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":true},"follow_up_prompt":[{"prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"Would you like anything else with your order?"},"content_type":{"constant_value":"PlainText"}}]}],"rejection_statement":[{"message":[{"content":{"constant_value":"OK, Your pizza is on its way."},"content_type":{"constant_value":"PlainText"}}]}]}],"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"rejection_statement":[{"message":[{"content":{"constant_value":"Sorry, I don't know how to help then"},"content_type":{"constant_value":"PlainText"}}]}],"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"sample_utterances":{"constant_value":["I want a {PizzaType} pizza.","A {PizzaType} pizza please."]},"slot_constraint":{"constant_value":"Required"},"slot_type":{"references":["aws_lex_slot_type.PizzaType.name","aws_lex_slot_type.PizzaType"]},"slot_type_version":{"references":["aws_lex_slot_type.PizzaType.version","aws_lex_slot_type.PizzaType"]},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0},{"address":"aws_lex_slot_type.PizzaType","mode":"managed","type":"aws_lex_slot_type","name":"PizzaType","provider_config_key":"aws","expressions":{"create_version":{"constant_value":true},"description":{"constant_value":"Types of pizza available to order"},"enumeration_value":[{"value":{"constant_value":"Margherita"}},{"value":{"constant_value":"Pepperoni"}}],"name":{"constant_value":"PizzaTypes"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_slot_type.PizzaType","attribute":["name"]},{"resource":"aws_lex_intent.OrderPizzaIntent","attribute":["name"]},{"resource":"aws_lex_slot_type.PizzaType","attribute":["version"]},{"resource":"aws_lex_intent.OrderPizzaIntent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:19Z","applyable":true,"complete":true,"errored":false}
|
29 | I need a simple conversational tool that can guide someone through placing a food order and wrap up with a friendly confirmation message once it has everything it needs. | create an aws_lex_bot for ordering pizzas with a conclusion statement | Has one resource "aws_lex_bot" and at least one resource "aws_lex_intent" with at least one user prompt | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "order_pizza_intent" {
name = "OrderPizzaIntent"
description = "To order a pizza"
sample_utterances = [
"I would like to pick up a pizza",
"I would like to order some pizzas",
]
fulfillment_activity {
type = "ReturnIntent"
}
slot {
name = "PizzaType"
description = "Type of pizza to order"
slot_constraint = "Required"
slot_type = "AMAZON.AlphaNumeric"
priority = 1
value_elicitation_prompt {
message {
content = "What type of pizza would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
slot {
name = "PizzaSize"
description = "Size of pizza to order"
slot_constraint = "Required"
slot_type = "AMAZON.NUMBER"
priority = 2
value_elicitation_prompt {
message {
content = "What size of pizza would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
slot {
name = "PizzaQuantity"
description = "Number of pizzas to order"
slot_constraint = "Required"
slot_type = "AMAZON.NUMBER"
priority = 3
value_elicitation_prompt {
message {
content = "How many pizzas do you want to order?"
content_type = "PlainText"
}
max_attempts = 2
}
}
conclusion_statement {
message {
content = "Your pizza order has been received."
content_type = "PlainText"
}
}
}
resource "aws_lex_bot" "pizza_ordering_bot" {
name = "PizzaOrderingBot"
description = "Bot to order pizzas"
voice_id = "Joanna"
idle_session_ttl_in_seconds = 300
child_directed = false
clarification_prompt {
message {
content = "I didn't understand you, what type of pizza would you like to order?"
content_type = "PlainText"
}
max_attempts = 5
}
abort_statement {
message {
content = "Sorry, I am unable to assist at the moment."
content_type = "PlainText"
}
}
locale = "en-US"
process_behavior = "BUILD"
intent {
intent_name = aws_lex_intent.order_pizza_intent.name
intent_version = aws_lex_intent.order_pizza_intent.version
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity; intent.values.conclusion_statement; intent.values.follow_up_prompt == false])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[{"description":"Number of pizzas to order","name":"PizzaQuantity","priority":3,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"How many pizzas do you want to order?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Size of pizza to order","name":"PizzaSize","priority":2,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.NUMBER","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What size of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]},{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]},{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Size of pizza to order"},"name":{"constant_value":"PizzaSize"},"priority":{"constant_value":2},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What size of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]},{"description":{"constant_value":"Number of pizzas to order"},"name":{"constant_value":"PizzaQuantity"},"priority":{"constant_value":3},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.NUMBER"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"How many pizzas do you want to order?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:31Z","applyable":true,"complete":true,"errored":false}
|
30 | I want a simple conversational helper that can understand when someone wants to plan a trip and guide them through it, with clear fallbacks if it gets confused. | create an aws_lex_bot for booking a trip with all arguments filled | Has one resource "aws_lex_bot" with all arguments initialized and at least one "aws_lex_intent" resource | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "BookTrip" {
description = "Book a trip"
name = "BookTrip"
sample_utterances = [
"I want to book a trip",
"I would like to book a trip",
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_bot" "BookTripBot" {
description = "Bot for booking trips"
idle_session_ttl_in_seconds = 600
locale = "en-US"
name = "BookTripBot"
process_behavior = "BUILD"
voice_id = "Salli"
detect_sentiment = false
enable_model_improvements = true
nlu_intent_confidence_threshold = 0
child_directed = false
abort_statement {
message {
content = "Sorry, I cannot assist you to book the trip right now."
content_type = "PlainText"
}
}
clarification_prompt {
max_attempts = 3
message {
content = "I'm sorry, I didn't understand. Could you please repeat that?"
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.BookTrip.name
intent_version = aws_lex_intent.BookTrip.version
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
is_boolean(resource.values.create_version)
resource.values.description
is_boolean(resource.values.detect_sentiment)
resource.values.idle_session_ttl_in_seconds
resource.values.process_behavior
resource.values.voice_id
resource.values.locale
is_boolean(resource.values.enable_model_improvements)
resource.values.nlu_intent_confidence_threshold
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I cannot assist you to book the trip right now.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":3,"message":[{"content":"I'm sorry, I didn't understand. Could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot for booking trips","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"BookTrip"}],"locale":"en-US","name":"BookTripBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Book a trip","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"BookTrip","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to book a trip","I would like to book a trip"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I cannot assist you to book the trip right now.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":3,"message":[{"content":"I'm sorry, I didn't understand. Could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot for booking trips","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"BookTrip"}],"locale":"en-US","name":"BookTripBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Book a trip","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"BookTrip","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to book a trip","I would like to book a trip"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.BookTripBot","mode":"managed","type":"aws_lex_bot","name":"BookTripBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I cannot assist you to book the trip right now."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":3},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand. Could you please repeat that?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot for booking trips"},"detect_sentiment":{"constant_value":false},"enable_model_improvements":{"constant_value":true},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.BookTrip.name","aws_lex_intent.BookTrip"]},"intent_version":{"references":["aws_lex_intent.BookTrip.version","aws_lex_intent.BookTrip"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"BookTripBot"},"nlu_intent_confidence_threshold":{"constant_value":0},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.BookTrip","mode":"managed","type":"aws_lex_intent","name":"BookTrip","provider_config_key":"aws","expressions":{"description":{"constant_value":"Book a trip"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"BookTrip"},"sample_utterances":{"constant_value":["I want to book a trip","I would like to book a trip"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.BookTrip","attribute":["name"]},{"resource":"aws_lex_intent.BookTrip","attribute":["version"]}],"timestamp":"2026-02-18T20:51:29Z","applyable":true,"complete":true,"errored":false}
|
31 | I want to set up a conversational helper that can walk people through ordering food, handle updates or cancellations, answer basic questions, and generally guide them through a few different actions, all while keeping things simple and reliable. | create an aws_lex_bot for ordering pizzas with 5 different intents | Has one resource "aws_lex_bot" with 5 different intent blocks and 5 different "aws_lex_intent" resources | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "OrderPizza" {
name = "OrderPizza"
description = "Pizza order processing"
sample_utterances = [
"I want to order a pizza"
]
slot {
name = "PizzaType"
description = "Type of pizza to order"
slot_constraint = "Required"
slot_type = "AMAZON.AlphaNumeric"
priority = 1
value_elicitation_prompt {
message {
content = "What type of pizza would you like?"
content_type = "PlainText"
}
max_attempts = 2
}
}
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "CancelOrder" {
name = "CancelOrder"
description = "Cancel an order"
sample_utterances = [
"I want to cancel my order"
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "CheckOrderStatus" {
name = "CheckOrderStatus"
description = "Check status of an order"
sample_utterances = [
"What is the status of my order"
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "ModifyOrder" {
name = "ModifyOrder"
description = "Modify an existing order"
sample_utterances = [
"I want to change my order"
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "HelpOrder" {
name = "HelpOrder"
description = "Provide help for ordering"
sample_utterances = [
"I need help",
"Can you help me"
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_bot" "PizzaOrderBot" {
abort_statement {
message {
content = "Sorry, I could not assist on this request."
content_type = "PlainText"
}
}
name = "PizzaOrderBot"
child_directed = false
create_version = false
idle_session_ttl_in_seconds = 600
process_behavior = "BUILD"
locale = "en-US"
voice_id = "Salli"
clarification_prompt {
max_attempts = 2
message {
content = "I'm sorry, I didn't understand the request. Can you reformulate?"
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.OrderPizza.name
intent_version = aws_lex_intent.OrderPizza.version
}
intent {
intent_name = aws_lex_intent.CancelOrder.name
intent_version = aws_lex_intent.CancelOrder.version
}
intent {
intent_name = aws_lex_intent.CheckOrderStatus.name
intent_version = aws_lex_intent.CheckOrderStatus.version
}
intent {
intent_name = aws_lex_intent.ModifyOrder.name
intent_version = aws_lex_intent.ModifyOrder.version
}
intent {
intent_name = aws_lex_intent.HelpOrder.name
intent_version = aws_lex_intent.HelpOrder.version
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I could not assist on this request.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand the request. Can you reformulate?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"CancelOrder"},{"intent_name":"CheckOrderStatus"},{"intent_name":"HelpOrder"},{"intent_name":"ModifyOrder"},{"intent_name":"OrderPizza"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{},{},{}]}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Cancel an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to cancel my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Check status of an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CheckOrderStatus","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["What is the status of my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Provide help for ordering","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"HelpOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["Can you help me","I need help"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Modify an existing order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"ModifyOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to change my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Pizza order processing","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizza","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to order a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}]}},"resource_changes":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I could not assist on this request.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I'm sorry, I didn't understand the request. Can you reformulate?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":600,"intent":[{"intent_name":"CancelOrder"},{"intent_name":"CheckOrderStatus"},{"intent_name":"HelpOrder"},{"intent_name":"ModifyOrder"},{"intent_name":"OrderPizza"}],"locale":"en-US","name":"PizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true},{"intent_version":true},{"intent_version":true},{"intent_version":true},{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{},{},{}]}}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Cancel an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to cancel my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Check status of an order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CheckOrderStatus","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["What is the status of my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Provide help for ordering","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"HelpOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["Can you help me","I need help"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Modify an existing order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"ModifyOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to change my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Pizza order processing","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizza","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I want to order a pizza"],"slot":[{"description":"Type of pizza to order","name":"PizzaType","priority":1,"response_card":"","sample_utterances":[],"slot_constraint":"Required","slot_type":"AMAZON.AlphaNumeric","slot_type_version":"","value_elicitation_prompt":[{"max_attempts":2,"message":[{"content":"What type of pizza would you like?","content_type":"PlainText","group_number":null}],"response_card":""}]}],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[{"sample_utterances":[],"value_elicitation_prompt":[{"message":[{}]}]}]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.PizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"PizzaOrderBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I could not assist on this request."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I'm sorry, I didn't understand the request. Can you reformulate?"},"content_type":{"constant_value":"PlainText"}}]}],"create_version":{"constant_value":false},"idle_session_ttl_in_seconds":{"constant_value":600},"intent":[{"intent_name":{"references":["aws_lex_intent.OrderPizza.name","aws_lex_intent.OrderPizza"]},"intent_version":{"references":["aws_lex_intent.OrderPizza.version","aws_lex_intent.OrderPizza"]}},{"intent_name":{"references":["aws_lex_intent.CancelOrder.name","aws_lex_intent.CancelOrder"]},"intent_version":{"references":["aws_lex_intent.CancelOrder.version","aws_lex_intent.CancelOrder"]}},{"intent_name":{"references":["aws_lex_intent.CheckOrderStatus.name","aws_lex_intent.CheckOrderStatus"]},"intent_version":{"references":["aws_lex_intent.CheckOrderStatus.version","aws_lex_intent.CheckOrderStatus"]}},{"intent_name":{"references":["aws_lex_intent.ModifyOrder.name","aws_lex_intent.ModifyOrder"]},"intent_version":{"references":["aws_lex_intent.ModifyOrder.version","aws_lex_intent.ModifyOrder"]}},{"intent_name":{"references":["aws_lex_intent.HelpOrder.name","aws_lex_intent.HelpOrder"]},"intent_version":{"references":["aws_lex_intent.HelpOrder.version","aws_lex_intent.HelpOrder"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Cancel an order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CancelOrder"},"sample_utterances":{"constant_value":["I want to cancel my order"]}},"schema_version":0},{"address":"aws_lex_intent.CheckOrderStatus","mode":"managed","type":"aws_lex_intent","name":"CheckOrderStatus","provider_config_key":"aws","expressions":{"description":{"constant_value":"Check status of an order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CheckOrderStatus"},"sample_utterances":{"constant_value":["What is the status of my order"]}},"schema_version":0},{"address":"aws_lex_intent.HelpOrder","mode":"managed","type":"aws_lex_intent","name":"HelpOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Provide help for ordering"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"HelpOrder"},"sample_utterances":{"constant_value":["I need help","Can you help me"]}},"schema_version":0},{"address":"aws_lex_intent.ModifyOrder","mode":"managed","type":"aws_lex_intent","name":"ModifyOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Modify an existing order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"ModifyOrder"},"sample_utterances":{"constant_value":["I want to change my order"]}},"schema_version":0},{"address":"aws_lex_intent.OrderPizza","mode":"managed","type":"aws_lex_intent","name":"OrderPizza","provider_config_key":"aws","expressions":{"description":{"constant_value":"Pizza order processing"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizza"},"sample_utterances":{"constant_value":["I want to order a pizza"]},"slot":[{"description":{"constant_value":"Type of pizza to order"},"name":{"constant_value":"PizzaType"},"priority":{"constant_value":1},"slot_constraint":{"constant_value":"Required"},"slot_type":{"constant_value":"AMAZON.AlphaNumeric"},"value_elicitation_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"What type of pizza would you like?"},"content_type":{"constant_value":"PlainText"}}]}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.CancelOrder","attribute":["name"]},{"resource":"aws_lex_intent.OrderPizza","attribute":["version"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["version"]},{"resource":"aws_lex_intent.CheckOrderStatus","attribute":["name"]},{"resource":"aws_lex_intent.HelpOrder","attribute":["name"]},{"resource":"aws_lex_intent.ModifyOrder","attribute":["name"]},{"resource":"aws_lex_intent.ModifyOrder","attribute":["version"]},{"resource":"aws_lex_intent.HelpOrder","attribute":["version"]},{"resource":"aws_lex_intent.CheckOrderStatus","attribute":["version"]},{"resource":"aws_lex_intent.OrderPizza","attribute":["name"]}],"timestamp":"2026-02-18T20:51:42Z","applyable":true,"complete":true,"errored":false}
|
32 | I need a friendly, kid‑oriented way for people to talk to an automated helper that can take simple requests, change their mind if needed, and respond politely. | create an aws_lex_bot for ordering pizzas that is meant for kids | Has one resource "aws_lex_bot" with "child_directed" = true and at least one "aws_lex_intent" resource | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_bot" "KidsPizzaOrderBot" {
child_directed = true
name = "KidsPizzaOrderBot"
process_behavior = "BUILD"
idle_session_ttl_in_seconds = 300
locale = "en-US"
voice_id = "Salli"
abort_statement {
message {
content = "I'm sorry, I can't assist further on this."
content_type = "PlainText"
}
}
clarification_prompt {
max_attempts = 1
message {
content = "I'm sorry, could you please repeat that?"
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.PizzaOrder.name
intent_version = aws_lex_intent.PizzaOrder.version
}
intent {
intent_name = aws_lex_intent.CancelOrder.name
intent_version = aws_lex_intent.CancelOrder.version
}
intent {
intent_name = aws_lex_intent.Appreciation.name
intent_version = aws_lex_intent.Appreciation.version
}
}
resource "aws_lex_intent" "PizzaOrder" {
name = "PizzaOrder"
description = "Intent for ordering pizza"
sample_utterances = [
"I would like to order a pizza",
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "CancelOrder" {
name = "CancelOrder"
description = "Intent for canceling pizza order"
sample_utterances = [
"I would like to cancel my order",
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_intent" "Appreciation" {
name = "Appreciation"
description = "Intent for appreciating the service"
sample_utterances = [
"I appreciate your service",
]
fulfillment_activity {
type = "ReturnIntent"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
resource.values.child_directed == true
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"I'm sorry, I can't assist further on this.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":true,"clarification_prompt":[{"max_attempts":1,"message":[{"content":"I'm sorry, could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"Appreciation"},{"intent_name":"CancelOrder"},{"intent_name":"PizzaOrder"}],"locale":"en-US","name":"KidsPizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{}]}},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for appreciating the service","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"Appreciation","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I appreciate your service"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for canceling pizza order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to cancel my order"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for ordering pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"PizzaOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order a pizza"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"I'm sorry, I can't assist further on this.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":true,"clarification_prompt":[{"max_attempts":1,"message":[{"content":"I'm sorry, could you please repeat that?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"Appreciation"},{"intent_name":"CancelOrder"},{"intent_name":"PizzaOrder"}],"locale":"en-US","name":"KidsPizzaOrderBot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Salli"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true},{"intent_version":true},{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{},{},{}]}}},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for appreciating the service","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"Appreciation","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I appreciate your service"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for canceling pizza order","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"CancelOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to cancel my order"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":false,"description":"Intent for ordering pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"PizzaOrder","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order a pizza"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.KidsPizzaOrderBot","mode":"managed","type":"aws_lex_bot","name":"KidsPizzaOrderBot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"I'm sorry, I can't assist further on this."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":true},"clarification_prompt":[{"max_attempts":{"constant_value":1},"message":[{"content":{"constant_value":"I'm sorry, could you please repeat that?"},"content_type":{"constant_value":"PlainText"}}]}],"idle_session_ttl_in_seconds":{"constant_value":300},"intent":[{"intent_name":{"references":["aws_lex_intent.PizzaOrder.name","aws_lex_intent.PizzaOrder"]},"intent_version":{"references":["aws_lex_intent.PizzaOrder.version","aws_lex_intent.PizzaOrder"]}},{"intent_name":{"references":["aws_lex_intent.CancelOrder.name","aws_lex_intent.CancelOrder"]},"intent_version":{"references":["aws_lex_intent.CancelOrder.version","aws_lex_intent.CancelOrder"]}},{"intent_name":{"references":["aws_lex_intent.Appreciation.name","aws_lex_intent.Appreciation"]},"intent_version":{"references":["aws_lex_intent.Appreciation.version","aws_lex_intent.Appreciation"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"KidsPizzaOrderBot"},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Salli"}},"schema_version":0},{"address":"aws_lex_intent.Appreciation","mode":"managed","type":"aws_lex_intent","name":"Appreciation","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for appreciating the service"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"Appreciation"},"sample_utterances":{"constant_value":["I appreciate your service"]}},"schema_version":0},{"address":"aws_lex_intent.CancelOrder","mode":"managed","type":"aws_lex_intent","name":"CancelOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for canceling pizza order"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"CancelOrder"},"sample_utterances":{"constant_value":["I would like to cancel my order"]}},"schema_version":0},{"address":"aws_lex_intent.PizzaOrder","mode":"managed","type":"aws_lex_intent","name":"PizzaOrder","provider_config_key":"aws","expressions":{"description":{"constant_value":"Intent for ordering pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"PizzaOrder"},"sample_utterances":{"constant_value":["I would like to order a pizza"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.PizzaOrder","attribute":["name"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["name"]},{"resource":"aws_lex_intent.PizzaOrder","attribute":["version"]},{"resource":"aws_lex_intent.Appreciation","attribute":["name"]},{"resource":"aws_lex_intent.Appreciation","attribute":["version"]},{"resource":"aws_lex_intent.CancelOrder","attribute":["version"]}],"timestamp":"2026-02-18T20:51:45Z","applyable":true,"complete":true,"errored":false}
|
33 | I need a conversational tool that can take simple food orders and should only act on a request when it’s reasonably sure what the person meant, while still being easy for people to interact with. | create an aws_lex_bot for ordering pizzas and set nlu_intent_confidence_threshold to 0.5 | Has one resource "aws_lex_bot" with argument "enable_model_improvements" = true
and argument "nlu_intent_confidence_threshold" = 0.5 and at least one resource "aws_lex_intent" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_lex_intent" "order_pizza_intent" {
name = "OrderPizzaIntent"
description = "To order a pizza"
sample_utterances = [
"I would like to pick up a pizza",
"I would like to order some pizzas",
]
fulfillment_activity {
type = "ReturnIntent"
}
conclusion_statement {
message {
content = "Your pizza order has been received."
content_type = "PlainText"
}
}
}
resource "aws_lex_bot" "pizza_ordering_bot" {
name = "PizzaOrderingBot"
description = "Bot to order pizzas"
voice_id = "Joanna"
idle_session_ttl_in_seconds = "300"
child_directed = false
enable_model_improvements = true
nlu_intent_confidence_threshold = 0.5
locale = "en-US"
process_behavior = "BUILD"
clarification_prompt {
message {
content = "I didn't understand you, what type of pizza would you like to order?"
content_type = "PlainText"
}
max_attempts = 5
}
abort_statement {
message {
content = "Sorry, I am unable to assist at the moment."
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.order_pizza_intent.name
intent_version = aws_lex_intent.order_pizza_intent.version
}
}
| package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
# is_boolean(resource.values.create_version)
# resource.values.description
# is_boolean(resource.values.detect_sentiment)
# resource.values.idle_session_ttl_in_seconds
# resource.values.process_behavior
# resource.values.voice_id
# resource.values.locale
resource.values.enable_model_improvements == true
resource.values.nlu_intent_confidence_threshold == 0.5
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0.5,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}]}},"resource_changes":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am unable to assist at the moment.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":5,"message":[{"content":"I didn't understand you, what type of pizza would you like to order?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":"Bot to order pizzas","detect_sentiment":false,"enable_model_improvements":true,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"OrderPizzaIntent"}],"locale":"en-US","name":"PizzaOrderingBot","nlu_intent_confidence_threshold":0.5,"process_behavior":"BUILD","region":"us-east-1","timeouts":null,"voice_id":"Joanna"},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{"intent_version":true}],"last_updated_date":true,"status":true,"version":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[{"message":[{"content":"Your pizza order has been received.","content_type":"PlainText","group_number":null}],"response_card":null}],"confirmation_prompt":[],"create_version":false,"description":"To order a pizza","dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"OrderPizzaIntent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to order some pizzas","I would like to pick up a pizza"],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false,false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[{"message":[{}]}],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false,false],"slot":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_lex_bot.pizza_ordering_bot","mode":"managed","type":"aws_lex_bot","name":"pizza_ordering_bot","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am unable to assist at the moment."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":5},"message":[{"content":{"constant_value":"I didn't understand you, what type of pizza would you like to order?"},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"Bot to order pizzas"},"enable_model_improvements":{"constant_value":true},"idle_session_ttl_in_seconds":{"constant_value":"300"},"intent":[{"intent_name":{"references":["aws_lex_intent.order_pizza_intent.name","aws_lex_intent.order_pizza_intent"]},"intent_version":{"references":["aws_lex_intent.order_pizza_intent.version","aws_lex_intent.order_pizza_intent"]}}],"locale":{"constant_value":"en-US"},"name":{"constant_value":"PizzaOrderingBot"},"nlu_intent_confidence_threshold":{"constant_value":0.5},"process_behavior":{"constant_value":"BUILD"},"voice_id":{"constant_value":"Joanna"}},"schema_version":0},{"address":"aws_lex_intent.order_pizza_intent","mode":"managed","type":"aws_lex_intent","name":"order_pizza_intent","provider_config_key":"aws","expressions":{"conclusion_statement":[{"message":[{"content":{"constant_value":"Your pizza order has been received."},"content_type":{"constant_value":"PlainText"}}]}],"description":{"constant_value":"To order a pizza"},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"OrderPizzaIntent"},"sample_utterances":{"constant_value":["I would like to pick up a pizza","I would like to order some pizzas"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_lex_intent.order_pizza_intent","attribute":["name"]},{"resource":"aws_lex_intent.order_pizza_intent","attribute":["version"]}],"timestamp":"2026-02-18T20:51:49Z","applyable":true,"complete":true,"errored":false}
|
34 | I want callers to be able to interact with an automated assistant during support conversations, and I need it wired into our existing setup without a lot of extra complexity. | create an aws_connect_bot_association resource | Has one resource "aws_connect_instance", at least one "aws_lex_intent" resource, one "aws_lex_bot" resource, and one "aws_connnect_bot_association" resource | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
data "aws_region" "current" {}
resource "aws_connect_instance" "example" {
identity_management_type = "CONNECT_MANAGED"
inbound_calls_enabled = true
instance_alias = "friendly-name-connect-13"
outbound_calls_enabled = true
}
resource "aws_lex_intent" "example" {
create_version = true
name = "connect_lex_intent"
sample_utterances = [
"I would like to pick up flowers.",
]
fulfillment_activity {
type = "ReturnIntent"
}
}
resource "aws_lex_bot" "example13" {
name = "connect_lex_bot"
process_behavior = "BUILD"
child_directed = false
abort_statement {
message {
content = "Sorry, I am not able to assist at this time."
content_type = "PlainText"
}
}
clarification_prompt {
max_attempts = 2
message {
content = "I didn't understand you, what would you like to do?"
