generated from production-ready-toolkit/terraform-module-boilerplate
-
Notifications
You must be signed in to change notification settings - Fork 4
/
variables.tf
98 lines (81 loc) · 2.32 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
variable "name" {
type = string
}
variable "elasticsearch_version" {
type = string
default = "OpenSearch_1.0"
}
variable "instance_type" {
type = string
}
variable "instance_count" {
description = "Number of cluster nodes"
type = number
}
variable "zone_awareness" {
description = ""
type = bool
default = true
}
variable "az_count" {
description = "value"
type = number
default = null
}
variable "vpc" {
description = "VPC ID"
type = string
}
variable "subnets" {
description = "List with subnet ID's to create a subnet group"
type = list
}
variable "cidrs_to_allow" {
description = "A list with CIDR's to enable on ingress and egress"
type = list
default = []
}
variable "security_groups_to_allow" {
description = "A list with security group ID's to enable on ingress and egress"
type = list
default = []
}
variable "kms_key" {
description = "The ARN of the key that you wish to use if encrypting at rest"
type = string
default = ""
}
variable "cloudwatch_rotation" {
description = "Specifies the number of days you want to retain log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, 3653, and 0. If you select 0, the events in the log group are always retained and never expire"
type = number
default = 1
}
variable "access_policy" {
description = "IAM policy document specifying the access policies for the domain."
type = string
default = null
}
variable "custom_domain" {
description = "Support for a custom DNS domain for cluster"
type = string
default = null
}
variable "enforce_https" {
description = "Only HTTPS"
type = bool
default = true
}
variable "custom_domain_acm_certificate" {
description = "ACM certificate ARN for your custom endpoint"
type = string
default = null
}
variable "tls_security_policy" {
description = "ame of the TLS security policy that needs to be applied to the HTTPS endpoint. Valid values: Policy-Min-TLS-1-0-2019-07 and Policy-Min-TLS-1-2-2019-07"
type = string
default = "Policy-Min-TLS-1-2-2019-07"
}
variable "tags" {
type = map(any)
default = {}
}