nexus

cn-terraform/nexus/aws

Terraform Module HCL AWS

Sonatype Nexus Terraform Module for AWS

Install
module "nexus" {
source = "cn-terraform/nexus/aws"
version = "2.0.16"
}
plain text: /constructs/tfmod-cn-terraform-nexus-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

Sonatype Nexus Terraform Module for AWS # This Terraform module deploys a Sonatype Nexus OOS on AWS. Based on official Sonatype Nexus Docker image . ![](https://github.com/cn-terraform/terraform-aws-nexus/actions?query=workflow%3Aterraform) ![](https://github.com/cn-terraform/terraform-aws-nexus) ![](https://github.com/cn-terraform/terraform-aws-nexus) ![](https://github.com/cn-terraform/terraform-aws-nexus) ![](https://github.com/cn-terraform/terraform-aws-nexus) ![](https://github.com/cn-terraform/terraform-aws-nexus) Usage Check valid versions on: Github Releases: Terraform Module Registry: Other modules that you may need to use this module The Networking module: Github Releases: Terraform Module Registry: Install pre commit hooks. Pleas run this command right after cloning the reposito

Inputs (29)
NameTypeDescriptionDefault
name_prefixstringName prefix for resources on AWS required
public_subnets_idslist(any)List of Public Subnets IDs required
regionstringAWS Region the infrastructure is hosted in required
vpc_idstringID of the VPC required
private_subnets_idslist(any)List of Private Subnets IDs required
nexus_imagestringNexus image"sonatype/nexus3"
deployment_circuit_breaker_rollbackbool(Optional) The optional rollback option causes Amazon ECS to roll back to the lafalse
enable_s3_bucket_server_side_encryptionbool(Optional) If true, server side encryption will be applied.true
create_kms_keyboolIf true a new KMS key will be created to encrypt the logs. Defaults true. If setfalse
container_cpunumber(Optional) The number of cpu units to reserve for the container. This is optiona4096
container_memory_reservationnumber(Optional) The amount of memory (in MiB) to reserve for the container. If contai4096
volumeslist(object({ host_path = (Optional) A set of volume blocks that containers in your task may use[]
log_group_kms_key_idstringThe ARN of the KMS Key to use when encrypting log data. Please note, after the Anull
log_group_retention_in_daysnumber(Optional) Specifies the number of days you want to retain log events in the spe30
mount_pointslist(any)Container mount points. This is a list of maps, where each map should contain a []
lb_waf_web_acl_arnstringARN of a WAFV2 to associate with the ALB""
lb_http_portsmap(any)Map containing objects to define listeners behaviour based on type field. If typ{}
s3_bucket_server_side_encryption_sse_algorithmstring(Optional) The server-side encryption algorithm to use. Valid values are AES256 "AES256"
s3_bucket_server_side_encryption_keystring(Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can onull
ephemeral_storage_sizenumberThe number of GBs to provision for ephemeral storage on Fargate tasks. Must be g0
tagsmap(string)Resource tags{}
lb_enable_cross_zone_load_balancingstringEnable cross zone support for LB"true"
container_memorynumber(Optional) The amount of memory (in MiB) to allow the container to use. This is 8192
deployment_circuit_breaker_enabledbool(Optional) You can enable the deployment circuit breaker to cause a service deplfalse
configure_loadbalancer_sslobject({ enable_ssl Enable SSL, and configure the loadbalancer to use the certificate{ "dns_zone_id": "", "enable_ssl": f
Outputs (5)
nexus_lb_id — Sonatype Nexus Load Balancer ID
nexus_lb_arn — Sonatype Nexus Load Balancer ARN
nexus_lb_arn_suffix — Sonatype Nexus Load Balancer ARN Suffix
nexus_lb_dns_name — Sonatype Nexus Load Balancer DNS Name
nexus_lb_zone_id — Sonatype Nexus Load Balancer Zone ID
Resources (1)
aws_route53_record
Details
FrameworkTerraform Module
LanguageHCL
Version2.0.16
Cloud AWS
★ Stars17
Forks13
Total downloads10.9k
Inputs29
Outputs5
Resources1
Examples1
LicenseApache-2.0
Namespacecn-terraform
Updated