content_type = "PlainText"
}
}
intent {
intent_name = aws_lex_intent.example.name
intent_version = "1"
}
}
resource "aws_connect_bot_association" "example" {
instance_id = aws_connect_instance.example.id
lex_bot {
lex_region = data.aws_region.current.name
name = aws_lex_bot.example13.name
}
}
| package terraform.validation
import future.keywords.in
default has_valid_resources = false
# Rule for multiple aws_lex_intent resources
has_valid_lex_intents {
count([intent | intent := input.planned_values.root_module.resources[_]; intent.type == "aws_lex_intent"; intent.values.name; intent.values.fulfillment_activity])
}
has_valid_connect_instance {
count([instance | instance := input.planned_values.root_module.resources[_]; instance.type == "aws_connect_instance"; instance.values.identity_management_type; instance.values.inbound_calls_enabled; instance.values.outbound_calls_enabled])
}
# Rule for aws_lex_bot resource with specific arguments
has_valid_lex_bot_instance {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_lex_bot"
is_boolean(resource.values.child_directed)
resource.values.clarification_prompt
resource.values.abort_statement
resource.values.name
# is_boolean(resource.values.create_version)
# resource.values.description
# is_boolean(resource.values.detect_sentiment)
# resource.values.idle_session_ttl_in_seconds
# resource.values.process_behavior
# resource.values.voice_id
# resource.values.locale
# is_boolean(resource.values.enable_model_improvements)
# resource.values.nlu_intent_confidence_threshold
}
has_valid_connect_bot_association {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_connect_bot_association"
resource.values.lex_bot[_].name
instance := input.configuration.root_module.resources[i]
instance.expressions.instance_id
}
# Combined rule to ensure all conditions are met
has_valid_resources {
has_valid_lex_intents
has_valid_lex_bot_instance
has_valid_connect_instance
has_valid_connect_bot_association
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"lex_bot":[{"lex_region":"us-east-1","name":"connect_lex_bot"}],"region":"us-east-1"},"sensitive_values":{"lex_bot":[{}]}},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_resolve_best_voices_enabled":true,"contact_flow_logs_enabled":false,"contact_lens_enabled":true,"directory_id":null,"early_media_enabled":true,"identity_management_type":"CONNECT_MANAGED","inbound_calls_enabled":true,"instance_alias":"friendly-name-connect-13","multi_party_conference_enabled":false,"outbound_calls_enabled":true,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"connect_lex_intent","intent_version":"1"}],"locale":"en-US","name":"connect_lex_bot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null},"sensitive_values":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"connect_lex_intent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to pick up flowers."],"slot":[],"timeouts":null},"sensitive_values":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}]}},"resource_changes":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"lex_bot":[{"lex_region":"us-east-1","name":"connect_lex_bot"}],"region":"us-east-1"},"after_unknown":{"id":true,"instance_id":true,"lex_bot":[{}]},"before_sensitive":false,"after_sensitive":{"lex_bot":[{}]}}},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_resolve_best_voices_enabled":true,"contact_flow_logs_enabled":false,"contact_lens_enabled":true,"directory_id":null,"early_media_enabled":true,"identity_management_type":"CONNECT_MANAGED","inbound_calls_enabled":true,"instance_alias":"friendly-name-connect-13","multi_party_conference_enabled":false,"outbound_calls_enabled":true,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"created_time":true,"id":true,"service_role":true,"status":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"abort_statement":[{"message":[{"content":"Sorry, I am not able to assist at this time.","content_type":"PlainText","group_number":null}],"response_card":null}],"child_directed":false,"clarification_prompt":[{"max_attempts":2,"message":[{"content":"I didn't understand you, what would you like to do?","content_type":"PlainText","group_number":null}],"response_card":null}],"create_version":false,"description":null,"detect_sentiment":false,"enable_model_improvements":false,"idle_session_ttl_in_seconds":300,"intent":[{"intent_name":"connect_lex_intent","intent_version":"1"}],"locale":"en-US","name":"connect_lex_bot","nlu_intent_confidence_threshold":0,"process_behavior":"BUILD","region":"us-east-1","timeouts":null},"after_unknown":{"abort_statement":[{"message":[{}]}],"arn":true,"checksum":true,"clarification_prompt":[{"message":[{}]}],"created_date":true,"failure_reason":true,"id":true,"intent":[{}],"last_updated_date":true,"status":true,"version":true,"voice_id":true},"before_sensitive":false,"after_sensitive":{"abort_statement":[{"message":[{}]}],"clarification_prompt":[{"message":[{}]}],"intent":[{}]}}},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"conclusion_statement":[],"confirmation_prompt":[],"create_version":true,"description":null,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[],"type":"ReturnIntent"}],"name":"connect_lex_intent","parent_intent_signature":null,"region":"us-east-1","rejection_statement":[],"sample_utterances":["I would like to pick up flowers."],"slot":[],"timeouts":null},"after_unknown":{"arn":true,"checksum":true,"conclusion_statement":[],"confirmation_prompt":[],"created_date":true,"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"id":true,"last_updated_date":true,"rejection_statement":[],"sample_utterances":[false],"slot":[],"version":true},"before_sensitive":false,"after_sensitive":{"conclusion_statement":[],"confirmation_prompt":[],"dialog_code_hook":[],"follow_up_prompt":[],"fulfillment_activity":[{"code_hook":[]}],"rejection_statement":[],"sample_utterances":[false],"slot":[]}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_connect_bot_association.example","mode":"managed","type":"aws_connect_bot_association","name":"example","provider_config_key":"aws","expressions":{"instance_id":{"references":["aws_connect_instance.example.id","aws_connect_instance.example"]},"lex_bot":[{"lex_region":{"references":["data.aws_region.current.name","data.aws_region.current"]},"name":{"references":["aws_lex_bot.example13.name","aws_lex_bot.example13"]}}]},"schema_version":0},{"address":"aws_connect_instance.example","mode":"managed","type":"aws_connect_instance","name":"example","provider_config_key":"aws","expressions":{"identity_management_type":{"constant_value":"CONNECT_MANAGED"},"inbound_calls_enabled":{"constant_value":true},"instance_alias":{"constant_value":"friendly-name-connect-13"},"outbound_calls_enabled":{"constant_value":true}},"schema_version":0},{"address":"aws_lex_bot.example13","mode":"managed","type":"aws_lex_bot","name":"example13","provider_config_key":"aws","expressions":{"abort_statement":[{"message":[{"content":{"constant_value":"Sorry, I am not able to assist at this time."},"content_type":{"constant_value":"PlainText"}}]}],"child_directed":{"constant_value":false},"clarification_prompt":[{"max_attempts":{"constant_value":2},"message":[{"content":{"constant_value":"I didn't understand you, what would you like to do?"},"content_type":{"constant_value":"PlainText"}}]}],"intent":[{"intent_name":{"references":["aws_lex_intent.example.name","aws_lex_intent.example"]},"intent_version":{"constant_value":"1"}}],"name":{"constant_value":"connect_lex_bot"},"process_behavior":{"constant_value":"BUILD"}},"schema_version":0},{"address":"aws_lex_intent.example","mode":"managed","type":"aws_lex_intent","name":"example","provider_config_key":"aws","expressions":{"create_version":{"constant_value":true},"fulfillment_activity":[{"type":{"constant_value":"ReturnIntent"}}],"name":{"constant_value":"connect_lex_intent"},"sample_utterances":{"constant_value":["I would like to pick up flowers."]}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_region.current","attribute":["name"]},{"resource":"aws_connect_instance.example","attribute":["id"]},{"resource":"aws_lex_bot.example13","attribute":["name"]},{"resource":"aws_lex_intent.example","attribute":["name"]}],"timestamp":"2026-02-18T20:51:52Z","applyable":true,"complete":true,"errored":false}
|
35 | I need a simple way to take in continuous chunks of data so other parts of the system can process them reliably, and it should work even if the volume fluctuates a bit. | Generate a basic Amazon Kinesis stream | Has one "aws_kinesis_stream" resource | provider "aws" {
region = "us-west-2"
}
resource "aws_kinesis_stream" "test_stream" {
name = "drow1"
shard_count = 1
retention_period = 48
shard_level_metrics = [
"IncomingBytes",
"OutgoingBytes",
]
stream_mode_details {
stream_mode = "PROVISIONED"
}
tags = {
Environment = "test"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_kinesis_stream {
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_stream"
resource.values.name
}
has_valid_resources {
has_valid_kinesis_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"drow1","region":"us-west-2","retention_period":48,"shard_count":1,"shard_level_metrics":["IncomingBytes","OutgoingBytes"],"stream_mode_details":[{"stream_mode":"PROVISIONED"}],"tags":{"Environment":"test"},"tags_all":{"Environment":"test"},"timeouts":null},"sensitive_values":{"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"drow1","region":"us-west-2","retention_period":48,"shard_count":1,"shard_level_metrics":["IncomingBytes","OutgoingBytes"],"stream_mode_details":[{"stream_mode":"PROVISIONED"}],"tags":{"Environment":"test"},"tags_all":{"Environment":"test"},"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"shard_level_metrics":[false,false],"stream_mode_details":[{}],"tags":{},"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_config_key":"aws","expressions":{"name":{"constant_value":"drow1"},"retention_period":{"constant_value":48},"shard_count":{"constant_value":1},"shard_level_metrics":{"constant_value":["IncomingBytes","OutgoingBytes"]},"stream_mode_details":[{"stream_mode":{"constant_value":"PROVISIONED"}}],"tags":{"constant_value":{"Environment":"test"}}},"schema_version":1}]}},"timestamp":"2026-02-18T20:52:09Z","applyable":true,"complete":true,"errored":false}
|
36 | I need a simple setup that can watch a continuous flow of event data and run some lightweight processing on it in a reliable, low‑maintenance way. | Generate a basic Amazon Kinesis Analytics Application with an input kinesis stream | Has one "aws_kinesis_analytics_application" resource with one "aws_kinesis_stream" resource as an input | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
data "aws_iam_policy_document" "StreamReaderWriter" {
statement {
effect = "Allow"
actions = ["kinesis:DescribeStream",
"kinesis:GetShardIterator",
"kinesis:GetRecords"]
resources = [aws_kinesis_stream.test_stream.arn]
}
}
data "aws_iam_policy_document" "KinesisAssume" {
statement {
effect = "Allow"
actions = ["sts:AssumeRole"]
principals {
type = "Service"
identifiers = ["kinesisanalytics.amazonaws.com"]
}
}
}
resource "aws_iam_policy" "StreamReaderWriter" {
name = "KinesisStreamReaderWriter"
policy = data.aws_iam_policy_document.StreamReaderWriter.json
}
resource "aws_iam_role" "kinesis_role" {
name = "kinesis_role"
assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json
}
resource "aws_iam_role_policy_attachment" "attach_kinesis_role" {
role = aws_iam_role.kinesis_role.name
policy_arn = aws_iam_policy.StreamReaderWriter.arn
}
resource "aws_kinesis_stream" "test_stream" {
name = "events"
shard_count = 1
retention_period = 168
}
resource "aws_kinesis_analytics_application" "test_application" {
name = "kinesis-analytics-application-test"
inputs {
name_prefix = "test_prefix"
kinesis_stream {
resource_arn = aws_kinesis_stream.test_stream.arn
role_arn = aws_iam_role.kinesis_role.arn
}
parallelism {
count = 1
}
schema {
record_columns {
mapping = "$.test"
name = "test"
sql_type = "VARCHAR(8)"
}
record_encoding = "UTF-8"
record_format {
mapping_parameters {
json {
record_row_path = "$"
}
}
}
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com")
}
has_valid_kinesis_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_stream"
resource.values.name
}
has_valid_kinesis_analytics_application {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_analytics_application"
resource.values.name
resource.values.inputs[_].kinesis_stream
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kinesis_stream
has_valid_kinesis_analytics_application
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":null,"name":"KinesisStreamReaderWriter","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"kinesis_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"name_prefix":"test_prefix","parallelism":[{"count":1}],"processing_configuration":[],"schema":[{"record_columns":[{"mapping":"$.test","name":"test","sql_type":"VARCHAR(8)"}],"record_encoding":"UTF-8","record_format":[{"mapping_parameters":[{"csv":[],"json":[{"record_row_path":"$"}]}]}]}]}],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-east-1","start_application":null,"tags":null},"sensitive_values":{"cloudwatch_logging_options":[],"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}]}]}],"starting_position_configuration":[],"stream_names":[]}],"outputs":[],"reference_data_sources":[],"tags_all":{}}},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"events","region":"us-east-1","retention_period":168,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"sensitive_values":{"stream_mode_details":[],"tags_all":{}}},{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["kinesis:DescribeStream","kinesis:GetRecords","kinesis:GetShardIterator"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["kinesis:DescribeStream","kinesis:GetRecords","kinesis:GetShardIterator"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":null,"name":"KinesisStreamReaderWriter","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"kinesis_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"name_prefix":"test_prefix","parallelism":[{"count":1}],"processing_configuration":[],"schema":[{"record_columns":[{"mapping":"$.test","name":"test","sql_type":"VARCHAR(8)"}],"record_encoding":"UTF-8","record_format":[{"mapping_parameters":[{"csv":[],"json":[{"record_row_path":"$"}]}]}]}]}],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-east-1","start_application":null,"tags":null},"after_unknown":{"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"inputs":[{"id":true,"kinesis_firehose":[],"kinesis_stream":[{"resource_arn":true,"role_arn":true}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}],"record_format_type":true}]}],"starting_position_configuration":true,"stream_names":true}],"last_update_timestamp":true,"outputs":[],"reference_data_sources":[],"status":true,"tags_all":true,"version":true},"before_sensitive":false,"after_sensitive":{"cloudwatch_logging_options":[],"inputs":[{"kinesis_firehose":[],"kinesis_stream":[{}],"parallelism":[{}],"processing_configuration":[],"schema":[{"record_columns":[{}],"record_format":[{"mapping_parameters":[{"csv":[],"json":[{}]}]}]}],"starting_position_configuration":[],"stream_names":[]}],"outputs":[],"reference_data_sources":[],"tags_all":{}}}},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"events","region":"us-east-1","retention_period":168,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"stream_mode_details":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"stream_mode_details":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.StreamReaderWriter","mode":"managed","type":"aws_iam_policy","name":"StreamReaderWriter","provider_config_key":"aws","expressions":{"name":{"constant_value":"KinesisStreamReaderWriter"},"policy":{"references":["data.aws_iam_policy_document.StreamReaderWriter.json","data.aws_iam_policy_document.StreamReaderWriter"]}},"schema_version":0},{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.attach_kinesis_role","mode":"managed","type":"aws_iam_role_policy_attachment","name":"attach_kinesis_role","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.StreamReaderWriter.arn","aws_iam_policy.StreamReaderWriter"]},"role":{"references":["aws_iam_role.kinesis_role.name","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_config_key":"aws","expressions":{"inputs":[{"kinesis_stream":[{"resource_arn":{"references":["aws_kinesis_stream.test_stream.arn","aws_kinesis_stream.test_stream"]},"role_arn":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}}],"name_prefix":{"constant_value":"test_prefix"},"parallelism":[{"count":{"constant_value":1}}],"schema":[{"record_columns":[{"mapping":{"constant_value":"$.test"},"name":{"constant_value":"test"},"sql_type":{"constant_value":"VARCHAR(8)"}}],"record_encoding":{"constant_value":"UTF-8"},"record_format":[{"mapping_parameters":[{"json":[{"record_row_path":{"constant_value":"$"}}]}]}]}]}],"name":{"constant_value":"kinesis-analytics-application-test"}},"schema_version":0},{"address":"aws_kinesis_stream.test_stream","mode":"managed","type":"aws_kinesis_stream","name":"test_stream","provider_config_key":"aws","expressions":{"name":{"constant_value":"events"},"retention_period":{"constant_value":168},"shard_count":{"constant_value":1}},"schema_version":1},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0},{"address":"data.aws_iam_policy_document.StreamReaderWriter","mode":"data","type":"aws_iam_policy_document","name":"StreamReaderWriter","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["kinesis:DescribeStream","kinesis:GetShardIterator","kinesis:GetRecords"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_kinesis_stream.test_stream.arn","aws_kinesis_stream.test_stream"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]},{"resource":"data.aws_iam_policy_document.StreamReaderWriter","attribute":["json"]},{"resource":"aws_kinesis_stream.test_stream","attribute":["arn"]},{"resource":"aws_iam_policy.StreamReaderWriter","attribute":["arn"]},{"resource":"aws_iam_role.kinesis_role","attribute":["name"]}],"timestamp":"2026-02-18T20:52:03Z","applyable":true,"complete":true,"errored":false}
|
37 | I need to run some continuous data processing logic that can handle streaming workloads reliably, and it should run in a managed environment so I don’t have to deal with the underlying servers. | Generate a basic Amazon Kinesis V2 Analytics Application to manage an Apache Flink Application | Has one "aws_iam_role" resource, and one "aws_kinesisanalyticsv2_application" with argument runtime_environment != "SQL-1_0" | provider "aws" {
region = "us-west-2"
}
data "aws_iam_policy_document" "KinesisAssume" {
statement {
effect = "Allow"
actions = ["sts:AssumeRole"]
principals {
type = "Service"
identifiers = ["kinesisanalytics.amazonaws.com"]
}
}
}
resource "aws_iam_role" "kinesis_role" {
name = "kinesis_role"
assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json
}
resource "aws_kinesisanalyticsv2_application" "flink_app" {
name = "example-application1"
runtime_environment = "FLINK-1_13"
service_execution_role = aws_iam_role.kinesis_role.arn
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com")
}
has_valid_kinesisanalyticsv2_application {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesisanalyticsv2_application"
resource.values.name
resource.values.runtime_environment != "SQL-1_0"
role := input.configuration.root_module.resources[i]
role.expressions.service_execution_role
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kinesisanalyticsv2_application
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"FLINK-1_13","start_application":null,"tags":null,"timeouts":null},"sensitive_values":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"FLINK-1_13","start_application":null,"tags":null,"timeouts":null},"after_unknown":{"application_configuration":true,"application_mode":true,"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"last_update_timestamp":true,"service_execution_role":true,"status":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-application1"},"runtime_environment":{"constant_value":"FLINK-1_13"},"service_execution_role":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:10Z","applyable":true,"complete":true,"errored":false}
|
38 | We need a way to take in a steady stream of app events, clean them up on the fly, and store them in a long‑term place where the files are automatically organized by things like who they belong to and when they arrived, all while keeping it flexible enough to rearrange later if our data patterns change. | Generate a Kinesis Firehose Delivery Stream with an extended S3 Destination with Dynamic Partitioning enabled | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with the argument "enabled" within the "dynamic_partitioning_configuration" block set to "true"
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
# even though this program seems to be problematic, it's copied from https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/kinesis_firehose_delivery_stream
# so I'll leave it unmodified
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
resource "aws_s3_bucket" "decemberthirtysecond" {
bucket = "decemberthirtysecond"
}
resource "aws_kinesis_firehose_delivery_stream" "extended_s3_stream" {
name = "terraform-kinesis-firehose-extended-s3-test-stream"
destination = "extended_s3"
extended_s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.decemberthirtysecond.arn
buffering_size = 64
# https://docs.aws.amazon.com/firehose/latest/dev/dynamic-partitioning.html
dynamic_partitioning_configuration {
enabled = "true"
}
# Example prefix using partitionKeyFromQuery, applicable to JQ processor
prefix = "data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/"
error_output_prefix = "errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/"
processing_configuration {
enabled = "true"
# Multi-record deaggregation processor example
processors {
type = "RecordDeAggregation"
parameters {
parameter_name = "SubRecordType"
parameter_value = "JSON"
}
}
# New line delimiter processor example
processors {
type = "AppendDelimiterToRecord"
}
# JQ processor example
processors {
type = "MetadataExtraction"
parameters {
parameter_name = "JsonParsingEngine"
parameter_value = "JQ-1.6"
}
parameters {
parameter_name = "MetadataExtractionQuery"
parameter_value = "{customer_id:.customer_id}"
}
}
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "extended_s3"
resource.values.extended_s3_configuration[_].dynamic_partitioning_configuration
role := input.configuration.root_module.resources[i]
role.expressions.extended_s3_configuration[_].role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":64,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{"enabled":true,"retry_duration":300}],"error_output_prefix":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/","file_extension":null,"kms_key_arn":null,"prefix":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/","processing_configuration":[{"enabled":true,"processors":[{"parameters":[{"parameter_name":"SubRecordType","parameter_value":"JSON"}],"type":"RecordDeAggregation"},{"parameters":[],"type":"AppendDelimiterToRecord"},{"parameters":[{"parameter_name":"JsonParsingEngine","parameter_value":"JQ-1.6"},{"parameter_name":"MetadataExtractionQuery","parameter_value":"{customer_id:.customer_id}"}],"type":"MetadataExtraction"}]}],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"decemberthirtysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":64,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{"enabled":true,"retry_duration":300}],"error_output_prefix":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/","file_extension":null,"kms_key_arn":null,"prefix":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/","processing_configuration":[{"enabled":true,"processors":[{"parameters":[{"parameter_name":"SubRecordType","parameter_value":"JSON"}],"type":"RecordDeAggregation"},{"parameters":[],"type":"AppendDelimiterToRecord"},{"parameters":[{"parameter_name":"JsonParsingEngine","parameter_value":"JQ-1.6"},{"parameter_name":"MetadataExtractionQuery","parameter_value":"{customer_id:.customer_id}"}],"type":"MetadataExtraction"}]}],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"role_arn":true,"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[{}],"processing_configuration":[{"processors":[{"parameters":[{}]},{"parameters":[]},{"parameters":[{},{}]}]}],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"decemberthirtysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"extended_s3"},"extended_s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.decemberthirtysecond.arn","aws_s3_bucket.decemberthirtysecond"]},"buffering_size":{"constant_value":64},"dynamic_partitioning_configuration":[{"enabled":{"constant_value":"true"}}],"error_output_prefix":{"constant_value":"errors/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/!{firehose:error-output-type}/"},"prefix":{"constant_value":"data/customer_id=!{partitionKeyFromQuery:customer_id}/year=!{timestamp:yyyy}/month=!{timestamp:MM}/day=!{timestamp:dd}/hour=!{timestamp:HH}/"},"processing_configuration":[{"enabled":{"constant_value":"true"},"processors":[{"parameters":[{"parameter_name":{"constant_value":"SubRecordType"},"parameter_value":{"constant_value":"JSON"}}],"type":{"constant_value":"RecordDeAggregation"}},{"type":{"constant_value":"AppendDelimiterToRecord"}},{"parameters":[{"parameter_name":{"constant_value":"JsonParsingEngine"},"parameter_value":{"constant_value":"JQ-1.6"}},{"parameter_name":{"constant_value":"MetadataExtractionQuery"},"parameter_value":{"constant_value":"{customer_id:.customer_id}"}}],"type":{"constant_value":"MetadataExtraction"}}]}],"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"name":{"constant_value":"terraform-kinesis-firehose-extended-s3-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.decemberthirtysecond","mode":"managed","type":"aws_s3_bucket","name":"decemberthirtysecond","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"decemberthirtysecond"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.decemberthirtysecond","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:15Z","applyable":true,"complete":true,"errored":false}
|
39 | We need a way to take our incoming app data and load it into our analytics system automatically, with a fallback option for storing the raw files in case something goes wrong. | Generate a Kinesis Firehose Delivery Stream with a Redshift cluster destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_redshift_cluster" resource, and one "aws_kinesis_firehose_delivery_stream" resource with a "redshift_configuration" block
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_redshift_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Principal = {
Service = "firehose.amazonaws.com"
},
Action = "sts:AssumeRole"
}
]
})
}
resource "aws_iam_policy" "firehose_policy" {
name = "firehose_redshift_s3_policy"
description = "Policy for Kinesis Firehose to access S3 and Redshift"
policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Action = [
"s3:PutObject",
"s3:PutObjectAcl",
"s3:GetBucketLocation",
"s3:ListBucket",
"s3:GetObject"
],
Resource = [
aws_s3_bucket.januarysecond.arn,
"${aws_s3_bucket.januarysecond.arn}/*"
]
},
{
Effect = "Allow",
Action = [
"redshift:DescribeClusters",
"redshift:GetClusterCredentials",
"redshift:CopyFromS3",
"redshift:CreateClusterUser"
],
Resource = aws_redshift_cluster.test_cluster.arn
},
{
Effect = "Allow",
Action = [
"kms:Decrypt",
"kms:GenerateDataKey"
],
Resource = "*"
}
]
})
}
resource "aws_iam_role_policy_attachment" "firehose_policy_attach" {
role = aws_iam_role.firehose_role.name
policy_arn = aws_iam_policy.firehose_policy.arn
}
resource "aws_s3_bucket" "januarysecond" {
bucket = "januarysecond"
}
resource "aws_redshift_cluster" "test_cluster" {
cluster_identifier = "tf-redshift-cluster"
database_name = "test"
master_username = "testuser"
master_password = "T3stPass"
node_type = "ra3.xlplus"
cluster_type = "single-node"
}
resource "aws_kinesis_firehose_delivery_stream" "test_stream" {
name = "terraform-kinesis-firehose-test-stream"
destination = "redshift"
redshift_configuration {
role_arn = aws_iam_role.firehose_role.arn
cluster_jdbcurl = "jdbc:redshift://${aws_redshift_cluster.test_cluster.endpoint}/${aws_redshift_cluster.test_cluster.database_name}"
username = "testuser"
password = "T3stPass"
data_table_name = "test-table"
copy_options = "delimiter '|'" # the default delimiter
data_table_columns = "test-col"
s3_backup_mode = "Disabled"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januarysecond.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_redshift_cluster {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_redshift_cluster"
resource.values.cluster_identifier
resource.values.node_type
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "redshift"
resource.values.redshift_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.redshift_configuration[_].role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_redshift_cluster
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and Redshift","name":"firehose_redshift_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_redshift_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_redshift_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"redshift","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"copy_options":"delimiter '|'","data_table_columns":"test-col","data_table_name":"test-table","password":"T3stPass","processing_configuration":[],"retry_duration":3600,"s3_backup_configuration":[],"s3_backup_mode":"Disabled","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"username":"testuser"}],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":[],"password":true,"processing_configuration":[],"s3_backup_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"test","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"T3stPass","master_password_wo":null,"master_password_wo_version":null,"master_username":"testuser","multi_az":false,"node_type":"ra3.xlplus","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and Redshift","name":"firehose_redshift_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_redshift_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_redshift_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"redshift","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"copy_options":"delimiter '|'","data_table_columns":"test-col","data_table_name":"test-table","password":"T3stPass","processing_configuration":[],"retry_duration":3600,"s3_backup_configuration":[],"s3_backup_mode":"Disabled","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"username":"testuser"}],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":true,"cluster_jdbcurl":true,"processing_configuration":[],"role_arn":true,"s3_backup_configuration":[],"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[{"cloudwatch_logging_options":[],"password":true,"processing_configuration":[],"s3_backup_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"test","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"T3stPass","master_password_wo":null,"master_password_wo_version":null,"master_username":"testuser","multi_az":false,"node_type":"ra3.xlplus","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysecond","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and Redshift"},"name":{"constant_value":"firehose_redshift_s3_policy"},"policy":{"references":["aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond","aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond","aws_redshift_cluster.test_cluster.arn","aws_redshift_cluster.test_cluster"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_redshift_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_policy.arn","aws_iam_policy.firehose_policy"]},"role":{"references":["aws_iam_role.firehose_role.name","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"redshift"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"redshift_configuration":[{"cluster_jdbcurl":{"references":["aws_redshift_cluster.test_cluster.endpoint","aws_redshift_cluster.test_cluster","aws_redshift_cluster.test_cluster.database_name","aws_redshift_cluster.test_cluster"]},"copy_options":{"constant_value":"delimiter '|'"},"data_table_columns":{"constant_value":"test-col"},"data_table_name":{"constant_value":"test-table"},"password":{"constant_value":"T3stPass"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_backup_mode":{"constant_value":"Disabled"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysecond.arn","aws_s3_bucket.januarysecond"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"username":{"constant_value":"testuser"}}]},"schema_version":1},{"address":"aws_redshift_cluster.test_cluster","mode":"managed","type":"aws_redshift_cluster","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"test"},"master_password":{"constant_value":"T3stPass"},"master_username":{"constant_value":"testuser"},"node_type":{"constant_value":"ra3.xlplus"}},"schema_version":0},{"address":"aws_s3_bucket.januarysecond","mode":"managed","type":"aws_s3_bucket","name":"januarysecond","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysecond"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_policy.firehose_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["name"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["arn"]},{"resource":"aws_s3_bucket.januarysecond","attribute":["arn"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["database_name"]},{"resource":"aws_redshift_cluster.test_cluster","attribute":["endpoint"]}],"timestamp":"2026-02-18T20:52:21Z","applyable":true,"complete":true,"errored":false}
|
40 | We need a way to stream our app’s event data into a search and analytics system in near‑real time, with a fallback location for anything that can’t be processed right away. | Generate a Kinesis Firehose Delivery Stream with a Elasticsearch destination with the appropriate iam role and bucket | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_elasticsearch_domain" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "elasticsearch_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "januarythird" {
bucket = "januarythird"
}
resource "aws_elasticsearch_domain" "test_cluster" {
domain_name = "es-test-2"
cluster_config {
instance_count = 2
zone_awareness_enabled = true
instance_type = "t2.small.elasticsearch"
}
ebs_options {
ebs_enabled = true
volume_size = 10
}
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
data "aws_iam_policy_document" "firehose-elasticsearch" {
statement {
effect = "Allow"
actions = ["es:*"]
resources = [
aws_elasticsearch_domain.test_cluster.arn,
"${aws_elasticsearch_domain.test_cluster.arn}/*",
]
}
}
resource "aws_iam_role_policy" "firehose-elasticsearch" {
name = "elasticsearch"
role = aws_iam_role.firehose_role.id
policy = data.aws_iam_policy_document.firehose-elasticsearch.json
}
resource "aws_elasticsearch_domain_policy" "main" {
domain_name = aws_elasticsearch_domain.test_cluster.domain_name
access_policies = <<POLICIES
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "es:*",
"Principal": "*",
"Effect": "Allow",
"Condition": {
"IpAddress": {"aws:SourceIp": "127.0.0.1/32"}
},
"Resource": "${aws_elasticsearch_domain.test_cluster.arn}/*"
}
]
}
POLICIES
}
resource "aws_kinesis_firehose_delivery_stream" "test" {
name = "terraform-kinesis-firehose-es"
destination = "elasticsearch"
elasticsearch_configuration {
domain_arn = aws_elasticsearch_domain.test_cluster.arn
role_arn = aws_iam_role.firehose_role.arn
index_name = "test"
type_name = "test"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januarythird.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_elasticsearch_cluster {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_elasticsearch_domain"
resource.values.domain_name
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "elasticsearch"
resource.values.elasticsearch_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.elasticsearch_configuration[_].role_arn
role.expressions.elasticsearch_configuration[_].domain_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_elasticsearch_cluster
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-2","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[]}},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"domain_name":"es-test-2","region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elasticsearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarythird","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-2","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"id":true,"kibana_endpoint":true,"log_publishing_options":[],"node_to_node_encryption":true,"snapshot_options":[],"tags_all":true,"vpc_options":[]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[]}}},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"domain_name":"es-test-2","region":"us-east-1","timeouts":null},"after_unknown":{"access_policies":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elasticsearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[{"cloudwatch_logging_options":true,"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarythird","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"t2.small.elasticsearch"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test-2"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}]},"schema_version":0},{"address":"aws_elasticsearch_domain_policy.main","mode":"managed","type":"aws_elasticsearch_domain_policy","name":"main","provider_config_key":"aws","expressions":{"access_policies":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"domain_name":{"references":["aws_elasticsearch_domain.test_cluster.domain_name","aws_elasticsearch_domain.test_cluster"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"elasticsearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-elasticsearch.json","data.aws_iam_policy_document.firehose-elasticsearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"elasticsearch"},"elasticsearch_configuration":[{"domain_arn":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarythird.arn","aws_s3_bucket.januarythird"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"type_name":{"constant_value":"test"}}],"name":{"constant_value":"terraform-kinesis-firehose-es"}},"schema_version":1},{"address":"aws_s3_bucket.januarythird","mode":"managed","type":"aws_s3_bucket","name":"januarythird","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarythird"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster","aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose-elasticsearch","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_s3_bucket.januarythird","attribute":["arn"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["domain_name"]}],"timestamp":"2026-02-18T20:52:35Z","applyable":true,"complete":true,"errored":false}
|
41 | We need a way to funnel a high volume of incoming event data into our search and analytics system in near real time, with some kind of fallback storage in case the main pipeline slows down. | Generate a Kinesis Firehose Delivery Stream with an OpenSearch destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearch_domain" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "opensearch_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "januaryseventh" {
bucket = "januaryseventh"
}
resource "aws_opensearch_domain" "test_cluster" {
domain_name = "es-test-3"
cluster_config {
instance_count = 2
zone_awareness_enabled = true
instance_type = "m4.large.search"
}
ebs_options {
ebs_enabled = true
volume_size = 10
}
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
data "aws_iam_policy_document" "firehose-opensearch" {
statement {
effect = "Allow"
actions = ["es:*"]
resources = [
aws_opensearch_domain.test_cluster.arn,
"${aws_opensearch_domain.test_cluster.arn}/*",
]
}
}
resource "aws_iam_role_policy" "firehose-opensearch" {
name = "opensearch"
role = aws_iam_role.firehose_role.id
policy = data.aws_iam_policy_document.firehose-opensearch.json
}
data "aws_iam_policy_document" "main" {
statement {
effect = "Allow"
principals {
type = "*"
identifiers = ["*"]
}
condition {
test = "IpAddress"
variable = "aws:SourceIp"
values = ["127.0.0.1/32"]
}
actions = ["es:*"]
resources = ["${aws_opensearch_domain.test_cluster.arn}/*"]
}
}
# applied at service level, necessary for opensearch access
resource "aws_opensearch_domain_policy" "main" {
domain_name = aws_opensearch_domain.test_cluster.domain_name
access_policies = data.aws_iam_policy_document.main.json
}
resource "aws_kinesis_firehose_delivery_stream" "test" {
depends_on = [aws_iam_role_policy.firehose-opensearch]
name = "terraform-kinesis-firehose-os"
destination = "opensearch"
opensearch_configuration {
domain_arn = aws_opensearch_domain.test_cluster.arn
role_arn = aws_iam_role.firehose_role.arn
index_name = "test"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januaryseventh.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_opensearch_cluster {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_opensearch_domain"
resource.values.domain_name
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "opensearch"
resource.values.opensearch_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.opensearch_configuration[_].role_arn
role.expressions.opensearch_configuration[_].domain_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_opensearch_cluster
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"opensearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-3","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[]}},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"domain_name":"es-test-3","region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryseventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[{"test":"IpAddress","values":["127.0.0.1/32"],"variable":"aws:SourceIp"}],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[{"identifiers":["*"],"type":"*"}],"resources":[null],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]}]}},"action_reason":"read_because_config_unknown"},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[{"test":"IpAddress","values":["127.0.0.1/32"],"variable":"aws:SourceIp"}],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[{"identifiers":["*"],"type":"*"}],"resources":[null],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[true]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[{"values":[false]}],"not_principals":[],"principals":[{"identifiers":[false]}],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"opensearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":true,"document_id_options":[],"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test-3","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"aiml_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"node_options":true,"zone_awareness_config":[]}],"cognito_options":[],"dashboard_endpoint":true,"dashboard_endpoint_v2":true,"domain_endpoint_options":true,"domain_endpoint_v2_hosted_zone_id":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"endpoint_v2":true,"engine_version":true,"id":true,"identity_center_options":[],"ip_address_type":true,"log_publishing_options":[],"node_to_node_encryption":true,"off_peak_window_options":true,"snapshot_options":[],"software_update_options":true,"tags_all":true,"vpc_options":[]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[]}}},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"domain_name":"es-test-3","region":"us-east-1","timeouts":null},"after_unknown":{"access_policies":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryseventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"opensearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-opensearch.json","data.aws_iam_policy_document.firehose-opensearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearch"},"name":{"constant_value":"terraform-kinesis-firehose-os"},"opensearch_configuration":[{"domain_arn":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryseventh.arn","aws_s3_bucket.januaryseventh"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-opensearch"]},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"m4.large.search"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test-3"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}]},"schema_version":0},{"address":"aws_opensearch_domain_policy.main","mode":"managed","type":"aws_opensearch_domain_policy","name":"main","provider_config_key":"aws","expressions":{"access_policies":{"references":["data.aws_iam_policy_document.main.json","data.aws_iam_policy_document.main"]},"domain_name":{"references":["aws_opensearch_domain.test_cluster.domain_name","aws_opensearch_domain.test_cluster"]}},"schema_version":0},{"address":"aws_s3_bucket.januaryseventh","mode":"managed","type":"aws_s3_bucket","name":"januaryseventh","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryseventh"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-opensearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster","aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0},{"address":"data.aws_iam_policy_document.main","mode":"data","type":"aws_iam_policy_document","name":"main","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"condition":[{"test":{"constant_value":"IpAddress"},"values":{"constant_value":["127.0.0.1/32"]},"variable":{"constant_value":"aws:SourceIp"}}],"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["*"]},"type":{"constant_value":"*"}}],"resources":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose-opensearch","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_s3_bucket.januaryseventh","attribute":["arn"]},{"resource":"data.aws_iam_policy_document.main","attribute":["json"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["domain_name"]}],"timestamp":"2026-02-18T20:52:38Z","applyable":true,"complete":true,"errored":false}
|
42 | We need a way to move our app’s event data into our analytics tool quickly, with a fallback so we don’t lose anything if the primary path has issues. | Generate a Kinesis Firehose Delivery Stream with a Splunk destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "splunk_configuration" block | provider "aws" {
region = "us-west-2"
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
resource "aws_s3_bucket" "januaryfifth" {
bucket = "januaryfifth"
}
resource "aws_kinesis_firehose_delivery_stream" "test_stream" {
name = "terraform-kinesis-firehose-test-stream"
destination = "splunk"
splunk_configuration {
hec_endpoint = "https://http-inputs-mydomain.splunkcloud.com:443"
hec_token = "51D4DA16-C61B-4F5F-8EC7-ED4301342A4A"
hec_acknowledgment_timeout = 600
hec_endpoint_type = "Event"
s3_backup_mode = "FailedEventsOnly"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januaryfifth.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "splunk"
resource.values.splunk_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.splunk_configuration[_].s3_configuration[_].bucket_arn
role.expressions.splunk_configuration[_].s3_configuration[_].role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"splunk","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"buffering_interval":60,"buffering_size":5,"hec_acknowledgment_timeout":600,"hec_endpoint":"https://http-inputs-mydomain.splunkcloud.com:443","hec_endpoint_type":"Event","hec_token":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A","processing_configuration":[],"retry_duration":3600,"s3_backup_mode":"FailedEventsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}]}],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"tags_all":{}}},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryfifth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"splunk","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"buffering_interval":60,"buffering_size":5,"hec_acknowledgment_timeout":600,"hec_endpoint":"https://http-inputs-mydomain.splunkcloud.com:443","hec_endpoint_type":"Event","hec_token":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A","processing_configuration":[],"retry_duration":3600,"s3_backup_mode":"FailedEventsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}]}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":true,"processing_configuration":[],"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"tags_all":{}}}},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryfifth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"splunk"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"splunk_configuration":[{"hec_acknowledgment_timeout":{"constant_value":600},"hec_endpoint":{"constant_value":"https://http-inputs-mydomain.splunkcloud.com:443"},"hec_endpoint_type":{"constant_value":"Event"},"hec_token":{"constant_value":"51D4DA16-C61B-4F5F-8EC7-ED4301342A4A"},"s3_backup_mode":{"constant_value":"FailedEventsOnly"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryfifth.arn","aws_s3_bucket.januaryfifth"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1},{"address":"aws_s3_bucket.januaryfifth","mode":"managed","type":"aws_s3_bucket","name":"januaryfifth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryfifth"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.januaryfifth","attribute":["arn"]}],"timestamp":"2026-02-18T20:52:36Z","applyable":true,"complete":true,"errored":false}
|
