diff --git a/03_02-03_remotestate/remote_resources/s3_backend.tf b/03_02-03_remotestate/remote_resources/s3_backend.tf index 0f0f424..cd5da3f 100644 --- a/03_02-03_remotestate/remote_resources/s3_backend.tf +++ b/03_02-03_remotestate/remote_resources/s3_backend.tf @@ -6,7 +6,7 @@ variable "aws_access_key" {} variable "aws_secret_key" {} variable "bucket_name" { - default = "red30-tfstate" + default = "sewred30-tfstate" } # ////////////////////////////// @@ -28,7 +28,7 @@ data "aws_iam_user" "terraform" { # ////////////////////////////// # S3 BUCKET # ////////////////////////////// -resource "aws_s3_bucket" "red30-tfremotestate" { +resource "aws_s3_bucket" "sewred30-tfremotestate" { bucket = var.bucket_name force_destroy = true acl = "private" @@ -56,8 +56,8 @@ resource "aws_s3_bucket" "red30-tfremotestate" { EOF } -resource "aws_s3_bucket_public_access_block" "red30-tfremotestate" { - bucket = aws_s3_bucket.red30-tfremotestate.id +resource "aws_s3_bucket_public_access_block" "sewred30-tfremotestate" { + bucket = aws_s3_bucket.sewred30-tfremotestate.id block_public_acls = true block_public_policy = true @@ -68,8 +68,8 @@ resource "aws_s3_bucket_public_access_block" "red30-tfremotestate" { # ////////////////////////////// # DYNAMODB TABLE # ////////////////////////////// -resource "aws_dynamodb_table" "tf_db_statelock" { - name = "red30-tfstatelock" +resource "aws_dynamodb_table" "sewtf_db_statelock" { + name = "sewred30-tfstatelock" read_capacity = 20 write_capacity = 20 hash_key = "LockID" @@ -94,7 +94,7 @@ resource "aws_iam_user_policy" "terraform_user_dbtable" { "Effect": "Allow", "Action": ["dynamodb:*"], "Resource": [ - "${aws_dynamodb_table.tf_db_statelock.arn}" + "${aws_dynamodb_table.sewtf_db_statelock.arn}" ] } ]