From c9e71d6a1a95b01c891dee7e2bdc79c3568e27a0 Mon Sep 17 00:00:00 2001 From: "docs-sourcer[bot]" <99042413+docs-sourcer[bot]@users.noreply.github.com> Date: Thu, 8 May 2025 18:20:18 +0000 Subject: [PATCH] Updated with the [latest changes](https://github.com/gruntwork-io/terraform-aws-server/releases/tag/v1.0.0) from the `terraform-aws-server@v1.0.0` source branch. --- .../attach-eni/attach-eni.md | 16 ++++++++-------- .../disable-instance-metadata.md | 16 ++++++++-------- .../ec2-backup/ec2-backup.md | 16 ++++++++-------- .../persistent-ebs-volume.md | 16 ++++++++-------- .../require-instance-metadata-service-version.md | 16 ++++++++-------- .../route53-helpers/route53-helpers.md | 16 ++++++++-------- .../single-server/single-server.md | 16 ++++++++-------- 7 files changed, 56 insertions(+), 56 deletions(-) diff --git a/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md b/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md index facb195db8..db871cdfcf 100644 --- a/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md +++ b/docs/reference/modules/terraform-aws-server/attach-eni/attach-eni.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Attach ENI Scripts -View Source +View Source Release Notes @@ -30,7 +30,7 @@ This folder contains scripts you can use to attach [Elastic Network Interfaces An ENI allows you to have IP addresses that remain static, even if the underlying EC2 Instances are changing. -Check out the [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/attach-eni) for how to use these scripts with Terraform. +Check out the [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/attach-eni) for how to use these scripts with Terraform. ## Installing the attach-eni script @@ -47,7 +47,7 @@ The `attach-eni` script has the following prerequisites: 1. It must be run as root 2. It must be run on an EC2 instance 3. The EC2 instance must have an IAM role with permissions to search ENIs and EC2 tags, as well as attach ENIs (see the - [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/attach-eni)) + [attach-eni example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/attach-eni)) 4. The EC2 instance must have the AWS CLI and jq installed Typically, you'll want to run the `attach-eni` script in the User Data of your EC2 instances so it attaches the ENI at @@ -70,11 +70,11 @@ This tells the script to try find and attach an ENI with the same `Name` tag as diff --git a/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md b/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md index d66c0b79b0..1864249af1 100644 --- a/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md +++ b/docs/reference/modules/terraform-aws-server/disable-instance-metadata/disable-instance-metadata.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Disable Instance Metadata Access script -View Source +View Source Release Notes @@ -26,7 +26,7 @@ Once that is done, you can call this script to further secure your instance by d `disable-instance-metadata`: This script can be run on an EC2 instance to disable further access to the Instance Metadata service from that instance. It uses the AWS API to disable access to the endpoint. -Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers) for how to use these scripts with Packer and Terraform. +Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers) for how to use these scripts with Packer and Terraform. ## Installing the scripts @@ -42,7 +42,7 @@ The `disable-instance-metadata` script has the following prerequisites: 1. It must be run on an EC2 instance 2. The EC2 instance must have an IAM role with permissions to modify the Instance Metadata service's options. See the - [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers)) for a reference implementation. + [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers)) for a reference implementation. 3. The EC2 instance must have the AWS CLI (version 2.2.37 or higher), unzip and jq installed. Run the `disable-instance-metadata` script in the User Data of your EC2 instances, after any required calls to the Instance Metadata service have been made. This way, your instances will still be able to access the Instance Metadata service when needed, but will also disable further access to the service upon boot. @@ -74,11 +74,11 @@ This will result in subsequent calls to the Instance Metadata service to fail. diff --git a/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md b/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md index a24dc0c88b..361b2f78e2 100644 --- a/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md +++ b/docs/reference/modules/terraform-aws-server/ec2-backup/ec2-backup.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # EC2 Backup Module -View Source +View Source Release Notes @@ -32,7 +32,7 @@ This module makes it easy to deploy a [data lifecycle manager policy](https://do module "ec_2_backup" { - source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v0.16.2" + source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -98,7 +98,7 @@ module "ec_2_backup" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v0.16.2" + source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/ec2-backup?ref=v1.0.0" } inputs = { @@ -304,11 +304,11 @@ The name of the IAM role associated with the data lifecycle manager diff --git a/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md b/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md index e21d81d7a0..72c39dc4c6 100644 --- a/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md +++ b/docs/reference/modules/terraform-aws-server/persistent-ebs-volume/persistent-ebs-volume.