forge

🔐 Secrets Inventory

The following secrets must exist in AWS Secrets Manager under the fixed prefix /tf/app. They can be created via module.secrets, custom modules, or any other process — the only requirement is that they exist before applying dependent modules.

Secret Name Description Required By Modules
/tf/app/splunk_access_ingest_token Splunk Observability Access Token (Ingest) modules/infra/eks, integrations/splunk_o11y_aws_integration
/tf/app/splunk_o11y_username Splunk Observability Username modules/integrations/splunk_o11y_aws_integration_common
/tf/app/splunk_o11y_password Splunk Observability Password modules/integrations/splunk_o11y_aws_integration_common
/tf/app/splunk_cloud_username Splunk Cloud Username modules/integrations/splunk_cloud_data_manager, modules/integrations/splunk_cloud_data_manager_common
/tf/app/splunk_cloud_password Splunk Cloud Password modules/integrations/splunk_cloud_data_manager, modules/integrations/splunk_cloud_data_manager_common
/tf/app/splunk_cloud_api_token Splunk Cloud API Token modules/integrations/splunk_cloud_conf_shared
/tf/app/splunk_cloud_hec_token_eks Splunk Cloud HEC Token for EKS modules/infra/eks

🔑 Splunk Tokens Overview

Splunk integrations require authentication tokens securely stored in AWS Secrets Manager and injected into modules at runtime.

🔸 HEC Token (HTTP Event Collector)

🔸 Observability (o11y) Access Token

🔸 Splunk Cloud API Token