apiVersion: iam.aws.upbound.io/v1beta1 kind: Role metadata: name: role-mathodprotect-dev labels: resource: Role spec: forProvider: assumeRolePolicy: | { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Effect": "Allow", "Principal": { "Service": "rds.amazonaws.com" } } ] } tags: region: eu-west-1 app: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: role providerConfigRef: name: dev --- apiVersion: rds.aws.upbound.io/v1beta1 kind: SubnetGroup metadata: name: subnetgroup-mathodprotect-dev labels: resource: SubnetGroup spec: forProvider: region: eu-west-1 subnetIds: # Replace to use subnetIdRefs - subnet-0c0a38354f2a028c8 - subnet-06dc47da5b4eae974 - subnet-0f3ee2a757ce85ad1 # subnetIdRefs: tags: region: eu-west-1 project: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: subnetgroup providerConfigRef: name: dev --- apiVersion: rds.aws.upbound.io/v1beta1 kind: Cluster metadata: name: cluster-mathodprotect-dev labels: resources: Cluster spec: forProvider: region: eu-west-1 availabilityZones: - eu-west-1a - eu-west-1b - eu-west-1c engine: aurora-mysql engineMode: provisioned engineVersion: 5.7.mysql_aurora.2.11.2 databaseName: mathodProtect autoGeneratePassword: true masterPasswordSecretRef: key: tropsecure name: cluster-mathodprotect-dev-password namespace: crossplane-system port: 3306 dbClusterParameterGroupName: clusterparametergroup-mathodprotect-dev # iamRoles: # - arn:aws:iam::453702081005:role/IAM-Role-Aurora # vpcSecurityGroupIds: # - sg-0292740ac642cbce9 vpcSecurityGroupIdRefs: - name: securitygroup-mathodprotect-dev masterUsername: mathod copyTagsToSnapshot: true finalSnapshotIdentifier: test-final dbSubnetGroupName: subnetgroup-mathodprotect-dev # dbSubnetGroupNameRef: backupRetentionPeriod: 1 preferredBackupWindow: 23:48-00:18 preferredMaintenanceWindow: tue:22:51-tue:23:21 tags: region: eu-west-1 project: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: cluster writeConnectionSecretToRef: name: rds-mathod-protect-password namespace: crossplane-system providerConfigRef: name: dev --- apiVersion: rds.aws.upbound.io/v1beta1 kind: ClusterInstance metadata: name: clusterinstance-mathodprotect-dev labels: resources: ClusterInstance spec: forProvider: region: eu-west-1 # clusterIdentifier: cluster-mathodprotect-dev # id: backoffice-staging-eu-west-1-aurora-cluster-instance-0 clusterIdentifierRef: name: cluster-mathodprotect-dev engine: aurora-mysql instanceClass: db.t3.medium publiclyAccessible: false caCertIdentifier: rds-ca-2019 # dbParameterGroupName: dbParameterGroupNameRef: name: parametergroup-mathodprotect-dev # dbSubnetGroupName: dbSubnetGroupNameRef: name: subnetgroup-mathodprotect-dev providerConfigRef: name: dev --- apiVersion: rds.aws.upbound.io/v1beta1 kind: ClusterParameterGroup metadata: name: clusterparametergroup-mathodprotect-dev labels: resources: ClusterParameterGroup spec: forProvider: region: eu-west-1 family: aurora-mysql5.7 parameter: - applyMethod: immediate name: aurora_load_from_s3_role value: arn:aws:iam::169590266381:role/role-mathodprotect-dev - applyMethod: immediate name: aurora_select_into_s3_role value: arn:aws:iam::169590266381:role/role-mathodprotect-dev - applyMethod: immediate name: aws_default_s3_role value: arn:aws:iam::169590266381:role/role-mathodprotect-dev - applyMethod: immediate name: innodb_online_alter_log_max_size value: "21474836480" - applyMethod: immediate name: slow_query_log value: "1" tags: region: eu-west-1 app: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: clusterparametergroup providerConfigRef: name: dev --- apiVersion: rds.aws.upbound.io/v1beta1 kind: ParameterGroup metadata: name: parametergroup-mathodprotect-dev labels: resources: ParameterGroup spec: forProvider: region: eu-west-1 family: aurora-mysql5.7 tags: region: eu-west-1 app: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: parametergroup providerConfigRef: name: dev --- apiVersion: ec2.aws.upbound.io/v1beta1 kind: SecurityGroup metadata: name: securitygroup-mathodprotect-dev spec: forProvider: region: eu-west-1 name: securitygroup-mathodprotect-dev vpcId: vpc-029aa16a171ccb018 # vpcIdRef: tags: region: eu-west-1 app: mathodprotect environment: dev account: "169590266381" composition: rds managedResources: securitygroup providerConfigRef: name: dev --- apiVersion: ec2.aws.upbound.io/v1beta1 kind: SecurityGroupEgressRule metadata: name: securitygroupegressrule-mathodprotect-dev spec: forProvider: region: eu-west-1 cidrIpv4: 0.0.0.0/0 ipProtocol: "-1" securityGroupIdRef: name: securitygroup-mathodprotect-dev providerConfigRef: name: dev