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Persistent EBS Volume Scripts -View Source +View Source Release Notes @@ -40,7 +40,7 @@ volume can only be associated with a single EC2 Instance, so if you need the dat multiple servers, check out the [Amazon Elastic File System](https://aws.amazon.com/efs/), which provides a service built on top of NFS. -Check out the [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/persistent-ebs-volume) for how to use these scripts with +Check out the [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/persistent-ebs-volume) for how to use these scripts with Terraform. ## Installing the scripts @@ -58,7 +58,7 @@ The scripts have the following prerequisites: 1. They must be run as root 2. They must be run on an EC2 instance 3. The EC2 instance must have an IAM role with permissions to list, attach, and detach volumes (see the - [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/persistent-ebs-volume)) + [persistent-ebs-volume example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/persistent-ebs-volume)) 4. The EC2 instance must have the AWS CLI and jq installed Run the `mount-ebs-volume` script in the User Data of your EC2 instances so it mounts the volume at boot. Run the @@ -219,11 +219,11 @@ detaching the device. diff --git a/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md b/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md index f535ed404f..55bbc96c56 100644 --- a/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md +++ b/docs/reference/modules/terraform-aws-server/require-instance-metadata-service-version/require-instance-metadata-service-version.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Require Instance Metadata Service version script -View Source +View Source Release Notes @@ -24,7 +24,7 @@ This folder contains a script (`require-instance-metadata-service-version`) you Learn more at [the official AWS EC2 Instance Metadata Service documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html). -Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers) for how to use these scripts with Packer and Terraform. +Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers) for how to use these scripts with Packer and Terraform. ## Installing bash-commons @@ -49,7 +49,7 @@ The `require-instance-metadata-service-version` script has the following prerequ 1. It must be run on an EC2 instance 2. It requires that `bash-commons` version `v0.1.8` or newer is installed on the EC2 Instance. See instructions above. 3. The EC2 instance must have an IAM role with permissions to modify the Instance Metadata service's options. See the - [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers)) for a reference implementation. + [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers)) for a reference implementation. 4. The EC2 instance must have the AWS CLI (version 2.2.37 or higher), unzip and jq installed. Run the `require-instance-metadata-service-version` script in the User Data of your EC2 instances, prior to any calls to the Instance Metadata Service to configure if you want `2.0` credentials to be `required` or `optional`. @@ -97,11 +97,11 @@ Setting Instance Metadata Service version 2 state to optional diff --git a/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md b/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md index 14b925e37b..a166544cd8 100644 --- a/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md +++ b/docs/reference/modules/terraform-aws-server/route53-helpers/route53-helpers.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Route 53 Helpers -View Source +View Source Release Notes @@ -23,7 +23,7 @@ The helpers are: * `add-dns-a-record`: A script that can be run on an EC2 instance to add a DNS A record pointing to the instance's IP address. -Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers) for how to use these scripts with Terraform. +Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers) for how to use these scripts with Terraform. ## Installing the helpers @@ -69,16 +69,16 @@ Here is an example of an IAM policy your EC2 instance needs attached to its IAM } ``` -Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v0.16.2/examples/route53-helpers) to see what this looks like in action. +Check out the [route53-helpers example](https://github.com/gruntwork-io/terraform-aws-server/tree/v1.0.0/examples/route53-helpers) to see what this looks like in action. diff --git a/docs/reference/modules/terraform-aws-server/single-server/single-server.md b/docs/reference/modules/terraform-aws-server/single-server/single-server.md index 3fa354fba4..20487f8708 100644 --- a/docs/reference/modules/terraform-aws-server/single-server/single-server.md +++ b/docs/reference/modules/terraform-aws-server/single-server/single-server.md @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx'; import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx'; import { ModuleUsage } from "../../../../../src/components/ModuleUsage"; - + # Single Server Module -View Source +View Source Release Notes @@ -105,7 +105,7 @@ resource "aws_iam_policy_attachment" "attachment" { module "single_server" { - source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v0.16.2" + source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.0" # ---------------------------------------------------------------------------------------------------- # REQUIRED VARIABLES @@ -390,7 +390,7 @@ module "single_server" { # ------------------------------------------------------------------------------------------------------ terraform { - source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v0.16.2" + source = "git::git@github.com:gruntwork-io/terraform-aws-server.git//modules/single-server?ref=v1.0.0" } inputs = { @@ -1301,11 +1301,11 @@ When used in combination with user_data or user_data_base64, a user_data change