43 | We need a way to take a steady flow of app events and push them into a search-friendly system in near real time, with some kind of fallback storage so we don’t lose data if the main target is slow or unavailable. | Generate a Kinesis Firehose Delivery Stream with a OpenSearch Serverless Destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearchserverless_security_policy" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "opensearchserverless_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
data "aws_region" "current" {}
data "aws_caller_identity" "current" {}
resource "aws_iam_role" "firehose_role" {
name = "firehose_opensearch_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Principal = {
Service = "firehose.amazonaws.com"
},
Action = "sts:AssumeRole"
}
]
})
}
resource "aws_iam_policy" "firehose_policy" {
name = "firehose_opensearch_s3_policy"
description = "Policy for Kinesis Firehose to access S3 and OpenSearch Serverless"
policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Action = [
"s3:PutObject",
"s3:PutObjectAcl",
"s3:GetBucketLocation",
"s3:ListBucket",
"s3:GetObject"
],
Resource = [
aws_s3_bucket.januarysixth.arn,
"${aws_s3_bucket.januarysixth.arn}/*"
]
},
{
Effect = "Allow",
Action = [
"es:ESHttpPut",
"es:ESHttpPost",
"es:ESHttpGet"
],
Resource = [
"arn:aws:es:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:collection/${aws_opensearchserverless_collection.test_collection.name}/*",
]
}
]
})
}
resource "aws_iam_role_policy_attachment" "firehose_policy_attach" {
role = aws_iam_role.firehose_role.name
policy_arn = aws_iam_policy.firehose_policy.arn
}
resource "aws_s3_bucket" "januarysixth" {
bucket = "januarysixth"
}
resource "aws_opensearchserverless_security_policy" "example" {
name = "example"
type = "encryption"
policy = jsonencode({
"Rules" = [
{
"Resource" = [
"collection/example"
],
"ResourceType" = "collection"
}
],
"AWSOwnedKey" = true
})
}
resource "aws_opensearchserverless_collection" "test_collection" {
name = "example"
depends_on = [aws_opensearchserverless_security_policy.example]
}
resource "aws_kinesis_firehose_delivery_stream" "test_stream" {
name = "terraform-kinesis-firehose-test-stream"
destination = "opensearchserverless"
opensearchserverless_configuration {
collection_endpoint = aws_opensearchserverless_collection.test_collection.collection_endpoint
role_arn = aws_iam_role.firehose_role.arn
index_name = "test"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januarysixth.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_opensearchserverless_collection {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_opensearchserverless_collection"
resource.values.name
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "opensearchserverless"
resource.values.opensearchserverless_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.opensearchserverless_configuration[_].role_arn
role.expressions.opensearchserverless_configuration[_].collection_endpoint
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_opensearchserverless_collection
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless","name":"firehose_opensearch_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_opensearch_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_opensearch_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearchserverless","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[{"buffering_interval":300,"buffering_size":5,"index_name":"test","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"vpc_config":[]}],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"name":"example","region":"us-east-1","tags":null,"tags_all":{},"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"name":"example","policy":"{\"AWSOwnedKey\":true,\"Rules\":[{\"Resource\":[\"collection/example\"],\"ResourceType\":\"collection\"}]}","region":"us-east-1","type":"encryption"},"sensitive_values":{}},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysixth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless","name":"firehose_opensearch_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_opensearch_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_opensearch_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearchserverless","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[{"buffering_interval":300,"buffering_size":5,"index_name":"test","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"vpc_config":[]}],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":true,"collection_endpoint":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[]}],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"example","region":"us-east-1","tags":null,"tags_all":{},"timeouts":null},"after_unknown":{"arn":true,"collection_endpoint":true,"dashboard_endpoint":true,"id":true,"kms_key_arn":true,"standby_replicas":true,"tags_all":{},"type":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"example","policy":"{\"AWSOwnedKey\":true,\"Rules\":[{\"Resource\":[\"collection/example\"],\"ResourceType\":\"collection\"}]}","region":"us-east-1","type":"encryption"},"after_unknown":{"id":true,"policy_version":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysixth","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_caller_identity.current","mode":"data","type":"aws_caller_identity","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"account_id":"536697244362","arn":"arn:aws:iam::536697244362:user/ec2-user","id":"536697244362","user_id":"AIDAXZ5NGBLFCHNECOU5B"},"sensitive_values":{}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and OpenSearch Serverless"},"name":{"constant_value":"firehose_opensearch_s3_policy"},"policy":{"references":["aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth","aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth","data.aws_region.current.name","data.aws_region.current","data.aws_caller_identity.current.account_id","data.aws_caller_identity.current","aws_opensearchserverless_collection.test_collection.name","aws_opensearchserverless_collection.test_collection"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_opensearch_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_policy.arn","aws_iam_policy.firehose_policy"]},"role":{"references":["aws_iam_role.firehose_role.name","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearchserverless"},"name":{"constant_value":"terraform-kinesis-firehose-test-stream"},"opensearchserverless_configuration":[{"collection_endpoint":{"references":["aws_opensearchserverless_collection.test_collection.collection_endpoint","aws_opensearchserverless_collection.test_collection"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysixth.arn","aws_s3_bucket.januarysixth"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}]}]},"schema_version":1},{"address":"aws_opensearchserverless_collection.test_collection","mode":"managed","type":"aws_opensearchserverless_collection","name":"test_collection","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"}},"schema_version":0,"depends_on":["aws_opensearchserverless_security_policy.example"]},{"address":"aws_opensearchserverless_security_policy.example","mode":"managed","type":"aws_opensearchserverless_security_policy","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"policy":{},"type":{"constant_value":"encryption"}},"schema_version":0},{"address":"aws_s3_bucket.januarysixth","mode":"managed","type":"aws_s3_bucket","name":"januarysixth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysixth"}},"schema_version":0},{"address":"data.aws_caller_identity.current","mode":"data","type":"aws_caller_identity","name":"current","provider_config_key":"aws","schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_policy.firehose_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_opensearchserverless_collection.test_collection","attribute":["collection_endpoint"]},{"resource":"data.aws_caller_identity.current","attribute":["account_id"]},{"resource":"data.aws_region.current","attribute":["name"]},{"resource":"aws_s3_bucket.januarysixth","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["name"]},{"resource":"aws_opensearchserverless_collection.test_collection","attribute":["name"]}],"timestamp":"2026-02-18T20:52:47Z","applyable":true,"complete":true,"errored":false}
|
44 | We need a way to collect a steady stream of app events, move them reliably into our search and analytics system, and keep everything running inside our private network for security. | Generate a Kinesis Firehose Delivery Stream with a Elasticsearch Destination With VPC | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_elasticsearch_domain" resource, one "aws_vpc" resource, two "aws_subnet" resources, one "aws_security_group," and one "aws_kinesis_firehose_delivery_stream" resource with a "vpc_config" block within the "elasticsearch_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "bucket" {
bucket_prefix = "my-bucket-"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
# Subnets
resource "aws_subnet" "first" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "second" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[1]
}
resource "aws_internet_gateway" "main" {
vpc_id = aws_vpc.main.id
}
resource "aws_route_table" "main" {
vpc_id = aws_vpc.main.id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.main.id
}
}
resource "aws_route_table_association" "first" {
subnet_id = aws_subnet.first.id
route_table_id = aws_route_table.main.id
}
resource "aws_route_table_association" "second" {
subnet_id = aws_subnet.second.id
route_table_id = aws_route_table.main.id
}
resource "aws_security_group" "first" {
name = "test-security-group"
description = "Allow traffic for Elasticsearch"
vpc_id = aws_vpc.main.id
}
resource "aws_vpc_security_group_ingress_rule" "ingress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 80
ip_protocol = "tcp"
to_port = 80
}
resource "aws_vpc_security_group_ingress_rule" "ingress2" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 443
ip_protocol = "tcp"
to_port = 443
}
resource "aws_vpc_security_group_ingress_rule" "ingress3" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 9200
ip_protocol = "tcp"
to_port = 9200
}
resource "aws_vpc_security_group_egress_rule" "egress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
ip_protocol = "-1"
}
resource "aws_elasticsearch_domain" "test_cluster" {
domain_name = "es-test"
cluster_config {
instance_count = 2
zone_awareness_enabled = true
instance_type = "t2.small.elasticsearch"
}
ebs_options {
ebs_enabled = true
volume_size = 10
}
vpc_options {
security_group_ids = [aws_security_group.first.id]
subnet_ids = [aws_subnet.first.id, aws_subnet.second.id]
}
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
data "aws_iam_policy_document" "firehose-elasticsearch" {
statement {
effect = "Allow"
actions = ["es:*"]
resources = [
aws_elasticsearch_domain.test_cluster.arn,
"${aws_elasticsearch_domain.test_cluster.arn}/*",
]
}
statement {
effect = "Allow"
actions = [
"ec2:DescribeVpcs",
"ec2:DescribeVpcAttribute",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkInterfaces",
"ec2:CreateNetworkInterface",
"ec2:CreateNetworkInterfacePermission",
"ec2:DeleteNetworkInterface",
]
resources = ["*"]
}
}
resource "aws_iam_role_policy" "firehose-elasticsearch" {
name = "elasticsearch"
role = aws_iam_role.firehose_role.id
policy = data.aws_iam_policy_document.firehose-elasticsearch.json
}
resource "aws_kinesis_firehose_delivery_stream" "test" {
depends_on = [aws_iam_role_policy.firehose-elasticsearch]
name = "terraform-kinesis-firehose-es"
destination = "elasticsearch"
elasticsearch_configuration {
domain_arn = aws_elasticsearch_domain.test_cluster.arn
role_arn = aws_iam_role.firehose_role.arn
index_name = "test"
type_name = "test"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.bucket.arn
}
vpc_config {
subnet_ids = [aws_subnet.first.id, aws_subnet.second.id]
security_group_ids = [aws_security_group.first.id]
role_arn = aws_iam_role.firehose_role.arn
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_elasticsearch_cluster {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_elasticsearch_domain"
resource.values.domain_name
resource.values.vpc_options
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "elasticsearch"
resource.values.elasticsearch_configuration[_].s3_configuration
resource.values.elasticsearch_configuration[_].vpc_config
role := input.configuration.root_module.resources[i]
role.expressions.elasticsearch_configuration[_].role_arn
role.expressions.elasticsearch_configuration[_].domain_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_elasticsearch_cluster
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"elasticsearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[{}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"sensitive_values":{"tags_all":{}}},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null},{"actions":["ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface","ec2:DescribeNetworkInterfaces","ec2:DescribeSecurityGroups","ec2:DescribeSubnets","ec2:DescribeVpcAttribute","ec2:DescribeVpcs"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":["*"],"sid":null}],"version":null},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}}]}},"resource_changes":[{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{"override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["es:*"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":[null,null],"sid":null},{"actions":["ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface","ec2:DescribeNetworkInterfaces","ec2:DescribeSecurityGroups","ec2:DescribeSubnets","ec2:DescribeVpcAttribute","ec2:DescribeVpcs"],"condition":[],"effect":"Allow","not_actions":null,"not_principals":[],"not_resources":null,"principals":[],"resources":["*"],"sid":null}],"version":null},"after_unknown":{"id":true,"json":true,"minified_json":true,"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[true,true]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]},"before_sensitive":false,"after_sensitive":{"statement":[{"actions":[false],"condition":[],"not_principals":[],"principals":[],"resources":[false,false]},{"actions":[false,false,false,false,false,false,false,false],"condition":[],"not_principals":[],"principals":[],"resources":[false]}]}},"action_reason":"read_because_config_unknown"},{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"t2.small.elasticsearch","warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"elasticsearch_version":"1.5","log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"id":true,"kibana_endpoint":true,"log_publishing_options":[],"node_to_node_encryption":true,"snapshot_options":[],"tags_all":true,"vpc_options":[{"availability_zones":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"log_publishing_options":[],"node_to_node_encryption":[],"snapshot_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}}},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"elasticsearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"elasticsearch","elasticsearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":"test","vpc_config":[{}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-es","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[{"cloudwatch_logging_options":true,"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[{"role_arn":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[{"cloudwatch_logging_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticsearch_domain.test_cluster","mode":"managed","type":"aws_elasticsearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"t2.small.elasticsearch"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}],"vpc_options":[{"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]},"schema_version":0},{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-elasticsearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"elasticsearch"},"policy":{"references":["data.aws_iam_policy_document.firehose-elasticsearch.json","data.aws_iam_policy_document.firehose-elasticsearch"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"elasticsearch"},"elasticsearch_configuration":[{"domain_arn":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.bucket.arn","aws_s3_bucket.bucket"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"type_name":{"constant_value":"test"},"vpc_config":[{"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]}],"name":{"constant_value":"terraform-kinesis-firehose-es"}},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-elasticsearch"]},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.first.id","aws_subnet.first"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.second.id","aws_subnet.second"]}},"schema_version":0},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"my-bucket-"}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":80},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":80}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":443},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":443}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":9200},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":9200}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose-elasticsearch","mode":"data","type":"aws_iam_policy_document","name":"firehose-elasticsearch","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["es:*"]},"effect":{"constant_value":"Allow"},"resources":{"references":["aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster","aws_elasticsearch_domain.test_cluster.arn","aws_elasticsearch_domain.test_cluster"]}},{"actions":{"constant_value":["ec2:DescribeVpcs","ec2:DescribeVpcAttribute","ec2:DescribeSubnets","ec2:DescribeSecurityGroups","ec2:DescribeNetworkInterfaces","ec2:CreateNetworkInterface","ec2:CreateNetworkInterfacePermission","ec2:DeleteNetworkInterface"]},"effect":{"constant_value":"Allow"},"resources":{"constant_value":["*"]}}]},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]},{"resource":"aws_s3_bucket.bucket","attribute":["arn"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_subnet.first","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose-elasticsearch","attribute":["json"]},{"resource":"aws_elasticsearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_subnet.second","attribute":["id"]},{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]}],"timestamp":"2026-02-18T20:53:07Z","applyable":true,"complete":true,"errored":false}
|
45 | We need a way to send our app’s event data to an external monitoring service in near real‑time, with a fallback so nothing gets lost if the service slows down or goes offline. | Generate a Kinesis Firehose Delivery Stream with a HTTP Endpoint (e.g., New Relic) Destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "http_endpoint_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "firehose_role2" {
name = "firehose_http_s3_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Principal = {
Service = "firehose.amazonaws.com"
},
Action = "sts:AssumeRole"
}
]
})
}
resource "aws_iam_policy" "firehose_http_s3_policy" {
name = "firehose_http_s3_policy"
description = "Policy for Kinesis Firehose to access S3 and HTTP endpoint"
policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Effect = "Allow",
Action = [
"s3:PutObject",
"s3:PutObjectAcl",
"s3:GetBucketLocation",
"s3:ListBucket",
"s3:GetObject"
],
Resource = [
aws_s3_bucket.januaryeleventh.arn,
"${aws_s3_bucket.januaryeleventh.arn}/*"
]
},
{
Effect = "Allow",
Action = [
"firehose:PutRecord",
"firehose:PutRecordBatch"
],
Resource = "*"
},
{
Effect = "Allow",
Action = [
"firehose:DescribeDeliveryStream",
"firehose:ListDeliveryStreams",
"firehose:DescribeDestinations",
"firehose:DescribeHttpEndpointDestination",
"firehose:UpdateDestination"
],
Resource = "*"
}
]
})
}
resource "aws_iam_role_policy_attachment" "firehose_http_s3_policy_attach" {
role = aws_iam_role.firehose_role2.name
policy_arn = aws_iam_policy.firehose_http_s3_policy.arn
}
resource "aws_s3_bucket" "januaryeleventh" {
bucket = "januaryeleventh"
}
resource "aws_kinesis_firehose_delivery_stream" "test_stream" {
name = "terraform-kinesis-firehose-test-stream"
destination = "http_endpoint"
http_endpoint_configuration {
url = "https://aws-api.newrelic.com/firehose/v1"
name = "New Relic"
access_key = "my-key"
buffering_size = 15
buffering_interval = 600
role_arn = aws_iam_role.firehose_role2.arn
s3_backup_mode = "FailedDataOnly"
s3_configuration {
role_arn = aws_iam_role.firehose_role2.arn
bucket_arn = aws_s3_bucket.januaryeleventh.arn
buffering_size = 10
buffering_interval = 400
compression_format = "GZIP"
}
request_configuration {
content_encoding = "GZIP"
common_attributes {
name = "testname"
value = "testvalue"
}
common_attributes {
name = "testname2"
value = "testvalue2"
}
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "http_endpoint"
resource.values.http_endpoint_configuration[_]
resource.values.http_endpoint_configuration[_].s3_configuration
role := input.configuration.root_module.resources[i]
role.expressions.http_endpoint_configuration[_].role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and HTTP endpoint","name":"firehose_http_s3_policy","path":"/","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"arn":null}},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_http_s3_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"role":"firehose_http_s3_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"http_endpoint","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":"my-key","buffering_interval":600,"buffering_size":15,"name":"New Relic","processing_configuration":[],"request_configuration":[{"common_attributes":[{"name":"testname","value":"testvalue"},{"name":"testname2","value":"testvalue2"}],"content_encoding":"GZIP"}],"retry_duration":300,"s3_backup_mode":"FailedDataOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"url":"https://aws-api.newrelic.com/firehose/v1"}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":true,"cloudwatch_logging_options":[],"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januaryeleventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"delay_after_policy_creation_in_ms":null,"description":"Policy for Kinesis Firehose to access S3 and HTTP endpoint","name":"firehose_http_s3_policy","path":"/","tags":null},"after_unknown":{"arn":true,"attachment_count":true,"id":true,"name_prefix":true,"policy":true,"policy_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"arn":null}}},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_http_s3_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"role":"firehose_http_s3_role"},"after_unknown":{"id":true,"policy_arn":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"http_endpoint","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":"my-key","buffering_interval":600,"buffering_size":15,"name":"New Relic","processing_configuration":[],"request_configuration":[{"common_attributes":[{"name":"testname","value":"testvalue"},{"name":"testname2","value":"testvalue2"}],"content_encoding":"GZIP"}],"retry_duration":300,"s3_backup_mode":"FailedDataOnly","s3_configuration":[{"buffering_interval":400,"buffering_size":10,"compression_format":"GZIP","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"url":"https://aws-api.newrelic.com/firehose/v1"}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"cloudwatch_logging_options":true,"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"secrets_manager_configuration":true}],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[{"access_key":true,"cloudwatch_logging_options":[],"processing_configuration":[],"request_configuration":[{"common_attributes":[{},{}]}],"s3_configuration":[{"cloudwatch_logging_options":[]}],"secrets_manager_configuration":[]}],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januaryeleventh","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_policy.firehose_http_s3_policy","mode":"managed","type":"aws_iam_policy","name":"firehose_http_s3_policy","provider_config_key":"aws","expressions":{"description":{"constant_value":"Policy for Kinesis Firehose to access S3 and HTTP endpoint"},"name":{"constant_value":"firehose_http_s3_policy"},"policy":{"references":["aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh","aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh"]}},"schema_version":0},{"address":"aws_iam_role.firehose_role2","mode":"managed","type":"aws_iam_role","name":"firehose_role2","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"firehose_http_s3_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.firehose_http_s3_policy_attach","mode":"managed","type":"aws_iam_role_policy_attachment","name":"firehose_http_s3_policy_attach","provider_config_key":"aws","expressions":{"policy_arn":{"references":["aws_iam_policy.firehose_http_s3_policy.arn","aws_iam_policy.firehose_http_s3_policy"]},"role":{"references":["aws_iam_role.firehose_role2.name","aws_iam_role.firehose_role2"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"http_endpoint"},"http_endpoint_configuration":[{"access_key":{"constant_value":"my-key"},"buffering_interval":{"constant_value":600},"buffering_size":{"constant_value":15},"name":{"constant_value":"New Relic"},"request_configuration":[{"common_attributes":[{"name":{"constant_value":"testname"},"value":{"constant_value":"testvalue"}},{"name":{"constant_value":"testname2"},"value":{"constant_value":"testvalue2"}}],"content_encoding":{"constant_value":"GZIP"}}],"role_arn":{"references":["aws_iam_role.firehose_role2.arn","aws_iam_role.firehose_role2"]},"s3_backup_mode":{"constant_value":"FailedDataOnly"},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januaryeleventh.arn","aws_s3_bucket.januaryeleventh"]},"buffering_interval":{"constant_value":400},"buffering_size":{"constant_value":10},"compression_format":{"constant_value":"GZIP"},"role_arn":{"references":["aws_iam_role.firehose_role2.arn","aws_iam_role.firehose_role2"]}}],"url":{"constant_value":"https://aws-api.newrelic.com/firehose/v1"}}],"name":{"constant_value":"terraform-kinesis-firehose-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.januaryeleventh","mode":"managed","type":"aws_s3_bucket","name":"januaryeleventh","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januaryeleventh"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_policy.firehose_http_s3_policy","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role2","attribute":["name"]},{"resource":"aws_iam_role.firehose_role2","attribute":["arn"]},{"resource":"aws_s3_bucket.januaryeleventh","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:21Z","applyable":true,"complete":true,"errored":false}
|
46 | We need a way to move our app’s streaming data into our search and analytics tool in near real time, and the whole thing has to run inside our private network for security. | Generate a Kinesis Firehose Delivery Stream with OpenSearch Destination With VPC | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, one "aws_opensearch_domain" resource, one "aws_vpc" resource, two "aws_subnet" resources, one "aws_security_group," and one "aws_kinesis_firehose_delivery_stream" resource with a "vpc_config" block within the "opensearch_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "bucket" {
bucket_prefix = "my-bucket-"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
# Subnets
resource "aws_subnet" "first" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "second" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[1]
}
resource "aws_internet_gateway" "main" {
vpc_id = aws_vpc.main.id
}
resource "aws_route_table" "main" {
vpc_id = aws_vpc.main.id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.main.id
}
}
resource "aws_route_table_association" "first" {
subnet_id = aws_subnet.first.id
route_table_id = aws_route_table.main.id
}
resource "aws_route_table_association" "second" {
subnet_id = aws_subnet.second.id
route_table_id = aws_route_table.main.id
}
resource "aws_security_group" "first" {
name = "test-security-group"
description = "Allow traffic for Elasticsearch"
vpc_id = aws_vpc.main.id
}
resource "aws_vpc_security_group_ingress_rule" "ingress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 80
ip_protocol = "tcp"
to_port = 80
}
resource "aws_vpc_security_group_ingress_rule" "ingress2" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 443
ip_protocol = "tcp"
to_port = 443
}
resource "aws_vpc_security_group_ingress_rule" "ingress3" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
from_port = 9200
ip_protocol = "tcp"
to_port = 9200
}
resource "aws_vpc_security_group_egress_rule" "egress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
ip_protocol = "-1"
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
resource "aws_iam_role_policy" "firehose-opensearch" {
name = "opensearch"
role = aws_iam_role.firehose_role.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"es:*"
],
"Resource": [
"${aws_opensearch_domain.test_cluster.arn}",
"${aws_opensearch_domain.test_cluster.arn}/*"
]
},
{
"Effect": "Allow",
"Action": [
"ec2:DescribeVpcs",
"ec2:DescribeVpcAttribute",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkInterfaces",
"ec2:CreateNetworkInterface",
"ec2:CreateNetworkInterfacePermission",
"ec2:DeleteNetworkInterface"
],
"Resource": [
"*"
]
}
]
}
EOF
}
resource "aws_opensearch_domain" "test_cluster" {
domain_name = "es-test"
cluster_config {
instance_count = 2
zone_awareness_enabled = true
instance_type = "m4.large.search"
}
ebs_options {
ebs_enabled = true
volume_size = 10
}
vpc_options {
security_group_ids = [aws_security_group.first.id]
subnet_ids = [aws_subnet.first.id, aws_subnet.second.id]
}
}
resource "aws_kinesis_firehose_delivery_stream" "test" {
depends_on = [aws_iam_role_policy.firehose-opensearch]
name = "terraform-kinesis-firehose-os"
destination = "opensearch"
opensearch_configuration {
domain_arn = aws_opensearch_domain.test_cluster.arn
role_arn = aws_iam_role.firehose_role.arn
index_name = "test"
s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.bucket.arn
}
vpc_config {
subnet_ids = [aws_subnet.first.id, aws_subnet.second.id]
security_group_ids = [aws_security_group.first.id]
role_arn = aws_iam_role.firehose_role.arn
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_opensearch_cluster {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_opensearch_domain"
resource.values.domain_name
resource.values.vpc_options
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "opensearch"
resource.values.opensearch_configuration[_].s3_configuration
resource.values.opensearch_configuration[_].vpc_config
role := input.configuration.root_module.resources[i]
role.expressions.opensearch_configuration[_].role_arn
role.expressions.opensearch_configuration[_].domain_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_opensearch_cluster
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"opensearch"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[{}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"sensitive_values":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"opensearch"},"after_unknown":{"id":true,"name_prefix":true,"policy":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"opensearch","elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-os","opensearch_configuration":[{"buffering_interval":300,"buffering_size":5,"cluster_endpoint":null,"document_id_options":[],"index_name":"test","index_rotation_period":"OneDay","processing_configuration":[],"retry_duration":300,"s3_backup_mode":"FailedDocumentsOnly","s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","error_output_prefix":null,"kms_key_arn":null,"prefix":null}],"type_name":null,"vpc_config":[{}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-east-1","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":true,"document_id_options":[],"domain_arn":true,"processing_configuration":[],"role_arn":true,"s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"role_arn":true}],"vpc_config":[{"role_arn":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[{"cloudwatch_logging_options":[],"document_id_options":[],"processing_configuration":[],"s3_configuration":[{"cloudwatch_logging_options":[]}],"vpc_config":[{"security_group_ids":[],"subnet_ids":[]}]}],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_config":[{"dedicated_master_count":null,"dedicated_master_enabled":false,"dedicated_master_type":null,"instance_count":2,"instance_type":"m4.large.search","multi_az_with_standby_enabled":null,"warm_count":null,"warm_enabled":null,"warm_type":null,"zone_awareness_config":[],"zone_awareness_enabled":true}],"cognito_options":[],"domain_name":"es-test","ebs_options":[{"ebs_enabled":true,"volume_size":10}],"identity_center_options":[],"log_publishing_options":[],"region":"us-east-1","snapshot_options":[],"tags":null,"timeouts":null,"vpc_options":[{}]},"after_unknown":{"access_policies":true,"advanced_options":true,"advanced_security_options":true,"aiml_options":true,"arn":true,"auto_tune_options":true,"cluster_config":[{"cold_storage_options":true,"node_options":true,"zone_awareness_config":[]}],"cognito_options":[],"dashboard_endpoint":true,"dashboard_endpoint_v2":true,"domain_endpoint_options":true,"domain_endpoint_v2_hosted_zone_id":true,"domain_id":true,"ebs_options":[{"iops":true,"throughput":true,"volume_type":true}],"encrypt_at_rest":true,"endpoint":true,"endpoint_v2":true,"engine_version":true,"id":true,"identity_center_options":[],"ip_address_type":true,"log_publishing_options":[],"node_to_node_encryption":true,"off_peak_window_options":true,"snapshot_options":[],"software_update_options":true,"tags_all":true,"vpc_options":[{"availability_zones":true,"security_group_ids":true,"subnet_ids":true,"vpc_id":true}]},"before_sensitive":false,"after_sensitive":{"advanced_options":{},"advanced_security_options":[],"aiml_options":[],"auto_tune_options":[],"cluster_config":[{"cold_storage_options":[],"node_options":[],"zone_awareness_config":[]}],"cognito_options":[],"domain_endpoint_options":[],"ebs_options":[{}],"encrypt_at_rest":[],"identity_center_options":[],"log_publishing_options":[],"node_to_node_encryption":[],"off_peak_window_options":[],"snapshot_options":[],"software_update_options":[],"tags_all":{},"vpc_options":[{"availability_zones":[],"security_group_ids":[],"subnet_ids":[]}]}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"my-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":80,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":80},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":443,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":443},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":9200,"ip_protocol":"tcp","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":9200},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_iam_role_policy.firehose-opensearch","mode":"managed","type":"aws_iam_role_policy","name":"firehose-opensearch","provider_config_key":"aws","expressions":{"name":{"constant_value":"opensearch"},"policy":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster","aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"role":{"references":["aws_iam_role.firehose_role.id","aws_iam_role.firehose_role"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.test","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"test","provider_config_key":"aws","expressions":{"destination":{"constant_value":"opensearch"},"name":{"constant_value":"terraform-kinesis-firehose-os"},"opensearch_configuration":[{"domain_arn":{"references":["aws_opensearch_domain.test_cluster.arn","aws_opensearch_domain.test_cluster"]},"index_name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.bucket.arn","aws_s3_bucket.bucket"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"vpc_config":[{"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]},"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]}]},"schema_version":1,"depends_on":["aws_iam_role_policy.firehose-opensearch"]},{"address":"aws_opensearch_domain.test_cluster","mode":"managed","type":"aws_opensearch_domain","name":"test_cluster","provider_config_key":"aws","expressions":{"cluster_config":[{"instance_count":{"constant_value":2},"instance_type":{"constant_value":"m4.large.search"},"zone_awareness_enabled":{"constant_value":true}}],"domain_name":{"constant_value":"es-test"},"ebs_options":[{"ebs_enabled":{"constant_value":true},"volume_size":{"constant_value":10}}],"vpc_options":[{"security_group_ids":{"references":["aws_security_group.first.id","aws_security_group.first"]},"subnet_ids":{"references":["aws_subnet.first.id","aws_subnet.first","aws_subnet.second.id","aws_subnet.second"]}}]},"schema_version":0},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.first.id","aws_subnet.first"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.second.id","aws_subnet.second"]}},"schema_version":0},{"address":"aws_s3_bucket.bucket","mode":"managed","type":"aws_s3_bucket","name":"bucket","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"my-bucket-"}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.first","mode":"managed","type":"aws_subnet","name":"first","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.second","mode":"managed","type":"aws_subnet","name":"second","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":80},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":80}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress2","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress2","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":443},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":443}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress3","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress3","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"from_port":{"constant_value":9200},"ip_protocol":{"constant_value":"tcp"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]},"to_port":{"constant_value":9200}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_iam_role.firehose_role","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]},{"resource":"aws_subnet.first","attribute":["id"]},{"resource":"aws_opensearch_domain.test_cluster","attribute":["arn"]},{"resource":"aws_subnet.second","attribute":["id"]},{"resource":"aws_s3_bucket.bucket","attribute":["arn"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:53:13Z","applyable":true,"complete":true,"errored":false}
|
47 | I need a simple place where I can send live video feeds so they can be stored briefly and accessed by whatever needs to process them. | Generate a basic Kinesis Video Stream resource | Has one "aws_kinesis_video_stream" resource | provider "aws" {
region = "us-east-1"
}
resource "aws_kinesis_video_stream" "default" {
name = "terraform-kinesis-video-stream"
data_retention_in_hours = 1
device_name = "kinesis-video-device-name"
media_type = "video/h264"
tags = {
Name = "terraform-kinesis-video-stream"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_kinesis_video_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_video_stream"
resource.values.name
}
has_valid_resources {
has_valid_kinesis_video_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"data_retention_in_hours":1,"device_name":"kinesis-video-device-name","media_type":"video/h264","name":"terraform-kinesis-video-stream","region":"us-east-1","tags":{"Name":"terraform-kinesis-video-stream"},"tags_all":{"Name":"terraform-kinesis-video-stream"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"data_retention_in_hours":1,"device_name":"kinesis-video-device-name","media_type":"video/h264","name":"terraform-kinesis-video-stream","region":"us-east-1","tags":{"Name":"terraform-kinesis-video-stream"},"tags_all":{"Name":"terraform-kinesis-video-stream"},"timeouts":null},"after_unknown":{"arn":true,"creation_time":true,"id":true,"kms_key_id":true,"tags":{},"tags_all":{},"version":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_kinesis_video_stream.default","mode":"managed","type":"aws_kinesis_video_stream","name":"default","provider_config_key":"aws","expressions":{"data_retention_in_hours":{"constant_value":1},"device_name":{"constant_value":"kinesis-video-device-name"},"media_type":{"constant_value":"video/h264"},"name":{"constant_value":"terraform-kinesis-video-stream"},"tags":{"constant_value":{"Name":"terraform-kinesis-video-stream"}}},"schema_version":0}]}},"timestamp":"2026-02-18T20:53:21Z","applyable":true,"complete":true,"errored":false}
|
48 | I need a way for one of our background services to reliably tap into a stream of incoming events so it can process them in real time without missing anything. | Generate a resource to manage a Kinesis Stream Consumer | Has one "aws_kinesis_stream" resource and one "aws_kinesis_stream_consumer" resource | provider "aws" {
region = "us-west-2"
}
resource "aws_kinesis_stream" "example" {
name = "example-stream"
shard_count = 1
}
resource "aws_kinesis_stream_consumer" "example" {
name = "example-consumer"
stream_arn = aws_kinesis_stream.example.arn
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_kinesis_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_stream"
resource.values.name
}
has_valid_kinesis_stream_consumer {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_stream_consumer"
resource.values.name
role := input.configuration.root_module.resources[i]
role.expressions.stream_arn
}
has_valid_resources {
has_valid_kinesis_stream
has_valid_kinesis_stream_consumer
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"example-stream","region":"us-west-2","retention_period":24,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"sensitive_values":{"stream_mode_details":[],"tags_all":{}}},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"example-consumer","region":"us-west-2","tags":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"encryption_type":"NONE","enforce_consumer_deletion":false,"kms_key_id":null,"name":"example-stream","region":"us-west-2","retention_period":24,"shard_count":1,"shard_level_metrics":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"max_record_size_in_kib":true,"stream_mode_details":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"stream_mode_details":[],"tags_all":{}}}},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"example-consumer","region":"us-west-2","tags":null},"after_unknown":{"arn":true,"creation_timestamp":true,"id":true,"stream_arn":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_stream.example","mode":"managed","type":"aws_kinesis_stream","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-stream"},"shard_count":{"constant_value":1}},"schema_version":1},{"address":"aws_kinesis_stream_consumer.example","mode":"managed","type":"aws_kinesis_stream_consumer","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-consumer"},"stream_arn":{"references":["aws_kinesis_stream.example.arn","aws_kinesis_stream.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_kinesis_stream.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:25Z","applyable":true,"complete":true,"errored":false}
|
49 | We need a way to funnel high‑volume app data into long‑term storage automatically, with something that can smooth out traffic spikes and keep things reliable without much manual work. | Generate a Kinesis Firehose Delivery Stream with an extended S3 Destination | Has one "aws_iam_role" resource, one "aws_s3_bucket" resource, and one "aws_kinesis_firehose_delivery_stream" resource with an "extended_s3_configuration" block
| provider "aws" {
region = "us-west-2"
}
resource "aws_s3_bucket" "januarysixteenth" {
bucket = "januarysixteenth"
}
data "aws_iam_policy_document" "firehose_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "firehose_role" {
name = "firehose_test_role"
assume_role_policy = data.aws_iam_policy_document.firehose_assume_role.json
}
resource "aws_kinesis_firehose_delivery_stream" "extended_s3_stream" {
name = "terraform-kinesis-firehose-extended-s3-test-stream"
destination = "extended_s3"
extended_s3_configuration {
role_arn = aws_iam_role.firehose_role.arn
bucket_arn = aws_s3_bucket.januarysixteenth.arn
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"firehose.amazonaws.com")
}
has_valid_bucket {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket"
}
has_valid_firehose_delivery_stream {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_firehose_delivery_stream"
resource.values.name
resource.values.destination == "extended_s3"
resource.values.extended_s3_configuration[_]
role := input.configuration.root_module.resources[i]
role.expressions.extended_s3_configuration[_].role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_bucket
has_valid_firehose_delivery_stream
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"error_output_prefix":null,"file_extension":null,"kms_key_arn":null,"prefix":null,"processing_configuration":[],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"sensitive_values":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"januarysixteenth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"firehose_test_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"destination":"extended_s3","elasticsearch_configuration":[],"extended_s3_configuration":[{"buffering_interval":300,"buffering_size":5,"compression_format":"UNCOMPRESSED","custom_time_zone":"UTC","data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"error_output_prefix":null,"file_extension":null,"kms_key_arn":null,"prefix":null,"processing_configuration":[],"s3_backup_configuration":[],"s3_backup_mode":"Disabled"}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"name":"terraform-kinesis-firehose-extended-s3-test-stream","opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"region":"us-west-2","server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"destination_id":true,"elasticsearch_configuration":[],"extended_s3_configuration":[{"bucket_arn":true,"cloudwatch_logging_options":true,"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"role_arn":true,"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"id":true,"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"elasticsearch_configuration":[],"extended_s3_configuration":[{"cloudwatch_logging_options":[],"data_format_conversion_configuration":[],"dynamic_partitioning_configuration":[],"processing_configuration":[],"s3_backup_configuration":[]}],"http_endpoint_configuration":[],"iceberg_configuration":[],"kinesis_source_configuration":[],"msk_source_configuration":[],"opensearch_configuration":[],"opensearchserverless_configuration":[],"redshift_configuration":[],"server_side_encryption":[],"snowflake_configuration":[],"splunk_configuration":[],"tags_all":{}}}},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"januarysixteenth","force_destroy":false,"region":"us-west-2","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"414810265","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["firehose.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.firehose_role","mode":"managed","type":"aws_iam_role","name":"firehose_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.firehose_assume_role.json","data.aws_iam_policy_document.firehose_assume_role"]},"name":{"constant_value":"firehose_test_role"}},"schema_version":0},{"address":"aws_kinesis_firehose_delivery_stream.extended_s3_stream","mode":"managed","type":"aws_kinesis_firehose_delivery_stream","name":"extended_s3_stream","provider_config_key":"aws","expressions":{"destination":{"constant_value":"extended_s3"},"extended_s3_configuration":[{"bucket_arn":{"references":["aws_s3_bucket.januarysixteenth.arn","aws_s3_bucket.januarysixteenth"]},"role_arn":{"references":["aws_iam_role.firehose_role.arn","aws_iam_role.firehose_role"]}}],"name":{"constant_value":"terraform-kinesis-firehose-extended-s3-test-stream"}},"schema_version":1},{"address":"aws_s3_bucket.januarysixteenth","mode":"managed","type":"aws_s3_bucket","name":"januarysixteenth","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"januarysixteenth"}},"schema_version":0},{"address":"data.aws_iam_policy_document.firehose_assume_role","mode":"data","type":"aws_iam_policy_document","name":"firehose_assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["firehose.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.firehose_assume_role","attribute":["json"]},{"resource":"aws_iam_role.firehose_role","attribute":["arn"]},{"resource":"aws_s3_bucket.januarysixteenth","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:30Z","applyable":true,"complete":true,"errored":false}
|
50 | I need a simple way to analyze streaming data as it comes in, nothing fancy, just enough to get something running quickly. | Generate a basic Amazon Kinesis Analytics Application | Has one "aws_kinesis_analytics_application" resource | provider "aws" {
region = "us-west-2"
}
resource "aws_kinesis_analytics_application" "test_application" {
name = "kinesis-analytics-application-test"
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_kinesis_analytics_application {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesis_analytics_application"
resource.values.name
}
has_valid_resources {
has_valid_kinesis_analytics_application
