diff --git a/examples/existing-cluster-with-base-and-infra/cleanup.sh b/examples/existing-cluster-with-base-and-infra/cleanup.sh
index 713b7b9f..1c9402ae 100755
--- a/examples/existing-cluster-with-base-and-infra/cleanup.sh
+++ b/examples/existing-cluster-with-base-and-infra/cleanup.sh
@@ -28,4 +28,4 @@ if [[ $? -eq 0 && $destroy_output == *"Destroy complete!"* ]]; then
else
echo "FAILED: Terraform destroy of all targets failed"
exit 1
-fi
\ No newline at end of file
+fi
diff --git a/examples/existing-cluster-with-base-and-infra/install.sh b/examples/existing-cluster-with-base-and-infra/install.sh
index 270289c7..a94380b6 100755
--- a/examples/existing-cluster-with-base-and-infra/install.sh
+++ b/examples/existing-cluster-with-base-and-infra/install.sh
@@ -29,4 +29,4 @@ if [[ ${PIPESTATUS[0]} -eq 0 && $apply_output == *"Apply complete"* ]]; then
else
echo "FAILED: Terraform apply of all modules failed"
exit 1
-fi
\ No newline at end of file
+fi
diff --git a/modules/eks-monitoring/add-ons/external-secrets/README.md b/modules/eks-monitoring/add-ons/external-secrets/README.md
index 62d7a5cd..2d8f32d3 100644
--- a/modules/eks-monitoring/add-ons/external-secrets/README.md
+++ b/modules/eks-monitoring/add-ons/external-secrets/README.md
@@ -11,6 +11,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p
| [aws](#requirement\_aws) | >= 3.72 |
| [kubectl](#requirement\_kubectl) | >= 2.0.3 |
| [kubernetes](#requirement\_kubernetes) | >= 2.10 |
+| [random](#requirement\_random) | >= 3.6.1 |
## Providers
@@ -18,6 +19,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p
|------|---------|
| [aws](#provider\_aws) | >= 3.72 |
| [kubectl](#provider\_kubectl) | >= 2.0.3 |
+| [random](#provider\_random) | >= 3.6.1 |
## Modules
@@ -35,6 +37,7 @@ This deploys an EKS Cluster with the External Secrets Operator. The cluster is p
| [aws_ssm_parameter.secret](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssm_parameter) | resource |
| [kubectl_manifest.cluster_secretstore](https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest) | resource |
| [kubectl_manifest.secret](https://registry.terraform.io/providers/alekc/kubectl/latest/docs/resources/manifest) | resource |
+| [random_uuid.grafana_key_suffix](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/uuid) | resource |
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
## Inputs
diff --git a/modules/eks-monitoring/add-ons/external-secrets/main.tf b/modules/eks-monitoring/add-ons/external-secrets/main.tf
index dfd3669b..0f9fca43 100644
--- a/modules/eks-monitoring/add-ons/external-secrets/main.tf
+++ b/modules/eks-monitoring/add-ons/external-secrets/main.tf
@@ -76,8 +76,11 @@ YAML
depends_on = [module.external_secrets]
}
+resource "random_uuid" "grafana_key_suffix" {
+}
+
resource "aws_ssm_parameter" "secret" {
- name = "/terraform-accelerator/grafana-api-key"
+ name = "/terraform-accelerator/grafana-api-key/${random_uuid.grafana_key_suffix.result}"
description = "SSM Secret to store grafana API Key"
type = "SecureString"
value = jsonencode({
diff --git a/modules/eks-monitoring/add-ons/external-secrets/versions.tf b/modules/eks-monitoring/add-ons/external-secrets/versions.tf
index 71b0a884..69b48d4b 100644
--- a/modules/eks-monitoring/add-ons/external-secrets/versions.tf
+++ b/modules/eks-monitoring/add-ons/external-secrets/versions.tf
@@ -14,5 +14,9 @@ terraform {
source = "alekc/kubectl"
version = ">= 2.0.3"
}
+ random = {
+ source = "hashicorp/random"
+ version = ">= 3.6.1"
+ }
}
}