This project deploys the basic resources necessary for running multi-user Terraform deployments on an AWS account.
.gitignore | ||
.terraform-version | ||
.terraform.lock.hcl | ||
aws.data.tf | ||
aws.dynamodb.tf | ||
aws.iam.tf | ||
aws.kms.tf | ||
aws.s3.tf | ||
aws.ssm.tf | ||
LICENSE | ||
README.md | ||
README.terraform.md | ||
terraform.meta.tf | ||
terraform.outputs.tf | ||
terraform.tfvars.sample | ||
terraform.variables.tf |
Terraform AWS Pre-Base
Intro
This project deploys the basic resources necessary for running multi-user Terraform deployments on an AWS account.
- an s3 bucket for storing terraform states
- a dynamodb table for maintaining terraform locks
- an admin user intended for use in other IaC projects
- a kms key intended for securing other IaC project secrets
- a parameter store tree to keep outputs of this project for reference
This configuration is intended to be manually executed once at the beginning by the root user.
⚠️ | Re-deploying this project again after running other AWS IaC projects can be extremely destructive. |
---|
Usage
-
Install terraform or opentofu (preferably with tfenv). The required version is stated in
terraform.meta.tf
. -
Install terraform dependencies:
terraform init -upgrade
-
Insert org-specific variable values in
<org-name>.tfvars
. See*.tfvars.sample
for example. -
Then execute as:
terraform apply -var-file=<org-name>.tfvars
Notes
The terraform state is not saved in s3, because it is assumed that no s3 bucket for terraform states exists yet. User should secure the state file using some other method.
Generated outputs are saved in a parameter store tree for future reference.