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-west-2","start_application":null,"tags":null},"sensitive_values":{"cloudwatch_logging_options":[],"inputs":[],"outputs":[],"reference_data_sources":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"code":null,"description":null,"inputs":[],"name":"kinesis-analytics-application-test","outputs":[],"reference_data_sources":[],"region":"us-west-2","start_application":null,"tags":null},"after_unknown":{"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"inputs":[],"last_update_timestamp":true,"outputs":[],"reference_data_sources":[],"status":true,"tags_all":true,"version":true},"before_sensitive":false,"after_sensitive":{"cloudwatch_logging_options":[],"inputs":[],"outputs":[],"reference_data_sources":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_kinesis_analytics_application.test_application","mode":"managed","type":"aws_kinesis_analytics_application","name":"test_application","provider_config_key":"aws","expressions":{"name":{"constant_value":"kinesis-analytics-application-test"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:53:43Z","applyable":true,"complete":true,"errored":false}
|
51 | I need a small setup that can run some ongoing data queries for me, without requiring much maintenance and able to scale as needed. | Generate a basic Amazon Kinesis V2 Analytics Application to manage a SQL application | Has one "aws_iam_role" resource, and one "aws_kinesisanalyticsv2_application" with argument runtime_environment == "SQL-1_0" | provider "aws" {
region = "us-west-2"
}
data "aws_iam_policy_document" "KinesisAssume" {
statement {
effect = "Allow"
actions = ["sts:AssumeRole"]
principals {
type = "Service"
identifiers = ["kinesisanalytics.amazonaws.com"]
}
}
}
resource "aws_iam_role" "kinesis_role" {
name = "kinesis_role"
assume_role_policy = data.aws_iam_policy_document.KinesisAssume.json
}
resource "aws_kinesisanalyticsv2_application" "flink_app" {
name = "example-application1"
runtime_environment = "SQL-1_0"
service_execution_role = aws_iam_role.kinesis_role.arn
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kinesisanalytics.amazonaws.com")
}
has_valid_kinesisanalyticsv2_application {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kinesisanalyticsv2_application"
resource.values.name
resource.values.runtime_environment == "SQL-1_0"
role := input.configuration.root_module.resources[i]
role.expressions.service_execution_role
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kinesisanalyticsv2_application
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"SQL-1_0","start_application":null,"tags":null,"timeouts":null},"sensitive_values":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"kinesis_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cloudwatch_logging_options":[],"description":null,"force_stop":null,"name":"example-application1","region":"us-west-2","runtime_environment":"SQL-1_0","start_application":null,"tags":null,"timeouts":null},"after_unknown":{"application_configuration":true,"application_mode":true,"arn":true,"cloudwatch_logging_options":[],"create_timestamp":true,"id":true,"last_update_timestamp":true,"service_execution_role":true,"status":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"application_configuration":[],"cloudwatch_logging_options":[],"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"28356347","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kinesisanalytics.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"kinesisanalytics.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["kinesisanalytics.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-2"}}}},"root_module":{"resources":[{"address":"aws_iam_role.kinesis_role","mode":"managed","type":"aws_iam_role","name":"kinesis_role","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.KinesisAssume.json","data.aws_iam_policy_document.KinesisAssume"]},"name":{"constant_value":"kinesis_role"}},"schema_version":0},{"address":"aws_kinesisanalyticsv2_application.flink_app","mode":"managed","type":"aws_kinesisanalyticsv2_application","name":"flink_app","provider_config_key":"aws","expressions":{"name":{"constant_value":"example-application1"},"runtime_environment":{"constant_value":"SQL-1_0"},"service_execution_role":{"references":["aws_iam_role.kinesis_role.arn","aws_iam_role.kinesis_role"]}},"schema_version":0},{"address":"data.aws_iam_policy_document.KinesisAssume","mode":"data","type":"aws_iam_policy_document","name":"KinesisAssume","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["kinesisanalytics.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_iam_policy_document.KinesisAssume","attribute":["json"]},{"resource":"aws_iam_role.kinesis_role","attribute":["arn"]}],"timestamp":"2026-02-18T20:53:47Z","applyable":true,"complete":true,"errored":false}
|
52 | I need to pull information from a site our system can’t reach directly, and it should grab the content automatically on a regular basis while going through our own network path for security. | Generate a Kendra data source resource with a proxy configuration | Has one "aws_iam_role" resource, one "aws_kendra_index" resource, and one "aws_kendra_data_source" resource with a "proxy_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "role" {
name = "Kendra-Role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "kendra.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
EOF
}
resource "aws_iam_role_policy" "policy" {
name = "Kendra-Policy"
role = aws_iam_role.role.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket"
],
"Resource": "*"
}
]
}
EOF
}
resource "aws_kendra_index" "example" {
name = "example"
description = "example"
edition = "DEVELOPER_EDITION"
role_arn = aws_iam_role.role.arn
}
resource "aws_kendra_data_source" "example" {
index_id = aws_kendra_index.example.id
name = "example"
type = "WEBCRAWLER"
role_arn = aws_iam_role.role.arn
configuration {
web_crawler_configuration {
proxy_configuration {
host = "a.example.com"
port = "443"
}
urls {
seed_url_configuration {
seed_urls = [
"https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"
]
}
}
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com")
}
has_valid_kendra_index {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_index"
resource.values.name
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
}
has_valid_kendra_data_source{
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_data_source"
resource.values.name
resource.values.type
resource.values.configuration[_].web_crawler_configuration[_].proxy_configuration
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
role.expressions.index_id
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kendra_index
has_valid_kendra_data_source
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[{"credentials":null,"host":"a.example.com","port":443}],"url_exclusion_patterns":null,"url_inclusion_patterns":null,"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"sensitive_values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[{"credentials":null,"host":"a.example.com","port":443}],"url_exclusion_patterns":null,"url_inclusion_patterns":null,"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"after_unknown":{"arn":true,"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"created_at":true,"custom_document_enrichment_configuration":[],"data_source_id":true,"error_message":true,"id":true,"index_id":true,"language_code":true,"role_arn":true,"status":true,"tags_all":true,"updated_at":true},"before_sensitive":false,"after_sensitive":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[{}],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_config_key":"aws","expressions":{"configuration":[{"web_crawler_configuration":[{"proxy_configuration":[{"host":{"constant_value":"a.example.com"},"port":{"constant_value":"443"}}],"urls":[{"seed_url_configuration":[{"seed_urls":{"constant_value":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"]}}]}]}]}],"index_id":{"references":["aws_kendra_index.example.id","aws_kendra_index.example"]},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"type":{"constant_value":"WEBCRAWLER"}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"description":{"constant_value":"example"},"edition":{"constant_value":"DEVELOPER_EDITION"},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]},{"resource":"aws_kendra_index.example","attribute":["id"]}],"timestamp":"2026-02-18T20:53:49Z","applyable":true,"complete":true,"errored":false}
|
53 | I need a system that can scan information from a site we point it to, but only pay attention to certain parts of it while ignoring others, and it should be easy to control what gets included or skipped. | Generate a Kendra data source resource With URL Exclusion and Inclusion Patterns | Has one "aws_iam_role" resource, one "aws_kendra_index" resource, and one "aws_kendra_data_source" resource with "url_exclusion_patterns" and "url_inclusion_patterns" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "role" {
name = "Kendra-Role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "kendra.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
EOF
}
resource "aws_iam_role_policy" "policy" {
name = "Kendra-Policy"
role = aws_iam_role.role.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket"
],
"Resource": "*"
}
]
}
EOF
}
resource "aws_kendra_index" "example" {
name = "example"
description = "example"
edition = "DEVELOPER_EDITION"
role_arn = aws_iam_role.role.arn
}
resource "aws_kendra_data_source" "example" {
index_id = aws_kendra_index.example.id
name = "example"
type = "WEBCRAWLER"
role_arn = aws_iam_role.role.arn
configuration {
web_crawler_configuration {
url_exclusion_patterns = ["example"]
url_inclusion_patterns = ["hello"]
urls {
seed_url_configuration {
seed_urls = [
"https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"
]
}
}
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com")
}
has_valid_kendra_index {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_index"
resource.values.name
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
}
has_valid_kendra_data_source{
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_data_source"
resource.values.name
resource.values.type
resource.values.configuration[_].web_crawler_configuration[_].url_exclusion_patterns
resource.values.configuration[_].web_crawler_configuration[_].url_inclusion_patterns
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
role.expressions.index_id
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kendra_index
has_valid_kendra_data_source
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[],"url_exclusion_patterns":["example"],"url_inclusion_patterns":["hello"],"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"sensitive_values":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"crawl_depth":2,"max_content_size_per_page_in_mega_bytes":null,"max_links_per_page":100,"max_urls_per_minute_crawl_rate":300,"proxy_configuration":[],"url_exclusion_patterns":["example"],"url_inclusion_patterns":["hello"],"urls":[{"seed_url_configuration":[{"seed_urls":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"],"web_crawler_mode":null}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"description":null,"name":"example","region":"us-east-1","schedule":null,"tags":null,"timeouts":null,"type":"WEBCRAWLER"},"after_unknown":{"arn":true,"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"created_at":true,"custom_document_enrichment_configuration":[],"data_source_id":true,"error_message":true,"id":true,"index_id":true,"language_code":true,"role_arn":true,"status":true,"tags_all":true,"updated_at":true},"before_sensitive":false,"after_sensitive":{"configuration":[{"s3_configuration":[],"template_configuration":[],"web_crawler_configuration":[{"authentication_configuration":[],"proxy_configuration":[],"url_exclusion_patterns":[false],"url_inclusion_patterns":[false],"urls":[{"seed_url_configuration":[{"seed_urls":[false]}],"site_maps_configuration":[]}]}]}],"custom_document_enrichment_configuration":[],"tags_all":{}}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"example","edition":"DEVELOPER_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_data_source.example","mode":"managed","type":"aws_kendra_data_source","name":"example","provider_config_key":"aws","expressions":{"configuration":[{"web_crawler_configuration":[{"url_exclusion_patterns":{"constant_value":["example"]},"url_inclusion_patterns":{"constant_value":["hello"]},"urls":[{"seed_url_configuration":[{"seed_urls":{"constant_value":["https://docs.aws.amazon.com/codedeploy/latest/userguide/getting-started-create-service-role.html"]}}]}]}]}],"index_id":{"references":["aws_kendra_index.example.id","aws_kendra_index.example"]},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"type":{"constant_value":"WEBCRAWLER"}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"description":{"constant_value":"example"},"edition":{"constant_value":"DEVELOPER_EDITION"},"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]},{"resource":"aws_kendra_index.example","attribute":["id"]}],"timestamp":"2026-02-18T20:53:53Z","applyable":true,"complete":true,"errored":false}
|
54 | I need a searchable place for all our internal content, and it should understand a few basic details about each item so results feel reasonably relevant without me having to fine‑tune anything. | Generate a basic Kendra index resource with the default Document Metadata Configuration Updates | Has one "aws_iam_role" resource and one "aws_kendra_index" resource with all default "document_metadata_configuration_updates" set | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "role" {
name = "Kendra-Role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "kendra.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
EOF
}
resource "aws_iam_role_policy" "policy" {
name = "Kendra-Policy"
role = aws_iam_role.role.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket"
],
"Resource": "*"
}
]
}
EOF
}
resource "aws_kendra_index" "example" {
name = "example"
role_arn = aws_iam_role.role.arn
document_metadata_configuration_updates {
name = "_authors"
type = "STRING_LIST_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = false
}
relevance {
importance = 1
}
}
document_metadata_configuration_updates {
name = "_category"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_created_at"
type = "DATE_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
freshness = false
importance = 1
duration = "25920000s"
rank_order = "ASCENDING"
}
}
document_metadata_configuration_updates {
name = "_data_source_id"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_document_title"
type = "STRING_VALUE"
search {
displayable = true
facetable = false
searchable = true
sortable = true
}
relevance {
importance = 2
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_excerpt_page_number"
type = "LONG_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = false
}
relevance {
importance = 2
rank_order = "ASCENDING"
}
}
document_metadata_configuration_updates {
name = "_faq_id"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_file_type"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_language_code"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_last_updated_at"
type = "DATE_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
freshness = false
importance = 1
duration = "25920000s"
rank_order = "ASCENDING"
}
}
document_metadata_configuration_updates {
name = "_source_uri"
type = "STRING_VALUE"
search {
displayable = true
facetable = false
searchable = false
sortable = false
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_tenant_id"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_version"
type = "STRING_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
values_importance_map = {}
}
}
document_metadata_configuration_updates {
name = "_view_count"
type = "LONG_VALUE"
search {
displayable = false
facetable = false
searchable = false
sortable = true
}
relevance {
importance = 1
rank_order = "ASCENDING"
}
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com")
}
has_valid_kendra_index {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_index"
resource.values.name
resource.values.document_metadata_configuration_updates
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kendra_index
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"document_metadata_configuration_updates":[{"name":"_authors","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_LIST_VALUE"},{"name":"_category","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_created_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_data_source_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_document_title","relevance":[{"importance":2}],"search":[{"displayable":true,"facetable":false,"searchable":true,"sortable":true}],"type":"STRING_VALUE"},{"name":"_excerpt_page_number","relevance":[{"importance":2,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"LONG_VALUE"},{"name":"_faq_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_file_type","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_language_code","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_last_updated_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_source_uri","relevance":[{"importance":1}],"search":[{"displayable":true,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_VALUE"},{"name":"_tenant_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_version","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_view_count","relevance":[{"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"LONG_VALUE"}],"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]}],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"document_metadata_configuration_updates":[{"name":"_authors","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_LIST_VALUE"},{"name":"_category","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_created_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_data_source_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_document_title","relevance":[{"importance":2}],"search":[{"displayable":true,"facetable":false,"searchable":true,"sortable":true}],"type":"STRING_VALUE"},{"name":"_excerpt_page_number","relevance":[{"importance":2,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":false}],"type":"LONG_VALUE"},{"name":"_faq_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_file_type","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_language_code","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_last_updated_at","relevance":[{"duration":"25920000s","freshness":false,"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"DATE_VALUE"},{"name":"_source_uri","relevance":[{"importance":1}],"search":[{"displayable":true,"facetable":false,"searchable":false,"sortable":false}],"type":"STRING_VALUE"},{"name":"_tenant_id","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_version","relevance":[{"importance":1}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"STRING_VALUE"},{"name":"_view_count","relevance":[{"importance":1,"rank_order":"ASCENDING"}],"search":[{"displayable":false,"facetable":false,"searchable":false,"sortable":true}],"type":"LONG_VALUE"}],"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":[{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"rank_order":true,"values_importance_map":true}],"search":[{}]},{"relevance":[{"duration":true,"freshness":true,"values_importance_map":true}],"search":[{}]}],"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]},{"relevance":[{"values_importance_map":{}}],"search":[{}]}],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"document_metadata_configuration_updates":[{"name":{"constant_value":"_authors"},"relevance":[{"importance":{"constant_value":1}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"STRING_LIST_VALUE"}},{"name":{"constant_value":"_category"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_created_at"},"relevance":[{"duration":{"constant_value":"25920000s"},"freshness":{"constant_value":false},"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"DATE_VALUE"}},{"name":{"constant_value":"_data_source_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_document_title"},"relevance":[{"importance":{"constant_value":2},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":true},"facetable":{"constant_value":false},"searchable":{"constant_value":true},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_excerpt_page_number"},"relevance":[{"importance":{"constant_value":2},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"LONG_VALUE"}},{"name":{"constant_value":"_faq_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_file_type"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_language_code"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_last_updated_at"},"relevance":[{"duration":{"constant_value":"25920000s"},"freshness":{"constant_value":false},"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"DATE_VALUE"}},{"name":{"constant_value":"_source_uri"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":true},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":false}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_tenant_id"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_version"},"relevance":[{"importance":{"constant_value":1},"values_importance_map":{"constant_value":{}}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"STRING_VALUE"}},{"name":{"constant_value":"_view_count"},"relevance":[{"importance":{"constant_value":1},"rank_order":{"constant_value":"ASCENDING"}}],"search":[{"displayable":{"constant_value":false},"facetable":{"constant_value":false},"searchable":{"constant_value":false},"sortable":{"constant_value":true}}],"type":{"constant_value":"LONG_VALUE"}}],"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]}],"timestamp":"2026-02-18T20:54:00Z","applyable":true,"complete":true,"errored":false}
|
55 | I need a searchable knowledge hub for our internal content, and it should understand who’s allowed to see what based on our existing team structure. | Generate a basic Kendra index resource With user group resolution configuration | Has one "aws_iam_role" resource and one "aws_kendra_index" resource with the "user_group_resolution_configuration" block | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "role" {
name = "Kendra-Role"
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "kendra.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
EOF
}
resource "aws_iam_role_policy" "policy" {
name = "Kendra-Policy"
role = aws_iam_role.role.id
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket"
],
"Resource": "*"
}
]
}
EOF
}
resource "aws_kendra_index" "example" {
name = "example"
role_arn = aws_iam_role.role.arn
user_group_resolution_configuration {
user_group_resolution_mode = "AWS_SSO"
}
} | package terraform.validation
import future.keywords.in
default has_valid_resources = false
has_valid_iam_role(resources) {
some resource in resources
resource.type == "aws_iam_role"
contains(resource.change.after.assume_role_policy,"kendra.amazonaws.com")
}
has_valid_kendra_index {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_kendra_index"
resource.values.name
resource.values.user_group_resolution_configuration
role := input.configuration.root_module.resources[i]
role.expressions.role_arn
}
has_valid_resources {
has_valid_iam_role(input.resource_changes)
has_valid_kendra_index
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"role":null}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":null,"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[{"user_group_resolution_mode":"AWS_SSO"}],"user_token_configurations":[]},"sensitive_values":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[{}],"user_token_configurations":[]}}]}},"resource_changes":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"kendra.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"Kendra-Role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"name":"Kendra-Policy","policy":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"s3:GetObject\",\"s3:ListBucket\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}"},"after_unknown":{"id":true,"name_prefix":true,"role":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"name":null,"role":null}}},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":null,"edition":"ENTERPRISE_EDITION","name":"example","region":"us-east-1","server_side_encryption_configuration":[],"tags":null,"timeouts":null,"user_context_policy":"ATTRIBUTE_FILTER","user_group_resolution_configuration":[{"user_group_resolution_mode":"AWS_SSO"}],"user_token_configurations":[]},"after_unknown":{"arn":true,"capacity_units":true,"created_at":true,"document_metadata_configuration_updates":true,"error_message":true,"id":true,"index_statistics":true,"role_arn":true,"server_side_encryption_configuration":[],"status":true,"tags_all":true,"updated_at":true,"user_group_resolution_configuration":[{}],"user_token_configurations":[]},"before_sensitive":false,"after_sensitive":{"capacity_units":[],"document_metadata_configuration_updates":[],"index_statistics":[],"server_side_encryption_configuration":[],"tags_all":{},"user_group_resolution_configuration":[{}],"user_token_configurations":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.role","mode":"managed","type":"aws_iam_role","name":"role","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"kendra.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n"},"name":{"constant_value":"Kendra-Role"}},"schema_version":0},{"address":"aws_iam_role_policy.policy","mode":"managed","type":"aws_iam_role_policy","name":"policy","provider_config_key":"aws","expressions":{"name":{"constant_value":"Kendra-Policy"},"policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:GetObject\",\n \"s3:ListBucket\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n"},"role":{"references":["aws_iam_role.role.id","aws_iam_role.role"]}},"schema_version":0},{"address":"aws_kendra_index.example","mode":"managed","type":"aws_kendra_index","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.role.arn","aws_iam_role.role"]},"user_group_resolution_configuration":[{"user_group_resolution_mode":{"constant_value":"AWS_SSO"}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.role","attribute":["arn"]},{"resource":"aws_iam_role.role","attribute":["id"]}],"timestamp":"2026-02-18T20:54:04Z","applyable":true,"complete":true,"errored":false}
|
56 | I need our custom domain to be recognized and managed so we can start using it for our online services. | Set up an aws_route_53 zone named "example53.com" | Has one "aws_route53_zone" resource
with "name" set to "example53.com" | provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "primary" {
name = "example53.com"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "example53.com"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:54:11Z","applyable":true,"complete":true,"errored":false}
|
57 | I need my main domain to direct visitors to a specific place where our app is running, keeping the setup straightforward. | Set up a non-alias aws_route_53 record that is linked to an aws_route53_zone resource named "example53.com" | Has one "aws_route53_zone" resource
with "name" set to "example53.com"
Has one "aws_route53_record" resource
with "name"
with "type"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "example53" {
name = "example53.com"
}
resource "aws_route53_record" "example53_A" {
zone_id = aws_route53_zone.example53.zone_id
name = "example53.com"
type = "A"
ttl = "300"
records = ["192.0.2.1"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "example53.com"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type
resource.expressions.ttl
resource.expressions.records
resource.expressions.zone_id.references[0] == "aws_route53_zone.example53.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"example53.com","records":["192.0.2.1"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.example53_A","mode":"managed","type":"aws_route53_record","name":"example53_A","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"},"records":{"constant_value":["192.0.2.1"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.example53.zone_id","aws_route53_zone.example53"]}},"schema_version":2},{"address":"aws_route53_zone.example53","mode":"managed","type":"aws_route53_zone","name":"example53","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.example53","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:54:16Z","applyable":true,"complete":true,"errored":false}
|
58 | I need a way for systems inside our internal network to look up a specific service by a stable name, and it should only be reachable from within that network. | Set up a non-alias aws_route_53 record that is linked to an aws_route53_zone resource called "private_zone" whose name paramter is set to "internal.example53.com" and has an aws_vpc resource called "main" attached to it | Has one "aws_vpc" resource
with a specified "cidr_block"
Has one "aws_route53_zone" resource
with "name" set to "internal.example53.com"
with a "vpc" block that contains "vpc_id" that references the "aws_vpc" resource
Has one "aws_route53_record" resource
with "name"
with "type"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource | provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
tags = {
Name = "main-vpc"
}
}
resource "aws_route53_zone" "private_zone" {
name = "internal.example53.com"
vpc {
vpc_id = aws_vpc.main.id
}
}
resource "aws_route53_record" "internal_record" {
zone_id = aws_route53_zone.private_zone.zone_id
name = "api.internal.example53.com"
type = "A"
ttl = "300"
records = ["10.0.1.101"]
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record = false
default is_valid_vpc = false
# Validate aws_vpc resource
is_valid_vpc {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_vpc"
resource.expressions.cidr_block != null
}
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
resource.expressions.name.constant_value == "internal.example53.com"
resource.expressions.vpc[0].vpc_id.references[0] == "aws_vpc.main.id"
}
# Validate aws_route53_record
is_valid_r53_record {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.type
resource.expressions.ttl
resource.expressions.records
resource.expressions.zone_id.references[0] == "aws_route53_zone.private_zone.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_vpc
is_valid_r53_zone
is_valid_r53_record
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"api.internal.example53.com","records":["10.0.1.101"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"internal.example53.com","tags":null,"timeouts":null,"vpc":[{}]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[{}]}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[],"multivalue_answer_routing_policy":null,"name":"api.internal.example53.com","records":["10.0.1.101"],"set_identifier":null,"timeouts":null,"ttl":300,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"internal.example53.com","tags":null,"timeouts":null,"vpc":[{}]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[{"vpc_id":true,"vpc_region":true}],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[{}]}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.internal_record","mode":"managed","type":"aws_route53_record","name":"internal_record","provider_config_key":"aws","expressions":{"name":{"constant_value":"api.internal.example53.com"},"records":{"constant_value":["10.0.1.101"]},"ttl":{"constant_value":"300"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.private_zone.zone_id","aws_route53_zone.private_zone"]}},"schema_version":2},{"address":"aws_route53_zone.private_zone","mode":"managed","type":"aws_route53_zone","name":"private_zone","provider_config_key":"aws","expressions":{"name":{"constant_value":"internal.example53.com"},"vpc":[{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}}]},"schema_version":0},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"tags":{"constant_value":{"Name":"main-vpc"}}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_route53_zone.private_zone","attribute":["zone_id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:54:26Z","applyable":true,"complete":true,"errored":false}
|
59 | I need a way to automatically flag when one of our machines is working too hard and have that status feed into whatever system is watching over our app’s overall well‑being, but it should err on the side of saying things are fine if there isn’t enough info. | Configure a health check with route 53 that uses a cloudwatch metric alarm called "foobar". Set the metric_name to "CPUUtilization", namespace to "AWS/EC2", statistic to "Average", period to "120", and comparison_operator to "GreaterThanOrEqualToThreshold". If the health check doesn't have enough info about the alarm, the status should be "Healthy". All resources should be provisioned in "us-east-1" | Has one "aws_cloudwatch_metric_alarm"" resources
with "alarm_name"
with "comparison_operator" set to "GreaterThanOrEqualToThreshold"
with "evaluation_periods"
with "namespace" set to "AWS/EC2"
with "period" set to "120"
with "statistic" set to "Average"
with "metric_name" set to "CPUUtilization"
with "threshold"
Has one "aws_route53_health_check" resources
with "cloudwatch_alarm_name" referencing the "aws_cloudwatch_metric_alarm" resource
with "cloudwatch_alarm_region"
with "insufficient_data_health_status" set to "Healthy"
with "type" equal to "CLOUDWATCH"
| provider "aws" {
region = "us-east-1"
}
resource "aws_cloudwatch_metric_alarm" "foobar" {
alarm_name = "terraform-test-foobar5"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "2"
metric_name = "CPUUtilization"
namespace = "AWS/EC2"
period = "120"
statistic = "Average"
threshold = "80"
alarm_description = "This metric monitors ec2 cpu utilization"
}
resource "aws_route53_health_check" "foo" {
type = "CLOUDWATCH_METRIC"
cloudwatch_alarm_name = aws_cloudwatch_metric_alarm.foobar.alarm_name
cloudwatch_alarm_region = "us-east-1"
insufficient_data_health_status = "Healthy"
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_health_check = false
default is_valid_cloud_watch_alarm = false
# Validate aws_route53_health_check
is_valid_r53_health_check {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_health_check"
resource.expressions.type.constant_value == "CLOUDWATCH_METRIC"
resource.expressions.cloudwatch_alarm_name.references[0] == "aws_cloudwatch_metric_alarm.foobar.alarm_name"
resource.expressions.cloudwatch_alarm_region.constant_value == "us-east-1"
resource.expressions.insufficient_data_health_status.constant_value = "Healthy"
}
is_valid_cloud_watch_alarm {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_cloudwatch_metric_alarm"
resource.expressions.alarm_name
resource.expressions.comparison_operator.constant_value == "GreaterThanOrEqualToThreshold"
resource.expressions.evaluation_periods
resource.expressions.metric_name.constant_value == "CPUUtilization"
resource.expressions.namespace.constant_value == "AWS/EC2"
resource.expressions.period.constant_value == "120"
resource.expressions.statistic.constant_value == "Average"
resource.expressions.threshold
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_health_check
is_valid_cloud_watch_alarm
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"actions_enabled":true,"alarm_actions":null,"alarm_description":"This metric monitors ec2 cpu utilization","alarm_name":"terraform-test-foobar5","comparison_operator":"GreaterThanOrEqualToThreshold","datapoints_to_alarm":null,"dimensions":null,"evaluation_periods":2,"extended_statistic":null,"insufficient_data_actions":null,"metric_name":"CPUUtilization","metric_query":[],"namespace":"AWS/EC2","ok_actions":null,"period":120,"region":"us-east-1","statistic":"Average","tags":null,"threshold":80,"threshold_metric_id":null,"treat_missing_data":"missing","unit":null},"sensitive_values":{"metric_query":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"alarm_name":null,"region":null}},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"child_health_threshold":null,"child_healthchecks":null,"cloudwatch_alarm_name":"terraform-test-foobar5","cloudwatch_alarm_region":"us-east-1","disabled":false,"fqdn":null,"insufficient_data_health_status":"Healthy","invert_healthcheck":null,"ip_address":null,"measure_latency":false,"port":null,"reference_name":null,"request_interval":null,"resource_path":null,"routing_control_arn":null,"search_string":null,"tags":null,"type":"CLOUDWATCH_METRIC"},"sensitive_values":{"regions":[],"tags_all":{},"triggers":{}}}]}},"resource_changes":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"actions_enabled":true,"alarm_actions":null,"alarm_description":"This metric monitors ec2 cpu utilization","alarm_name":"terraform-test-foobar5","comparison_operator":"GreaterThanOrEqualToThreshold","datapoints_to_alarm":null,"dimensions":null,"evaluation_periods":2,"extended_statistic":null,"insufficient_data_actions":null,"metric_name":"CPUUtilization","metric_query":[],"namespace":"AWS/EC2","ok_actions":null,"period":120,"region":"us-east-1","statistic":"Average","tags":null,"threshold":80,"threshold_metric_id":null,"treat_missing_data":"missing","unit":null},"after_unknown":{"arn":true,"evaluate_low_sample_count_percentiles":true,"id":true,"metric_query":[],"tags_all":true},"before_sensitive":false,"after_sensitive":{"metric_query":[],"tags_all":{}},"after_identity":{"account_id":null,"alarm_name":null,"region":null}}},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"child_health_threshold":null,"child_healthchecks":null,"cloudwatch_alarm_name":"terraform-test-foobar5","cloudwatch_alarm_region":"us-east-1","disabled":false,"fqdn":null,"insufficient_data_health_status":"Healthy","invert_healthcheck":null,"ip_address":null,"measure_latency":false,"port":null,"reference_name":null,"request_interval":null,"resource_path":null,"routing_control_arn":null,"search_string":null,"tags":null,"type":"CLOUDWATCH_METRIC"},"after_unknown":{"arn":true,"enable_sni":true,"failure_threshold":true,"id":true,"regions":true,"tags_all":true,"triggers":true},"before_sensitive":false,"after_sensitive":{"regions":[],"tags_all":{},"triggers":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_cloudwatch_metric_alarm.foobar","mode":"managed","type":"aws_cloudwatch_metric_alarm","name":"foobar","provider_config_key":"aws","expressions":{"alarm_description":{"constant_value":"This metric monitors ec2 cpu utilization"},"alarm_name":{"constant_value":"terraform-test-foobar5"},"comparison_operator":{"constant_value":"GreaterThanOrEqualToThreshold"},"evaluation_periods":{"constant_value":"2"},"metric_name":{"constant_value":"CPUUtilization"},"namespace":{"constant_value":"AWS/EC2"},"period":{"constant_value":"120"},"statistic":{"constant_value":"Average"},"threshold":{"constant_value":"80"}},"schema_version":1},{"address":"aws_route53_health_check.foo","mode":"managed","type":"aws_route53_health_check","name":"foo","provider_config_key":"aws","expressions":{"cloudwatch_alarm_name":{"references":["aws_cloudwatch_metric_alarm.foobar.alarm_name","aws_cloudwatch_metric_alarm.foobar"]},"cloudwatch_alarm_region":{"constant_value":"us-east-1"},"insufficient_data_health_status":{"constant_value":"Healthy"},"type":{"constant_value":"CLOUDWATCH_METRIC"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_cloudwatch_metric_alarm.foobar","attribute":["alarm_name"]}],"timestamp":"2026-02-18T20:54:40Z","applyable":true,"complete":true,"errored":false}
|
60 | I need users to reach our service through our main domain in a way that automatically sends them to whichever location can respond the quickest, even as traffic conditions change. | Configure a routing policy that navigates users to the least congested endpoint of a route 53 zone using Route 53 resources. Call the zone "primary" and use "us-east-1" and "eu-central-1" regions | Has one "aws_route53_zone" resource
with "name"
Has two "aws_route53_record" resources
The first "aws_route53_record"
with "name"
with "type"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
with "set_identifier"
with "latency_routing_policy" block that contains "region" set to "us-east-1"
The second "aws_route53_record"
with "name"
with "type"
with "ttl"
with "records"
with "zone_id" referencing the "aws_route53_zone" resource
with "set_identifier"
with "latency_routing_policy" block that contains "region" set to "eu-central-1"
| provider "aws" {
region = "us-east-1"
}
resource "aws_route53_zone" "primary" {
name = "example53.com"
}
# Record for the EC2 instance in the US East region
resource "aws_route53_record" "us_east_record" {
zone_id = aws_route53_zone.primary.zone_id
name = "service.example53.com"
type = "A"
ttl = "60"
records = ["192.0.2.101"]
set_identifier = "US East N. Virginia"
latency_routing_policy {
region = "us-east-1"
}
}
# Record for the EC2 instance in the EU region
resource "aws_route53_record" "eu_central_record" {
zone_id = aws_route53_zone.primary.zone_id
name = "service.example53.com"
type = "A"
ttl = "60"
records = ["192.0.2.102"]
set_identifier = "EU Frankfurt"
latency_routing_policy {
region = "eu-central-1"
}
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_zone = false
default is_valid_r53_record_na = false
default is_valid_r53_record_eu = false
# Validate aws_route53_zone resource
is_valid_r53_zone {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_zone"
}
# Validate aws_route53_record
is_valid_r53_record_na {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.latency_routing_policy[0].region.constant_value == "us-east-1"
resource.expressions.type
resource.expressions.ttl
resource.expressions.records
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id"
}
is_valid_r53_record_eu {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_record"
resource.expressions.name
resource.expressions.latency_routing_policy[0].region.constant_value == "eu-central-1"
resource.expressions.type
resource.expressions.ttl
resource.expressions.records
resource.expressions.set_identifier
resource.expressions.zone_id.references[0] == "aws_route53_zone.primary.zone_id"
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_zone
is_valid_r53_record_na
is_valid_r53_record_eu
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"eu-central-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.102"],"set_identifier":"EU Frankfurt","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":2,"values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"us-east-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.101"],"set_identifier":"US East N. Virginia","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"sensitive_values":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"identity_schema_version":0,"identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"sensitive_values":{"name_servers":[],"tags_all":{},"vpc":[]}}]}},"resource_changes":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"eu-central-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.102"],"set_identifier":"EU Frankfurt","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"health_check_id":null,"latency_routing_policy":[{"region":"us-east-1"}],"multivalue_answer_routing_policy":null,"name":"service.example53.com","records":["192.0.2.101"],"set_identifier":"US East N. Virginia","timeouts":null,"ttl":60,"type":"A","weighted_routing_policy":[]},"after_unknown":{"alias":[],"allow_overwrite":true,"cidr_routing_policy":[],"failover_routing_policy":[],"fqdn":true,"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"id":true,"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"alias":[],"cidr_routing_policy":[],"failover_routing_policy":[],"geolocation_routing_policy":[],"geoproximity_routing_policy":[],"latency_routing_policy":[{}],"records":[false],"weighted_routing_policy":[]},"after_identity":{"account_id":null,"name":null,"set_identifier":null,"type":null,"zone_id":null}}},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"Managed by Terraform","delegation_set_id":null,"force_destroy":false,"name":"example53.com","tags":null,"timeouts":null,"vpc":[]},"after_unknown":{"arn":true,"enable_accelerated_recovery":true,"id":true,"name_servers":true,"primary_name_server":true,"tags_all":true,"vpc":[],"zone_id":true},"before_sensitive":false,"after_sensitive":{"name_servers":[],"tags_all":{},"vpc":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_record.eu_central_record","mode":"managed","type":"aws_route53_record","name":"eu_central_record","provider_config_key":"aws","expressions":{"latency_routing_policy":[{"region":{"constant_value":"eu-central-1"}}],"name":{"constant_value":"service.example53.com"},"records":{"constant_value":["192.0.2.102"]},"set_identifier":{"constant_value":"EU Frankfurt"},"ttl":{"constant_value":"60"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_record.us_east_record","mode":"managed","type":"aws_route53_record","name":"us_east_record","provider_config_key":"aws","expressions":{"latency_routing_policy":[{"region":{"constant_value":"us-east-1"}}],"name":{"constant_value":"service.example53.com"},"records":{"constant_value":["192.0.2.101"]},"set_identifier":{"constant_value":"US East N. Virginia"},"ttl":{"constant_value":"60"},"type":{"constant_value":"A"},"zone_id":{"references":["aws_route53_zone.primary.zone_id","aws_route53_zone.primary"]}},"schema_version":2},{"address":"aws_route53_zone.primary","mode":"managed","type":"aws_route53_zone","name":"primary","provider_config_key":"aws","expressions":{"name":{"constant_value":"example53.com"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_route53_zone.primary","attribute":["zone_id"]}],"timestamp":"2026-02-18T20:54:46Z","applyable":true,"complete":true,"errored":false}
|
61 | I want a simple way to control how people reach our service through our domain, with room to change the routing logic later without much effort. | route 53 traffic policy | Has one "aws_route53_traffic_policy" resource
with "name" | provider "aws" {
region = "us-east-1"
}
resource "aws_route53_traffic_policy" "example" {
name = "example"
comment = "example comment"
document = <<EOF
{
"AWSPolicyFormatVersion": "2015-10-01",
"RecordType": "A",
"Endpoints": {
"endpoint-start-NkPh": {
"Type": "value",
"Value": "10.0.0.2"
}
},
"StartEndpoint": "endpoint-start-NkPh"
}
EOF
} | package terraform.validation
default is_configuration_valid = false
default is_valid_r53_traffic_policy = false
# Validate aws_route53_zone resource
is_valid_r53_traffic_policy {
some i
resource := input.configuration.root_module.resources[i]
resource.type == "aws_route53_traffic_policy"
resource.expressions.name
resource.expressions.comment
resource.expressions.document
}
# Combine all checks into a final rule
is_configuration_valid {
is_valid_r53_traffic_policy
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"comment":"example comment","document":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n","name":"example"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"comment":"example comment","document":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n","name":"example"},"after_unknown":{"arn":true,"id":true,"type":true,"version":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_route53_traffic_policy.example","mode":"managed","type":"aws_route53_traffic_policy","name":"example","provider_config_key":"aws","expressions":{"comment":{"constant_value":"example comment"},"document":{"constant_value":"{\n \"AWSPolicyFormatVersion\": \"2015-10-01\",\n \"RecordType\": \"A\",\n \"Endpoints\": {\n \"endpoint-start-NkPh\": {\n \"Type\": \"value\",\n \"Value\": \"10.0.0.2\"\n }\n },\n \"StartEndpoint\": \"endpoint-start-NkPh\"\n}\n"},"name":{"constant_value":"example"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:54:53Z","applyable":true,"complete":true,"errored":false}
|
62 | I need an easy way to spin up and tear down a shared environment for running containerized workloads, making sure it has its own isolated network space and the right access rules, plus some automatic setup so my command‑line tools can talk to it while it exists. | Define a variable 'cluster_name' of type string. Create an AWS EKS cluster named based on the provided cluster name variable, associating it with an IAM role. Configure the EKS cluster with VPC subnet IDs for networking. Ensure that IAM role permissions are handled before and after EKS cluster management for proper resource handling. Use local-exec provisioners to manage kubectl configuration during cluster creation and destruction. Define an IAM role with a policy attachment for Amazon EKS cluster and service policies. | has one "aws_eks_cluster" resource
with one "name"
with one "role_arn"
with one "subnet_ids" in "vpc_config"
with multiple "depends_on" dependencies
with multiple "local-exec" provisioners
with a "command"
with a "when"
has one "aws_iam_role" resource
with one "name"
with one "assume_role_policy"
has one "aws_iam_role_policy_attachment" resource for "eks_cluster_policy"
with one "policy_arn"
with one "role"
has one "aws_iam_role_policy_attachment" resource for "eks_service_policy"
with one "policy_arn"
with one "role" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
variable "cluster_name" {
type = string
default = "test-cluster"
}
data "aws_region" "current" {}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
resource "aws_subnet" "test_eks_1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "test_eks_2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
availability_zone = data.aws_availability_zones.available.names[1]
}
resource "aws_iam_role" "example" {
name = "${var.cluster_name}-eks"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = var.cluster_name
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ]
