forked from terraform-community-modules/tf_aws_elasticsearch
-
Notifications
You must be signed in to change notification settings - Fork 0
/
variables.tf
153 lines (128 loc) · 4.58 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
variable "create_iam_service_linked_role" {
description = "Whether to create IAM service linked role for AWS ElasticSearch service. Can be only one per AWS account."
type = bool
default = true
}
variable "domain_name" {
description = "Domain name for Elasticsearch cluster"
type = string
default = "es-domain"
}
variable "es_version" {
description = "Version of Elasticsearch to deploy (default 5.1)"
type = string
default = "5.1"
}
variable "instance_type" {
description = "ES instance type for data nodes in the cluster (default t2.small.elasticsearch)"
type = string
default = "t2.small.elasticsearch"
}
variable "instance_count" {
description = "Number of data nodes in the cluster (default 6)"
type = number
default = 6
}
variable "dedicated_master_type" {
description = "ES instance type to be used for dedicated masters (default same as instance_type)"
type = string
default = "false"
}
variable "encrypt_at_rest" {
description = "Enable encrption at rest (only specific instance family types support it: m4, c4, r4, i2, i3 default: false)"
type = bool
default = false
}
variable "management_iam_roles" {
description = "List of IAM role ARNs from which to permit management traffic (default ['*']). Note that a client must match both the IP address and the IAM role patterns in order to be permitted access."
type = list(string)
default = ["*"]
}
variable "management_public_ip_addresses" {
description = "List of IP addresses from which to permit management traffic (default []). Note that a client must match both the IP address and the IAM role patterns in order to be permitted access."
type = list(string)
default = []
}
variable "es_zone_awareness" {
description = "Enable zone awareness for Elasticsearch cluster (default false)"
type = bool
default = false
}
variable "es_zone_awareness_count" {
description = "Number of availability zones used for data nodes (default 2)"
type = number
default = 2
}
variable "ebs_volume_size" {
description = "Optionally use EBS volumes for data storage by specifying volume size in GB (default 0)"
type = number
default = 0
}
variable "ebs_volume_type" {
description = "Storage type of EBS volumes, if used (default gp2)"
type = string
default = "gp2"
}
variable "kms_key_id" {
description = "KMS key used for elasticsearch"
type = string
default = ""
}
variable "snapshot_start_hour" {
description = "Hour at which automated snapshots are taken, in UTC (default 0)"
type = number
default = 0
}
variable "vpc_options" {
description = "A map of supported vpc options"
type = map(list(string))
default = {
security_group_ids = []
subnet_ids = []
}
}
variable "tags" {
description = "tags to apply to all resources"
type = map(string)
default = {}
}
variable "use_prefix" {
description = "Flag indicating whether or not to use the domain_prefix. Default: true"
type = bool
default = true
}
variable "domain_prefix" {
description = "String to be prefixed to search domain. Default: tf-"
type = string
default = "tf-"
}
variable "dedicated_master_threshold" {
description = "The number of instances above which dedicated master nodes will be used. Default: 10"
type = number
default = 10
}
variable "advanced_options" {
description = "Map of key-value string pairs to specify advanced configuration options. Note that the values for these configuration options must be strings (wrapped in quotes) or they may be wrong and cause a perpetual diff, causing Terraform to want to recreate your Elasticsearch domain on every apply."
type = map(string)
default = {}
}
variable "log_publishing_options" {
description = "List of maps of options for publishing slow logs to CloudWatch Logs."
type = list(map(string))
default = []
}
variable "node_to_node_encryption_enabled" {
description = "Whether to enable node-to-node encryption."
type = bool
default = false
}
variable "enforce_https" {
description = "Whether or not to require HTTPS."
type = bool
default = false
}
variable "tls_security_policy" {
description = "The name of the TLS security policy that needs to be applied to the HTTPS endpoint. Example values: Policy-Min-TLS-1-0-2019-07 and Policy-Min-TLS-1-2-2019-07. Terraform will only perform drift detection if a configuration value is provided."
type = string
default = null
}