Difference between revisions of "Terraform resource: aws secretsmanager secret"
Jump to navigation
Jump to search
(4 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
} | } | ||
+ | # aws_secretsmanager_secret.your_secret will be created | ||
+ | + resource "aws_secretsmanager_secret" "your_secret" { | ||
+ | + arn = (known after apply) | ||
+ | + force_overwrite_replica_secret = false | ||
+ | + id = (known after apply) | ||
+ | + name = "your_secret" | ||
+ | + name_prefix = (known after apply) | ||
+ | + policy = (known after apply) | ||
+ | + recovery_window_in_days = 30 | ||
+ | + rotation_enabled = (known after apply) | ||
+ | + rotation_lambda_arn = (known after apply) | ||
+ | + tags_all = (known after apply) | ||
+ | } | ||
+ | |||
+ | Plan: 1 to add, 0 to change, 0 to destroy. | ||
+ | |||
+ | |||
+ | == Errors == | ||
+ | ╷ | ||
+ | │ Error: creating Secrets Manager Secret (example): operation error Secrets Manager: | ||
+ | CreateSecret, https response error StatusCode: 400, RequestID: a362c253-6f81-4725- a0bd-61be11cdd0c2, api error UnrecognizedClientException: [[The security token included in the request is invalid.]] | ||
+ | │ | ||
+ | │ with aws_secretsmanager_secret.ssh_priv_key, | ||
+ | │ on main.tf line 14, in resource "aws_secretsmanager_secret" "ssh_priv_key": | ||
+ | │ 14: resource "aws_secretsmanager_secret" "ssh_priv_key" { | ||
+ | │ | ||
+ | ╵ | ||
+ | |||
+ | |||
+ | == Related == | ||
* Terraform AWS data: <code>[[Terraform AWS data: aws_secretsmanager_secret|aws_secretsmanager_secret]]</code> | * Terraform AWS data: <code>[[Terraform AWS data: aws_secretsmanager_secret|aws_secretsmanager_secret]]</code> | ||
− | + | * <code>[[aws_secretsmanager_secret_rotation]]</code> | |
+ | * <code>[[aws secretsmanager create-secret]]</code> | ||
+ | * <code>[[aws_secretsmanager_secret_version]]</code> | ||
== See also == | == See also == |
Latest revision as of 10:30, 22 January 2025
aws_secretsmanager_secret
(ref)
resource "aws_secretsmanager_secret" "example" { name = "example" }
# aws_secretsmanager_secret.your_secret will be created + resource "aws_secretsmanager_secret" "your_secret" { + arn = (known after apply) + force_overwrite_replica_secret = false + id = (known after apply) + name = "your_secret" + name_prefix = (known after apply) + policy = (known after apply) + recovery_window_in_days = 30 + rotation_enabled = (known after apply) + rotation_lambda_arn = (known after apply) + tags_all = (known after apply) } Plan: 1 to add, 0 to change, 0 to destroy.
Errors[edit]
╷ │ Error: creating Secrets Manager Secret (example): operation error Secrets Manager: CreateSecret, https response error StatusCode: 400, RequestID: a362c253-6f81-4725- a0bd-61be11cdd0c2, api error UnrecognizedClientException: The security token included in the request is invalid. │ │ with aws_secretsmanager_secret.ssh_priv_key, │ on main.tf line 14, in resource "aws_secretsmanager_secret" "ssh_priv_key": │ 14: resource "aws_secretsmanager_secret" "ssh_priv_key" { │ ╵
Related[edit]
- Terraform AWS data:
aws_secretsmanager_secret
aws_secretsmanager_secret_rotation
aws secretsmanager create-secret
aws_secretsmanager_secret_version
See also[edit]
- Terraform Secrets Manager:
aws_secretsmanager_secret, aws_secretsmanager_secret_version, aws_secretsmanager secret_policy, aws_secretsmanager_secret_rotation
- AWS Secrets Manager:
aws secretsmanager
[create-secret | list-secrets
|get-secret-value | get-random-password ], arn:aws:secretmanager
- Terraform AWS: provider, resources, modules, data sources, VPC, IAM, Net, EC2, S3, Route53, ACM, CloudWatch, SES, RDS, ECS,
awscc, autoscaling, EKS
Advertising: