secret-manager
GoogleCloudPlatform/secret-manager/google
Creates one or more Google Secret Manager secrets and manages basic permissions for them
terraform-google-secret-manager This modules makes it easy to create Google Secret Manager secrets. If enabled it can enable the use of KMS keys for encrypting the secrets. Also if rotation is enabled and pubsub topics are passed in, then notification about secret rotation are sent to the pubsub topics. Here is a diagram of the resources that are deployed: !arch_diagram Usage Basic usage of this module is as follows: ``hcl module "secret-manager" { source = "GoogleCloudPlatform/secret-manager/google" version = "~> 0.9" project_id = var.project_id secrets = [ { name = "secret-1" secret_data = "secret information" }, ] } ` Functional examples are included in the examples directory. Inputs | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| |
| Name | Type | Description | Default |
|---|---|---|---|
| project_id | string | The project ID to manage the Secret Manager resources | required |
| automatic_replication | map(object({ kms_key_name = st | Automatic replication parameters that will be used for defined secrets. If not p | {} |
| topics | map(list(object({ name = strin | topics that will be used for defined secrets | {} |
| add_kms_permissions | list(string) | The list of the crypto keys to give secret manager access to | [] |
| add_pubsub_permissions | list(string) | The list of the pubsub topics to give secret manager access to | [] |
| secrets | list(object({ name : strin | The list of the secrets | [] |
| labels | map(map(string)) | labels to be added for the defined secrets | {} |
| secret_accessors_list | list(string) | The list of the members to allow accessing secrets | [] |
| user_managed_replication | map(list(object({ location = s | Replication parameters that will be used for defined secrets | {} |
secret_names — The name list of Secretssecret_versions — The name list of Secret VersionsCreates a global HTTP load balancer for Compute Engine by using forwarding rules
Creates a Cloud SQL database instance
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Creates an internal load balancer for Compute Engine by using forwarding rules