}
# Ensure that IAM Role permissions are created before and deleted after EKS Cluster handling.
# Otherwise, EKS will not be able to properly delete EKS managed EC2 infrastructure such as Security Groups.
depends_on = [
aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy,
]
# Manage kubectl configuration
provisioner "local-exec" {
command = "aws eks --region ${data.aws_region.current.name} update-kubeconfig --name ${self.name}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset users.${self.arn}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset clusters.${self.arn}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset contexts.${self.arn}"
}
}
| package terraform.validation
default has_aws_eks_cluster = false
default has_aws_iam_role = false
default has_aws_iam_role_policy_attachment_eks_cluster = false
default has_aws_iam_role_policy_attachment_eks_service = false
has_aws_eks_cluster {
some i
eks_cluster := input.configuration.root_module.resources[i]
eks_cluster.type == "aws_eks_cluster"
eks_cluster.expressions.name != null
eks_cluster.expressions.role_arn != null
eks_cluster.expressions.vpc_config[_].subnet_ids != null
count(eks_cluster.expressions.vpc_config[_].subnet_ids) > 0
count(eks_cluster.depends_on) > 0
has_local_exec_provisioners(eks_cluster)
}
has_local_exec_provisioners(resource) {
resource.provisioners != null
local_exec_count := [provisioner |
provisioner := resource.provisioners[_];
provisioner.type == "local-exec"
]
count(local_exec_count) > 0
has_local_exec_command(local_exec_count)
}
has_local_exec_command(provisioners) {
some i
provisioners[i].expressions.command != null
}
has_aws_iam_role {
some i
iam_role := input.planned_values.root_module.resources[i]
iam_role.type == "aws_iam_role"
iam_role.values.name != null
iam_role.values.assume_role_policy != null
}
has_aws_iam_role_policy_attachment_eks_cluster {
some i
policy_attachment := input.planned_values.root_module.resources[i]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
}
has_aws_iam_role_policy_attachment_eks_service {
some i
policy_attachment := input.planned_values.root_module.resources[i]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
}
valid_configuration {
has_aws_eks_cluster
has_aws_iam_role
has_aws_iam_role_policy_attachment_eks_cluster
has_aws_iam_role_policy_attachment_eks_service
} | {"format_version":"1.2","terraform_version":"1.14.3","variables":{"cluster_name":{"value":"test-cluster"}},"planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["data.aws_region.current.name","data.aws_region.current","self.name","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}}],"expressions":{"name":{"references":["var.cluster_name"]},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"references":["var.cluster_name"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}],"variables":{"cluster_name":{"default":"test-cluster"}}}},"relevant_attributes":[{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]}],"timestamp":"2026-02-18T20:55:08Z","applyable":true,"complete":true,"errored":false}
|
63 | I need a place to run containerized apps in a managed, scalable way, with its own network space and the right access setup, and I want my local tools to be able to talk to it securely and reliably. | Set up an AWS provider for the specified region. Retrieve the current caller identity using 'aws_caller_identity'. Optionally, fetch the latest stable ECR image tagged as 'stable' from the specified repository. Define local variables including an image tag, AWS tags, and workspace name. Instantiate an EKS module with configurations for cluster setup, IAM policies, instance types, and node count. Retrieve information about the created EKS cluster and its authentication data. Configure Helm and Kubernetes providers using the EKS cluster's details for cluster communication. | has one "aws_caller_identity" data source named "current"
has one "aws_ecr_image"
with one "repository_name"
with one "image_tag"
has multiple local variables defining:
"image_tag"
"aws_tags"
"workspace_name"
has one module named "eks"
has one "aws_eks_cluster" data source named "aptos"
with one "name"
with a "depends_on"
has one "aws_eks_cluster_auth"
with one "name"
has one "helm" provider
has one "kubernetes" provider
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
variable "cluster_name" {
type = string
default = "test-cluster"
}
data "aws_region" "current" {}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
resource "aws_subnet" "test_eks_1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "test_eks_2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
availability_zone = data.aws_availability_zones.available.names[1]
}
resource "aws_iam_role" "example" {
name = "${var.cluster_name}-eks"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = var.cluster_name
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ]
}
# Ensure that IAM Role permissions are created before and deleted after EKS Cluster handling.
# Otherwise, EKS will not be able to properly delete EKS managed EC2 infrastructure such as Security Groups.
depends_on = [
aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy,
]
# Manage kubectl configuration
provisioner "local-exec" {
command = "aws eks --region ${data.aws_region.current.name} update-kubeconfig --name ${self.name}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset users.${self.arn}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset clusters.${self.arn}"
}
provisioner "local-exec" {
when = destroy
command = "kubectl config unset contexts.${self.arn}"
}
}
| package terraform.validation
default has_aws_eks_cluster = false
default has_aws_iam_role = false
default has_aws_iam_role_policy_attachment_eks_cluster = false
default has_aws_iam_role_policy_attachment_eks_service = false
has_aws_eks_cluster {
some i
eks_cluster := input.configuration.root_module.resources[i]
eks_cluster.type == "aws_eks_cluster"
eks_cluster.expressions.name != null
eks_cluster.expressions.role_arn != null
eks_cluster.expressions.vpc_config[_].subnet_ids != null
count(eks_cluster.expressions.vpc_config[_].subnet_ids) > 0
count(eks_cluster.depends_on) > 0
has_local_exec_provisioners(eks_cluster)
}
has_local_exec_provisioners(resource) {
resource.provisioners != null
local_exec_count := [provisioner |
provisioner := resource.provisioners[_];
provisioner.type == "local-exec"
]
count(local_exec_count) > 0
has_local_exec_command(local_exec_count)
}
has_local_exec_command(provisioners) {
some i
provisioners[i].expressions.command != null
}
has_aws_iam_role {
some i
iam_role := input.planned_values.root_module.resources[i]
iam_role.type == "aws_iam_role"
iam_role.values.name != null
iam_role.values.assume_role_policy != null
}
has_aws_iam_role_policy_attachment_eks_cluster {
some i
policy_attachment := input.planned_values.root_module.resources[i]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
}
has_aws_iam_role_policy_attachment_eks_service {
some i
policy_attachment := input.planned_values.root_module.resources[i]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
}
valid_configuration {
has_aws_eks_cluster
has_aws_iam_role
has_aws_iam_role_policy_attachment_eks_cluster
has_aws_iam_role_policy_attachment_eks_service
} | {"format_version":"1.2","terraform_version":"1.14.3","variables":{"cluster_name":{"value":"test-cluster"}},"planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test-cluster","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"test-cluster-eks","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"test-cluster-eks"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"US East (N. Virginia)","endpoint":"ec2.us-east-1.amazonaws.com","id":"us-east-1","name":"us-east-1","region":"us-east-1"},"sensitive_values":{}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["data.aws_region.current.name","data.aws_region.current","self.name","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}},{"type":"local-exec","expressions":{"command":{"references":["self.arn","self"]}}}],"expressions":{"name":{"references":["var.cluster_name"]},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"references":["var.cluster_name"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_region.current","mode":"data","type":"aws_region","name":"current","provider_config_key":"aws","schema_version":0}],"variables":{"cluster_name":{"default":"test-cluster"}}}},"relevant_attributes":[{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:08Z","applyable":true,"complete":true,"errored":false}
|
64 | I need to make sure some of our system-level services in the cluster can run in an isolated, pay‑as‑you‑go compute setup, and also apply a small configuration tweak to one of the built‑in components once that environment is ready, keeping everything tied cleanly into the network we already have. | Create an IAM role for EKS Fargate profiles with the necessary policies for pod execution. Attach the AmazonEKSFargatePodExecutionRolePolicy to the IAM role. Define an AWS EKS Fargate profile for the 'kube-system' namespace, associating it with the EKS cluster and specifying the pod execution role ARN. Ensure that the specified subnets have the required resource tag for cluster association. Use a null_resource to patch the Kubernetes deployment 'coredns' in the 'kube-system' namespace, using the EKS cluster's endpoint, certificate authority, and authentication token for communication. | Resource "aws_iam_role" "eks-fargate-profile"
has one "name"
has one "assume_role_policy"
Resource "aws_iam_role_policy_attachment" "eks-fargate-profile"
has one "policy_arn"
has one "role"
Resource "aws_eks_fargate_profile" "kube-system"
has one "cluster_name"
has one "fargate_profile_name"
has one "pod_execution_role_arn"
has one "subnet_ids"
has one "namespace" in "selector"
Data "aws_eks_cluster_auth" "eks"
has one "name"
Resource "null_resource" "k8s_patcher"
has multiple "triggers" (endpoint, ca_crt, token)
uses a "local-exec" provisioner to execute a command that patches the Kubernetes deployment
has a "lifecycle" policy to ignore changes in "triggers" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
resource "aws_subnet" "test_eks_1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
availability_zone = data.aws_availability_zones.available.names[0]
tags = {
"kubernetes.io/cluster/test" = "shared"
}
}
resource "aws_subnet" "test_eks_2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
availability_zone = data.aws_availability_zones.available.names[1]
tags = {
"kubernetes.io/cluster/test" = "shared"
}
}
resource "aws_iam_role" "eks-cluster" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.eks-cluster.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.eks-cluster.name
}
resource "aws_eks_cluster" "cluster" {
name = "test"
role_arn = aws_iam_role.eks-cluster.arn
vpc_config {
subnet_ids = [
aws_subnet.test_eks_1.id,
aws_subnet.test_eks_2.id
]
}
depends_on = [
aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy,
]
}
resource "aws_iam_role" "eks-fargate-profile" {
name = "eks-fargate-profile"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks-fargate-pods.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "eks-fargate-profile" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"
role = aws_iam_role.eks-fargate-profile.name
}
resource "aws_eks_fargate_profile" "kube-system" {
cluster_name = aws_eks_cluster.cluster.name
fargate_profile_name = "kube-system"
pod_execution_role_arn = aws_iam_role.eks-fargate-profile.arn
subnet_ids = [
aws_subnet.test_eks_1.id,
aws_subnet.test_eks_2.id
]
selector {
namespace = "kube-system"
}
depends_on = [ aws_iam_role_policy_attachment.eks-fargate-profile ]
}
data "aws_eks_cluster_auth" "eks" {
name = aws_eks_cluster.cluster.id
}
resource "null_resource" "k8s_patcher" {
depends_on = [aws_eks_fargate_profile.kube-system]
triggers = {
endpoint = aws_eks_cluster.cluster.endpoint
ca_crt = base64decode(aws_eks_cluster.cluster.certificate_authority[0].data)
token = data.aws_eks_cluster_auth.eks.token
}
provisioner "local-exec" {
command = <<EOH
cat >/tmp/ca.crt <<EOF
${base64decode(aws_eks_cluster.cluster.certificate_authority[0].data)}
EOF
kubectl \
--server="${aws_eks_cluster.cluster.endpoint}" \
--certificate_authority=/tmp/ca.crt \
--token="${data.aws_eks_cluster_auth.eks.token}" \
patch deployment coredns \
-n kube-system --type json \
-p='[{"op": "remove", "path": "/spec/template/metadata/annotations/eks.amazonaws.com~1compute-type"}]'
EOH
}
lifecycle {
ignore_changes = [triggers]
}
} | package terraform.validation
default has_aws_iam_role_fargate = false
default has_aws_iam_role_policy_attachment_fargate = false
default has_aws_eks_fargate_profile = false
default has_aws_eks_cluster_auth = false
default has_null_resource_k8s_patcher = false
has_aws_iam_role_fargate {
role := input.planned_values.root_module.resources[_]
role.type == "aws_iam_role"
role.name == "eks-fargate-profile"
role.values.name == "eks-fargate-profile"
role.values.assume_role_policy != null
}
has_aws_iam_role_policy_attachment_fargate {
attachment := input.planned_values.root_module.resources[_]
attachment.type == "aws_iam_role_policy_attachment"
attachment.name == "eks-fargate-profile"
attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"
attachment.values.role == input.planned_values.root_module.resources[_].values.name # Ensure role is correctly referenced
}
has_aws_eks_fargate_profile {
fargate_profile := input.configuration.root_module.resources[_]
fargate_profile.type == "aws_eks_fargate_profile"
fargate_profile.name == "kube-system"
fargate_profile.expressions.cluster_name != null
fargate_profile.expressions.fargate_profile_name.constant_value == "kube-system"
fargate_profile.expressions.pod_execution_role_arn != null
count(fargate_profile.expressions.subnet_ids.references) == 4 # Ensure there are two subnet IDs
fargate_profile.expressions.selector[_].namespace.constant_value == "kube-system"
}
has_aws_eks_cluster_auth {
cluster_auth := input.configuration.root_module.resources[_]
cluster_auth.type == "aws_eks_cluster_auth"
cluster_auth.name != null # Check for proper referencing
}
has_null_resource_k8s_patcher {
k8s_patcher := input.configuration.root_module.resources[_]
k8s_patcher.type == "null_resource"
k8s_patcher.name == "k8s_patcher"
k8s_patcher.depends_on != null
count(k8s_patcher.expressions.triggers.references) == 8 # Check for three triggers
k8s_patcher.provisioners[0].type == "local-exec"
k8s_patcher.provisioners[0].expressions.command != null
}
valid_configuration {
has_aws_iam_role_fargate
has_aws_iam_role_policy_attachment_fargate
has_aws_eks_fargate_profile
has_aws_eks_cluster_auth
has_null_resource_k8s_patcher
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"test","fargate_profile_name":"kube-system","region":"us-east-1","selector":[{"labels":null,"namespace":"kube-system"}],"tags":null,"timeouts":null},"sensitive_values":{"selector":[{}],"subnet_ids":[],"tags_all":{}}},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"sensitive_values":{"token":true}},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_name":"registry.terraform.io/hashicorp/null","schema_version":0,"values":{"triggers":{}},"sensitive_values":{"triggers":{"token":true}}}]}},"resource_changes":[{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["read"],"before":null,"after":{},"after_unknown":{"id":true,"name":true,"region":true,"token":true},"before_sensitive":false,"after_sensitive":{"token":true}},"action_reason":"read_because_config_unknown"},{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"test","fargate_profile_name":"kube-system","region":"us-east-1","selector":[{"labels":null,"namespace":"kube-system"}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"pod_execution_role_arn":true,"selector":[{}],"status":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"selector":[{}],"subnet_ids":[],"tags_all":{}}}},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"kubernetes.io/cluster/test":"shared"},"tags_all":{"kubernetes.io/cluster/test":"shared"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_name":"registry.terraform.io/hashicorp/null","change":{"actions":["create"],"before":null,"after":{"triggers":{}},"after_unknown":{"id":true,"triggers":{"ca_crt":true,"endpoint":true,"token":true}},"before_sensitive":false,"after_sensitive":{"triggers":{"token":true}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}},"null":{"name":"null","full_name":"registry.terraform.io/hashicorp/null"}},"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.eks-cluster.arn","aws_iam_role.eks-cluster"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_eks_fargate_profile.kube-system","mode":"managed","type":"aws_eks_fargate_profile","name":"kube-system","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.cluster.name","aws_eks_cluster.cluster"]},"fargate_profile_name":{"constant_value":"kube-system"},"pod_execution_role_arn":{"references":["aws_iam_role.eks-fargate-profile.arn","aws_iam_role.eks-fargate-profile"]},"selector":[{"namespace":{"constant_value":"kube-system"}}],"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}},"schema_version":0,"depends_on":["aws_iam_role_policy_attachment.eks-fargate-profile"]},{"address":"aws_iam_role.eks-cluster","mode":"managed","type":"aws_iam_role","name":"eks-cluster","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role.eks-fargate-profile","mode":"managed","type":"aws_iam_role","name":"eks-fargate-profile","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks-fargate-profile","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks-fargate-profile","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.eks-fargate-profile.name","aws_iam_role.eks-fargate-profile"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.eks-cluster.name","aws_iam_role.eks-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.eks-cluster.name","aws_iam_role.eks-cluster"]}},"schema_version":0},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"tags":{"constant_value":{"kubernetes.io/cluster/test":"shared"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"tags":{"constant_value":{"kubernetes.io/cluster/test":"shared"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"null_resource.k8s_patcher","mode":"managed","type":"null_resource","name":"k8s_patcher","provider_config_key":"null","provisioners":[{"type":"local-exec","expressions":{"command":{"references":["aws_eks_cluster.cluster.certificate_authority[0].data","aws_eks_cluster.cluster.certificate_authority[0]","aws_eks_cluster.cluster.certificate_authority","aws_eks_cluster.cluster","aws_eks_cluster.cluster.endpoint","aws_eks_cluster.cluster","data.aws_eks_cluster_auth.eks.token","data.aws_eks_cluster_auth.eks"]}}}],"expressions":{"triggers":{"references":["aws_eks_cluster.cluster.endpoint","aws_eks_cluster.cluster","aws_eks_cluster.cluster.certificate_authority[0].data","aws_eks_cluster.cluster.certificate_authority[0]","aws_eks_cluster.cluster.certificate_authority","aws_eks_cluster.cluster","data.aws_eks_cluster_auth.eks.token","data.aws_eks_cluster_auth.eks"]}},"schema_version":0,"depends_on":["aws_eks_fargate_profile.kube-system"]},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0},{"address":"data.aws_eks_cluster_auth.eks","mode":"data","type":"aws_eks_cluster_auth","name":"eks","provider_config_key":"aws","expressions":{"name":{"references":["aws_eks_cluster.cluster.id","aws_eks_cluster.cluster"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.eks-cluster","attribute":["arn"]},{"resource":"aws_eks_cluster.cluster","attribute":["id"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_eks_cluster.cluster","attribute":["certificate_authority",0,"data"]},{"resource":"aws_eks_cluster.cluster","attribute":["endpoint"]},{"resource":"aws_eks_cluster.cluster","attribute":["name"]},{"resource":"aws_iam_role.eks-cluster","attribute":["name"]},{"resource":"aws_iam_role.eks-fargate-profile","attribute":["name"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_eks_cluster_auth.eks","attribute":["token"]},{"resource":"aws_iam_role.eks-fargate-profile","attribute":["arn"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]}],"timestamp":"2026-02-18T20:55:09Z","applyable":true,"complete":true,"errored":false}
|
65 | I need to let a specific team or system interact with our container platform in a controlled way, making sure they get the right level of access without overcomplicating things. | Create a Terraform script for an AWS EKS access entry with name "example". Define a resource to grant access to an EKS cluster using the cluster's name and a principal's ARN. Include assigning specific Kubernetes groups and set the access type to 'STANDARD'. | has one "aws_eks_access_entry" resource
with one "cluster_name"
with one "principal_arn"
with one "kubernetes_groups"
with one "type" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "private-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = "test"
version = "test-version"
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [
aws_subnet.private-us-east-1a.id,
]
}
}
resource "aws_eks_access_entry" "example" {
cluster_name = aws_eks_cluster.example.name
principal_arn = aws_iam_role.example.arn
kubernetes_groups = ["group-1", "group-2"]
type = "STANDARD"
} | package terraform.validation
default has_aws_eks_access_entry_example = false
has_aws_eks_access_entry_example {
entry := input.planned_values.root_module.resources[_]
entry.type == "aws_eks_access_entry"
entry.name == "example"
entry.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it's the correct reference to aws_eks_cluster.example
entry.values.kubernetes_groups == ["group-1", "group-2"]
entry.values.type == "STANDARD"
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"test","kubernetes_groups":["group-1","group-2"],"region":"us-east-1","tags":null,"timeouts":null,"type":"STANDARD"},"sensitive_values":{"kubernetes_groups":[false,false],"tags_all":{}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"test","kubernetes_groups":["group-1","group-2"],"region":"us-east-1","tags":null,"timeouts":null,"type":"STANDARD"},"after_unknown":{"access_entry_arn":true,"created_at":true,"id":true,"kubernetes_groups":[false,false],"modified_at":true,"principal_arn":true,"tags_all":true,"user_name":true},"before_sensitive":false,"after_sensitive":{"kubernetes_groups":[false,false],"tags_all":{}}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_access_entry.example","mode":"managed","type":"aws_eks_access_entry","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"kubernetes_groups":{"constant_value":["group-1","group-2"]},"principal_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:12Z","applyable":true,"complete":true,"errored":false}
|
66 | I need to let a specific person see only a limited part of our app’s shared computing space, keeping their permissions tightly scoped to just one area. | Create a Terraform script to associate an access policy with name "example", with an AWS EKS cluster. Define a resource linking the cluster's name to a specific policy ARN and a principal's ARN. Include settings for an access scope limited to a specific namespace. | has one "aws_eks_access_policy_association" resource
with one "cluster_name"
with one "policy_arn"
with one "principal_arn"
with one "access_scope" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "private-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = "test"
version = "test-version"
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [
aws_subnet.private-us-east-1a.id,
]
}
}
resource "aws_iam_user" "example" {
name = "eks-test"
}
resource "aws_eks_access_policy_association" "example" {
cluster_name = aws_eks_cluster.example.name
policy_arn = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
principal_arn = aws_iam_user.example.arn
access_scope {
type = "namespace"
namespaces = ["example-namespace"]
}
} | package terraform.validation
default has_aws_eks_access_policy_association_example = false
has_aws_eks_access_policy_association_example {
policy_assoc := input.planned_values.root_module.resources[_]
policy_assoc.type == "aws_eks_access_policy_association"
policy_assoc.name == "example"
policy_assoc.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it references aws_eks_cluster.example
policy_assoc.values.policy_arn == "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"
policy_assoc.values.access_scope[_].type == "namespace"
policy_assoc.values.access_scope[_].namespaces == ["example-namespace"]
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_scope":[{"namespaces":["example-namespace"],"type":"namespace"}],"cluster_name":"test","policy_arn":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy","region":"us-east-1","timeouts":null},"sensitive_values":{"access_scope":[{"namespaces":[false]}]}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"force_destroy":false,"name":"eks-test","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_scope":[{"namespaces":["example-namespace"],"type":"namespace"}],"cluster_name":"test","policy_arn":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy","region":"us-east-1","timeouts":null},"after_unknown":{"access_scope":[{"namespaces":[false]}],"associated_at":true,"id":true,"modified_at":true,"principal_arn":true},"before_sensitive":false,"after_sensitive":{"access_scope":[{"namespaces":[false]}]}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"force_destroy":false,"name":"eks-test","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"id":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_access_policy_association.example","mode":"managed","type":"aws_eks_access_policy_association","name":"example","provider_config_key":"aws","expressions":{"access_scope":[{"namespaces":{"constant_value":["example-namespace"]},"type":{"constant_value":"namespace"}}],"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"policy_arn":{"constant_value":"arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy"},"principal_arn":{"references":["aws_iam_user.example.arn","aws_iam_user.example"]}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_user.example","mode":"managed","type":"aws_iam_user","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"eks-test"}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_user.example","attribute":["arn"]}],"timestamp":"2026-02-18T20:55:26Z","applyable":true,"complete":true,"errored":false}
|
67 | I need to extend our container-orchestration setup with one of the optional system components it supports so we get better networking behavior, and it should plug cleanly into the existing cluster without adding much complexity. | Generate a Terraform script to add an addon with name "example", to an AWS EKS cluster. Define a resource that specifies the cluster's name and sets the addon name to 'vpc-cni'. | has one "aws_eks_addon" resource
with one "cluster_name"
with one "addon_name" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "private-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = "test"
version = "test-version"
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [
aws_subnet.private-us-east-1a.id,
]
}
}
resource "aws_eks_addon" "example" {
cluster_name = aws_eks_cluster.example.name
addon_name = "vpc-cni"
} | package terraform.validation
default has_aws_eks_addon_example = false
has_aws_eks_addon_example {
addon := input.planned_values.root_module.resources[_]
addon.type == "aws_eks_addon"
addon.name == "example"
addon.values.cluster_name == input.planned_values.root_module.resources[_].values.name # Ensures it references aws_eks_cluster.example correctly
addon.values.addon_name == "vpc-cni"
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"addon_name":"vpc-cni","cluster_name":"test","pod_identity_association":[],"preserve":null,"region":"us-east-1","resolve_conflicts_on_create":null,"resolve_conflicts_on_update":null,"service_account_role_arn":null,"tags":null,"timeouts":null},"sensitive_values":{"pod_identity_association":[],"tags_all":{}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"addon_name":"vpc-cni","cluster_name":"test","pod_identity_association":[],"preserve":null,"region":"us-east-1","resolve_conflicts_on_create":null,"resolve_conflicts_on_update":null,"service_account_role_arn":null,"tags":null,"timeouts":null},"after_unknown":{"addon_version":true,"arn":true,"configuration_values":true,"created_at":true,"id":true,"modified_at":true,"pod_identity_association":[],"tags_all":true},"before_sensitive":false,"after_sensitive":{"pod_identity_association":[],"tags_all":{}}}},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_addon.example","mode":"managed","type":"aws_eks_addon","name":"example","provider_config_key":"aws","expressions":{"addon_name":{"constant_value":"vpc-cni"},"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]}},"schema_version":0},{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a"]}}]},"schema_version":1},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:34Z","applyable":true,"complete":true,"errored":false}
|
68 | I want to run certain lightweight workloads without having to manage any underlying machines, and have them launch only within a specific part of our environment for security and cost control. | Generate a Terraform script to create an AWS EKS Fargate profile. Define a resource that links to an EKS cluster (with name set to "example") by name, sets a Fargate profile name, and assigns a pod execution role ARN (tied to an IAM role with name "example"). Specify subnet IDs and include a selector for the namespace 'example'. | has one "aws_eks_fargate_profile" resource
with one "cluster_name"
with one "fargate_profile_name"
with one "pod_execution_role_arn"
with one "subnet_ids"
with one "selector" containing "namespace" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "example1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "example2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role" "example-fargate" {
name = "eks-fargate-profile-example"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks-fargate-pods.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "example-AmazonEKSFargatePodExecutionRolePolicy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"
role = aws_iam_role.example-fargate.name
}
resource "aws_eks_cluster" "example" {
name = "example"
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id]
}
}
resource "aws_eks_fargate_profile" "example" {
cluster_name = aws_eks_cluster.example.name
fargate_profile_name = "example"
pod_execution_role_arn = aws_iam_role.example-fargate.arn
subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id]
selector {
namespace = "example"
}
} | package terraform.validation
default has_aws_eks_fargate_profile_example = false
has_aws_eks_fargate_profile_example {
fargate_profile := input.configuration.root_module.resources[_]
fargate_profile.type == "aws_eks_fargate_profile"
fargate_profile.name == "example"
contains(fargate_profile.expressions.cluster_name.references[_], "aws_eks_cluster.example") # Ensures it references aws_eks_cluster.example correctly
fargate_profile.expressions.fargate_profile_name.constant_value == "example"
contains(fargate_profile.expressions.pod_execution_role_arn.references[_], "aws_iam_role.example") # Ensures it references aws_iam_role.example correctly
count(fargate_profile.expressions.subnet_ids.references) > 0 # Ensure that subnet_ids is populated
fargate_profile.expressions.selector[_].namespace.constant_value == "example"
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","fargate_profile_name":"example","region":"us-east-1","selector":[{"labels":null,"namespace":"example"}],"tags":null,"timeouts":null},"sensitive_values":{"selector":[{}],"subnet_ids":[],"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","fargate_profile_name":"example","region":"us-east-1","selector":[{"labels":null,"namespace":"example"}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"pod_execution_role_arn":true,"selector":[{}],"status":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"selector":[{}],"subnet_ids":[],"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1},{"address":"aws_eks_fargate_profile.example","mode":"managed","type":"aws_eks_fargate_profile","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"fargate_profile_name":{"constant_value":"example"},"pod_execution_role_arn":{"references":["aws_iam_role.example-fargate.arn","aws_iam_role.example-fargate"]},"selector":[{"namespace":{"constant_value":"example"}}],"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role.example-fargate","mode":"managed","type":"aws_iam_role","name":"example-fargate","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile-example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.example-fargate.name","aws_iam_role.example-fargate"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example-fargate","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example-fargate","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_subnet.example2","attribute":["id"]}],"timestamp":"2026-02-18T20:55:36Z","applyable":true,"complete":true,"errored":false}
|
69 | I need a secure way for certain automated workloads in our compute platform to run with just the permissions they need, without giving them broader access than necessary. | Create a Terraform script for an AWS IAM role designed for EKS Fargate profiles. Define a role with a specific name (with the name attribute set to "eks-fargate-profile-example") and an assume role policy that allows actions from 'eks-fargate-pods.amazonaws.com'. Also, attach a predefined Amazon EKS Fargate Pod Execution Role Policy to this role. | has one "aws_iam_role" resource
with one "name"
with one "assume_role_policy"
has one "aws_iam_role_policy_attachment" resource
with one "policy_arn"
with one "role" | provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "example" {
name = "eks-fargate-profile-example"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks-fargate-pods.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "example-AmazonEKSFargatePodExecutionRolePolicy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"
role = aws_iam_role.example.name
} | package terraform.validation
default has_aws_iam_role_example = false
default has_aws_iam_role_policy_attachment_example = false
has_aws_iam_role_example {
role := input.planned_values.root_module.resources[_]
role.type == "aws_iam_role"
role.values.name == "eks-fargate-profile-example"
# Ensure the assume role policy is correctly configured
role.values.assume_role_policy == "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}"
}
has_aws_iam_role_policy_attachment_example {
attachment := input.planned_values.root_module.resources[_]
attachment.type == "aws_iam_role_policy_attachment"
attachment.name == "example-AmazonEKSFargatePodExecutionRolePolicy"
attachment.values.policy_arn == "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"
# Check if the role is correctly referenced
attachment.values.role == input.planned_values.root_module.resources[_].values.name
}
valid_configuration {
has_aws_iam_role_example
has_aws_iam_role_policy_attachment_example
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}}]}},"resource_changes":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks-fargate-pods.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-fargate-profile-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy","role":"eks-fargate-profile-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-fargate-profile-example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSFargatePodExecutionRolePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSFargatePodExecutionRolePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:38Z","applyable":true,"complete":true,"errored":false}
|
70 | I need to let an external authentication system securely verify who can access my container platform, and I want this to plug into the cluster’s built‑in access controls without adding too much complexity. | Generate a Terraform script to configure an OIDC identity provider for an AWS EKS cluster (where the cluster has it's name attribute set to "example"). Define a resource that links to the cluster by name and sets up OIDC with specific parameters including client ID, identity provider config name, and issuer URL. | has one "aws_eks_identity_provider_config" resource
with one "cluster_name"
with one "oidc" block containing:
one "client_id"
one "identity_provider_config_name"
one "issuer_url" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "example1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "example2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "example" {
name = "example"
role_arn = aws_iam_role.example.arn
vpc_config {
subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id]
}
}
resource "aws_eks_identity_provider_config" "example" {
cluster_name = aws_eks_cluster.example.name
oidc {
client_id = "your client_id"
identity_provider_config_name = "example"
issuer_url = "https://www.sampleurl.com"
}
} | package terraform.validation
default has_aws_eks_identity_provider_config_example = false
has_aws_eks_identity_provider_config_example {
identity_provider_config := input.planned_values.root_module.resources[_]
identity_provider_config.type == "aws_eks_identity_provider_config"
identity_provider_config.values.cluster_name == input.planned_values.root_module.resources[_].values.name
# Check OIDC configuration
identity_provider_config.values.oidc[_].client_id != null
identity_provider_config.values.oidc[_].identity_provider_config_name != null
identity_provider_config.values.oidc[_].issuer_url != null
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","oidc":[{"client_id":"your client_id","groups_claim":null,"groups_prefix":null,"identity_provider_config_name":"example","issuer_url":"https://www.sampleurl.com","required_claims":null,"username_claim":null,"username_prefix":null}],"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"oidc":[{}],"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","oidc":[{"client_id":"your client_id","groups_claim":null,"groups_prefix":null,"identity_provider_config_name":"example","issuer_url":"https://www.sampleurl.com","required_claims":null,"username_claim":null,"username_prefix":null}],"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"oidc":[{}],"status":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"oidc":[{}],"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1},{"address":"aws_eks_identity_provider_config.example","mode":"managed","type":"aws_eks_identity_provider_config","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"oidc":[{"client_id":{"constant_value":"your client_id"},"identity_provider_config_name":{"constant_value":"example"},"issuer_url":{"constant_value":"https://www.sampleurl.com"}}]},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_subnet.example2","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]}],"timestamp":"2026-02-18T20:55:50Z","applyable":true,"complete":true,"errored":false}
|
71 | I need to add a pool of machines that can join our container platform, scale up and down automatically, and have whatever access they need to pull images and handle networking, while keeping the setup simple and reliable. | Create a Terraform script for an AWS EKS node group (with name attribute set to "example") linked to a specific EKS cluster (with name attribute set to "example"). Define a resource with details including the node group name, node role ARN, and subnet IDs. Configure scaling parameters (desired size is 1, max size is 2, and min size is 1, with max unavailable set to 1) and update settings for node management. Include dependencies on IAM role policy attachments to ensure proper permissions management during lifecycle events of EC2 instances and network interfaces (in particular, make sure the EKS worker node policy, the EKS CNI policy, and the EC2 container registry read only policy are attached). | has one "aws_eks_node_group" resource
with one "cluster_name"
with one "node_group_name"
with one "node_role_arn"
with one "subnet_ids"
with one "scaling_config" containing:
one "desired_size"
one "max_size"
one "min_size"
with one "update_config" containing:
one "max_unavailable"
with dependencies on three IAM role policy attachments | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
data "aws_availability_zones" "available" {
state = "available"
}
resource "aws_subnet" "test_eks_1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[0]
}
resource "aws_subnet" "test_eks_2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[1]
}
resource "aws_internet_gateway" "main" {
vpc_id = aws_vpc.main.id
}
resource "aws_route_table" "main" {
vpc_id = aws_vpc.main.id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.main.id
}
}
resource "aws_route_table_association" "first" {
subnet_id = aws_subnet.test_eks_1.id
route_table_id = aws_route_table.main.id
}
resource "aws_route_table_association" "second" {
subnet_id = aws_subnet.test_eks_2.id
route_table_id = aws_route_table.main.id
}
resource "aws_security_group" "first" {
name = "test-security-group"
description = "Allow traffic for Elasticsearch"
vpc_id = aws_vpc.main.id
}
resource "aws_vpc_security_group_ingress_rule" "ingress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
ip_protocol = "-1"
}
resource "aws_vpc_security_group_egress_rule" "egress1" {
security_group_id = aws_security_group.first.id
cidr_ipv4 = "0.0.0.0/0"
ip_protocol = "-1"
}
resource "aws_iam_role" "example-cluster" {
name = "eks-cluster-role"
assume_role_policy = jsonencode({
Statement = [{
Action = "sts:AssumeRole"
Effect = "Allow"
Principal = {
Service = "eks.amazonaws.com"
}
}]
Version = "2012-10-17"
})
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example-cluster.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example-cluster.name
}
resource "aws_eks_cluster" "example" {
name = "example"
role_arn = aws_iam_role.example-cluster.arn
vpc_config {
subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ]
}
}
resource "aws_iam_role" "example-group" {
name = "eks-cluster-group-role"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": ["eks.amazonaws.com", "ec2.amazonaws.com"]
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "example-AmazonEKSWorkerNodePolicy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"
role = aws_iam_role.example-group.name
}
resource "aws_iam_role_policy_attachment" "example-AmazonEKS_CNI_Policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
role = aws_iam_role.example-group.name
}
resource "aws_iam_role_policy_attachment" "example-AmazonEC2ContainerRegistryReadOnly" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
role = aws_iam_role.example-group.name
}
resource "aws_eks_node_group" "example" {
cluster_name = aws_eks_cluster.example.name
node_group_name = "example"
node_role_arn = aws_iam_role.example-group.arn
subnet_ids = [ aws_subnet.test_eks_1.id, aws_subnet.test_eks_2.id ]
