s3.terraform_backend.tf 768 B

1234567891011121314151617181920212223242526272829303132
  1. resource "aws_s3_bucket" "splunk_terraform_state" {
  2. # This must be unique, and must match the config in other directories's "backend.tf"
  3. bucket = "ftd-splunk-standalone-terraform-state"
  4. versioning {
  5. enabled = true
  6. }
  7. lifecycle {
  8. prevent_destroy = false
  9. }
  10. force_destroy = true
  11. server_side_encryption_configuration {
  12. rule {
  13. apply_server_side_encryption_by_default {
  14. kms_master_key_id = "${aws_kms_key.terraform_key.arn}"
  15. sse_algorithm = "aws:kms"
  16. }
  17. }
  18. }
  19. }
  20. resource "aws_s3_bucket_public_access_block" "keep_terraform_safe" {
  21. bucket = "${aws_s3_bucket.splunk_terraform_state.id}"
  22. block_public_acls = true
  23. block_public_policy = true
  24. ignore_public_acls = true
  25. restrict_public_buckets = true
  26. }