Skip to content

CloudHealth Terraform module for IAM Roles provisioning DevOps owned repository managed with Terraform.

License

Notifications You must be signed in to change notification settings

formstack/terraform-cloudhealth-iam

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CloudHealth Technologies Terraform module for CloudHealth IAM Role AWS account provisioning.

This module manages installation of CloudHealth IAM Role in your AWS account.

Inputs

Variable Type Description
external-id String IAM Role External ID assigned in CloudHealth platform
s3-billing-bucket String S3 bucket location for consolidated accounts billing data (optional)
s3-cur-bucket String S3 bucket location for consolidated accounts cost and usage data (optional)
s3-cloudtrail-bucket String S3 bucket location for Cloudtrail data (optional)
s3-config-bucket String S3 bucket location for AWS Config data (optional)
s3-ecs-bucket String S3 bucket location for Elastic Container Service event stream data (optional)
automated-ri-modification-enabled Boolean Additional permissions for enabling automated RI modification (default: false)
automated-actions-enabled Boolean Additional permissions for enabling automated actions (default: false)
additional-policy String Additional policy to associate with IAM Role (optional)

Outputs

Variable Type Description
cloudhealth-role-arn String IAM Role ARN created by the module
external-id String IAM Role External ID assigned in CloudHealth platform
cloudhealth-policy-arn String IAM Policy ARN created by the module

Usage

Obtain your External ID from the CloudHealth platform under new AWS account setup page.

Define invocation of TF module

module "cloudhealth-iam-role" {
    source  = "github.com/CloudHealth/terraform-cloudhealth-iam/role"
    external-id = "1234567890abcdefg"
    s3-billing-bucket = "billing-bucket"
    s3-cloudtrail-bucket = "cloudtrail-bucket"
    automated-ri-modification-enabled = true
    automated-actions-enabled = true
    additional-policy = <<POLICY
{
   "Action": [
     "ec2:CreateTags"
   ],
   "Effect": "Allow",
   "Resource": "*"
}
POLICY
}

Run terraform plan and apply

terraform plan -target=module.cloudhealth-iam-role
terraform apply -target=module.cloudhealth-iam-role

Get created ARN and External ID to use in CHT portal

terraform output -module=cloudhealth-iam-role

License and Authors

Authors: CloudHealth Team GSD (devops@cloudhealthtech.com)

About

CloudHealth Terraform module for IAM Roles provisioning DevOps owned repository managed with Terraform.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • HCL 100.0%