scaling_config {
desired_size = 1
max_size = 2
min_size = 1
}
update_config {
max_unavailable = 1
}
# Ensure that IAM Role permissions are created before and deleted after EKS Node Group handling.
# Otherwise, EKS will not be able to properly delete EC2 Instances and Elastic Network Interfaces.
depends_on = [
aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy,
aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy,
aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly,
]
}
| package terraform.validation
default has_aws_eks_node_group_example = false
has_aws_eks_node_group_example {
node_group := input.planned_values.root_module.resources[_]
node_group.type == "aws_eks_node_group"
node_group.values.cluster_name == input.planned_values.root_module.resources[_].values.name
node_group.values.node_group_name == "example"
node_group.values.scaling_config[_].desired_size == 1
node_group.values.scaling_config[_].max_size == 2
node_group.values.scaling_config[_].min_size == 1
node_group.values.update_config[_].max_unavailable == 1
node_group2 := input.configuration.root_module.resources[_]
node_group2.expressions.node_role_arn.references != null
node_group2.expressions.subnet_ids != null
count(node_group2.depends_on) == 3
# Checking for AmazonEKSWorkerNodePolicy:
worker_policy := input.configuration.root_module.resources[_]
contains(node_group2.depends_on[_], worker_policy.name)
contains(worker_policy.expressions.policy_arn.constant_value, "AmazonEKSWorkerNodePolicy")
# Checking for AmazonEKS_CNI_Policy:
worker_policy2 := input.configuration.root_module.resources[_]
contains(node_group2.depends_on[_], worker_policy2.name)
contains(worker_policy2.expressions.policy_arn.constant_value, "AmazonEKS_CNI_Policy")
# Checking for AmazonEC2ContainerRegistryReadOnly:
worker_policy3 := input.configuration.root_module.resources[_]
contains(node_group2.depends_on[_], worker_policy3.name)
contains(worker_policy3.expressions.policy_arn.constant_value, "AmazonEC2ContainerRegistryReadOnly")
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","force_update_version":null,"labels":null,"launch_template":[],"node_group_name":"example","region":"us-east-1","remote_access":[],"scaling_config":[{"desired_size":1,"max_size":2,"min_size":1}],"tags":null,"taint":[],"timeouts":null,"update_config":[{"max_unavailable":1,"max_unavailable_percentage":null,"update_strategy":null}]},"sensitive_values":{"instance_types":[],"launch_template":[],"node_repair_config":[],"remote_access":[],"resources":[],"scaling_config":[{}],"subnet_ids":[],"tags_all":{},"taint":[],"update_config":[{}]}},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"eks.amazonaws.com\",\"ec2.amazonaws.com\"]}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-group-role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy","role":"eks-cluster-group-role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"sensitive_values":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"gateway_id":null,"region":"us-east-1","timeouts":null},"sensitive_values":{}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"sensitive_values":{"egress":[],"ingress":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","force_update_version":null,"labels":null,"launch_template":[],"node_group_name":"example","region":"us-east-1","remote_access":[],"scaling_config":[{"desired_size":1,"max_size":2,"min_size":1}],"tags":null,"taint":[],"timeouts":null,"update_config":[{"max_unavailable":1,"max_unavailable_percentage":null,"update_strategy":null}]},"after_unknown":{"ami_type":true,"arn":true,"capacity_type":true,"disk_size":true,"id":true,"instance_types":true,"launch_template":[],"node_group_name_prefix":true,"node_repair_config":true,"node_role_arn":true,"release_version":true,"remote_access":[],"resources":true,"scaling_config":[{}],"status":true,"subnet_ids":true,"tags_all":true,"taint":[],"update_config":[{}],"version":true},"before_sensitive":false,"after_sensitive":{"instance_types":[],"launch_template":[],"node_repair_config":[],"remote_access":[],"resources":[],"scaling_config":[{}],"subnet_ids":[],"tags_all":{},"taint":[],"update_config":[{}]}}},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"eks.amazonaws.com\",\"ec2.amazonaws.com\"]}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-group-role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy","role":"eks-cluster-group-role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","route":[{"carrier_gateway_id":"","cidr_block":"0.0.0.0/0","core_network_arn":"","destination_prefix_list_id":"","egress_only_gateway_id":"","ipv6_cidr_block":"","local_gateway_id":"","nat_gateway_id":"","network_interface_id":"","transit_gateway_id":"","vpc_endpoint_id":"","vpc_peering_connection_id":""}],"tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"propagating_vgws":true,"route":[{"gateway_id":true}],"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"propagating_vgws":[],"route":[{}],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"gateway_id":null,"region":"us-east-1","timeouts":null},"after_unknown":{"id":true,"route_table_id":true,"subnet_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Allow traffic for Elasticsearch","name":"test-security-group","region":"us-east-1","revoke_rules_on_delete":false,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"egress":true,"id":true,"ingress":true,"name_prefix":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"egress":[],"ingress":[],"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cidr_ipv4":"0.0.0.0/0","cidr_ipv6":null,"description":null,"from_port":null,"ip_protocol":"-1","prefix_list_id":null,"referenced_security_group_id":null,"region":"us-east-1","tags":null,"tags_all":{},"to_port":null},"after_unknown":{"arn":true,"id":true,"security_group_id":true,"security_group_rule_id":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example-cluster.arn","aws_iam_role.example-cluster"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}}]},"schema_version":1},{"address":"aws_eks_node_group.example","mode":"managed","type":"aws_eks_node_group","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"node_group_name":{"constant_value":"example"},"node_role_arn":{"references":["aws_iam_role.example-group.arn","aws_iam_role.example-group"]},"scaling_config":[{"desired_size":{"constant_value":1},"max_size":{"constant_value":2},"min_size":{"constant_value":1}}],"subnet_ids":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1","aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]},"update_config":[{"max_unavailable":{"constant_value":1}}]},"schema_version":0,"depends_on":["aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly"]},{"address":"aws_iam_role.example-cluster","mode":"managed","type":"aws_iam_role","name":"example-cluster","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"eks-cluster-role"}},"schema_version":0},{"address":"aws_iam_role.example-group","mode":"managed","type":"aws_iam_role","name":"example-group","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\"eks.amazonaws.com\", \"ec2.amazonaws.com\"]\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-group-role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example-cluster.name","aws_iam_role.example-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example-cluster.name","aws_iam_role.example-cluster"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEC2ContainerRegistryReadOnly","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKSWorkerNodePolicy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example-AmazonEKS_CNI_Policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"},"role":{"references":["aws_iam_role.example-group.name","aws_iam_role.example-group"]}},"schema_version":0},{"address":"aws_internet_gateway.main","mode":"managed","type":"aws_internet_gateway","name":"main","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table.main","mode":"managed","type":"aws_route_table","name":"main","provider_config_key":"aws","expressions":{"route":{"references":["aws_internet_gateway.main.id","aws_internet_gateway.main"]},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":0},{"address":"aws_route_table_association.first","mode":"managed","type":"aws_route_table_association","name":"first","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.test_eks_1.id","aws_subnet.test_eks_1"]}},"schema_version":0},{"address":"aws_route_table_association.second","mode":"managed","type":"aws_route_table_association","name":"second","provider_config_key":"aws","expressions":{"route_table_id":{"references":["aws_route_table.main.id","aws_route_table.main"]},"subnet_id":{"references":["aws_subnet.test_eks_2.id","aws_subnet.test_eks_2"]}},"schema_version":0},{"address":"aws_security_group.first","mode":"managed","type":"aws_security_group","name":"first","provider_config_key":"aws","expressions":{"description":{"constant_value":"Allow traffic for Elasticsearch"},"name":{"constant_value":"test-security-group"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_1","mode":"managed","type":"aws_subnet","name":"test_eks_1","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[0]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.test_eks_2","mode":"managed","type":"aws_subnet","name":"test_eks_2","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.available.names[1]","data.aws_availability_zones.available.names","data.aws_availability_zones.available"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"aws_vpc_security_group_egress_rule.egress1","mode":"managed","type":"aws_vpc_security_group_egress_rule","name":"egress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"aws_vpc_security_group_ingress_rule.ingress1","mode":"managed","type":"aws_vpc_security_group_ingress_rule","name":"ingress1","provider_config_key":"aws","expressions":{"cidr_ipv4":{"constant_value":"0.0.0.0/0"},"ip_protocol":{"constant_value":"-1"},"security_group_id":{"references":["aws_security_group.first.id","aws_security_group.first"]}},"schema_version":0},{"address":"data.aws_availability_zones.available","mode":"data","type":"aws_availability_zones","name":"available","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.example-cluster","attribute":["name"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_internet_gateway.main","attribute":["id"]},{"resource":"aws_subnet.test_eks_1","attribute":["id"]},{"resource":"aws_iam_role.example-cluster","attribute":["arn"]},{"resource":"aws_subnet.test_eks_2","attribute":["id"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example-group","attribute":["arn"]},{"resource":"aws_iam_role.example-group","attribute":["name"]},{"resource":"data.aws_availability_zones.available","attribute":["names",0]},{"resource":"data.aws_availability_zones.available","attribute":["names",1]},{"resource":"aws_security_group.first","attribute":["id"]},{"resource":"aws_route_table.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:54Z","applyable":true,"complete":true,"errored":false}
|
72 | I need certain workloads in our container platform to be able to pull data from our storage system, but only with tightly scoped permissions, and tied to a specific app identity so everything stays secure and easy to manage. | Create a Terraform script for an AWS EKS setup with pod identity management. Start by defining an IAM policy document (called "example") for assuming a role by EKS pods. Then, create an IAM role (called "example") using this policy. Attach a policy for S3 read-only access to this role. Finally, define an EKS pod identity association linking the role to a specific EKS cluster (called "example"), namespace, and service account. | has one "data" block for "aws_iam_policy_document" named "assume_role"
with one "statement" block containing:
one "effect"
one "principals" block with "type" and "identifiers"
one "actions" list
has one "aws_iam_role" resource named "example"
with one "name"
with one "assume_role_policy" referencing the data block
has one "aws_iam_role_policy_attachment" resource named "example_s3"
with one "policy_arn"
with one "role" referencing the "aws_iam_role.example.name"
has one "aws_eks_pod_identity_association" resource named "example"
with one "cluster_name"
with one "namespace"
with one "service_account"
with one "role_arn" referencing the "aws_iam_role.example.arn" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "example1" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "example2" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
}
resource "aws_iam_role" "example1" {
name = "eks-cluster-1"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example1.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example1.name
}
resource "aws_eks_cluster" "example" {
name = "example"
role_arn = aws_iam_role.example1.arn
vpc_config {
subnet_ids = [aws_subnet.example1.id, aws_subnet.example2.id]
}
depends_on = [
aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy,
]
}
data "aws_iam_policy_document" "assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["pods.eks.amazonaws.com"]
}
actions = [
"sts:AssumeRole",
"sts:TagSession"
]
}
}
resource "aws_iam_role" "example" {
name = "eks-pod-identity-example"
assume_role_policy = data.aws_iam_policy_document.assume_role.json
}
resource "aws_iam_role_policy_attachment" "example_s3" {
policy_arn = "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"
role = aws_iam_role.example.name
}
resource "aws_eks_pod_identity_association" "example" {
cluster_name = aws_eks_cluster.example.name
namespace = "example"
service_account = "example-sa"
role_arn = aws_iam_role.example.arn
} | package terraform.validation
default has_aws_iam_policy_document_assume_role = false
default has_aws_iam_role_example = false
default has_aws_iam_role_policy_attachment_example_s3 = false
default has_aws_eks_pod_identity_association_example = false
has_aws_iam_policy_document_assume_role {
assume_role := input.configuration.root_module.resources[_]
assume_role.type == "aws_iam_policy_document"
assume_role.expressions.statement[_].effect.constant_value == "Allow"
assume_role.expressions.statement[_].principals[_].type.constant_value == "Service"
assume_role.expressions.statement[_].principals[_].identifiers.constant_value[_] == "pods.eks.amazonaws.com"
count(assume_role.expressions.statement[_].actions.constant_value) == 2
assume_role.expressions.statement[_].actions.constant_value[_] == "sts:AssumeRole"
assume_role.expressions.statement[_].actions.constant_value[_] == "sts:TagSession"
}
has_aws_iam_role_example {
role := input.configuration.root_module.resources[_]
role.type == "aws_iam_role"
role.name == "example"
role.expressions.assume_role_policy != null
}
has_aws_iam_role_policy_attachment_example_s3 {
policy_attachment := input.configuration.root_module.resources[_]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.name == "example_s3"
policy_attachment.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"
policy_attachment.expressions.role.references[_] == "aws_iam_role.example.name"
}
has_aws_eks_pod_identity_association_example {
pod_identity := input.configuration.root_module.resources[_]
pod_identity.type == "aws_eks_pod_identity_association"
pod_identity.expressions.cluster_name.references[_] == "aws_eks_cluster.example.name"
pod_identity.expressions.namespace.constant_value == "example"
pod_identity.expressions.role_arn.references[_] == "aws_iam_role.example.arn"
}
valid_configuration {
has_aws_iam_policy_document_assume_role
has_aws_iam_role_example
has_aws_iam_role_policy_attachment_example_s3
has_aws_eks_pod_identity_association_example
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_name":"example","disable_session_tags":false,"namespace":"example","region":"us-east-1","service_account":"example-sa","tags":null,"tags_all":{},"target_role_arn":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-pod-identity-example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"eks-pod-identity-example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"version":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_name":"example","disable_session_tags":false,"namespace":"example","region":"us-east-1","service_account":"example-sa","tags":null,"tags_all":{},"target_role_arn":null},"after_unknown":{"association_arn":true,"association_id":true,"external_id":true,"id":true,"role_arn":true,"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-pod-identity-example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster-1","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"eks-pod-identity-example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"id":"819195744","json":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sts:TagSession\",\n \"sts:AssumeRole\"\n ],\n \"Principal\": {\n \"Service\": \"pods.eks.amazonaws.com\"\n }\n }\n ]\n}","minified_json":"{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Principal\":{\"Service\":\"pods.eks.amazonaws.com\"}}]}","override_json":null,"override_policy_documents":null,"policy_id":null,"source_json":null,"source_policy_documents":null,"statement":[{"actions":["sts:AssumeRole","sts:TagSession"],"condition":[],"effect":"Allow","not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":["pods.eks.amazonaws.com"],"type":"Service"}],"resources":[],"sid":""}],"version":"2012-10-17"},"sensitive_values":{"statement":[{"actions":[false,false],"condition":[],"not_actions":[],"not_principals":[],"not_resources":[],"principals":[{"identifiers":[false]}],"resources":[]}]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.example","mode":"managed","type":"aws_eks_cluster","name":"example","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example1.arn","aws_iam_role.example1"]},"vpc_config":[{"subnet_ids":{"references":["aws_subnet.example1.id","aws_subnet.example1","aws_subnet.example2.id","aws_subnet.example2"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_eks_pod_identity_association.example","mode":"managed","type":"aws_eks_pod_identity_association","name":"example","provider_config_key":"aws","expressions":{"cluster_name":{"references":["aws_eks_cluster.example.name","aws_eks_cluster.example"]},"namespace":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"service_account":{"constant_value":"example-sa"}},"schema_version":0},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"references":["data.aws_iam_policy_document.assume_role.json","data.aws_iam_policy_document.assume_role"]},"name":{"constant_value":"eks-pod-identity-example"}},"schema_version":0},{"address":"aws_iam_role.example1","mode":"managed","type":"aws_iam_role","name":"example1","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster-1"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example1.name","aws_iam_role.example1"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example1.name","aws_iam_role.example1"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.example_s3","mode":"managed","type":"aws_iam_role_policy_attachment","name":"example_s3","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.example1","mode":"managed","type":"aws_subnet","name":"example1","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.example2","mode":"managed","type":"aws_subnet","name":"example2","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1},{"address":"data.aws_iam_policy_document.assume_role","mode":"data","type":"aws_iam_policy_document","name":"assume_role","provider_config_key":"aws","expressions":{"statement":[{"actions":{"constant_value":["sts:AssumeRole","sts:TagSession"]},"effect":{"constant_value":"Allow"},"principals":[{"identifiers":{"constant_value":["pods.eks.amazonaws.com"]},"type":{"constant_value":"Service"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_subnet.example1","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_subnet.example2","attribute":["id"]},{"resource":"data.aws_iam_policy_document.assume_role","attribute":["json"]},{"resource":"aws_iam_role.example1","attribute":["name"]},{"resource":"aws_eks_cluster.example","attribute":["name"]},{"resource":"aws_iam_role.example1","attribute":["arn"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_vpc.main","attribute":["id"]}],"timestamp":"2026-02-18T20:55:58Z","applyable":true,"complete":true,"errored":false}
|
73 | I need to spin up a managed container environment that can reach the rest of our cloud network, and it should be reachable from outside our private network while keeping the setup simple and secure. | Create a Terraform configuration to provision an AWS IAM role with attribute name set to "example" for an Amazon EKS cluster. The role's assume role policy should allow access for EKS services. Attach the AmazonEKSClusterPolicy to this role. Additionally, define an AWS EKS cluster with a name set to "example", with a subnet and attached VPC. Ensure proper dependency handling for the IAM role's policy attachment during the EKS cluster creation process. The EKS cluster's endpoint private access should be set to false, and endpoint public access set to true | has one "aws_iam_role"
with one "name"
with one "assume_role_policy"
has one "aws_iam_role_policy_attachment"
with one "policy_arn"
with one "role" referencing the "aws_iam_role.eks.name"
has one "aws_eks_cluster"
with one "name"
with one "version"
with one "role_arn"
with one "vpc_config" containing "endpoint_private_access", "endpoint_public_access", and "subnet_ids"
| terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "private-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "public-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
}
resource "aws_iam_role" "example" {
name = "example"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "eks" {
name = "example"
version = "test-version"
role_arn = aws_iam_role.example.arn
vpc_config {
endpoint_private_access = false
endpoint_public_access = true
subnet_ids = [
aws_subnet.private-us-east-1a.id,
aws_subnet.public-us-east-1a.id
]
}
depends_on = [aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy]
} | package terraform.analysis
default has_aws_iam_role = false
default has_aws_iam_role_policy_attachment = false
default has_aws_eks_cluster = false
has_aws_iam_role {
r := input.configuration.root_module.resources[_]
r.type == "aws_iam_role"
r.expressions.name.constant_value == "example"
r.expressions.assume_role_policy
}
has_aws_iam_role_policy_attachment {
r := input.configuration.root_module.resources[_]
r.type == "aws_iam_role_policy_attachment"
r.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
r.expressions.role.references != null
}
has_aws_eks_cluster {
r := input.configuration.root_module.resources[_]
r.type == "aws_eks_cluster"
r.expressions.role_arn
r.expressions.vpc_config[_].endpoint_private_access.constant_value == false
r.expressions.vpc_config[_].endpoint_public_access.constant_value == true
count(r.expressions.vpc_config[_].subnet_ids.references) == 4
}
valid_config {
has_aws_iam_role
has_aws_iam_role_policy_attachment
has_aws_eks_cluster
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"example"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"example","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"test-version","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":true,"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"example","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"example"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.eks","mode":"managed","type":"aws_eks_cluster","name":"eks","provider_config_key":"aws","expressions":{"name":{"constant_value":"example"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"test-version"},"vpc_config":[{"endpoint_private_access":{"constant_value":false},"endpoint_public_access":{"constant_value":true},"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a","aws_subnet.public-us-east-1a.id","aws_subnet.public-us-east-1a"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"example"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_subnet.public-us-east-1a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:01Z","applyable":true,"complete":true,"errored":false}
|
74 | I need to spin up a managed environment for running containerized workloads, and it should plug into my network and be reachable from the outside while keeping the setup straightforward and secure. | Generate Terraform code to set up an AWS IAM role named 'eks-cluster' for an Amazon EKS cluster. Ensure the role's assume role policy allows access for EKS services and attach the AmazonEKSClusterPolicy to this role. Create an AWS EKS cluster with a name and version, attaching it to a subnet and VPC from us-east-1. Ensure proper dependency handling for the IAM role's policy attachment during EKS cluster creation. The EKS cluster's endpoint private access should be set to false, and endpoint public access set to true | has one "aws_iam_role"
with one "name"
with one "assume_role_policy"
has one "aws_iam_role_policy_attachment"
with one "policy_arn"
with one "role" referencing the "aws_iam_role.eks.name"
has one "aws_eks_cluster"
with one "name"
with one "version"
with one "role_arn"
with one "vpc_config" containing "endpoint_private_access", "endpoint_public_access", and "subnet_ids" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
}
resource "aws_subnet" "private-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "public-us-east-1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
}
resource "aws_iam_role" "example" {
name = "eks-cluster"
assume_role_policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "eks.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
POLICY
}
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
role = aws_iam_role.example.name
}
resource "aws_iam_role_policy_attachment" "eks_service_policy" {
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
role = aws_iam_role.example.name
}
resource "aws_eks_cluster" "cluster" {
name = "test"
version = "1.22"
role_arn = aws_iam_role.example.arn
vpc_config {
endpoint_private_access = false
endpoint_public_access = true
public_access_cidrs = ["0.0.0.0/0"]
subnet_ids = [
aws_subnet.private-us-east-1a.id,
aws_subnet.public-us-east-1a.id,
]
}
depends_on = [aws_iam_role_policy_attachment.eks_cluster_policy,
aws_iam_role_policy_attachment.eks_service_policy]
} | package terraform.analysis
default has_aws_iam_role = false
default has_aws_iam_role_policy_attachment = false
default has_aws_eks_cluster = false
has_aws_iam_role {
role := input.configuration.root_module.resources[_]
role.type == "aws_iam_role"
role.expressions.assume_role_policy
}
has_aws_iam_role_policy_attachment {
policy_attachment := input.configuration.root_module.resources[_]
policy_attachment.type == "aws_iam_role_policy_attachment"
policy_attachment.expressions.policy_arn.constant_value == "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
policy_attachment.expressions.role
}
has_aws_eks_cluster {
cluster := input.configuration.root_module.resources[_]
cluster.type = "aws_eks_cluster"
cluster.expressions.name
cluster.expressions.version
cluster.expressions.role_arn
cluster.expressions.vpc_config[_].endpoint_private_access.constant_value == false
cluster.expressions.vpc_config[_].endpoint_public_access.constant_value == true
cluster.expressions.vpc_config[_].subnet_ids
count(cluster.expressions.vpc_config[_].subnet_ids.references) >= 4
}
valid_config {
has_aws_iam_role
has_aws_iam_role_policy_attachment
has_aws_eks_cluster
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"1.22","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"public_access_cidrs":["0.0.0.0/0"],"security_group_ids":null}],"zonal_shift_config":[]},"sensitive_values":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[false],"subnet_ids":[]}],"zonal_shift_config":[]}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bootstrap_self_managed_addons":true,"enabled_cluster_log_types":null,"encryption_config":[],"force_update_version":null,"name":"test","outpost_config":[],"region":"us-east-1","remote_network_config":[],"tags":null,"timeouts":null,"version":"1.22","vpc_config":[{"endpoint_private_access":false,"endpoint_public_access":true,"public_access_cidrs":["0.0.0.0/0"],"security_group_ids":null}],"zonal_shift_config":[]},"after_unknown":{"access_config":true,"arn":true,"certificate_authority":true,"cluster_id":true,"compute_config":true,"control_plane_scaling_config":true,"created_at":true,"deletion_protection":true,"encryption_config":[],"endpoint":true,"id":true,"identity":true,"kubernetes_network_config":true,"outpost_config":[],"platform_version":true,"remote_network_config":[],"role_arn":true,"status":true,"storage_config":true,"tags_all":true,"upgrade_policy":true,"vpc_config":[{"cluster_security_group_id":true,"public_access_cidrs":[false],"subnet_ids":true,"vpc_id":true}],"zonal_shift_config":[]},"before_sensitive":false,"after_sensitive":{"access_config":[],"certificate_authority":[],"compute_config":[],"control_plane_scaling_config":[],"encryption_config":[],"identity":[],"kubernetes_network_config":[],"outpost_config":[],"remote_network_config":[],"storage_config":[],"tags_all":{},"upgrade_policy":[],"vpc_config":[{"public_access_cidrs":[false],"subnet_ids":[]}],"zonal_shift_config":[]}}},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"eks-cluster","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy","role":"eks-cluster"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy","role":"eks-cluster"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_dns_hostnames":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_eks_cluster.cluster","mode":"managed","type":"aws_eks_cluster","name":"cluster","provider_config_key":"aws","expressions":{"name":{"constant_value":"test"},"role_arn":{"references":["aws_iam_role.example.arn","aws_iam_role.example"]},"version":{"constant_value":"1.22"},"vpc_config":[{"endpoint_private_access":{"constant_value":false},"endpoint_public_access":{"constant_value":true},"public_access_cidrs":{"constant_value":["0.0.0.0/0"]},"subnet_ids":{"references":["aws_subnet.private-us-east-1a.id","aws_subnet.private-us-east-1a","aws_subnet.public-us-east-1a.id","aws_subnet.public-us-east-1a"]}}]},"schema_version":1,"depends_on":["aws_iam_role_policy_attachment.eks_cluster_policy","aws_iam_role_policy_attachment.eks_service_policy"]},{"address":"aws_iam_role.example","mode":"managed","type":"aws_iam_role","name":"example","provider_config_key":"aws","expressions":{"assume_role_policy":{"constant_value":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"},"name":{"constant_value":"eks-cluster"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_cluster_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_cluster_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.eks_service_policy","mode":"managed","type":"aws_iam_role_policy_attachment","name":"eks_service_policy","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonEKSServicePolicy"},"role":{"references":["aws_iam_role.example.name","aws_iam_role.example"]}},"schema_version":0},{"address":"aws_subnet.private-us-east-1a","mode":"managed","type":"aws_subnet","name":"private-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.1.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.public-us-east-1a","mode":"managed","type":"aws_subnet","name":"public-us-east-1a","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.2.0/24"},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_iam_role.example","attribute":["arn"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.private-us-east-1a","attribute":["id"]},{"resource":"aws_iam_role.example","attribute":["name"]},{"resource":"aws_subnet.public-us-east-1a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:08Z","applyable":true,"complete":true,"errored":false}
|
75 | I need a place to keep some files, but it has to block anyone coming from a certain network, and I want the access rules written down clearly so they’re easy to manage later. | Create an AWS S3 bucket named 'my_bucket' and define an S3 bucket policy to deny access from a specific IP address. Ensure that the S3 bucket policy includes a version number, an identifier, and a statement that denies all S3 actions for the specified IP address. Use the 'jsonencode' function to encode the policy in JSON format. | has one "aws_s3_bucket" resource
with one "bucket"
has one "aws_s3_bucket_policy"
with one "bucket"
with one "policy" | provider "aws" {
region = "us-west-1"
}
resource "aws_s3_bucket" "a" {
bucket = "test_bucket"
}
resource "aws_s3_bucket_policy" "b" {
bucket = aws_s3_bucket.a.id
policy = jsonencode({
"Version" : "2012-10-17",
"Id" : "my_policy",
"Statement" : [
{
"Sid" : "IPAllow",
"Effect" : "Deny",
"Principal" : "*",
"Action" : "s3:*",
"Resource" : "arn:aws:s3:::test_bucket/*",
"Condition" : {
"IpAddress" : { "aws:SourceIp" : "1.2.3.4/32" }
}
}
]
})
} | package terraform.validation
default valid_configuration = false
default has_s3_bucket = false
default has_s3_bucket_policy = false
# Check for if any aws_s3_bucket with "bucket"
has_s3_bucket {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket"
resource.expressions.bucket.constant_value != null
}
# Check for if any aws_s3_bucket_policy with "bucket" "policy"
has_s3_bucket_policy{
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket_policy"
resource.expressions.bucket.references != null
has_policy(resource.name)
}
has_policy(policy_name){
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket_policy"
resource.name == policy_name
resource.expressions.policy != null
}
valid_configuration{
has_s3_bucket
has_s3_bucket_policy
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"test_bucket","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy":"{\"Id\":\"my_policy\",\"Statement\":[{\"Action\":\"s3:*\",\"Condition\":{\"IpAddress\":{\"aws:SourceIp\":\"1.2.3.4/32\"}},\"Effect\":\"Deny\",\"Principal\":\"*\",\"Resource\":\"arn:aws:s3:::test_bucket/*\",\"Sid\":\"IPAllow\"}],\"Version\":\"2012-10-17\"}","region":"us-west-1"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"test_bucket","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy":"{\"Id\":\"my_policy\",\"Statement\":[{\"Action\":\"s3:*\",\"Condition\":{\"IpAddress\":{\"aws:SourceIp\":\"1.2.3.4/32\"}},\"Effect\":\"Deny\",\"Principal\":\"*\",\"Resource\":\"arn:aws:s3:::test_bucket/*\",\"Sid\":\"IPAllow\"}],\"Version\":\"2012-10-17\"}","region":"us-west-1"},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"test_bucket"}},"schema_version":0},{"address":"aws_s3_bucket_policy.b","mode":"managed","type":"aws_s3_bucket_policy","name":"b","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.a.id","aws_s3_bucket.a"]},"policy":{}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.a","attribute":["id"]}],"timestamp":"2026-02-18T20:56:13Z","applyable":true,"complete":true,"errored":false}
|
76 | I need a secure place to store some files where everything stays private by default, is encrypted automatically, and can’t accidentally be exposed to the public. | Create an AWS S3 bucket named 'test-bucket' with preventive destruction measures, private ACLs, AES256 server-side encryption, and a public access block restricting public access. | has one "aws_s3_bucket" resource
with one "bucket"
has one "aws_s3_bucket_acl"
with one "bucket"
with one "acl" or "access_control_policy"
has one "aws_s3_bucket_public_access_block"
with one "bucket"
has one "aws_s3_bucket_server_side_encryption_configuration"
with one "bucket"
with one "rule" | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "backstage" {
bucket_prefix = "test-bucket-"
}
resource "aws_s3_bucket_ownership_controls" "example" {
bucket = aws_s3_bucket.backstage.id
rule {
object_ownership = "BucketOwnerPreferred"
}
}
resource "aws_s3_bucket_acl" "backstage_acl" {
depends_on = [ aws_s3_bucket_ownership_controls.example ]
bucket = aws_s3_bucket.backstage.id
acl = "private"
}
resource "aws_s3_bucket_server_side_encryption_configuration" "backstage_server_side_encription" {
bucket = aws_s3_bucket.backstage.id
rule {
apply_server_side_encryption_by_default {
sse_algorithm = "AES256"
}
}
}
resource "aws_s3_bucket_public_access_block" "backstage" {
bucket = aws_s3_bucket.backstage.id
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
} | package terraform.validation
default valid_configuration = false
default has_s3_bucket = false
default has_aws_s3_bucket_acl = false
default has_aws_s3_bucket_public_access_block = false
default has_aws_s3_bucket_server_side_encryption_configuration = false
has_s3_bucket {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket"
# resource.name == "backstage"
# some i
# resource.expressions.bucket.references[i] == "var.bucket_name"
}
has_aws_s3_bucket_acl{
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket_acl"
# resource.name == "backstage"
resource.expressions.acl.constant_value != null
}
has_aws_s3_bucket_public_access_block{
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket_public_access_block"
resource.expressions.bucket.references != null
}
has_aws_s3_bucket_server_side_encryption_configuration{
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket_server_side_encryption_configuration"
# resource.name == "backstage"
# some i, j, k
# resource.expressions.server_side_encryption_configuration[i].rule[j].apply_server_side_encryption_by_default[k].sse_algorithm.constant_value == "AES256" != null
some i, j
resource.expressions.rule[i].apply_server_side_encryption_by_default[j].sse_algorithm.constant_value == "AES256"
}
valid_configuration{
has_s3_bucket
has_aws_s3_bucket_acl
has_aws_s3_bucket_public_access_block
has_aws_s3_bucket_server_side_encryption_configuration
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket_prefix":"test-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"acl":"private","expected_bucket_owner":null,"region":"us-east-1"},"sensitive_values":{"access_control_policy":[]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","rule":[{"object_ownership":"BucketOwnerPreferred"}]},"sensitive_values":{"rule":[{}]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"sensitive_values":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket_prefix":"test-bucket-","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket":true,"bucket_domain_name":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"acl":"private","expected_bucket_owner":null,"region":"us-east-1"},"after_unknown":{"access_control_policy":true,"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{"access_control_policy":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","rule":[{"object_ownership":"BucketOwnerPreferred"}]},"after_unknown":{"bucket":true,"id":true,"rule":[{}]},"before_sensitive":false,"after_sensitive":{"rule":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"after_unknown":{"bucket":true,"id":true,"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"before_sensitive":false,"after_sensitive":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.backstage","mode":"managed","type":"aws_s3_bucket","name":"backstage","provider_config_key":"aws","expressions":{"bucket_prefix":{"constant_value":"test-bucket-"}},"schema_version":0},{"address":"aws_s3_bucket_acl.backstage_acl","mode":"managed","type":"aws_s3_bucket_acl","name":"backstage_acl","provider_config_key":"aws","expressions":{"acl":{"constant_value":"private"},"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]}},"schema_version":0,"depends_on":["aws_s3_bucket_ownership_controls.example"]},{"address":"aws_s3_bucket_ownership_controls.example","mode":"managed","type":"aws_s3_bucket_ownership_controls","name":"example","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"rule":[{"object_ownership":{"constant_value":"BucketOwnerPreferred"}}]},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.backstage","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"backstage","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0},{"address":"aws_s3_bucket_server_side_encryption_configuration.backstage_server_side_encription","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"backstage_server_side_encription","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.backstage.id","aws_s3_bucket.backstage"]},"rule":[{"apply_server_side_encryption_by_default":[{"sse_algorithm":{"constant_value":"AES256"}}]}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.backstage","attribute":["id"]}],"timestamp":"2026-02-18T20:56:23Z","applyable":true,"complete":true,"errored":false}
|
77 | I need a place to keep files where old versions are preserved automatically, and it should be locked down so only our own account is recognized as the owner. | Create a bucket "sample". Implement versioning resource for the AWS S3 bucket named 'sample' with the versioning status set to 'Enabled' and specify the expected_bucket_owner as '123456789012' to ensure ownership consistency. | has one aws_s3_bucket resource
