Provides a DigitalOcean database user resource. When creating a new database cluster, a default admin user with name doadmin
will be created. Then, this resource can be used to provide additional normal users inside the cluster.
NOTE: Any new users created will always have normal
role, only the default user that comes with database cluster creation has primary
role. Additional permissions must be managed manually.
resource "digitalocean_database_user" "user-example" {
cluster_id = digitalocean_database_cluster.postgres-example.id
name = "foobar"
}
resource "digitalocean_database_cluster" "postgres-example" {
name = "example-postgres-cluster"
engine = "pg"
version = "15"
size = "db-s-1vcpu-1gb"
region = "nyc1"
node_count = 1
}
resource "digitalocean_database_cluster" "postgres-example" {
name = "example-postgres-cluster"
engine = "pg"
version = "15"
size = "db-s-1vcpu-1gb"
region = "nyc1"
node_count = 1
}
resource "digitalocean_database_replica" "replica-example" {
cluster_id = digitalocean_database_cluster.postgres-example.id
name = "replica-example"
size = "db-s-1vcpu-1gb"
region = "nyc1"
}
resource "digitalocean_database_user" "user-example" {
cluster_id = digitalocean_database_replica.replica-example.uuid
name = "foobar"
}
resource "digitalocean_database_cluster" "kafka-example" {
name = "example-kafka-cluster"
engine = "kafka"
version = "3.5"
size = "db-s-2vcpu-2gb"
region = "nyc1"
node_count = 3
}
resource "digitalocean_database_kafka_topic" "foobar_topic" {
cluster_id = digitalocean_database_cluster.foobar.id
name = "topic-1"
}
resource "digitalocean_database_user" "foobar_user" {
cluster_id = digitalocean_database_cluster.foobar.id
name = "example-user"
settings {
acl {
topic = "topic-1"
permission = "produce"
}
acl {
topic = "topic-2"
permission = "produceconsume"
}
acl {
topic = "topic-*"
permission = "consume"
}
}
}
The following arguments are supported:
cluster_id
- (Required) The ID of the original source database cluster.name
- (Required) The name for the database user.mysql_auth_plugin
- (Optional) The authentication method to use for connections to the MySQL user account. The valid values are mysql_native_password
or caching_sha2_password
(this is the default).settings
- (Optional) Contains optional settings for the user.
The settings
block is documented below.settings
supports the following:
acl
- (Optional) A set of ACLs (Access Control Lists) specifying permission on topics with a Kafka cluster. The properties of an individual ACL are described below:An individual ACL includes the following:
topic
- (Required) A regex for matching the topic(s) that this ACL should apply to. The regex can assume one of 3 patterns: “”, “permission
- (Required) The permission level applied to the ACL. This includes “admin”, “consume”, “produce”, and “produceconsume”. “admin” allows for producing and consuming as well as add/delete/update permission for topics. “consume” allows only for reading topic messages. “produce” allows only for writing topic messages. “produceconsume” allows for both reading and writing topic messages.In addition to the above arguments, the following attributes are exported:
role
- Role for the database user. The value will be either “primary” or “normal”.password
- Password for the database user.access_cert
- Access certificate for TLS client authentication. (Kafka only)access_key
- Access key for TLS client authentication. (Kafka only)For individual ACLs for Kafka topics, the following attributes are exported:
id
- An identifier for the ACL, this will be automatically assigned when you create an ACL entryDatabase user can be imported using the id
of the source database cluster
and the name
of the user joined with a comma. For example:
terraform import digitalocean_database_user.user-example 245bcfd0-7f31-4ce6-a2bc-475a116cca97,foobar
Note: MongoDB user passwords are only available when the user is created. An existing MongoDB user that is imported will not have its password
attribute exported. Recreate the user if it is necessary to access the password with Terraform.