Skip to content

Commit 9ebf951

Browse files
committed
Add output for storage KMS
1 parent fc160aa commit 9ebf951

File tree

2 files changed

+6
-25
lines changed

2 files changed

+6
-25
lines changed

README.md

+1-25
Original file line numberDiff line numberDiff line change
@@ -8,31 +8,6 @@
88
[![Validate](https://github.com/geekcell/terraform-aws-ecs-cluster/actions/workflows/validate.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-ecs-cluster/actions/workflows/validate.yaml)
99
[![Lint](https://github.com/geekcell/terraform-aws-ecs-cluster/actions/workflows/linter.yaml/badge.svg)](https://github.com/geekcell/terraform-aws-ecs-cluster/actions/workflows/linter.yaml)
1010

11-
### Security
12-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/general)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=INFRASTRUCTURE+SECURITY)
13-
14-
#### Cloud
15-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_aws)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+AWS+V1.2)
16-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_aws_13)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+AWS+V1.3)
17-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_azure)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+AZURE+V1.1)
18-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_azure_13)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+AZURE+V1.3)
19-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_gcp)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+GCP+V1.1)
20-
21-
##### Container
22-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_kubernetes_16)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+KUBERNETES+V1.6)
23-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_eks_11)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+EKS+V1.1)
24-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_gke_11)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+GKE+V1.1)
25-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/cis_kubernetes)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=CIS+KUBERNETES+V1.5)
26-
27-
#### Data protection
28-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/soc2)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=SOC2)
29-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/pci)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=PCI-DSS+V3.2)
30-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/pci_dss_v321)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=PCI-DSS+V3.2.1)
31-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/iso)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=ISO27001)
32-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/nist)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=NIST-800-53)
33-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/hipaa)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=HIPAA)
34-
[![Infrastructure Tests](https://www.bridgecrew.cloud/badges/github/geekcell/terraform-aws-ecs-cluster/fedramp_moderate)](https://www.bridgecrew.cloud/link/badge?vcs=github&fullRepo=geekcell%2Fterraform-aws-ecs-cluster&benchmark=FEDRAMP+%28MODERATE%29)
35-
3611
# Terraform AWS ECS Cluster
3712

3813
This Terraform module provides a preconfigured solution for setting up an Amazon Elastic Container Service (ECS)
@@ -60,6 +35,7 @@ performance and health.
6035
| <a name="output_command_session_cloudwatch_log_group_arn"></a> [command\_session\_cloudwatch\_log\_group\_arn](#output\_command\_session\_cloudwatch\_log\_group\_arn) | The ARN of the CloudWatch log group used to store the command session. |
6136
| <a name="output_command_session_kms_arn"></a> [command\_session\_kms\_arn](#output\_command\_session\_kms\_arn) | The ARN of the KMS key used to encrypt the command session. |
6237
| <a name="output_name"></a> [name](#output\_name) | The name of the ECS cluster. |
38+
| <a name="output_storage_kms_arn"></a> [storage\_kms\_arn](#output\_storage\_kms\_arn) | The ARN of the KMS key used to encrypt the storage (managed and ephemeral). |
6339

6440
## Providers
6541

outputs.tf

+5
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,11 @@ output "arn" {
88
value = aws_ecs_cluster.main.arn
99
}
1010

11+
output "storage_kms_arn" {
12+
description = "The ARN of the KMS key used to encrypt the storage (managed and ephemeral)."
13+
value = try(module.kms_storage[0].key_arn, null)
14+
}
15+
1116
output "command_session_kms_arn" {
1217
description = "The ARN of the KMS key used to encrypt the command session."
1318
value = try(module.kms[0].key_arn, null)

0 commit comments

Comments
 (0)