arrow-left
All pages
gitbookPowered by GitBook
1 of 1

Loading...

AWS RDS PostgreSQL

An open-source relational database management system emphasizing extensibility and SQL compliance.

hashtag
Example Usage


aws-rds-postgresql-integration.tf
resource "apono_integration" "aws-rds-postgresql-integration" {
  name                     = "AWS RDS PostgreSQL"
  type                     = "aws-rds-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-postgresql-instance"]
  metadata 
aws-rds-postgresql-integration.tf
resource "apono_resource_integration" "aws-rds-postgresql-integration" {
  name                     = "AWS RDS PostgreSQL"
  type                     = "aws-rds-postgresql"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["aws-rds-postgresql-instance"]
  integration_config 

hashtag
Schema


  • type aws-rds-postgresql

  • connected_resource_types List of resource types to sync.

chevron-rightAvailable resource types you can usehashtag
  • aws-rds-postgresql-instance

  • aws-rds-postgresql-database

  • aws-rds-postgresql-table

hashtag
Integration Config


  • auth_type (Required | String) Auth Type

    • Possible values: aws-iam-auth, user-password

  • aws_region (Required | String) Region

aws-rds-postgresql-integration.json
{
    "aws-rds-postgresql-integration": {
        "name": "AWS RDS PostgreSQL",
        "type": "aws-rds-postgresql",
        "connector_id": "apono-connector-id",
        "connected_resource_types": [
            "aws-rds-postgresql-instance"
        ],
        "integration_config": {
            "auth_type": "<Auth Type>",
            "aws_region": "<Region>",
            "aws_instance_id": "<Instance ID>",
            "dbname": "<Database Name>",
            "sslmode": "<SSL Mode>",
            "credentials_rotation_period_in_days": "<Credentials rotation period (in days)>",
            "credentials_cleanup_period_in_days": "<User cleanup after access is revoked (in days)>",
            "enable_audit": "<Enable Audit>",
        },
	"secret_store_config": {
    	    "region": "aws_region_template_value",
    	    "secret_id": "aws_secret_id_template_value"
  	    }
    }
}

aws-rds-postgresql-role

Possible values: us-east-1, us-east-2, us-west-1, us-west-2, eu-central-1, eu-central-2, eu-west-1, eu-west-2, eu-south-1, eu-south-2, eu-west-3, eu-north-1, af-south-1, ap-east-1, ap-southeast-3, ap-southeast-4, ap-southeast-5, ap-southeast-7, ap-south-1, ap-south-2, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-northeast-1, ca-central-1, ca-west-1, me-south-1, me-central-1, sa-east-1, il-central-1, mx-central-1
  • aws_instance_id (Required | String) Instance ID

  • dbname (Required | String) Database Name

    • Default value: postgres

  • sslmode (Optional | String) SSL Mode

    • Default value: require

    • Possible values: disable, allow, prefer, require, verify-ca, verify-full

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

  • enable_audit (Optional | String) Enable Audit

    • Default value: false

    • Possible values: true, false

  • =
    {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
    }
    aws_secret = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }
    =
    {
    auth_type = "<Auth Type>"
    aws_region = "<Region>"
    aws_instance_id = "<Instance ID>"
    dbname = "<Database Name>"
    sslmode = "<SSL Mode>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
    enable_audit = "<Enable Audit>"
    }
    secret_store_config = {
    aws = {
    region = "aws_region_template_value"
    secret_id = "aws_secret_id_template_value"
    }
    }