with bucket
has one "aws_s3_bucket_versioning" resource
with bucket
with versionaning_configuration
with status | provider "aws" {
region = "us-west-1"
}
resource "aws_s3_bucket" "sample" {
bucket = "sample"
}
resource "aws_s3_bucket_versioning" "sample" {
bucket = "sample"
versioning_configuration {
status = "Enabled"
}
expected_bucket_owner = "123456789012"
} | package terraform.validation
default has_s3_bucket_versioning = false
default has_s3_bucket = false
default valid_configuration = false
has_s3_bucket {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_s3_bucket"
resource.name == "sample"
}
has_s3_bucket_versioning {
versioning := input.planned_values.root_module.resources[_]
versioning.type == "aws_s3_bucket_versioning"
versioning.values.bucket == "sample"
versioning.values.expected_bucket_owner == "123456789012"
versioning.values.versioning_configuration[_].status == "Enabled"
}
valid_configuration {
has_s3_bucket
has_s3_bucket_versioning
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"sample","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"sample","expected_bucket_owner":"123456789012","mfa":null,"region":"us-west-1","versioning_configuration":[{"status":"Enabled"}]},"sensitive_values":{"versioning_configuration":[{}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"sample","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"sample","expected_bucket_owner":"123456789012","mfa":null,"region":"us-west-1","versioning_configuration":[{"status":"Enabled"}]},"after_unknown":{"id":true,"versioning_configuration":[{"mfa_delete":true}]},"before_sensitive":false,"after_sensitive":{"versioning_configuration":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.sample","mode":"managed","type":"aws_s3_bucket","name":"sample","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"sample"}},"schema_version":0},{"address":"aws_s3_bucket_versioning.sample","mode":"managed","type":"aws_s3_bucket_versioning","name":"sample","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"sample"},"expected_bucket_owner":{"constant_value":"123456789012"},"versioning_configuration":[{"status":{"constant_value":"Enabled"}}]},"schema_version":0}]}},"timestamp":"2026-02-18T20:56:22Z","applyable":true,"complete":true,"errored":false}
|
78 | I need a reliable place to keep my infrastructure setup files so changes don’t get lost, plus some way to prevent multiple people from editing them at the same time, and it all needs to be protected against accidental removal and kept private. | Set up an AWS S3 bucket and DynamoDB table for Terraform state management. Ensure the S3 bucket has preventive measures against accidental deletion and is configured with versioning enabled, server-side encryption using AES256, and public access restrictions. Create a DynamoDB table with a hash key named 'LockID' using 'PAY_PER_REQUEST' billing mode for Terraform locking. | has one aws_s3_bucket_versioning resource
with bucket
with status
has one aws_dynamodb_table resource
with name
with hash_key
has one aws_s3_bucket_lifecycle_configuration resource
with bucket
with rule
with id
with status
with action
with transition
with days
with storage_class
has one aws_s3_bucket_server_side_encryption_configuration resource
with bucket
with rule
with apply_server_side_encryption_by_default
with sse_algorithm
has one aws_s3_bucket_public_access_block resource
with bucket
with block_public_acls (boolean)
with block_public_policy (boolean)
with ignore_public_acls (boolean)
with restrict_public_buckets(boolean)
has one aws_dynamodb_table resource
with name
with hash_key
with attribute
with name
with type | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_s3_bucket" "terraform_state" {
bucket = "iac-misc-terraform-state"
}
resource "aws_s3_bucket_versioning" "enabled" {
bucket = aws_s3_bucket.terraform_state.id
versioning_configuration {
status = "Enabled"
}
}
resource "aws_s3_bucket_server_side_encryption_configuration" "default" {
bucket = aws_s3_bucket.terraform_state.id
rule {
apply_server_side_encryption_by_default {
sse_algorithm = "AES256"
}
}
}
resource "aws_s3_bucket_public_access_block" "public_access" {
bucket = aws_s3_bucket.terraform_state.id
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
resource "aws_dynamodb_table" "terraform_locks" {
name = "iac-misc-terraform-locks"
billing_mode = "PAY_PER_REQUEST"
hash_key = "LockID"
attribute {
name = "LockID"
type = "S"
}
} | package terraform.validation
default has_s3_bucket_versioning = false
default has_dynamodb_table = false
default has_s3_bucket_server_side_encryption_configuration = false
default has_s3_bucket_public_access_block = false
default valid_configuration = false
# Check for aws_s3_bucket_versioning resource with 'bucket' and 'status'
has_s3_bucket_versioning {
versioning := input.planned_values.root_module.resources[_]
versioning.type == "aws_s3_bucket_versioning"
versioning.values.versioning_configuration[_].status == "Enabled"
}
# Check for aws_dynamodb_table resource with 'name' and 'hash_key'
has_dynamodb_table {
some i
table := input.planned_values.root_module.resources[i]
table.type == "aws_dynamodb_table"
table.values.name != null
table.values.hash_key != null
}
# Check for aws_s3_bucket_server_side_encryption_configuration resource with 'bucket', 'rule', and 'sse_algorithm'
has_s3_bucket_server_side_encryption_configuration {
some i
encryption := input.planned_values.root_module.resources[i]
encryption.type == "aws_s3_bucket_server_side_encryption_configuration"
encryption.values.rule != null
encryption.values.rule[0].apply_server_side_encryption_by_default != null
encryption.values.rule[0].apply_server_side_encryption_by_default[0].sse_algorithm != null
}
# Check for aws_s3_bucket_public_access_block resource with 'bucket' and boolean flags
has_s3_bucket_public_access_block {
some i
access_block := input.planned_values.root_module.resources[i]
access_block.type == "aws_s3_bucket_public_access_block"
access_block.values.block_public_acls == true
access_block.values.block_public_policy == true
access_block.values.ignore_public_acls == true
access_block.values.restrict_public_buckets == true
}
# Combined validation rule
valid_configuration {
has_s3_bucket_versioning
has_dynamodb_table
has_s3_bucket_server_side_encryption_configuration
has_s3_bucket_public_access_block
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"attribute":[{"name":"LockID","type":"S"}],"billing_mode":"PAY_PER_REQUEST","deletion_protection_enabled":null,"hash_key":"LockID","import_table":[],"local_secondary_index":[],"name":"iac-misc-terraform-locks","on_demand_throughput":[],"range_key":null,"region":"us-east-1","replica":[],"restore_date_time":null,"restore_source_name":null,"restore_source_table_arn":null,"restore_to_latest_time":null,"stream_enabled":null,"table_class":null,"tags":null,"timeouts":null},"sensitive_values":{"attribute":[{}],"global_secondary_index":[],"global_table_witness":[],"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":[],"replica":[],"server_side_encryption":[],"tags_all":{},"ttl":[],"warm_throughput":[]}},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"iac-misc-terraform-state","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"sensitive_values":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"expected_bucket_owner":null,"mfa":null,"region":"us-east-1","versioning_configuration":[{"status":"Enabled"}]},"sensitive_values":{"versioning_configuration":[{}]},"identity_schema_version":1,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"attribute":[{"name":"LockID","type":"S"}],"billing_mode":"PAY_PER_REQUEST","deletion_protection_enabled":null,"hash_key":"LockID","import_table":[],"local_secondary_index":[],"name":"iac-misc-terraform-locks","on_demand_throughput":[],"range_key":null,"region":"us-east-1","replica":[],"restore_date_time":null,"restore_source_name":null,"restore_source_table_arn":null,"restore_to_latest_time":null,"stream_enabled":null,"table_class":null,"tags":null,"timeouts":null},"after_unknown":{"arn":true,"attribute":[{}],"global_secondary_index":true,"global_table_witness":true,"id":true,"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":true,"read_capacity":true,"replica":[],"server_side_encryption":true,"stream_arn":true,"stream_label":true,"stream_view_type":true,"tags_all":true,"ttl":true,"warm_throughput":true,"write_capacity":true},"before_sensitive":false,"after_sensitive":{"attribute":[{}],"global_secondary_index":[],"global_table_witness":[],"import_table":[],"local_secondary_index":[],"on_demand_throughput":[],"point_in_time_recovery":[],"replica":[],"server_side_encryption":[],"tags_all":{},"ttl":[],"warm_throughput":[]}}},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"iac-misc-terraform-state","force_destroy":false,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"ignore_public_acls":true,"region":"us-east-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"bucket":true,"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"region":"us-east-1","rule":[{"apply_server_side_encryption_by_default":[{"kms_master_key_id":"","sse_algorithm":"AES256"}],"blocked_encryption_types":[],"bucket_key_enabled":null}]},"after_unknown":{"bucket":true,"id":true,"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"before_sensitive":false,"after_sensitive":{"rule":[{"apply_server_side_encryption_by_default":[{}],"blocked_encryption_types":[]}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"expected_bucket_owner":null,"mfa":null,"region":"us-east-1","versioning_configuration":[{"status":"Enabled"}]},"after_unknown":{"bucket":true,"id":true,"versioning_configuration":[{"mfa_delete":true}]},"before_sensitive":false,"after_sensitive":{"versioning_configuration":[{}]},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_dynamodb_table.terraform_locks","mode":"managed","type":"aws_dynamodb_table","name":"terraform_locks","provider_config_key":"aws","expressions":{"attribute":[{"name":{"constant_value":"LockID"},"type":{"constant_value":"S"}}],"billing_mode":{"constant_value":"PAY_PER_REQUEST"},"hash_key":{"constant_value":"LockID"},"name":{"constant_value":"iac-misc-terraform-locks"}},"schema_version":1},{"address":"aws_s3_bucket.terraform_state","mode":"managed","type":"aws_s3_bucket","name":"terraform_state","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"iac-misc-terraform-state"}},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.public_access","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"public_access","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0},{"address":"aws_s3_bucket_server_side_encryption_configuration.default","mode":"managed","type":"aws_s3_bucket_server_side_encryption_configuration","name":"default","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"rule":[{"apply_server_side_encryption_by_default":[{"sse_algorithm":{"constant_value":"AES256"}}]}]},"schema_version":0},{"address":"aws_s3_bucket_versioning.enabled","mode":"managed","type":"aws_s3_bucket_versioning","name":"enabled","provider_config_key":"aws","expressions":{"bucket":{"references":["aws_s3_bucket.terraform_state.id","aws_s3_bucket.terraform_state"]},"versioning_configuration":[{"status":{"constant_value":"Enabled"}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_s3_bucket.terraform_state","attribute":["id"]}],"timestamp":"2026-02-18T20:56:43Z","applyable":true,"complete":true,"errored":false}
|
79 | I need a place to store files where the people downloading them, not us, should cover the access costs, and it should be simple to manage. | create a bucket 'pike-680235478471'. Set up request payment configuration for an AWS S3 bucket named 'pike-680235478471', specifying the payer as 'Requester'. | has one aws_s3_bucket resource
with bucket
has one aws_s3_bucket_request_payment_configuration resource
with bucket
with payer (BucketOwner or Requester) | provider "aws" {
region = "us-west-1"
}
resource "aws_s3_bucket" "a" {
bucket = "pike-680235478471"
}
resource "aws_s3_bucket_request_payment_configuration" "pike" {
bucket = "pike-680235478471"
payer = "Requester"
} | package terraform.validation
default has_s3_bucket = false
default has_s3_bucket_request_payment_configuration = false
default valid_configuration = false
has_s3_bucket {
some i
bucket := input.planned_values.root_module.resources[i]
bucket.type == "aws_s3_bucket"
bucket.values.bucket == "pike-680235478471"
}
has_s3_bucket_request_payment_configuration {
some i
payment_config := input.planned_values.root_module.resources[i]
payment_config.type == "aws_s3_bucket_request_payment_configuration"
payment_config.values.bucket == "pike-680235478471"
payment_config.values.payer == "Requester"
}
valid_configuration {
has_s3_bucket
has_s3_bucket_request_payment_configuration
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","expected_bucket_owner":null,"payer":"Requester","region":"us-west-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","expected_bucket_owner":null,"payer":"Requester","region":"us-west-1"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"}},"schema_version":0},{"address":"aws_s3_bucket_request_payment_configuration.pike","mode":"managed","type":"aws_s3_bucket_request_payment_configuration","name":"pike","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"},"payer":{"constant_value":"Requester"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:56:50Z","applyable":true,"complete":true,"errored":false}
|
80 | I need to make sure that a place where we keep files isn’t accidentally exposed to the outside world, and it should default to being as locked down as possible. | Implement public access block settings for an AWS S3 bucket named 'pike-680235478471' to block public ACLs, public policies, and restrict public buckets. | has one aws_s3_bucket resource
with bucket
has one aws_s3_bucket_public_access_block resource
with bucket
with block_public_acls (boolean)
with block_public_policy (boolean)
with ignore_public_acls (boolean)
with restrict_public_buckets (boolean) | provider "aws" {
region = "us-west-1"
}
resource "aws_s3_bucket" "a" {
bucket = "pike-680235478471"
}
resource "aws_s3_bucket_public_access_block" "example" {
bucket = "pike-680235478471"
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
} | package terraform.validation
default has_s3_bucket = false
default has_s3_bucket_public_access_block = false
default valid_configuration = false
has_s3_bucket {
resource := input.planned_values.root_module.resources[_]
resource.type == "aws_s3_bucket"
resource.values.bucket == "pike-680235478471"
}
has_s3_bucket_public_access_block {
some i
resource := input.planned_values.root_module.resources[i]
resource.type == "aws_s3_bucket_public_access_block"
resource.values.bucket == "pike-680235478471"
resource.values.block_public_acls == true
resource.values.block_public_policy == true
resource.values.ignore_public_acls == true
resource.values.restrict_public_buckets == true
}
valid_configuration {
has_s3_bucket
has_s3_bucket_public_access_block
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"sensitive_values":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"block_public_acls":true,"block_public_policy":true,"bucket":"pike-680235478471","ignore_public_acls":true,"region":"us-west-1","restrict_public_buckets":true,"skip_destroy":null},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"bucket":"pike-680235478471","force_destroy":false,"region":"us-west-1","tags":null,"timeouts":null},"after_unknown":{"acceleration_status":true,"acl":true,"arn":true,"bucket_domain_name":true,"bucket_prefix":true,"bucket_region":true,"bucket_regional_domain_name":true,"cors_rule":true,"grant":true,"hosted_zone_id":true,"id":true,"lifecycle_rule":true,"logging":true,"object_lock_configuration":true,"object_lock_enabled":true,"policy":true,"replication_configuration":true,"request_payer":true,"server_side_encryption_configuration":true,"tags_all":true,"versioning":true,"website":true,"website_domain":true,"website_endpoint":true},"before_sensitive":false,"after_sensitive":{"cors_rule":[],"grant":[],"lifecycle_rule":[],"logging":[],"object_lock_configuration":[],"replication_configuration":[],"server_side_encryption_configuration":[],"tags_all":{},"versioning":[],"website":[]},"after_identity":{"account_id":null,"bucket":null,"region":null}}},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"block_public_acls":true,"block_public_policy":true,"bucket":"pike-680235478471","ignore_public_acls":true,"region":"us-west-1","restrict_public_buckets":true,"skip_destroy":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"bucket":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket.a","mode":"managed","type":"aws_s3_bucket","name":"a","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"pike-680235478471"}},"schema_version":0},{"address":"aws_s3_bucket_public_access_block.example","mode":"managed","type":"aws_s3_bucket_public_access_block","name":"example","provider_config_key":"aws","expressions":{"block_public_acls":{"constant_value":true},"block_public_policy":{"constant_value":true},"bucket":{"constant_value":"pike-680235478471"},"ignore_public_acls":{"constant_value":true},"restrict_public_buckets":{"constant_value":true}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:01Z","applyable":true,"complete":true,"errored":false}
|
81 | I need to place a new file into our cloud storage in a way that keeps things simple and lets me control where it goes. | Craft a Terraform configuration for creating an AWS S3 bucket object. Define an S3 bucket object (with value "object") with specific attributes including the bucket name (with value "your_bucket_name"), object key (with value "new_object_key"), and the path to the source file (with value "path/to/file"). | Resource "aws_s3_bucket_object"
has one "bucket"
has one "key"
has one "source"
has one "etag" | provider "aws" {
region = "us-west-1"
}
resource "aws_s3_bucket_object" "object" {
bucket = "your_bucket_name"
key = "new_object_key"
source = "path/to/file"
} | package terraform.validation
default has_aws_s3_bucket_object = false
has_aws_s3_bucket_object {
object := input.planned_values.root_module.resources[_]
object.type == "aws_s3_bucket_object"
object.name == "object"
object.values.bucket == "your_bucket_name"
object.values.key == "new_object_key"
object.values.source == "path/to/file"
}
valid_configuration {
has_aws_s3_bucket_object
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"acl":"private","bucket":"your_bucket_name","cache_control":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"new_object_key","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"region":"us-west-1","source":"path/to/file","source_hash":null,"tags":null,"website_redirect":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"bucket":null,"key":null,"region":null}}]}},"resource_changes":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"acl":"private","bucket":"your_bucket_name","cache_control":null,"content":null,"content_base64":null,"content_disposition":null,"content_encoding":null,"content_language":null,"force_destroy":false,"key":"new_object_key","metadata":null,"object_lock_legal_hold_status":null,"object_lock_mode":null,"object_lock_retain_until_date":null,"region":"us-west-1","source":"path/to/file","source_hash":null,"tags":null,"website_redirect":null},"after_unknown":{"arn":true,"bucket_key_enabled":true,"content_type":true,"etag":true,"id":true,"kms_key_id":true,"server_side_encryption":true,"storage_class":true,"tags_all":true,"version_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"bucket":null,"key":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-west-1"}}}},"root_module":{"resources":[{"address":"aws_s3_bucket_object.object","mode":"managed","type":"aws_s3_bucket_object","name":"object","provider_config_key":"aws","expressions":{"bucket":{"constant_value":"your_bucket_name"},"key":{"constant_value":"new_object_key"},"source":{"constant_value":"path/to/file"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:11Z","applyable":true,"complete":true,"errored":false}
|
82 | I need a way to automatically pick the newest stable system image for our servers so we’re always starting from an up‑to‑date base without having to track it manually. | Create an AWS aws_ami resource for the latest Amazon Linux 2 AMI | create aws_ami resource with name = any | provider "aws" {
region = "us-east-1"
}
data "aws_ami" "latest_amazon_linux_2" {
most_recent = true
owners = ["amazon"]
filter {
name = "name"
values = ["amzn2-ami-hvm-*-x86_64-gp2"]
}
} | package terraform
default ami_latest_amazon_linux_2 = false
ami_latest_amazon_linux_2 {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_ami"
resource.name == "latest_amazon_linux_2"
resource.expressions.filter[_].name.constant_value == "name"
resource.expressions.filter[_].values.constant_value[_] == "amzn2-ami-hvm-*-x86_64-gp2"
resource.expressions.most_recent.constant_value == true
resource.expressions.owners.constant_value[_] == "amazon"
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{}},"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_unsafe_filter":null,"architecture":"x86_64","arn":"arn:aws:ec2:us-east-1::image/ami-0e349888043265b96","block_device_mappings":[{"device_name":"/dev/xvda","ebs":{"delete_on_termination":"true","encrypted":"false","iops":"0","snapshot_id":"snap-0a7144882096adc05","throughput":"0","volume_initialization_rate":"0","volume_size":"8","volume_type":"gp2"},"no_device":"","virtual_name":""}],"boot_mode":"","creation_date":"2026-02-04T02:08:09.000Z","deprecation_time":"2026-05-05T02:13:00.000Z","description":"Amazon Linux 2 AMI 2.0.20260202.2 x86_64 HVM gp2","ena_support":true,"executable_users":null,"filter":[{"name":"name","values":["amzn2-ami-hvm-*-x86_64-gp2"]}],"hypervisor":"xen","id":"ami-0e349888043265b96","image_id":"ami-0e349888043265b96","image_location":"amazon/amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","image_owner_alias":"amazon","image_type":"machine","imds_support":"","include_deprecated":false,"kernel_id":"","last_launched_time":"","most_recent":true,"name":"amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","name_regex":null,"owner_id":"137112412989","owners":["amazon"],"platform":"","platform_details":"Linux/UNIX","product_codes":[],"public":true,"ramdisk_id":"","region":"us-east-1","root_device_name":"/dev/xvda","root_device_type":"ebs","root_snapshot_id":"snap-0a7144882096adc05","sriov_net_support":"simple","state":"available","state_reason":{"code":"UNSET","message":"UNSET"},"tags":{},"timeouts":null,"tpm_support":"","uefi_data":null,"usage_operation":"RunInstances","virtualization_type":"hvm"},"sensitive_values":{"block_device_mappings":[{"ebs":{}}],"filter":[{"values":[false]}],"owners":[false],"product_codes":[],"state_reason":{},"tags":{}}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_config_key":"aws","expressions":{"filter":[{"name":{"constant_value":"name"},"values":{"constant_value":["amzn2-ami-hvm-*-x86_64-gp2"]}}],"most_recent":{"constant_value":true},"owners":{"constant_value":["amazon"]}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:18Z","applyable":false,"complete":true,"errored":false}
|
83 | I need a way to automatically pull in the newest version of our base system image so our servers always start from an up‑to‑date foundation. | Create an AWS aws_ami for the latest Amazon Linux 2 AMI | create aws_ami resource with name = any | provider "aws" {
region = "us-east-1"
}
data "aws_ami" "latest_amazon_linux_2" {
most_recent = true
owners = ["amazon"]
filter {
name = "name"
values = ["amzn2-ami-hvm-*-x86_64-gp2"]
}
} | package terraform
default ami_latest_amazon_linux_2 = false
ami_latest_amazon_linux_2 {
resource := input.configuration.root_module.resources[_]
resource.type == "aws_ami"
resource.name == "latest_amazon_linux_2"
resource.expressions.filter[_].name.constant_value == "name"
resource.expressions.filter[_].values.constant_value[_] == "amzn2-ami-hvm-*-x86_64-gp2"
resource.expressions.most_recent.constant_value == true
resource.expressions.owners.constant_value[_] == "amazon"
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{}},"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_unsafe_filter":null,"architecture":"x86_64","arn":"arn:aws:ec2:us-east-1::image/ami-0e349888043265b96","block_device_mappings":[{"device_name":"/dev/xvda","ebs":{"delete_on_termination":"true","encrypted":"false","iops":"0","snapshot_id":"snap-0a7144882096adc05","throughput":"0","volume_initialization_rate":"0","volume_size":"8","volume_type":"gp2"},"no_device":"","virtual_name":""}],"boot_mode":"","creation_date":"2026-02-04T02:08:09.000Z","deprecation_time":"2026-05-05T02:13:00.000Z","description":"Amazon Linux 2 AMI 2.0.20260202.2 x86_64 HVM gp2","ena_support":true,"executable_users":null,"filter":[{"name":"name","values":["amzn2-ami-hvm-*-x86_64-gp2"]}],"hypervisor":"xen","id":"ami-0e349888043265b96","image_id":"ami-0e349888043265b96","image_location":"amazon/amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","image_owner_alias":"amazon","image_type":"machine","imds_support":"","include_deprecated":false,"kernel_id":"","last_launched_time":"","most_recent":true,"name":"amzn2-ami-hvm-2.0.20260202.2-x86_64-gp2","name_regex":null,"owner_id":"137112412989","owners":["amazon"],"platform":"","platform_details":"Linux/UNIX","product_codes":[],"public":true,"ramdisk_id":"","region":"us-east-1","root_device_name":"/dev/xvda","root_device_type":"ebs","root_snapshot_id":"snap-0a7144882096adc05","sriov_net_support":"simple","state":"available","state_reason":{"code":"UNSET","message":"UNSET"},"tags":{},"timeouts":null,"tpm_support":"","uefi_data":null,"usage_operation":"RunInstances","virtualization_type":"hvm"},"sensitive_values":{"block_device_mappings":[{"ebs":{}}],"filter":[{"values":[false]}],"owners":[false],"product_codes":[],"state_reason":{},"tags":{}}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"data.aws_ami.latest_amazon_linux_2","mode":"data","type":"aws_ami","name":"latest_amazon_linux_2","provider_config_key":"aws","expressions":{"filter":[{"name":{"constant_value":"name"},"values":{"constant_value":["amzn2-ami-hvm-*-x86_64-gp2"]}}],"most_recent":{"constant_value":true},"owners":{"constant_value":["amazon"]}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:26Z","applyable":false,"complete":true,"errored":false}
|
84 | I need a super-fast, in-memory place to stash frequently used data so my app can handle bursts of traffic without slowing down. | Provide a Memcached Cluster | requires cluster id, engine=memcached, node_type, num_cache_nodes, parameter_group_name | provider "aws" {
region="us-east-1"
}
resource "aws_elasticache_cluster" "example" {
cluster_id = "cluster-example"
engine = "memcached"
node_type = "cache.m4.large"
num_cache_nodes = 2
parameter_group_name = "default.memcached1.4"
port = 11211
} | package main
import future.keywords.in
default allow = false
aws_elasticache_cluster_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_cluster"
resource.change.after.engine == "memcached"
}
# Aggregate all checks
allow {
aws_elasticache_cluster_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"memcached","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":2,"outpost_mode":null,"parameter_group_name":"default.memcached1.4","port":11211,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"sensitive_values":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"memcached","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":2,"outpost_mode":null,"parameter_group_name":"default.memcached1.4","port":11211,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"after_unknown":{"apply_immediately":true,"arn":true,"availability_zone":true,"az_mode":true,"cache_nodes":true,"cluster_address":true,"configuration_endpoint":true,"engine_version":true,"engine_version_actual":true,"id":true,"ip_discovery":true,"log_delivery_configuration":[],"maintenance_window":true,"network_type":true,"preferred_outpost_arn":true,"replication_group_id":true,"security_group_ids":true,"snapshot_window":true,"subnet_group_name":true,"tags_all":true,"transit_encryption_enabled":true},"before_sensitive":false,"after_sensitive":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_id":{"constant_value":"cluster-example"},"engine":{"constant_value":"memcached"},"node_type":{"constant_value":"cache.m4.large"},"num_cache_nodes":{"constant_value":2},"parameter_group_name":{"constant_value":"default.memcached1.4"},"port":{"constant_value":11211}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:50Z","applyable":true,"complete":true,"errored":false}
|
85 | I need a super fast place to temporarily store frequently used data so my app can respond quickly, but I want to keep the setup pretty simple. | Provide a Redis Instance | requires cluster id, engine=redis, node_type, num_cache_nodes, parameter_group_name | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_cluster" "example" {
cluster_id = "cluster-example"
engine = "redis"
node_type = "cache.m4.large"
num_cache_nodes = 1
parameter_group_name = "default.redis3.2"
engine_version = "3.2.10"
port = 6379
} | package main
import future.keywords.in
default allow = false
aws_elasticache_cluster_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_cluster"
resource.change.after.engine == "redis"
}
# Aggregate all checks
allow {
aws_elasticache_cluster_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"redis","engine_version":"3.2.10","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":1,"outpost_mode":null,"parameter_group_name":"default.redis3.2","port":6379,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"sensitive_values":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"auto_minor_version_upgrade":"true","cluster_id":"cluster-example","engine":"redis","engine_version":"3.2.10","final_snapshot_identifier":null,"log_delivery_configuration":[],"node_type":"cache.m4.large","notification_topic_arn":null,"num_cache_nodes":1,"outpost_mode":null,"parameter_group_name":"default.redis3.2","port":6379,"preferred_availability_zones":null,"region":"us-east-1","snapshot_arns":null,"snapshot_name":null,"snapshot_retention_limit":null,"tags":null,"timeouts":null},"after_unknown":{"apply_immediately":true,"arn":true,"availability_zone":true,"az_mode":true,"cache_nodes":true,"cluster_address":true,"configuration_endpoint":true,"engine_version_actual":true,"id":true,"ip_discovery":true,"log_delivery_configuration":[],"maintenance_window":true,"network_type":true,"preferred_outpost_arn":true,"replication_group_id":true,"security_group_ids":true,"snapshot_window":true,"subnet_group_name":true,"tags_all":true,"transit_encryption_enabled":true},"before_sensitive":false,"after_sensitive":{"cache_nodes":[],"log_delivery_configuration":[],"security_group_ids":[],"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_cluster.example","mode":"managed","type":"aws_elasticache_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_id":{"constant_value":"cluster-example"},"engine":{"constant_value":"redis"},"engine_version":{"constant_value":"3.2.10"},"node_type":{"constant_value":"cache.m4.large"},"num_cache_nodes":{"constant_value":1},"parameter_group_name":{"constant_value":"default.redis3.2"},"port":{"constant_value":6379}},"schema_version":0}]}},"timestamp":"2026-02-18T20:57:57Z","applyable":true,"complete":true,"errored":false}
|
86 | I need a way for certain parts of our system to interact with our fast in‑memory data layer, but only with tightly limited permissions for security. | Provide an ElastiCache user resource with redis | requires access string, engine = REDIS, user id and user name | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_user" "test" {
user_id = "testUserId"
user_name = "testUserName"
access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"
engine = "REDIS"
passwords = ["password123456789"]
} | package main
import future.keywords.in
default allow = false
aws_elasticache_user_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_user"
resource.change.after.engine == "REDIS"
}
# Aggregate all checks
allow {
aws_elasticache_user_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:04Z","applyable":true,"complete":true,"errored":false}
|
87 | I need to set up a way for a specific person or system to safely interact with our fast in‑memory data layer, using our existing identity setup to control what they can do. | Provide an ElastiCache user resource with iam | requires access string, engine = REDIS, user id and user name, authentication_mode {type = "iam"} | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_user" "test" {
user_id = "testUserId"
user_name = "testUserName"
access_string = "on ~* +@all"
engine = "REDIS"
authentication_mode {
type = "iam"
}
} | package main
import future.keywords.in
default allow = false
aws_elasticache_user_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_user"
resource.change.after.authentication_mode[_].type == "iam"
}
# Aggregate all checks
allow {
aws_elasticache_user_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":null,"type":"iam"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":null,"type":"iam"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":[{"password_count":true}],"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~* +@all"},"authentication_mode":[{"type":{"constant_value":"iam"}}],"engine":{"constant_value":"REDIS"},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:14Z","applyable":true,"complete":true,"errored":false}
|
88 | I need a way to control who can interact with our in‑memory data layer, using a setup that requires people to log in securely. | Provide an ElastiCache user resource with password. | requires access string, engine = REDIS, user id and user name, authentication_mode {type= "password", passwords = ["password1", "password2"]} | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_user" "test" {
user_id = "testUserId"
user_name = "testUserName"
access_string = "on ~* +@all"
engine = "REDIS"
authentication_mode {
type = "password"
passwords = ["password1", "password2"]
}
} | package main
import future.keywords.in
default allow = false
aws_elasticache_user_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_user"
resource.change.after.authentication_mode[_].type == "password"
}
# Aggregate all checks
allow {
aws_elasticache_user_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":["password1","password2"],"type":"password"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"sensitive_values":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~* +@all","authentication_mode":[{"passwords":["password1","password2"],"type":"password"}],"engine":"REDIS","no_password_required":false,"passwords":null,"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"testUserName"},"after_unknown":{"arn":true,"authentication_mode":[{"password_count":true,"passwords":[false,false]}],"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[{"passwords":true}],"passwords":true,"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~* +@all"},"authentication_mode":[{"passwords":{"constant_value":["password1","password2"]},"type":{"constant_value":"password"}}],"engine":{"constant_value":"REDIS"},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"testUserName"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:19Z","applyable":true,"complete":true,"errored":false}
|
89 | I need a way to manage who can do what in our shared in‑memory data service so we can keep things secure without making access too complicated. | Provide an ElastiCache user group resource. | creates elasticache user resources(requires access string, engine = REDIS, user id and user name) and sets engine , creates group resource using the user ids | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_user" "test" {
user_id = "testUserId"
user_name = "default"
access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"
engine = "REDIS"
passwords = ["password123456789"]
}
resource "aws_elasticache_user_group" "test" {
engine = "REDIS"
user_group_id = "userGroupId"
user_ids = [aws_elasticache_user.test.user_id]
} | package main
import future.keywords.in
default allow = false
aws_elasticache_user_group_valid(resources) {
some resource in resources
resource.type == "aws_elasticache_user_group"
}
# Aggregate all checks
allow {
aws_elasticache_user_group_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"default"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["testUserId"]},"sensitive_values":{"tags_all":{},"user_ids":[false]}}]}},"resource_changes":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"testUserId","user_name":"default"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["testUserId"]},"after_unknown":{"arn":true,"id":true,"tags_all":true,"user_ids":[false]},"before_sensitive":false,"after_sensitive":{"tags_all":{},"user_ids":[false]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.test","mode":"managed","type":"aws_elasticache_user","name":"test","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"testUserId"},"user_name":{"constant_value":"default"}},"schema_version":0},{"address":"aws_elasticache_user_group.test","mode":"managed","type":"aws_elasticache_user_group","name":"test","provider_config_key":"aws","expressions":{"engine":{"constant_value":"REDIS"},"user_group_id":{"constant_value":"userGroupId"},"user_ids":{"references":["aws_elasticache_user.test.user_id","aws_elasticache_user.test"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elasticache_user.test","attribute":["user_id"]}],"timestamp":"2026-02-18T20:58:21Z","applyable":true,"complete":true,"errored":false}
|
90 | I need to make sure one of our app’s user accounts is included in the right collection of permissions so it can access shared data safely without over‑privilege. | Associate an existing ElastiCache user and an existing user group. | creates elasticache user group and a user resource then associates the 2 using ids | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_elasticache_user" "default" {
user_id = "defaultUserID"
user_name = "default"
access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"
engine = "REDIS"
passwords = ["password123456789"]
}
resource "aws_elasticache_user_group" "example"{
engine = "REDIS"
user_group_id = "userGroupId"
user_ids = [aws_elasticache_user.default.user_id]
lifecycle { ignore_changes = [user_ids] }
}
resource "aws_elasticache_user" "example" {
user_id = "exampleUserID"
user_name = "exampleuser"
access_string = "on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"
engine = "REDIS"
passwords = ["password123456789"]
}
resource "aws_elasticache_user_group_association" "example" {
user_group_id = aws_elasticache_user_group.example.user_group_id
user_id = aws_elasticache_user.example.user_id
} | package main
import future.keywords.in
default allow = false
# Check if AWS ElastiCache user group exists
aws_elasticache_user_group_exists(resources) {
some resource in resources
resource.type == "aws_elasticache_user_group"
resource.change.actions[_] == "create"
}
# Check if AWS ElastiCache user exists
aws_elasticache_user_exists(resources) {
some resource in resources
resource.type == "aws_elasticache_user"
resource.change.actions[_] == "create"
}
# Check if AWS ElastiCache user group association is valid
aws_elasticache_user_group_association_valid(resources) {
aws_elasticache_user_exists(resources)
aws_elasticache_user_group_exists(resources)
some resource in resources
resource.type == "aws_elasticache_user_group_association"
resource.change.actions[_] == "create"
user_id := resource.change.after.user_id
group_id := resource.change.after.user_group_id
user_id_exists(user_id, resources)
group_id_exists(group_id, resources)
}
# Helper functions to check if user_id and group_id exist in the resources
user_id_exists(user_id, resources) {
some resource in resources
resource.type == "aws_elasticache_user"
resource.change.after.user_id == user_id
}
group_id_exists(group_id, resources) {
some resource in resources
resource.type == "aws_elasticache_user_group"
resource.change.after.user_group_id == group_id
}
# Aggregate all checks
allow {
