1234567891011121314151617181920212223242526272829303132 |
- resource "aws_s3_bucket" "splunk_terraform_state" {
- # This must be unique, and must match the config in other directories's "backend.tf"
- bucket = "ftd-splunk-standalone-terraform-state"
- versioning {
- enabled = true
- }
- lifecycle {
- prevent_destroy = false
- }
- force_destroy = true
- server_side_encryption_configuration {
- rule {
- apply_server_side_encryption_by_default {
- kms_master_key_id = "${aws_kms_key.terraform_key.arn}"
- sse_algorithm = "aws:kms"
- }
- }
- }
- }
- resource "aws_s3_bucket_public_access_block" "keep_terraform_safe" {
- bucket = "${aws_s3_bucket.splunk_terraform_state.id}"
- block_public_acls = true
- block_public_policy = true
- ignore_public_acls = true
- restrict_public_buckets = true
- }
|