You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Database Lab Terraform Module
2
2
3
-
This [Terraform Module](https://www.terraform.io/docs/language/modules/index.html)is responsible for deploying the [Database Lab Engine](https://gitlab.com/postgres-ai/database-lab) to cloud hosting providers.
3
+
This [Terraform Module](https://www.terraform.io/docs/language/modules/index.html)can be used as a template for deploying the [Database Lab Engine](https://gitlab.com/postgres-ai/database-lab) to cloud hosting providers. Please feel free to tailor it to meet your requirements.
4
4
5
5
Your source PostgreSQL database can be located anywhere, but DLE with other components will be created on an EC2 instance under your AWS account. Currently, only "logical" mode of data retrieval (dump/restore) is supported – the only available method for managed PostgreSQL cloud services such as RDS Postgres, RDS Aurora Postgres, Azure Postgres, or Heroku. "Physical" mode is not yet supported, but it will be in the future. More about various data retrieval options for DLE: https://postgres.ai/docs/how-to-guides/administration/data.
6
6
@@ -12,7 +12,7 @@ Your source PostgreSQL database can be located anywhere, but DLE with other comp
- AWS [Route 53](https://aws.amazon.com/route53/) Hosted Zone (For setting up TLS) for a domain or sub-domain you control
14
14
- You must have AWS Access Keys and a default region in your Terraform environment (See section on required IAM Permissions)
15
-
- The DLE runs on an EC2 instance which can be accessed using a selected set of SSH keys uploaded to EC2. Use the Terraform parameter `aws_keypair` to specify which EC2 Keypair to use
15
+
- The DLE runs on an EC2 instance which can be accessed using a selected set of SSH keys uploaded to EC2.
16
16
- Required IAM Permissions: to successfully run this Terraform module, the IAM User/Role must have the following permissions:
17
17
* Read/Write permissions on EC2
18
18
* Read/Write permissions on Route53
@@ -49,16 +49,15 @@ The following steps were tested on Ubuntu 20.04 but supposed to be valid for oth
49
49
```
50
50
1. Edit `terraform.tfvars` file. In our example, we will use Heroku demo database as a source:
1. Create `secret.tfvars` containing `source_postgres_password`, `platform_access_token`, and `vcs_github_secret_token`. An example:
79
79
```config
@@ -106,7 +106,7 @@ The following steps were tested on Ubuntu 20.04 but supposed to be valid for oth
106
106
public_dns_name = "demo-api-engine.aws.postgres.ai"# todo: this should be URL, not hostname – further we'll need URL, with protocol – `https://`
107
107
```
108
108
109
-
1. To verify result and check the progress, you might want to connect to the just-created EC2 machine using IP address or hostname from the Terraform output. In our example, it can be done using this one-liner (you can find more about DLE logs and configuration on this page: https://postgres.ai/docs/how-to-guides/administration/engine-manage):
109
+
1. To verify result and check the progress, you might want to connect to the just-created EC2 machine using IP address or hostname from the Terraform output and ssh key from ssh_public_keys_files_list and/or ssh_public_keys_list variables. In our example, it can be done using this one-liner (you can find more about DLE logs and configuration on this page: https://postgres.ai/docs/how-to-guides/administration/engine-manage):
0 commit comments