All Projects → skyscrapers → terraform-codedeploy

skyscrapers / terraform-codedeploy

Licence: MIT license
Terraform module to add codedeploy

Programming Languages

HCL
1544 projects
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to terraform-codedeploy

terraform-aws-cognito-user-pool
A Terraform module to create and manage Cognito User Pools (Simple and Secure User Sign-Up, Sign-In, and Access Control) on Amazon Web Services (AWS). https://aws.amazon.com/cognito
Stars: ✭ 46 (+58.62%)
Mutual labels:  terraform-modules
terraform-aws-iam-system-user
Terraform Module to Provision a Basic IAM System User Suitable for CI/CD Systems (E.g. TravisCI, CircleCI)
Stars: ✭ 71 (+144.83%)
Mutual labels:  terraform-modules
terraform-aws-vpc
A Terraform module to create an Amazon Web Services (AWS) Virtual Private Cloud (VPC).
Stars: ✭ 24 (-17.24%)
Mutual labels:  terraform-modules
terraform-aws-datadog-integration
Terraform module to configure Datadog AWS integration
Stars: ✭ 26 (-10.34%)
Mutual labels:  terraform-modules
terraform-aws-logs
Creates and configures an S3 bucket for storing AWS logs.
Stars: ✭ 69 (+137.93%)
Mutual labels:  terraform-modules
terraform-aws-pritunl-vpn-server
Pritunl VPN Server for your public/private like VPC on AWS
Stars: ✭ 40 (+37.93%)
Mutual labels:  terraform-modules
terraform-aws-iam-assumed-roles
Terraform Module for Assumed Roles on AWS with IAM Groups Requiring MFA
Stars: ✭ 33 (+13.79%)
Mutual labels:  terraform-modules
terraform-aws-cloudtrail
Creates and configures AWS CloudTrail
Stars: ✭ 40 (+37.93%)
Mutual labels:  terraform-modules
terraform-aws-enforce-mfa
A terraform module to enforce MFA for AWS groups and users
Stars: ✭ 24 (-17.24%)
Mutual labels:  terraform-modules
terraform-modules
Terraform Modules by Peak
Stars: ✭ 16 (-44.83%)
Mutual labels:  terraform-modules
db-sharding
Oracle Sharded database deployment automation and tools for use in client applications.
Stars: ✭ 30 (+3.45%)
Mutual labels:  terraform-modules
terraform-aws-lambda-function
A Terraform module for deploying and managing Lambda functions on Amazon Web Services (AWS). https://aws.amazon.com/lambda/
Stars: ✭ 37 (+27.59%)
Mutual labels:  terraform-modules
terraform-digitalocean-kubernetes
A terraform module for managing and creating a Kubernetes cluster on digital ocean
Stars: ✭ 11 (-62.07%)
Mutual labels:  terraform-modules
terraform-aws-acm-request-certificate
Terraform module to request an ACM certificate for a domain name and create a CNAME record in the DNS zone to complete certificate validation
Stars: ✭ 83 (+186.21%)
Mutual labels:  terraform-modules
terraform-aws-redis-elasticache
A Terraform module to create an Amazon Web Services (AWS) Redis ElastiCache cluster.
Stars: ✭ 33 (+13.79%)
Mutual labels:  terraform-modules
terraform-aws-route53
A Terraform module to create a Route53 Domain Name System (DNS) on Amazon Web Services (AWS). https://aws.amazon.com/route53/
Stars: ✭ 39 (+34.48%)
Mutual labels:  terraform-modules
terraform-aws-minikube
Terraform module for single node Kubernetes instance bootstrapped using kubeadm
Stars: ✭ 58 (+100%)
Mutual labels:  terraform-modules
terraform-aws-efs-backup
Terraform module designed to easily backup EFS filesystems to S3 using DataPipeline
Stars: ✭ 40 (+37.93%)
Mutual labels:  terraform-modules
terraform-aws-ec2-instance
Terraform module for provisioning a general purpose EC2 host
Stars: ✭ 123 (+324.14%)
Mutual labels:  terraform-modules
terraform-aws-s3-anti-virus
Creates and configures Anti-Virus Scanning of S3 Buckets.
Stars: ✭ 31 (+6.9%)
Mutual labels:  terraform-modules

