Skip to content

Commit 6bfa0c6

Browse files
author
Giuseppe Borgese
committed
changed readme
1 parent d84884a commit 6bfa0c6

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

README.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,18 @@ This module will create all the resources to store and rotate a MySQL or Aurora
88
* A VPC with private subnets and accessibilty to AWS Secrets Manager Endpoint, see below for more details.
99
* An RDS with MySQL or Aurora already created and reacheable from the private subnets
1010

11+
module "secret-manager-with-rotation" {
12+
source = "giuseppeborgese/secret-manager-with-rotation/aws"
13+
version = "0.1.0"
14+
15+
# insert the 7 required variables here
16+
}
17+
1118
# Usage Example
1219
``` hcl
13-
module "mysqlsecretmanager" {
14-
source = "terraform-aws-secret-manager-with-rotation"
20+
module "secret-manager-with-rotation" {
21+
source = "giuseppeborgese/secret-manager-with-rotation/aws"
22+
version = "<always choose the latest version displayed in the upper right corner of this page>"
1523
name = "PassRotation"
1624
rotation_days = 10
1725
subnets_lambda = ["subnet-xxxxxx", "subnet-xxxxxx"]
@@ -23,7 +31,10 @@ module "mysqlsecretmanager" {
2331
}
2432
```
2533

34+
### Video Tutorial
2635
Take a look to the video to see the module in action
36+
[![Rotate automatically a MySQL or Aurora password using AWS Secrets Manager and Terraform](https://img.youtube.com/vi/cNtZWdxqhRc/0.jpg)](https://youtu.be/cNtZWdxqhRc)
37+
2738

2839
The subnets specified needs to be private and with internet access to reach the [AWS secrets manager endpoint](https://docs.aws.amazon.com/general/latest/gr/rande.html#asm_region)
2940
You can use a NAT GW or configure your Routes with a VPC Endpoint like is described in [this guide](https://aws.amazon.com/blogs/security/how-to-connect-to-aws-secrets-manager-service-within-a-virtual-private-cloud/)

0 commit comments

Comments
 (0)