You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After you create the files, navigate to each application and environment pair's directory and run the following
472
-
command to initialize Terraform:
473
-
474
-
.. code-block::
475
-
476
-
terraform init
477
-
478
-
Run the following command to view the Terraform plan:
479
-
480
-
.. code-block::
481
-
482
-
terraform plan
483
-
484
-
Run the following command to create one project and one deployment for the application and environment pair. The command uses the files and the |service-terraform| to
485
-
create the projects and clusters:
486
-
487
-
.. code-block::
488
-
489
-
terraform apply
490
-
491
-
When prompted, type ``yes`` and press :kbd:`Enter` to apply
492
-
the configuration.
493
-
494
494
.. tab:: Staging and Prod Environments
495
495
:tabid: stagingprod
496
496
@@ -518,33 +518,92 @@ These examples also apply other recommended configurations, including:
After you create the files, navigate to each application and environment pair's directory and run the following
523
-
command to initialize Terraform:
526
+
Configure BYOK Encryption
527
+
~~~~~~~~~~~~~~~~~~~~~~~~~
524
528
525
-
.. code-block::
529
+
.. tabs::
526
530
527
-
terraform init
531
+
.. tab:: Dev and Test Environments
532
+
:tabid: devtest
528
533
529
-
Run the following command to view the Terraform plan:
534
+
For your development and testing environments, consider skipping |byok| encryption
535
+
environments to save costs, unless you're in a highly-regulated industry
536
+
or storing sensitive data. To learn more, see :ref:`arch-center-recommendations`.
530
537
531
-
.. code-block::
538
+
.. tab:: Staging and Prod Environments
539
+
:tabid: stagingprod
532
540
533
-
terraform plan
534
-
535
-
Run the following command to create one project and one deployment for the application and environment pair. The command uses the files and the |service-terraform| to
536
-
create the projects and clusters:
541
+
For your staging and production environments environments, we
542
+
recommend enabling |byok| encryption when provisioning your {+clusters+}.
543
+
To learn more, see :ref:`arch-center-recommendations`.
537
544
538
-
.. code-block::
545
+
To enable |byok| encryption with Terraform,
546
+
create the following resources. Change the IDs and names to use your values:
539
547
540
-
terraform apply
548
+
.. tabs::
549
+
550
+
.. tab:: AWS
551
+
:tabid: aws
552
+
553
+
.. tip::
554
+
555
+
For a complete configuration example, see
556
+
:github:`Atlas Terraform Provider Example <mongodb/terraform-provider-mongodbatlas/blob/master/examples/mongodbatlas_encryption_at_rest/aws/atlas-cluster>`.
557
+
558
+
Alternatively, to simplify the configuration process, you can use the
559
+
`encryption at rest Terraform module <https://registry.terraform.io/modules/terraform-mongodbatlas-modules/encryption-at-rest/mongodbatlas/latest>`__.
After you create the files, navigate to each application and environment pair's directory and run the following
586
+
command to initialize Terraform:
587
+
588
+
.. code-block::
589
+
590
+
terraform init
591
+
592
+
Run the following command to view the Terraform plan:
593
+
594
+
.. code-block::
595
+
596
+
terraform plan
597
+
598
+
Run the following command to create one project and one deployment for the application and environment pair. The command uses the files and the |service-terraform| to
599
+
create the projects and clusters:
600
+
601
+
.. code-block::
602
+
603
+
terraform apply
604
+
605
+
When prompted, type ``yes`` and press :kbd:`Enter` to apply
0 commit comments