diff --git a/examples/existing-cluster-with-base-and-infra/cleanup.sh b/examples/existing-cluster-with-base-and-infra/cleanup.sh index 713b7b9f..1c9402ae 100755 --- a/examples/existing-cluster-with-base-and-infra/cleanup.sh +++ b/examples/existing-cluster-with-base-and-infra/cleanup.sh @@ -28,4 +28,4 @@ if [[ $? -eq 0 && $destroy_output == *"Destroy complete!"* ]]; then else echo "FAILED: Terraform destroy of all targets failed" exit 1 -fi \ No newline at end of file +fi diff --git a/examples/existing-cluster-with-base-and-infra/install.sh b/examples/existing-cluster-with-base-and-infra/install.sh index 270289c7..a94380b6 100755 --- a/examples/existing-cluster-with-base-and-infra/install.sh +++ b/examples/existing-cluster-with-base-and-infra/install.sh @@ -29,4 +29,4 @@ if [[ ${PIPESTATUS[0]} -eq 0 && $apply_output == *"Apply complete"* ]]; then else echo "FAILED: Terraform apply of all modules failed" exit 1 -fi \ No newline at end of file +fi diff --git a/modules/eks-monitoring/add-ons/external-secrets/README.md b/modules/eks-monitoring/add-ons/external-secrets/README.md index 62d7a5cd..2d8f32d3 100644 --- a/modules/eks-monitoring/add-ons/external-secrets/README.md +++ b/modules/eks-monitoring/add-ons/external-secrets/README.md @@ -11,6 +11,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p | [aws](#requirement\_aws) | >= 3.72 | | [kubectl](#requirement\_kubectl) | >= 2.0.3 | | [kubernetes](#requirement\_kubernetes) | >= 2.10 | +| [random](#requirement\_random) | >= 3.6.1 | ## Providers @@ -18,6 +19,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p |------|---------| | [aws](#provider\_aws) | >= 3.72 | | [kubectl](#provider\_kubectl) | >= 2.0.3 | +| [random](#provider\_random) | >= 3.6.1 | ## Modules @@ -35,6 +37,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p | [aws_ssm_parameter.secret](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssm_parameter) | resource | | [kubectl_manifest.cluster_secretstore](https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest) | resource | | [kubectl_manifest.secret](https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest) | resource | +| [random_uuid.grafana_key_suffix](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/uuid) | resource | | [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source | ## Inputs diff --git a/modules/eks-monitoring/add-ons/external-secrets/main.tf b/modules/eks-monitoring/add-ons/external-secrets/main.tf index dfd3669b..0f9fca43 100644 --- a/modules/eks-monitoring/add-ons/external-secrets/main.tf +++ b/modules/eks-monitoring/add-ons/external-secrets/main.tf @@ -76,8 +76,11 @@ YAML depends_on = [module.external_secrets] } +resource "random_uuid" "grafana_key_suffix" { +} + resource "aws_ssm_parameter" "secret" { - name = "/terraform-accelerator/grafana-api-key" + name = "/terraform-accelerator/grafana-api-key/${random_uuid.grafana_key_suffix.result}" description = "SSM Secret to store grafana API Key" type = "SecureString" value = jsonencode({ diff --git a/modules/eks-monitoring/add-ons/external-secrets/versions.tf b/modules/eks-monitoring/add-ons/external-secrets/versions.tf index 71b0a884..69b48d4b 100644 --- a/modules/eks-monitoring/add-ons/external-secrets/versions.tf +++ b/modules/eks-monitoring/add-ons/external-secrets/versions.tf @@ -14,5 +14,9 @@ terraform { source = "alekc/kubectl" version = ">= 2.0.3" } + random = { + source = "hashicorp/random" + version = ">= 3.6.1" + } } }