You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add option to apply security groups to domain (#134)
* Add option to apply security groups to domain
Resolves#62.
* Auto Format
* Auto Format
---------
Co-authored-by: cloudpossebot <[email protected]>
Co-authored-by: Igor Rodionov <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -225,6 +225,7 @@ Available targets:
225
225
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
226
226
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
227
227
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
228
+
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable. |`bool`|`true`| no |
228
229
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
229
230
| <aname="input_custom_endpoint_certificate_arn"></a> [custom\_endpoint\_certificate\_arn](#input\_custom\_endpoint\_certificate\_arn)| ACM certificate ARN for custom endpoint. |`string`|`""`| no |
230
231
| <aname="input_custom_endpoint_enabled"></a> [custom\_endpoint\_enabled](#input\_custom\_endpoint\_enabled)| Whether to enable custom endpoint for the Elasticsearch domain. |`bool`|`false`| no |
@@ -275,7 +276,7 @@ Available targets:
275
276
| <aname="input_namespace"></a> [namespace](#input\_namespace)| ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique |`string`|`null`| no |
276
277
| <aname="input_node_to_node_encryption_enabled"></a> [node\_to\_node\_encryption\_enabled](#input\_node\_to\_node\_encryption\_enabled)| Whether to enable node-to-node encryption |`bool`|`false`| no |
277
278
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
278
-
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster |`list(string)`|`[]`| no |
279
+
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false. |`list(string)`|`[]`| no |
279
280
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
280
281
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| VPC Subnet IDs |`list(string)`|`[]`| no |
281
282
| <aname="input_tags"></a> [tags](#input\_tags)| Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).<br>Neither the tag keys nor the tag values will be modified by this module. |`map(string)`|`{}`| no |
Copy file name to clipboardExpand all lines: docs/terraform.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,6 +62,7 @@
62
62
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
63
63
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
64
64
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
65
+
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable. |`bool`|`true`| no |
65
66
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
66
67
| <aname="input_custom_endpoint_certificate_arn"></a> [custom\_endpoint\_certificate\_arn](#input\_custom\_endpoint\_certificate\_arn)| ACM certificate ARN for custom endpoint. |`string`|`""`| no |
67
68
| <aname="input_custom_endpoint_enabled"></a> [custom\_endpoint\_enabled](#input\_custom\_endpoint\_enabled)| Whether to enable custom endpoint for the Elasticsearch domain. |`bool`|`false`| no |
@@ -112,7 +113,7 @@
112
113
| <aname="input_namespace"></a> [namespace](#input\_namespace)| ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique |`string`|`null`| no |
113
114
| <aname="input_node_to_node_encryption_enabled"></a> [node\_to\_node\_encryption\_enabled](#input\_node\_to\_node\_encryption\_enabled)| Whether to enable node-to-node encryption |`bool`|`false`| no |
114
115
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
115
-
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster |`list(string)`|`[]`| no |
116
+
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false. |`list(string)`|`[]`| no |
116
117
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
117
118
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| VPC Subnet IDs |`list(string)`|`[]`| no |
118
119
| <aname="input_tags"></a> [tags](#input\_tags)| Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).<br>Neither the tag keys nor the tag values will be modified by this module. |`map(string)`|`{}`| no |
Copy file name to clipboardExpand all lines: variables.tf
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,13 @@
1
1
variable"security_groups" {
2
2
type=list(string)
3
3
default=[]
4
-
description="List of security group IDs to be allowed to connect to the cluster"
4
+
description="List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false."
5
+
}
6
+
7
+
variable"create_security_group" {
8
+
type=bool
9
+
default=true
10
+
description="Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable."
0 commit comments