-
Notifications
You must be signed in to change notification settings - Fork 6
/
README.yaml
74 lines (60 loc) · 2.04 KB
/
README.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
---
#
# This is the canonical configuration for the `README.md`
# Run `make readme` to rebuild the `README.md`
#
# Name of this project
name: terraform-aws-teleport-storage
# Tags of this project
tags:
- aws
- terraform
- terraform-modules
- kubernetes
- teleport
# Logo for this project
#logo: docs/logo.png
# License of this project
license: "APACHE2"
# Canonical GitHub repo
github_repo: cloudposse/terraform-aws-teleport-storage
# Badges to display
badges:
- name: "Codefresh Build Status"
image: "https://g.codefresh.io/api/badges/pipeline/cloudposse/terraform-modules%2Fterraform-aws-teleport-storage?type=cf-1"
url: "https://g.codefresh.io/public/accounts/cloudposse/pipelines/5d04407b1fc622c0cf6d3df8"
- name: "Latest Release"
image: "https://img.shields.io/github/release/cloudposse/terraform-aws-teleport-storage.svg"
url: "https://github.com/cloudposse/terraform-aws-teleport-storage/releases/latest"
- name: "Slack Community"
image: "https://slack.cloudposse.com/badge.svg"
url: "https://slack.cloudposse.com"
# Short description of this project
description: |-
This Terraform module provisions:
* An S3 bucket for session logs in Gravitational [Teleport](https://gravitational.com/teleport)
* 2 DynamoDB tables to use as storage backend in Teleport
## Features
Using DynamoDB as a storage backend allows highly available deployments of Teleport Auth services.
Using S3 for Teleport session storage has many advantages:
* Encryption at rest
* Versioned objects
* Lifecycle Support to expunge old sessions (e.g. after 2 years)
* Extreme Availability & Durability
* Zero Maintenance
* Glacier
* Cross Region Replication
* S3 Bucket could be owned by tamper-proof AWS Audit Account
* Easily prevent deletions
* Audit Trails, Access Logs via Cloud Trails
include:
- "docs/targets.md"
- "docs/terraform.md"
# Contributors to this project
contributors:
- name: "Erik Osterman"
github: "osterman"
- name: "Andriy Knysh"
github: "aknysh"
- name: "Igor Rodionov"
github: "goruha"