You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
226
226
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
227
227
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
228
+
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable. |`bool`|`true`| no |
228
229
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
229
230
| <aname="input_custom_endpoint_certificate_arn"></a> [custom\_endpoint\_certificate\_arn](#input\_custom\_endpoint\_certificate\_arn)| ACM certificate ARN for custom endpoint. |`string`|`""`| no |
230
231
| <aname="input_custom_endpoint_enabled"></a> [custom\_endpoint\_enabled](#input\_custom\_endpoint\_enabled)| Whether to enable custom endpoint for the Elasticsearch domain. |`bool`|`false`| no |
@@ -278,7 +279,7 @@ Available targets:
278
279
| <aname="input_namespace"></a> [namespace](#input\_namespace)| ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique |`string`|`null`| no |
279
280
| <aname="input_node_to_node_encryption_enabled"></a> [node\_to\_node\_encryption\_enabled](#input\_node\_to\_node\_encryption\_enabled)| Whether to enable node-to-node encryption |`bool`|`false`| no |
280
281
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
281
-
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster |`list(string)`|`[]`| no |
282
+
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false. |`list(string)`|`[]`| no |
282
283
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
283
284
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| VPC Subnet IDs |`list(string)`|`[]`| no |
284
285
| <aname="input_tags"></a> [tags](#input\_tags)| Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).<br>Neither the tag keys nor the tag values will be modified by this module. |`map(string)`|`{}`| no |
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
63
63
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
64
64
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
65
+
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable. |`bool`|`true`| no |
65
66
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
66
67
| <aname="input_custom_endpoint_certificate_arn"></a> [custom\_endpoint\_certificate\_arn](#input\_custom\_endpoint\_certificate\_arn)| ACM certificate ARN for custom endpoint. |`string`|`""`| no |
67
68
| <aname="input_custom_endpoint_enabled"></a> [custom\_endpoint\_enabled](#input\_custom\_endpoint\_enabled)| Whether to enable custom endpoint for the Elasticsearch domain. |`bool`|`false`| no |
@@ -115,7 +116,7 @@
115
116
| <aname="input_namespace"></a> [namespace](#input\_namespace)| ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique |`string`|`null`| no |
116
117
| <aname="input_node_to_node_encryption_enabled"></a> [node\_to\_node\_encryption\_enabled](#input\_node\_to\_node\_encryption\_enabled)| Whether to enable node-to-node encryption |`bool`|`false`| no |
117
118
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
118
-
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster |`list(string)`|`[]`| no |
119
+
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false. |`list(string)`|`[]`| no |
119
120
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
120
121
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| VPC Subnet IDs |`list(string)`|`[]`| no |
121
122
| <aname="input_tags"></a> [tags](#input\_tags)| Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).<br>Neither the tag keys nor the tag values will be modified by this module. |`map(string)`|`{}`| no |
Copy file name to clipboardExpand all lines: variables.tf
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,13 @@
1
1
variable"security_groups" {
2
2
type=list(string)
3
3
default=[]
4
-
description="List of security group IDs to be allowed to connect to the cluster"
4
+
description="List of security group IDs to be allowed to connect to the cluster or the security group IDs to apply to the cluster when the `create_security_group` variable is set to false."
5
+
}
6
+
7
+
variable"create_security_group" {
8
+
type=bool
9
+
default=true
10
+
description="Whether to create a dedicated security group for the Elasticsearch domain. Set it to `false` if you already have security groups that you want to attach to the domain and specify them in the `security_groups` variable."
0 commit comments