You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -342,7 +342,7 @@ Available targets:
342
342
| <aname="input_node_role_policy_arns"></a> [node\_role\_policy\_arns](#input\_node\_role\_policy\_arns)| List of policy ARNs to attach to the worker role this module creates in addition to the default ones |`list(string)`|`[]`| no |
343
343
| <aname="input_placement"></a> [placement](#input\_placement)| Configuration for the [`placement` Configuration Block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/launch_template#placement) of the launch template.<br>Leave list empty for defaults. Pass list with single object with attributes matching the `placement` block to configure it.<br>Note that this configures the launch template only. Some elements will be ignored by the Auto Scaling Group<br>that actually launches instances. Consult AWS documentation for details. |`list(any)`|`[]`| no |
344
344
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
345
-
| <aname="input_resources_to_tag"></a> [resources\_to\_tag](#input\_resources\_to\_tag)| List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request", "network-interface". |`list(string)`|`[]`| no |
345
+
| <aname="input_resources_to_tag"></a> [resources\_to\_tag](#input\_resources\_to\_tag)| List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request", "network-interface". |`list(string)`|<pre>[<br> "instance",<br> "volume",<br> "network-interface"<br>]</pre>| no |
346
346
| <aname="input_ssh_access_security_group_ids"></a> [ssh\_access\_security\_group\_ids](#input\_ssh\_access\_security\_group\_ids)| Set of EC2 Security Group IDs to allow SSH access (port 22) to the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
347
347
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
348
348
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| A list of subnet IDs to launch resources in |`list(string)`| n/a | yes |
@@ -536,7 +536,7 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
Copy file name to clipboardExpand all lines: docs/terraform.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@
98
98
| <aname="input_node_role_policy_arns"></a> [node\_role\_policy\_arns](#input\_node\_role\_policy\_arns)| List of policy ARNs to attach to the worker role this module creates in addition to the default ones |`list(string)`|`[]`| no |
99
99
| <aname="input_placement"></a> [placement](#input\_placement)| Configuration for the [`placement` Configuration Block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/launch_template#placement) of the launch template.<br>Leave list empty for defaults. Pass list with single object with attributes matching the `placement` block to configure it.<br>Note that this configures the launch template only. Some elements will be ignored by the Auto Scaling Group<br>that actually launches instances. Consult AWS documentation for details. |`list(any)`|`[]`| no |
100
100
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
101
-
| <aname="input_resources_to_tag"></a> [resources\_to\_tag](#input\_resources\_to\_tag)| List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request", "network-interface". |`list(string)`|`[]`| no |
101
+
| <aname="input_resources_to_tag"></a> [resources\_to\_tag](#input\_resources\_to\_tag)| List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request", "network-interface". |`list(string)`|<pre>[<br> "instance",<br> "volume",<br> "network-interface"<br>]</pre>| no |
102
102
| <aname="input_ssh_access_security_group_ids"></a> [ssh\_access\_security\_group\_ids](#input\_ssh\_access\_security\_group\_ids)| Set of EC2 Security Group IDs to allow SSH access (port 22) to the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
103
103
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
104
104
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| A list of subnet IDs to launch resources in |`list(string)`| n/a | yes |
description="List of auto-launched resource types to tag. Valid types are \"instance\", \"volume\", \"elastic-gpu\", \"spot-instances-request\", \"network-interface\"."
0 commit comments