Difference between revisions of "Terraform resource: aws secretsmanager secret"
Jump to navigation
Jump to search
(Ant moved page Terraform resource: aws secretsmanager secret to Terraform AWS data: aws secretsmanager secret) Tag: New redirect |
|||
(14 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | # | + | <code>[[aws_secretsmanager_secret]]</code> ([https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/secretsmanager_secret ref]) |
+ | |||
+ | resource "aws_secretsmanager_secret" "example" { | ||
+ | name = "example" | ||
+ | } | ||
+ | |||
+ | # aws_secretsmanager_secret.your_secret will be created | ||
+ | + resource "aws_secretsmanager_secret" "your_secret" { | ||
+ | + arn = (known after apply) | ||
+ | + force_overwrite_replica_secret = false | ||
+ | + id = (known after apply) | ||
+ | + name = "your_secret" | ||
+ | + name_prefix = (known after apply) | ||
+ | + policy = (known after apply) | ||
+ | + recovery_window_in_days = 30 | ||
+ | + rotation_enabled = (known after apply) | ||
+ | + rotation_lambda_arn = (known after apply) | ||
+ | + tags_all = (known after apply) | ||
+ | } | ||
+ | |||
+ | Plan: 1 to add, 0 to change, 0 to destroy. | ||
+ | |||
+ | |||
+ | == Related == | ||
+ | * Terraform AWS data: <code>[[Terraform AWS data: aws_secretsmanager_secret|aws_secretsmanager_secret]]</code> | ||
+ | * <code>[[aws_secretsmanager_secret_rotation]]</code> | ||
+ | * <code>[[aws secretsmanager create-secret]]</code> | ||
+ | * <code>[[aws_secretsmanager_secret_version]]</code> | ||
+ | |||
+ | == See also == | ||
+ | * {{tf secretsmanager}} | ||
+ | * {{aws secretsmanager}} | ||
+ | * {{tf aws}} | ||
+ | |||
+ | [[Category:Terraform]] |
Latest revision as of 09:16, 17 June 2024
aws_secretsmanager_secret
(ref)
resource "aws_secretsmanager_secret" "example" { name = "example" }
# aws_secretsmanager_secret.your_secret will be created + resource "aws_secretsmanager_secret" "your_secret" { + arn = (known after apply) + force_overwrite_replica_secret = false + id = (known after apply) + name = "your_secret" + name_prefix = (known after apply) + policy = (known after apply) + recovery_window_in_days = 30 + rotation_enabled = (known after apply) + rotation_lambda_arn = (known after apply) + tags_all = (known after apply) } Plan: 1 to add, 0 to change, 0 to destroy.
Related[edit]
- Terraform AWS data:
aws_secretsmanager_secret
aws_secretsmanager_secret_rotation
aws secretsmanager create-secret
aws_secretsmanager_secret_version
See also[edit]
- Terraform Secrets Manager:
aws_secretsmanager_secret, aws_secretsmanager_secret_version, aws_secretsmanager secret_policy, aws_secretsmanager_secret_rotation
- AWS Secrets Manager:
aws secretsmanager
[create-secret | list-secrets
|get-secret-value | get-random-password ], arn:aws:secretmanager
- Terraform AWS: provider, resources, modules, data sources, VPC, IAM, Net, EC2, S3, Route53, ACM, CloudWatch, SES, RDS, ECS,
awscc, autoscaling, EKS
Advertising: