You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_additional_certificates_arn_for_https_listeners"></a> [additional\_certificates\_arn\_for\_https\_listeners](#input\_additional\_certificates\_arn\_for\_https\_listeners)| (Optional) List of SSL server certificate ARNs for HTTPS listener. Use it if you need to set additional certificates besides default\_certificate\_arn |`list(any)`|`[]`| no |
87
87
| <aname="input_assign_public_ip"></a> [assign\_public\_ip](#input\_assign\_public\_ip)| (Optional) Assign a public IP address to the ENI (Fargate launch type only). If true service will be associated with public subnets. Default false. |`bool`|`false`| no |
88
-
| <aname="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access)| (Optional) If true, public access to the S3 bucket will be blocked. |`bool`|`false`| no |
88
+
| <aname="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access)| (Optional) If true, public access to the S3 bucket will be blocked. |`bool`|`true`| no |
89
89
| <aname="input_container_name"></a> [container\_name](#input\_container\_name)| Name of the running container |`any`| n/a | yes |
90
90
| <aname="input_default_certificate_arn"></a> [default\_certificate\_arn](#input\_default\_certificate\_arn)| (Optional) The ARN of the default SSL server certificate. Required if var.https\_ports is set. |`string`|`null`| no |
91
91
| <aname="input_deployment_controller"></a> [deployment\_controller](#input\_deployment\_controller)| (Optional) Deployment controller |`list(string)`|`[]`| no |
@@ -98,6 +98,8 @@ In order to run all checks at any point run the following command:
98
98
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| (Optional) If true, autoscaling alarms will be created. |`bool`|`true`| no |
99
99
| <aname="input_enable_ecs_managed_tags"></a> [enable\_ecs\_managed\_tags](#input\_enable\_ecs\_managed\_tags)| (Optional) Specifies whether to enable Amazon ECS managed tags for the tasks within the service. |`bool`|`false`| no |
100
100
| <aname="input_enable_execute_command"></a> [enable\_execute\_command](#input\_enable\_execute\_command)| (Optional) Specifies whether to enable Amazon ECS Exec for the tasks within the service. |`bool`|`false`| no |
101
+
| <aname="input_enable_s3_bucket_server_side_encryption"></a> [enable\_s3\_bucket\_server\_side\_encryption](#input\_enable\_s3\_bucket\_server\_side\_encryption)| (Optional) If true, server side encryption will be applied. |`bool`|`true`| no |
102
+
| <aname="input_enable_s3_logs"></a> [enable\_s3\_logs](#input\_enable\_s3\_logs)| (Optional) If true, all resources to send LB logs to S3 will be created |`bool`|`true`| no |
101
103
| <aname="input_force_new_deployment"></a> [force\_new\_deployment](#input\_force\_new\_deployment)| (Optional) Enable to force a new task deployment of the service. This can be used to update tasks to use a newer Docker image with same image/tag combination (e.g. myimage:latest), roll Fargate tasks onto a newer platform version, or immediately deploy ordered\_placement\_strategy and placement\_constraints updates. |`bool`|`false`| no |
102
104
| <aname="input_health_check_grace_period_seconds"></a> [health\_check\_grace\_period\_seconds](#input\_health\_check\_grace\_period\_seconds)| (Optional) Seconds to ignore failing load balancer health checks on newly instantiated tasks to prevent premature shutdown, up to 2147483647. Only valid for services configured to use load balancers. |`number`|`0`| no |
103
105
| <aname="input_lb_deregistration_delay"></a> [lb\_deregistration\_delay](#input\_lb\_deregistration\_delay)| (Optional) The amount time for Elastic Load Balancing to wait before changing the state of a deregistering target from draining to unused. The range is 0-3600 seconds. The default value is 300 seconds. |`number`|`300`| no |
@@ -138,6 +140,8 @@ In order to run all checks at any point run the following command:
138
140
| <aname="input_private_subnets"></a> [private\_subnets](#input\_private\_subnets)| The private subnets associated with the task or service. |`list(any)`| n/a | yes |
139
141
| <aname="input_propagate_tags"></a> [propagate\_tags](#input\_propagate\_tags)| (Optional) Specifies whether to propagate the tags from the task definition or the service to the tasks. The valid values are SERVICE and TASK\_DEFINITION. Default to SERVICE |`string`|`"SERVICE"`| no |
140
142
| <aname="input_public_subnets"></a> [public\_subnets](#input\_public\_subnets)| The public subnets associated with the task or service. |`list(any)`| n/a | yes |
143
+
| <aname="input_s3_bucket_server_side_encryption_key"></a> [s3\_bucket\_server\_side\_encryption\_key](#input\_s3\_bucket\_server\_side\_encryption\_key)| (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. |`string`|`"aws/s3"`| no |
144
+
| <aname="input_s3_bucket_server_side_encryption_sse_algorithm"></a> [s3\_bucket\_server\_side\_encryption\_sse\_algorithm](#input\_s3\_bucket\_server\_side\_encryption\_sse\_algorithm)| (Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms|`string`|`"aws:kms"`| no |
141
145
| <aname="input_scale_target_max_capacity"></a> [scale\_target\_max\_capacity](#input\_scale\_target\_max\_capacity)| The max capacity of the scalable target |`number`|`5`| no |
142
146
| <aname="input_scale_target_min_capacity"></a> [scale\_target\_min\_capacity](#input\_scale\_target\_min\_capacity)| The min capacity of the scalable target |`number`|`1`| no |
143
147
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| (Optional) The security groups associated with the task or service. If you do not specify a security group, the default security group for the VPC is used. |`list(any)`|`[]`| no |
description="(Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms"
429
+
type=string
430
+
default="aws:kms"
431
+
}
432
+
433
+
variable"s3_bucket_server_side_encryption_key" {
434
+
description="(Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse_algorithm is aws:kms."
0 commit comments