-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaws_backup.tf
129 lines (113 loc) · 4.38 KB
/
aws_backup.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
# Source vault
resource "aws_backup_vault" "source" {
count = var.enabled ? 1 : 0
provider = aws.source
name = module.source_label.id
kms_key_arn = module.source_kms_key.key_arn
tags = module.source_label.tags
force_destroy = true
}
resource "aws_backup_vault_policy" "source" {
count = var.enabled ? 1 : 0
provider = aws.source
backup_vault_name = aws_backup_vault.source[0].name
policy = data.aws_iam_policy_document.source_vault.json
}
resource "aws_backup_plan" "source" {
provider = aws.source
for_each = { for bp in var.backup_plans : bp.name => bp if var.enabled }
name = each.value.name
tags = module.source_label.tags
dynamic "rule" {
for_each = each.value.rules
content {
rule_name = rule.value.name
target_vault_name = aws_backup_vault.source[0].name
schedule = rule.value.schedule
start_window = try(rule.value.start_window, 60)
completion_window = try(rule.value.completion_window, 180)
recovery_point_tags = try(rule.value.recovery_point_tags, null)
enable_continuous_backup = try(rule.value.enable_continuous_backup, null)
dynamic "lifecycle" {
for_each = try(rule.value.lifecycle, null) != null ? [true] : []
content {
cold_storage_after = try(rule.value.lifecycle.cold_storage_after, null)
delete_after = try(rule.value.lifecycle.delete_after, null)
}
}
dynamic "copy_action" {
for_each = var.is_cross_account_backup_enabled == true ? [true] : []
content {
dynamic "lifecycle" {
for_each = try(rule.value.copy_action_lifecycle, null) != null ? [true] : []
content {
cold_storage_after = try(rule.value.copy_action_lifecycle.cold_storage_after, null)
delete_after = try(rule.value.copy_action_lifecycle.delete_after, null)
}
}
destination_vault_arn = aws_backup_vault.target[0].arn
}
}
}
}
dynamic "advanced_backup_setting" {
for_each = try(each.value.advanced_backup_setting, null) != null ? [true] : []
content {
backup_options = {
WindowsVSS = try(each.value.advanced_backup_setting.WindowsVSS, null)
}
resource_type = try(each.value.advanced_backup_setting.resource_type, null)
}
}
}
# Resource selection by arn
resource "aws_backup_selection" "source" {
for_each = { for bp in flatten([
for bp_plan in var.backup_plans : [
for resource in bp_plan.resources : {
backup_plan_key : bp_plan.name
resource_arn : resource
}
]
]) : md5("${bp.backup_plan_key}${bp.resource_arn}") => bp if var.enabled }
provider = aws.source
iam_role_arn = module.source_role.arn
plan_id = aws_backup_plan.source[each.value.backup_plan_key].id
name = substr("${module.source_label.id}-${each.key}", 0, 50)
resources = [each.value.resource_arn]
}
# Resource selection by tag
resource "aws_backup_selection" "tag" {
for_each = { for bp in flatten([
for bp_plan in var.backup_plans : [
for selection_tag in bp_plan.selection_tags : {
backup_plan_key : bp_plan.name
selection_tag : selection_tag
}
]
]) : md5("${bp.backup_plan_key}${bp.selection_tag["type"]}${bp.selection_tag["key"]}${bp.selection_tag["value"]}") => bp if var.enabled }
provider = aws.source
iam_role_arn = module.source_role.arn
plan_id = aws_backup_plan.source[each.value.backup_plan_key].id
name = substr("${module.source_label.id}-${each.key}", 0, 50)
selection_tag {
type = each.value.selection_tag["type"]
key = each.value.selection_tag["key"]
value = each.value.selection_tag["value"]
}
}
# Target vault
resource "aws_backup_vault" "target" {
count = var.enabled && var.is_cross_account_backup_enabled ? 1 : 0
provider = aws.target
name = module.target_label.id
kms_key_arn = module.target_kms_key.key_arn
tags = module.source_label.tags
force_destroy = true
}
resource "aws_backup_vault_policy" "target" {
count = var.enabled && var.is_cross_account_backup_enabled ? 1 : 0
provider = aws.target
backup_vault_name = aws_backup_vault.target[0].name
policy = data.aws_iam_policy_document.target_vault[0].json
}