Terraform modules that are related to codedeploy

app

Create a codedeploy app

Requirements

Name Version
terraform >= 0.12

Providers

Name Version
aws n/a

Inputs

Name Description Type Default Required
name Name of your codedeploy application any n/a yes
project The current project any n/a yes
s3_bucket_arn ARN of the S3 bucket where to fetch the application revision packages string "" no

Outputs

Name Description
app_name n/a
deployer_policy_arn n/a
deployer_policy_id n/a
deployer_policy_name n/a

Example

  module "codedeploy" {
    source  = "github.com/skyscrapers/terraform-codedeploy//app"
    name    = "application"
    project = "example"
  }

deployment-group

Create an deployment group for a codedeploy app

Requirements

Name Version
terraform >= 0.12

Providers

Name Version
aws n/a

Inputs

Name Description Type Default Required
app_name Name of the app any n/a yes
autoscaling_groups Autoscaling groups you want to attach to the deployment group list(string) n/a yes
environment Environment where your codedeploy deployment group is used for any n/a yes
service_role_arn IAM role that is used by the deployment group any n/a yes
alb_target_group Name of the ALB target group to use, define it when traffic need to be blocked from ALB during deployment string null no
blue_termination_behavior The action to take on instances in the original environment after a successful deployment. Only relevant when enable_bluegreen is true string "KEEP_ALIVE" no
bluegreen_timeout_action When to reroute traffic from an original environment to a replacement environment. Only relevant when enable_bluegreen is true string "CONTINUE_DEPLOYMENT" no
ec2_tag_filter Filter key and value you want to use for tags filters. Defined as key/value format, example: {"Environment":"staging"} map(string) null no
enable_bluegreen Enable all bluegreen deployment options bool false no
green_provisioning The method used to add instances to a replacement environment. Only relevant when enable_bluegreen is true string "COPY_AUTO_SCALING_GROUP" no
rollback_enabled Whether to enable auto rollback bool false no
rollback_events The event types that trigger a rollback list(string)
[
"DEPLOYMENT_FAILURE"
]
no
trigger_events events that can trigger the notifications list(string)
[
"DeploymentStop",
"DeploymentRollback",
"DeploymentSuccess",
"DeploymentFailure",
"DeploymentStart"
]
no
trigger_target_arn The ARN of the SNS topic through which notifications are sent string null no

Outputs

No output.

Example

  module "deployment_group" {
    source             = "github.com/skyscrapers/terraform-codedeploy//deployment-group"
    environment        = "production"
    app_name           = module.codedeploy.app_name
    service_role_arn   = module.iam.arn_role
    autoscaling_groups = ["autoscaling1", "autoscaling2"]
  }

S3 bucket

Create an S3 bucket to use with Codedeploy, to store application revisions.

Requirements

Name Version
terraform >= 0.12

Providers

Name Version
aws n/a

Inputs

Name Description Type Default Required
name_prefix Prefix for the bucket name. Note that the same bucket is used for all codedeploy deployment groups any n/a yes

Outputs

Name Description
bucket_arn n/a
bucket_id n/a
policy_arn n/a
policy_id n/a
policy_name n/a

Example

module "codedeploy_bucket" {
  source      = "github.com/skyscrapers/terraform-codedeploy//s3bucket?ref=478373f6f8d4a46b7a1ec96090707365e0ae3e42"
  name_prefix = "app"
}

notify-slack

Creates a lambda function that notifies Slack via the incoming webhooks when a deployment event happens using an SNS topic to call the lambda function.

Requirements

Name Version
terraform >= 0.12

Providers

Name Version
archive n/a
aws n/a

Inputs

Name Description Type Default Required
kms_key_arn KMS used for encrypting the webhook any n/a yes
slack_channel E.g. #channel_name any n/a yes
slack_webhook_url Needs to be encrypted from a file with no encryption context, using: aws kms encrypt --key-id 'arn:' --plaintext 'fileb://webhook' --output text --query CiphertextBlob any n/a yes
notify_users Slack usernames for mentions as a space separated string as '<@name1> <@name2>' or '<!channel>' or '<!here>' string "" no
verbose All codedeploy messages will be output if true. Only CREATED, FAILED, STOPPED and SUCCEEDED if it is empty or false string "true" no

Outputs

Name Description
sns_topic n/a

Example

  module "slack-notification" {
    source  = "github.com/skyscrapers/terraform-codedeploy//notify-slack"
    slack_webhook_url = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
    slack_channel = "#channel_name"
    kms_key_arn = aws_kms_key.kms_key.arn
  }
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].