All Projects → kgorskowski → Ebs_bckup

kgorskowski / Ebs_bckup

Licence: mit

Projects that are alternatives of or similar to Ebs bckup

Terraform
Terraform automation for Cloud
Stars: ✭ 121 (+278.13%)
Mutual labels:  automation, aws, terraform, hcl, devops
Terraform Eks
Terraform for AWS EKS
Stars: ✭ 82 (+156.25%)
Mutual labels:  aws, terraform, hcl, devops
Terratag
Terratag is a CLI tool that enables users of Terraform to automatically create and maintain tags across their entire set of AWS, Azure, and GCP resources
Stars: ✭ 385 (+1103.13%)
Mutual labels:  aws, terraform, hcl, devops
Vishwakarma
Terraform modules to create a self-hosting Kubernetes cluster on opinionated Cloud Platform.
Stars: ✭ 127 (+296.88%)
Mutual labels:  aws, terraform, hcl, devops
Ecs Pipeline
☁️ 🐳 ⚡️ 🚀 Create environment and deployment pipelines to ECS Fargate with CodePipeline, CodeBuild and Github using Terraform
Stars: ✭ 85 (+165.63%)
Mutual labels:  aws, terraform, hcl, devops
Terraform Aws Couchbase
Reusable infrastructure modules for running Couchbase on AWS
Stars: ✭ 73 (+128.13%)
Mutual labels:  aws, terraform, hcl, devops
Intro To Terraform
Sample code for the blog post series "A Comprehensive Guide to Terraform."
Stars: ✭ 550 (+1618.75%)
Mutual labels:  aws, terraform, hcl, devops
Terraform Modules
Reusable Terraform modules
Stars: ✭ 63 (+96.88%)
Mutual labels:  aws, terraform, hcl, devops
Infra Personal
Terraform for setting up my personal infrastructure
Stars: ✭ 45 (+40.63%)
Mutual labels:  automation, aws, terraform, hcl
Terraform Modules
Terraform Modules
Stars: ✭ 25 (-21.87%)
Mutual labels:  aws, terraform, hcl, devops
Terraform Aws Secure Baseline
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Stars: ✭ 596 (+1762.5%)
Mutual labels:  aws, terraform, hcl, devops
Terraform Aws Labs
Terraform template for AWS provider ☁️
Stars: ✭ 146 (+356.25%)
Mutual labels:  aws, lambda, terraform, hcl
Aws Automation
AWS automation scripts and lambda functions
Stars: ✭ 81 (+153.13%)
Mutual labels:  automation, aws, lambda, devops
Lambda Deployment Example
Automated Lambda Deployments with Terraform & CodePipeline
Stars: ✭ 25 (-21.87%)
Mutual labels:  aws, lambda, terraform, hcl
Terra Aws Core Kube
Terraform configuration to bootstrap a Kubernetes Cluster on top of CoreOS using AWS-EC2 instances
Stars: ✭ 10 (-68.75%)
Mutual labels:  aws, terraform, hcl
Howtheyaws
A curated collection of publicly available resources on how technology and tech-savvy organizations around the world use Amazon Web Services (AWS)
Stars: ✭ 389 (+1115.63%)
Mutual labels:  automation, aws, devops
Touchdown
Cloud service orchestration framework for python
Stars: ✭ 10 (-68.75%)
Mutual labels:  automation, aws, devops
Terracognita
Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
Stars: ✭ 452 (+1312.5%)
Mutual labels:  aws, terraform, devops
Inframap
Read your tfstate or HCL to generate a graph specific for each provider, showing only the resources that are most important/relevant.
Stars: ✭ 430 (+1243.75%)
Mutual labels:  aws, terraform, hcl
Terraformer
CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
Stars: ✭ 6,316 (+19637.5%)
Mutual labels:  aws, terraform, hcl

tf_ebs_bckup

a Lambda-powered EBS Snapshot Terraform Module

A Terraform module for creating a Lambda Function that takes automatic snapshots of of all connected EBS volumes of correspondingly tagged instances. The function is triggered via a CloudWatch event that can be freely configured by a cronlike expression.

Input Variables:

  • EC2_INSTANCE_TAG - All instances with this tag be backed up. Default is "Backup"
  • RETENTION_DAYS - Number of day the created EBS Snapshots will be stored, defaults to 5
  • unique_name - Just a marker for the Terraform stack. Default is "v1"`
  • stack_prefix - Prefix for resource generation. Default is ebs_bckup
  • cron_expression - Cron expression for CloudWatch events. Default is "22 1 * * ? *"
  • regions - List of regions in which the Lambda function should run. Requires at least one entry (eg. ["eu-west-1", "us-west-1"])

Outputs

Default outputs are aws_iam_role_arn with the value of the created IAM role for the Lambda function and the lambda_function_name

Example usage

In your Terrafom main.tf call the module with the required variables.

module "ebs_bckup" {
  source = "github.com/kgorskowski/ebs_bckup"
  EC2_INSTANCE_TAG = "Backup"
  RETENTION_DAYS   = 10
  unique_name      = "v2"
  stack_prefix     = "ebs_snapshot"
  cron_expression  = "45 1 * * ? *"
  regions          = ["eu-west-1", "eu-central-1"]
}

Update

As AWS now offers a EBS Snapshot Lifecycle mechanism I would recommend this solution as the latest state of the art. https://aws.amazon.com/de/blogs/aws/new-lifecycle-management-for-amazon-ebs-snapshots/ Implementation in Terraform pending https://github.com/terraform-providers/terraform-provider-aws/pull/5558

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].