You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_advanced_options"></a> [advanced\_options](#input\_advanced\_options)| Key-value string pairs to specify advanced configuration options. Note that the values for these configuration options must be strings (wrapped in quotes) or they may be wrong and cause a perpetual diff, causing Terraform to want to recreate your Elasticsearch domain on every apply |`map(string)`|`{}`| no |
191
191
| <aname="input_advanced_security_options"></a> [advanced\_security\_options](#input\_advanced\_security\_options)| Configuration block for [fine-grained access control](https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/fgac.html)|`any`| <pre>{<br> "anonymous_auth_enabled": false,<br> "enabled": true<br>}</pre> | no |
192
192
| <aname="input_auto_tune_options"></a> [auto\_tune\_options](#input\_auto\_tune\_options)| Configuration block for the Auto-Tune options of the domain |`any`| <pre>{<br> "desired_state": "ENABLED",<br> "rollback_on_disable": "NO_ROLLBACK"<br>}</pre> | no |
193
+
| <aname="input_cloudwatch_log_group_class"></a> [cloudwatch\_log\_group\_class](#input\_cloudwatch\_log\_group\_class)| Specified the log class of the log group. Possible values are: STANDARD or INFREQUENT\_ACCESS |`string`|`null`| no |
193
194
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
194
195
| <aname="input_cloudwatch_log_group_retention_in_days"></a> [cloudwatch\_log\_group\_retention\_in\_days](#input\_cloudwatch\_log\_group\_retention\_in\_days)| Number of days to retain log events |`number`|`60`| no |
196
+
| <aname="input_cloudwatch_log_group_skip_destroy"></a> [cloudwatch\_log\_group\_skip\_destroy](#input\_cloudwatch\_log\_group\_skip\_destroy)| Set to true if you do not wish the log group (and any logs it may contain) to be deleted at destroy time, and instead just remove the log group from the Terraform state |`bool`|`null`| no |
195
197
| <aname="input_cloudwatch_log_resource_policy_name"></a> [cloudwatch\_log\_resource\_policy\_name](#input\_cloudwatch\_log\_resource\_policy\_name)| Name of the resource policy for OpenSearch to log to CloudWatch |`string`|`null`| no |
196
198
| <aname="input_cluster_config"></a> [cluster\_config](#input\_cluster\_config)| Configuration block for the cluster of the domain |`any`| <pre>{<br> "dedicated_master_enabled": true<br>}</pre> | no |
197
199
| <aname="input_cognito_options"></a> [cognito\_options](#input\_cognito\_options)| Configuration block for authenticating Kibana with Cognito |`any`|`{}`| no |
@@ -207,6 +209,7 @@ No modules.
207
209
| <aname="input_enable_access_policy"></a> [enable\_access\_policy](#input\_enable\_access\_policy)| Determines whether an access policy will be applied to the domain |`bool`|`true`| no |
208
210
| <aname="input_encrypt_at_rest"></a> [encrypt\_at\_rest](#input\_encrypt\_at\_rest)| Configuration block for encrypting at rest |`any`| <pre>{<br> "enabled": true<br>}</pre> | no |
209
211
| <aname="input_engine_version"></a> [engine\_version](#input\_engine\_version)| Version of the OpenSearch engine to use |`string`|`null`| no |
212
+
| <aname="input_ip_address_type"></a> [ip\_address\_type](#input\_ip\_address\_type)| The IP address type for the endpoint. Valid values are ipv4 and dualstack |`string`|`null`| no |
210
213
| <aname="input_log_publishing_options"></a> [log\_publishing\_options](#input\_log\_publishing\_options)| Configuration block for publishing slow and application logs to CloudWatch Logs. This block can be declared multiple times, for each log\_type, within the same resource |`any`| <pre>[<br> {<br> "log_type": "INDEX_SLOW_LOGS"<br> },<br> {<br> "log_type": "SEARCH_SLOW_LOGS"<br> }<br>]</pre> | no |
211
214
| <aname="input_node_to_node_encryption"></a> [node\_to\_node\_encryption](#input\_node\_to\_node\_encryption)| Configuration block for node-to-node encryption options |`any`| <pre>{<br> "enabled": true<br>}</pre> | no |
212
215
| <aname="input_off_peak_window_options"></a> [off\_peak\_window\_options](#input\_off\_peak\_window\_options)| Configuration to add Off Peak update options |`any`| <pre>{<br> "enabled": true,<br> "off_peak_window": {<br> "hours": 7<br> }<br>}</pre> | no |
Copy file name to clipboardExpand all lines: variables.tf
+18Lines changed: 18 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -91,6 +91,12 @@ variable "engine_version" {
91
91
default=null
92
92
}
93
93
94
+
variable"ip_address_type" {
95
+
description="The IP address type for the endpoint. Valid values are ipv4 and dualstack"
96
+
type=string
97
+
default=null
98
+
}
99
+
94
100
variable"log_publishing_options" {
95
101
description="Configuration block for publishing slow and application logs to CloudWatch Logs. This block can be declared multiple times, for each log_type, within the same resource"
description="Set to true if you do not wish the log group (and any logs it may contain) to be deleted at destroy time, and instead just remove the log group from the Terraform state"
252
+
type=bool
253
+
default=null
254
+
}
255
+
256
+
variable"cloudwatch_log_group_class" {
257
+
description="Specified the log class of the log group. Possible values are: STANDARD or INFREQUENT_ACCESS"
258
+
type=string
259
+
default=null
260
+
}
261
+
244
262
variable"create_cloudwatch_log_resource_policy" {
245
263
description="Determines whether a resource policy will be created for OpenSearch to log to CloudWatch"
0 commit comments