aws_elasticache_user_group_association_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"defaultUserID","user_name":"default"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"exampleUserID","user_name":"exampleuser"},"sensitive_values":{"authentication_mode":[],"passwords":true,"tags_all":{}}},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["defaultUserID"]},"sensitive_values":{"tags_all":{},"user_ids":[false]}},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","timeouts":null,"user_group_id":"userGroupId","user_id":"exampleUserID"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"defaultUserID","user_name":"default"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"access_string":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember","engine":"REDIS","no_password_required":false,"passwords":["password123456789"],"region":"us-east-1","tags":null,"timeouts":null,"user_id":"exampleUserID","user_name":"exampleuser"},"after_unknown":{"arn":true,"authentication_mode":true,"id":true,"passwords":[false],"tags_all":true},"before_sensitive":false,"after_sensitive":{"authentication_mode":[],"passwords":true,"tags_all":{}}}},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"engine":"REDIS","region":"us-east-1","tags":null,"user_group_id":"userGroupId","user_ids":["defaultUserID"]},"after_unknown":{"arn":true,"id":true,"tags_all":true,"user_ids":[false]},"before_sensitive":false,"after_sensitive":{"tags_all":{},"user_ids":[false]}}},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","timeouts":null,"user_group_id":"userGroupId","user_id":"exampleUserID"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_elasticache_user.default","mode":"managed","type":"aws_elasticache_user","name":"default","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"defaultUserID"},"user_name":{"constant_value":"default"}},"schema_version":0},{"address":"aws_elasticache_user.example","mode":"managed","type":"aws_elasticache_user","name":"example","provider_config_key":"aws","expressions":{"access_string":{"constant_value":"on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius -georadiusbymember"},"engine":{"constant_value":"REDIS"},"passwords":{"constant_value":["password123456789"]},"user_id":{"constant_value":"exampleUserID"},"user_name":{"constant_value":"exampleuser"}},"schema_version":0},{"address":"aws_elasticache_user_group.example","mode":"managed","type":"aws_elasticache_user_group","name":"example","provider_config_key":"aws","expressions":{"engine":{"constant_value":"REDIS"},"user_group_id":{"constant_value":"userGroupId"},"user_ids":{"references":["aws_elasticache_user.default.user_id","aws_elasticache_user.default"]}},"schema_version":0},{"address":"aws_elasticache_user_group_association.example","mode":"managed","type":"aws_elasticache_user_group_association","name":"example","provider_config_key":"aws","expressions":{"user_group_id":{"references":["aws_elasticache_user_group.example.user_group_id","aws_elasticache_user_group.example"]},"user_id":{"references":["aws_elasticache_user.example.user_id","aws_elasticache_user.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_elasticache_user.default","attribute":["user_id"]},{"resource":"aws_elasticache_user.example","attribute":["user_id"]},{"resource":"aws_elasticache_user_group.example","attribute":["user_group_id"]}],"timestamp":"2026-02-18T20:58:25Z","applyable":true,"complete":true,"errored":false}
|
91 | I need a place to run analytics on our data without setting up a bunch of machines, and it should stay simple for now. | Create a RedShift cluster resource with a single node | Has an aws_redshift_cluster resource and check cluster_type is "single_node" or number of nodes is 1 | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "tf-redshift-cluster"
database_name = "mydb"
master_username = "exampleuser"
master_password = "Mustbe8characters"
node_type = "dc2.large"
cluster_type = "single-node"
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 1
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"exampleuser","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"exampleuser","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"exampleuser"},"node_type":{"constant_value":"dc2.large"}},"schema_version":0}]}},"timestamp":"2026-02-18T20:58:33Z","applyable":true,"complete":true,"errored":false}
|
92 | I need a data warehouse that can handle spikes in demand but only for a short, controlled period so costs don’t get out of hand. | Create a 2 node RedShift cluster and limit the concurrency scaling to 60 minutes | Has an aws_redshift_cluster resource and check cluster_type is "single_node" or number of nodes is 2, check there is a aws_redshift_usage_limit resouce where the feature type is concurrency_scaling, limit_type is "time", and amount is 60 | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
number_of_nodes = 2
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
skip_final_snapshot = true
}
resource "aws_redshift_usage_limit" "example" {
cluster_identifier = aws_redshift_cluster.example.id
feature_type = "concurrency-scaling"
limit_type = "time"
amount = 60
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 2
}
aws_redshift_usage_limit_valid(resources) {
some resource in resources
resource.type == "aws_redshift_usage_limit"
resource.change.after.feature_type == "concurrency-scaling"
resource.change.after.limit_type == "time"
resource.change.after.amount == 60
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
aws_redshift_usage_limit_valid(input.resource_changes)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"amount":60,"breach_action":"log","feature_type":"concurrency-scaling","limit_type":"time","period":"monthly","region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"amount":60,"breach_action":"log","feature_type":"concurrency-scaling","limit_type":"time","period":"monthly","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"cluster_identifier":true,"id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_usage_limit.example","mode":"managed","type":"aws_redshift_usage_limit","name":"example","provider_config_key":"aws","expressions":{"amount":{"constant_value":60},"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"feature_type":{"constant_value":"concurrency-scaling"},"limit_type":{"constant_value":"time"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["id"]}],"timestamp":"2026-02-18T20:58:40Z","applyable":true,"complete":true,"errored":false}
|
93 | I need a shared analytics workspace that can handle heavier queries, and I also need to let a specific outside account connect to it securely. | Create a 2 node RedShift cluster and create a new Amazon Redshift endpoint authorization for an account with AWS id 012345678910 | Has an aws_redshift_resouce with 2 nodes and creates a aws_redshift_endpoint_authorization resource with account =012345678910 | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
number_of_nodes = 2
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
skip_final_snapshot = true
}
resource "aws_redshift_endpoint_authorization" "example" {
account = "012345678910"
cluster_identifier = aws_redshift_cluster.example.cluster_identifier
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 2
}
# Function to check if Redshift snapshot schedule is every 12 hours
aws_redshift_endpoint_authorization_valid(resources) {
some resource in resources
resource.type == "aws_redshift_endpoint_authorization"
resource.change.after.account == "012345678910"
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
aws_redshift_endpoint_authorization_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"account":"012345678910","cluster_identifier":"redshift-cluster-1","force_delete":false,"region":"us-east-1","vpc_ids":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"account":"012345678910","cluster_identifier":"redshift-cluster-1","force_delete":false,"region":"us-east-1","vpc_ids":null},"after_unknown":{"allowed_all_vpcs":true,"endpoint_count":true,"grantee":true,"grantor":true,"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_endpoint_authorization.example","mode":"managed","type":"aws_redshift_endpoint_authorization","name":"example","provider_config_key":"aws","expressions":{"account":{"constant_value":"012345678910"},"cluster_identifier":{"references":["aws_redshift_cluster.example.cluster_identifier","aws_redshift_cluster.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["cluster_identifier"]}],"timestamp":"2026-02-18T20:58:47Z","applyable":true,"complete":true,"errored":false}
|
94 | I need a small analytical data system set up for internal use, and it should save its state on a regular schedule so we can recover quickly if something goes wrong. | Create a 1 node RedShift cluster and automatically create a snapshot every 12 hours | Has an aws_redshift resouce with 1 node and aws_redshift_snapshot_schedule resource with rate set to 12 hours. Then have a aws_redshift_snapshot_schedle_association to conect the 2 | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
number_of_nodes = 1
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
skip_final_snapshot = true
}
resource "aws_redshift_snapshot_schedule" "default" {
identifier = "tf-redshift-snapshot-schedule"
definitions = [
"rate(12 hours)",
]
}
resource "aws_redshift_snapshot_schedule_association" "default" {
cluster_identifier = aws_redshift_cluster.example.id
schedule_identifier = aws_redshift_snapshot_schedule.default.id
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 1
}
# Function to check if Redshift snapshot schedule is every 12 hours
aws_redshift_snapshot_schedule_valid(resources) {
some resource in resources
resource.type == "aws_redshift_snapshot_schedule"
resource.change.after.definitions[_] == "rate(12 hours)"
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
aws_redshift_snapshot_schedule_valid(input.resource_changes)
} | {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"definitions":["rate(12 hours)"],"description":null,"force_destroy":false,"identifier":"tf-redshift-snapshot-schedule","region":"us-east-1","tags":null},"sensitive_values":{"definitions":[false],"tags_all":{}}},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"cluster_type":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"definitions":["rate(12 hours)"],"description":null,"force_destroy":false,"identifier":"tf-redshift-snapshot-schedule","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"definitions":[false],"id":true,"identifier_prefix":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"definitions":[false],"tags_all":{}}}},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1"},"after_unknown":{"cluster_identifier":true,"id":true,"schedule_identifier":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":1},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_snapshot_schedule.default","mode":"managed","type":"aws_redshift_snapshot_schedule","name":"default","provider_config_key":"aws","expressions":{"definitions":{"constant_value":["rate(12 hours)"]},"identifier":{"constant_value":"tf-redshift-snapshot-schedule"}},"schema_version":0},{"address":"aws_redshift_snapshot_schedule_association.default","mode":"managed","type":"aws_redshift_snapshot_schedule_association","name":"default","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"schedule_identifier":{"references":["aws_redshift_snapshot_schedule.default.id","aws_redshift_snapshot_schedule.default"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["id"]},{"resource":"aws_redshift_snapshot_schedule.default","attribute":["id"]}],"timestamp":"2026-02-18T20:58:30Z","applyable":true,"complete":true,"errored":false}
|
95 | I need a private network for some data tools we’re setting up, and it should work across a couple of separate locations so it stays reliable even if part of the system has issues. | Create a VPC in us-east-1 and create subnets in east-1a and east-1b. Create a RedShift subnet group with a subnet in east-1a and east-1b | Create a VPC, create 2 subnets (1 in east1a and 1 in east1b) then create a redshift_subnet_group | provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
tags = {
Name = "main-vpc"
}
}
resource "aws_subnet" "subnet_east_1a" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.1.0/24"
availability_zone = "us-east-1a"
tags = {
Name = "subnet-east-1a"
}
}
resource "aws_subnet" "subnet_east_1b" {
vpc_id = aws_vpc.main.id
cidr_block = "10.0.2.0/24"
availability_zone = "us-east-1b"
tags = {
Name = "subnet-east-1b"
}
}
resource "aws_redshift_subnet_group" "redshift_subnet_group" {
name = "my-redshift-subnet-group"
subnet_ids = [aws_subnet.subnet_east_1a.id, aws_subnet.subnet_east_1b.id]
tags = {
Name = "my-redshift-subnet-group"
}
} | package main
import future.keywords.in
default allow = false
# Function to check if a VPC is created in us-east-1
aws_vpc_valid(resources) {
some resource in resources
resource.type == "aws_vpc"
resource.change.after.cidr_block == "10.0.0.0/16"
}
# Function to check if subnets are created in east-1a and east-1b
aws_subnets_valid(resources) {
some resource in resources
resource.type == "aws_subnet"
resource.change.after.availability_zone in {"us-east-1a", "us-east-1b"}
resource.change.after.cidr_block == "10.0.1.0/24"
}
# Function to check if a Redshift subnet group is created with subnets in east-1a and east-1b
aws_redshift_subnet_group_valid(root_module_resources) {
some resource in root_module_resources
resource.type == "aws_redshift_subnet_group"
count(resource.expressions.subnet_ids.references) == 4
}
# Aggregate all checks
allow {
aws_vpc_valid(input.resource_changes)
aws_subnets_valid(input.resource_changes)
aws_redshift_subnet_group_valid(input.configuration.root_module.resources)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Managed by Terraform","name":"my-redshift-subnet-group","region":"us-east-1","tags":{"Name":"my-redshift-subnet-group"},"tags_all":{"Name":"my-redshift-subnet-group"}},"sensitive_values":{"subnet_ids":[],"tags":{},"tags_all":{}}},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1a"},"tags_all":{"Name":"subnet-east-1a"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1b"},"tags_all":{"Name":"subnet-east-1b"},"timeouts":null},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"sensitive_values":{"tags":{},"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Managed by Terraform","name":"my-redshift-subnet-group","region":"us-east-1","tags":{"Name":"my-redshift-subnet-group"},"tags_all":{"Name":"my-redshift-subnet-group"}},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags":{},"tags_all":{}}}},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1a"},"tags_all":{"Name":"subnet-east-1a"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":false,"outpost_arn":null,"region":"us-east-1","tags":{"Name":"subnet-east-1b"},"tags_all":{"Name":"subnet-east-1b"},"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags":{},"tags_all":{},"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":{"Name":"main-vpc"},"tags_all":{"Name":"main-vpc"}},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags":{},"tags_all":{}},"before_sensitive":false,"after_sensitive":{"tags":{},"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_subnet_group.redshift_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"redshift_subnet_group","provider_config_key":"aws","expressions":{"name":{"constant_value":"my-redshift-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_east_1a.id","aws_subnet.subnet_east_1a","aws_subnet.subnet_east_1b.id","aws_subnet.subnet_east_1b"]},"tags":{"constant_value":{"Name":"my-redshift-subnet-group"}}},"schema_version":0},{"address":"aws_subnet.subnet_east_1a","mode":"managed","type":"aws_subnet","name":"subnet_east_1a","provider_config_key":"aws","expressions":{"availability_zone":{"constant_value":"us-east-1a"},"cidr_block":{"constant_value":"10.0.1.0/24"},"tags":{"constant_value":{"Name":"subnet-east-1a"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_subnet.subnet_east_1b","mode":"managed","type":"aws_subnet","name":"subnet_east_1b","provider_config_key":"aws","expressions":{"availability_zone":{"constant_value":"us-east-1b"},"cidr_block":{"constant_value":"10.0.2.0/24"},"tags":{"constant_value":{"Name":"subnet-east-1b"}},"vpc_id":{"references":["aws_vpc.main.id","aws_vpc.main"]}},"schema_version":1},{"address":"aws_vpc.main","mode":"managed","type":"aws_vpc","name":"main","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true},"tags":{"constant_value":{"Name":"main-vpc"}}},"schema_version":1}]}},"relevant_attributes":[{"resource":"aws_subnet.subnet_east_1a","attribute":["id"]},{"resource":"aws_vpc.main","attribute":["id"]},{"resource":"aws_subnet.subnet_east_1b","attribute":["id"]}],"timestamp":"2026-02-18T20:58:58Z","applyable":true,"complete":true,"errored":false}
|
96 | I need a data warehouse setup that can keep running smoothly even if part of the underlying infrastructure has an outage. | Set up a highly available Amazon Redshift cluster across multiple us-east-1a and us-east-1b | Create a VPC, create internet_gateway,create 2 subnets (1 in east1a and 1 in east1b) then create a redshift_subnet_group | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "example_vpc" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
}
resource "aws_internet_gateway" "gw" {
vpc_id = aws_vpc.example_vpc.id
}
data "aws_availability_zones" "azs" {
state = "available"
}
# Create subnet in us-east-1a
resource "aws_subnet" "subnet_a" {
vpc_id = aws_vpc.example_vpc.id
cidr_block = "10.0.1.0/24"
availability_zone = data.aws_availability_zones.azs.names[0]
map_public_ip_on_launch = true
}
# Create subnet in us-east-1b
resource "aws_subnet" "subnet_b" {
vpc_id = aws_vpc.example_vpc.id
cidr_block = "10.0.2.0/24"
availability_zone = data.aws_availability_zones.azs.names[1]
map_public_ip_on_launch = true
}
# Create the Redshift subnet group
resource "aws_redshift_subnet_group" "example_subnet_group" {
name = "example-subnet-group"
description = "Example Redshift subnet group"
subnet_ids = [aws_subnet.subnet_a.id, aws_subnet.subnet_b.id]
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
cluster_type = "multi-node"
number_of_nodes = 2
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
cluster_subnet_group_name = aws_redshift_subnet_group.example_subnet_group.name
skip_final_snapshot = true
} | package main
import future.keywords.in
default allow = false
# Function to check if Redshift cluster is set up for high availability
aws_redshift_cluster_ha_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.cluster_type == "multi-node"
resource.change.after.number_of_nodes > 1
resource.change.after.cluster_subnet_group_name != null
}
aws_internet_gateway_valid(resources) {
some resource in resources
resource.type == "aws_internet_gateway"
}
# Function to check if subnets are created in east-1a and east-1b
aws_subnets_valid(resources) {
subnet_a_valid(resources)
subnet_b_valid(resources)
}
subnet_a_valid(resources) {
some resource in resources
resource.type == "aws_subnet"
resource.change.after.availability_zone == "us-east-1a"
}
subnet_b_valid(resources) {
some resource in resources
resource.type == "aws_subnet"
resource.change.after.availability_zone == "us-east-1b"
}
# Function to check if a Redshift subnet group spans across us-east-1a and us-east-1b
aws_redshift_subnet_group_valid(root_module_resources) {
some resource in root_module_resources
resource.type == "aws_redshift_subnet_group"
count(resource.expressions.subnet_ids.references) == 4
}
# Aggregate all checks
allow {
aws_redshift_cluster_ha_valid(input.resource_changes)
aws_internet_gateway_valid(input.resource_changes)
aws_subnets_valid(input.resource_changes)
aws_redshift_subnet_group_valid(input.configuration.root_module.resources)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_subnet_group_name":"example-subnet-group","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"tags_all":{}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"id":true,"owner_id":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_subnet_group_name":"example-subnet-group","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags_all":{}}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"},"s3_use_path_style":{"constant_value":true},"skip_credentials_validation":{"constant_value":true},"skip_metadata_api_check":{"constant_value":true},"skip_requesting_account_id":{"constant_value":true}}},"awscc":{"name":"awscc","full_name":"registry.terraform.io/hashicorp/awscc","expressions":{"skip_metadata_api_check":{"constant_value":true}}}},"root_module":{"resources":[{"address":"aws_internet_gateway.gw","mode":"managed","type":"aws_internet_gateway","name":"gw","provider_config_key":"aws","expressions":{"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":0},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_subnet_group_name":{"references":["aws_redshift_subnet_group.example_subnet_group.name","aws_redshift_subnet_group.example_subnet_group"]},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_config_key":"aws","expressions":{"description":{"constant_value":"Example Redshift subnet group"},"name":{"constant_value":"example-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_a.id","aws_subnet.subnet_a","aws_subnet.subnet_b.id","aws_subnet.subnet_b"]}},"schema_version":0},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[0]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[1]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_subnet_group.example_subnet_group","attribute":["name"]},{"resource":"aws_subnet.subnet_b","attribute":["id"]},{"resource":"data.aws_availability_zones.azs","attribute":["names",0]},{"resource":"data.aws_availability_zones.azs","attribute":["names",1]},{"resource":"aws_vpc.example_vpc","attribute":["id"]},{"resource":"aws_subnet.subnet_a","attribute":["id"]}],"timestamp":"2026-02-18T20:58:40Z","applyable":true,"complete":true,"errored":false}
|
97 | I need a data warehouse that can pull information from our storage system automatically, and it should have the right access setup so it can read what it needs without exposing anything else. | Create an IAM role and a redshift cluster and associate the IAM role with the RedShift cluster. | Create a aws_iam_role, aws_redshift_cluster, and attach the role to the cluster | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_iam_role" "redshift_role" {
name = "redshift_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Effect = "Allow",
Principal = {
Service = "redshift.amazonaws.com"
},
},
],
})
}
resource "aws_iam_role_policy_attachment" "redshift_s3_read_only" {
role = aws_iam_role.redshift_role.name
policy_arn = "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "tf-redshift-cluster"
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
node_type = "dc2.large"
cluster_type = "single-node"
depends_on = [aws_iam_role.redshift_role]
}
resource "aws_redshift_cluster_iam_roles" "example" {
cluster_identifier = aws_redshift_cluster.example.id
iam_role_arns = [aws_iam_role.redshift_role.arn]
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 1
}
iam_role_vaild(resources) {
some resource in resources
resource.type == "aws_iam_role"
}
aws_iam_role_policy_attachment(resources) {
some resource in resources
resource.type == "aws_iam_role_policy_attachment"
}
aws_redshift_cluster_iam_roles_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster_iam_roles"
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
iam_role_vaild(input.resource_changes)
aws_iam_role_policy_attachment(input.resource_changes)
aws_redshift_cluster_iam_roles_valid(input.resource_changes)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"redshift.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"redshift_role","path":"/","permissions_boundary":null,"tags":null},"sensitive_values":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"name":null}},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"redshift_role"},"sensitive_values":{},"identity_schema_version":0,"identity":{"account_id":null,"policy_arn":null,"role":null}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1","timeouts":null},"sensitive_values":{"iam_role_arns":[]}}]}},"resource_changes":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assume_role_policy":"{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"redshift.amazonaws.com\"}}],\"Version\":\"2012-10-17\"}","description":null,"force_detach_policies":false,"max_session_duration":3600,"name":"redshift_role","path":"/","permissions_boundary":null,"tags":null},"after_unknown":{"arn":true,"create_date":true,"id":true,"inline_policy":true,"managed_policy_arns":true,"name_prefix":true,"tags_all":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{"inline_policy":[],"managed_policy_arns":[],"tags_all":{}},"after_identity":{"account_id":null,"name":null}}},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"policy_arn":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess","role":"redshift_role"},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{},"after_identity":{"account_id":null,"policy_arn":null,"role":null}}},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"tf-redshift-cluster","cluster_type":"single-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":1,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":false,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1","timeouts":null},"after_unknown":{"cluster_identifier":true,"default_iam_role_arn":true,"iam_role_arns":true,"id":true},"before_sensitive":false,"after_sensitive":{"iam_role_arns":[]}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_iam_role.redshift_role","mode":"managed","type":"aws_iam_role","name":"redshift_role","provider_config_key":"aws","expressions":{"assume_role_policy":{},"name":{"constant_value":"redshift_role"}},"schema_version":0},{"address":"aws_iam_role_policy_attachment.redshift_s3_read_only","mode":"managed","type":"aws_iam_role_policy_attachment","name":"redshift_s3_read_only","provider_config_key":"aws","expressions":{"policy_arn":{"constant_value":"arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"},"role":{"references":["aws_iam_role.redshift_role.name","aws_iam_role.redshift_role"]}},"schema_version":0},{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"tf-redshift-cluster"},"cluster_type":{"constant_value":"single-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"}},"schema_version":0,"depends_on":["aws_iam_role.redshift_role"]},{"address":"aws_redshift_cluster_iam_roles.example","mode":"managed","type":"aws_redshift_cluster_iam_roles","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.id","aws_redshift_cluster.example"]},"iam_role_arns":{"references":["aws_iam_role.redshift_role.arn","aws_iam_role.redshift_role"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_iam_role.redshift_role","attribute":["arn"]},{"resource":"aws_iam_role.redshift_role","attribute":["name"]},{"resource":"aws_redshift_cluster.example","attribute":["id"]}],"timestamp":"2026-02-18T20:59:00Z","applyable":true,"complete":true,"errored":false}
|
98 | I need a shared analytics workspace that can handle moderate workloads across multiple machines, and it should allow certain external systems to plug into it securely. | Create a 2-node RedShift cluster and attach a resource policy to it. | Create a redshift cluster and a aws_reedshift_resource_poliicy attached to it | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.0"
}
}
}
provider "aws" {
region = "us-east-1"
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
cluster_type = "multi-node"
number_of_nodes = 2
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
skip_final_snapshot = true
}
resource "aws_redshift_resource_policy" "example" {
resource_arn = aws_redshift_cluster.example.cluster_namespace_arn
policy = jsonencode({
Version = "2012-10-17"
Statement = [{
Effect = "Allow"
Principal = {
AWS = "arn:aws:iam::12345678901:root"
}
Action = "redshift:CreateInboundIntegration"
Resource = aws_redshift_cluster.example.cluster_namespace_arn
Sid = ""
}]
})
} | package main
import future.keywords.in
default allow = false
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 2
}
aws_redshift_resource_policy_valid(resources) {
some resource in resources
resource.type == "aws_redshift_resource_policy"
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
aws_redshift_resource_policy_valid(input.resource_changes)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"region":"us-east-1"},"sensitive_values":{}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"region":"us-east-1"},"after_unknown":{"id":true,"policy":true,"resource_arn":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.0.0","expressions":{"region":{"constant_value":"us-east-1"}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_resource_policy.example","mode":"managed","type":"aws_redshift_resource_policy","name":"example","provider_config_key":"aws","expressions":{"policy":{"references":["aws_redshift_cluster.example.cluster_namespace_arn","aws_redshift_cluster.example"]},"resource_arn":{"references":["aws_redshift_cluster.example.cluster_namespace_arn","aws_redshift_cluster.example"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"aws_redshift_cluster.example","attribute":["cluster_namespace_arn"]}],"timestamp":"2026-02-18T20:59:15Z","applyable":true,"complete":true,"errored":false}
|
99 | I need a data warehouse that can handle bigger analytical workloads, and it should be reachable from inside our private network so our other systems can work with it securely. | Create a RedShift cluster with 2 nodes and create an endpoint access for it | Create a cluster and a endpoint associated with it | terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = ">= 5.75"
}
}
required_version = ">= 1.9.0"
}
provider "aws" {
region = "us-east-1"
}
resource "aws_vpc" "example_vpc" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
}
data "aws_availability_zones" "azs" {
state = "available"
}
resource "aws_subnet" "subnet_a" {
vpc_id = aws_vpc.example_vpc.id
cidr_block = "10.0.1.0/24"
availability_zone = data.aws_availability_zones.azs.names[0]
map_public_ip_on_launch = true
}
resource "aws_subnet" "subnet_b" {
vpc_id = aws_vpc.example_vpc.id
cidr_block = "10.0.2.0/24"
availability_zone = data.aws_availability_zones.azs.names[1]
map_public_ip_on_launch = true
}
# Create the Redshift subnet group
resource "aws_redshift_subnet_group" "example_subnet_group" {
name = "example-subnet-group"
description = "Example Redshift subnet group"
subnet_ids = [aws_subnet.subnet_a.id, aws_subnet.subnet_b.id]
}
resource "aws_redshift_cluster" "example" {
cluster_identifier = "redshift-cluster-1"
node_type = "dc2.large"
cluster_type = "multi-node"
number_of_nodes = 2
database_name = "mydb"
master_username = "foo"
master_password = "Mustbe8characters"
skip_final_snapshot = true
}
resource "aws_redshift_endpoint_access" "example" {
endpoint_name = "example"
subnet_group_name = aws_redshift_subnet_group.example_subnet_group.id
cluster_identifier = aws_redshift_cluster.example.cluster_identifier
} | package main
import future.keywords.in
default allow = false
# Check if AWS Redshift cluster with 2 nodes is being created
aws_redshift_cluster_valid(resources) {
some resource in resources
resource.type == "aws_redshift_cluster"
resource.change.after.number_of_nodes == 2
}
# Check if AWS Redshift endpoint access is being created
aws_redshift_endpoint_access_valid(resources) {
some resource in resources
resource.type == "aws_redshift_endpoint_access"
}
# Aggregate all checks
allow {
aws_redshift_cluster_valid(input.resource_changes)
aws_redshift_endpoint_access_valid(input.resource_changes)
}
| {"format_version":"1.2","terraform_version":"1.14.3","planned_values":{"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"sensitive_values":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"cluster_identifier":"redshift-cluster-1","endpoint_name":"example","region":"us-east-1"},"sensitive_values":{"vpc_endpoint":[],"vpc_security_group_ids":[]}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"sensitive_values":{"subnet_ids":[],"tags_all":{}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":1,"values":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"sensitive_values":{"tags_all":{}},"identity_schema_version":0,"identity":{"account_id":null,"id":null,"region":null}}]}},"resource_changes":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"allow_version_upgrade":true,"apply_immediately":false,"automated_snapshot_retention_period":1,"availability_zone_relocation_enabled":false,"cluster_identifier":"redshift-cluster-1","cluster_type":"multi-node","cluster_version":"1.0","database_name":"mydb","elastic_ip":null,"encrypted":"true","final_snapshot_identifier":null,"maintenance_track_name":"current","manage_master_password":null,"manual_snapshot_retention_period":-1,"master_password":"Mustbe8characters","master_password_wo":null,"master_password_wo_version":null,"master_username":"foo","multi_az":false,"node_type":"dc2.large","number_of_nodes":2,"owner_account":null,"port":5439,"publicly_accessible":false,"region":"us-east-1","skip_final_snapshot":true,"snapshot_arn":null,"snapshot_cluster_identifier":null,"snapshot_identifier":null,"tags":null,"timeouts":null},"after_unknown":{"aqua_configuration_status":true,"arn":true,"availability_zone":true,"cluster_namespace_arn":true,"cluster_nodes":true,"cluster_parameter_group_name":true,"cluster_public_key":true,"cluster_revision_number":true,"cluster_subnet_group_name":true,"default_iam_role_arn":true,"dns_name":true,"endpoint":true,"enhanced_vpc_routing":true,"iam_roles":true,"id":true,"kms_key_id":true,"master_password_secret_arn":true,"master_password_secret_kms_key_id":true,"preferred_maintenance_window":true,"tags_all":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"cluster_nodes":[],"iam_roles":[],"master_password":true,"master_password_wo":true,"tags_all":{},"vpc_security_group_ids":[]}}},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"cluster_identifier":"redshift-cluster-1","endpoint_name":"example","region":"us-east-1"},"after_unknown":{"address":true,"id":true,"port":true,"resource_owner":true,"subnet_group_name":true,"vpc_endpoint":true,"vpc_security_group_ids":true},"before_sensitive":false,"after_sensitive":{"vpc_endpoint":[],"vpc_security_group_ids":[]}}},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"description":"Example Redshift subnet group","name":"example-subnet-group","region":"us-east-1","tags":null},"after_unknown":{"arn":true,"id":true,"subnet_ids":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"subnet_ids":[],"tags_all":{}}}},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1a","cidr_block":"10.0.1.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_ipv6_address_on_creation":false,"availability_zone":"us-east-1b","cidr_block":"10.0.2.0/24","customer_owned_ipv4_pool":null,"enable_dns64":false,"enable_lni_at_device_index":null,"enable_resource_name_dns_a_record_on_launch":false,"enable_resource_name_dns_aaaa_record_on_launch":false,"ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_native":false,"ipv6_netmask_length":null,"map_customer_owned_ip_on_launch":null,"map_public_ip_on_launch":true,"outpost_arn":null,"region":"us-east-1","tags":null,"timeouts":null},"after_unknown":{"arn":true,"availability_zone_id":true,"id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_association_id":true,"owner_id":true,"private_dns_hostname_type_on_launch":true,"tags_all":true,"vpc_id":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_name":"registry.terraform.io/hashicorp/aws","change":{"actions":["create"],"before":null,"after":{"assign_generated_ipv6_cidr_block":null,"cidr_block":"10.0.0.0/16","enable_dns_hostnames":true,"enable_dns_support":true,"instance_tenancy":"default","ipv4_ipam_pool_id":null,"ipv4_netmask_length":null,"ipv6_ipam_pool_id":null,"ipv6_netmask_length":null,"region":"us-east-1","tags":null},"after_unknown":{"arn":true,"default_network_acl_id":true,"default_route_table_id":true,"default_security_group_id":true,"dhcp_options_id":true,"enable_network_address_usage_metrics":true,"id":true,"ipv6_association_id":true,"ipv6_cidr_block":true,"ipv6_cidr_block_network_border_group":true,"main_route_table_id":true,"owner_id":true,"tags_all":true},"before_sensitive":false,"after_sensitive":{"tags_all":{}},"after_identity":{"account_id":null,"id":null,"region":null}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.14.3","values":{"root_module":{"resources":[{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_name":"registry.terraform.io/hashicorp/aws","schema_version":0,"values":{"all_availability_zones":null,"exclude_names":null,"exclude_zone_ids":null,"filter":null,"group_names":["us-east-1-zg-1"],"id":"us-east-1","names":["us-east-1a","us-east-1b","us-east-1c","us-east-1d","us-east-1e","us-east-1f"],"region":"us-east-1","state":"available","timeouts":null,"zone_ids":["use1-az4","use1-az6","use1-az1","use1-az2","use1-az3","use1-az5"]},"sensitive_values":{"group_names":[false],"names":[false,false,false,false,false,false],"zone_ids":[false,false,false,false,false,false]}}]}}},"configuration":{"provider_config":{"aws":{"name":"aws","full_name":"registry.terraform.io/hashicorp/aws","version_constraint":"\u003e= 5.75.0","expressions":{"region":{"constant_value":"us-east-1"},"s3_use_path_style":{"constant_value":true},"skip_credentials_validation":{"constant_value":true},"skip_metadata_api_check":{"constant_value":true},"skip_requesting_account_id":{"constant_value":true}}},"awscc":{"name":"awscc","full_name":"registry.terraform.io/hashicorp/awscc","expressions":{"skip_metadata_api_check":{"constant_value":true}}}},"root_module":{"resources":[{"address":"aws_redshift_cluster.example","mode":"managed","type":"aws_redshift_cluster","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"constant_value":"redshift-cluster-1"},"cluster_type":{"constant_value":"multi-node"},"database_name":{"constant_value":"mydb"},"master_password":{"constant_value":"Mustbe8characters"},"master_username":{"constant_value":"foo"},"node_type":{"constant_value":"dc2.large"},"number_of_nodes":{"constant_value":2},"skip_final_snapshot":{"constant_value":true}},"schema_version":0},{"address":"aws_redshift_endpoint_access.example","mode":"managed","type":"aws_redshift_endpoint_access","name":"example","provider_config_key":"aws","expressions":{"cluster_identifier":{"references":["aws_redshift_cluster.example.cluster_identifier","aws_redshift_cluster.example"]},"endpoint_name":{"constant_value":"example"},"subnet_group_name":{"references":["aws_redshift_subnet_group.example_subnet_group.id","aws_redshift_subnet_group.example_subnet_group"]}},"schema_version":0},{"address":"aws_redshift_subnet_group.example_subnet_group","mode":"managed","type":"aws_redshift_subnet_group","name":"example_subnet_group","provider_config_key":"aws","expressions":{"description":{"constant_value":"Example Redshift subnet group"},"name":{"constant_value":"example-subnet-group"},"subnet_ids":{"references":["aws_subnet.subnet_a.id","aws_subnet.subnet_a","aws_subnet.subnet_b.id","aws_subnet.subnet_b"]}},"schema_version":0},{"address":"aws_subnet.subnet_a","mode":"managed","type":"aws_subnet","name":"subnet_a","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[0]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.1.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_subnet.subnet_b","mode":"managed","type":"aws_subnet","name":"subnet_b","provider_config_key":"aws","expressions":{"availability_zone":{"references":["data.aws_availability_zones.azs.names[1]","data.aws_availability_zones.azs.names","data.aws_availability_zones.azs"]},"cidr_block":{"constant_value":"10.0.2.0/24"},"map_public_ip_on_launch":{"constant_value":true},"vpc_id":{"references":["aws_vpc.example_vpc.id","aws_vpc.example_vpc"]}},"schema_version":1},{"address":"aws_vpc.example_vpc","mode":"managed","type":"aws_vpc","name":"example_vpc","provider_config_key":"aws","expressions":{"cidr_block":{"constant_value":"10.0.0.0/16"},"enable_dns_hostnames":{"constant_value":true},"enable_dns_support":{"constant_value":true}},"schema_version":1},{"address":"data.aws_availability_zones.azs","mode":"data","type":"aws_availability_zones","name":"azs","provider_config_key":"aws","expressions":{"state":{"constant_value":"available"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.aws_availability_zones.azs","attribute":["names",0]},{"resource":"data.aws_availability_zones.azs","attribute":["names",1]},{"resource":"aws_subnet.subnet_a","attribute":["id"]},{"resource":"aws_redshift_cluster.example","attribute":["cluster_identifier"]},{"resource":"aws_subnet.subnet_b","attribute":["id"]},{"resource":"aws_redshift_subnet_group.example_subnet_group","attribute":["id"]},{"resource":"aws_vpc.example_vpc","attribute":["id"]}],"timestamp":"2026-02-18T20:58:53Z","applyable":true,"complete":true,"errored":false}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.