You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
57
+
|[aws_iam_policy_document.cloudwatch](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
58
+
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
59
+
|[aws_iam_session_context.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_session_context)| data source |
60
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
61
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
62
+
|[aws_subnet.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnet)| data source |
51
63
52
64
## Inputs
53
65
54
66
| Name | Description | Type | Default | Required |
| <aname="input_access_policies"></a> [access\_policies](#input\_access\_policies)| IAM policy document specifying the access policies for the domain. Required if `create_access_policy` is `false`|`string`|`null`| no |
57
-
| <aname="input_access_pollicy_statements"></a> [access\_pollicy\_statements](#input\_access\_pollicy\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
69
+
| <aname="input_access_policy_statements"></a> [access\_policy\_statements](#input\_access\_policy\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
58
70
| <aname="input_advanced_options"></a> [advanced\_options](#input\_advanced\_options)| Key-value string pairs to specify advanced configuration options. Note that the values for these configuration options must be strings (wrapped in quotes) or they may be wrong and cause a perpetual diff, causing Terraform to want to recreate your Elasticsearch domain on every apply |`map(string)`|`{}`| no |
59
-
| <aname="input_advanced_security_options"></a> [advanced\_security\_options](#input\_advanced\_security\_options)| Configuration block for [fine-grained access control](https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/fgac.html)|`any`|`{}`| no |
60
-
| <aname="input_auto_tune_options"></a> [auto\_tune\_options](#input\_auto\_tune\_options)| Configuration block for the Auto-Tune options of the domain |`any`|`{}`| no |
61
-
| <aname="input_cluster_config"></a> [cluster\_config](#input\_cluster\_config)| Configuration block for the cluster of the domain |`any`|`{}`| no |
71
+
| <aname="input_advanced_security_options"></a> [advanced\_security\_options](#input\_advanced\_security\_options)| Configuration block for [fine-grained access control](https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/fgac.html)|`any`| <pre>{<br> "anonymous_auth_enabled": false,<br> "enabled": true<br>}</pre> | no |
72
+
| <aname="input_auto_tune_options"></a> [auto\_tune\_options](#input\_auto\_tune\_options)| Configuration block for the Auto-Tune options of the domain |`any`| <pre>{<br> "desired_state": "ENABLED",<br> "rollback_on_disable": "NO_ROLLBACK"<br>}</pre> | no |
73
+
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
74
+
| <aname="input_cloudwatch_log_group_retention_in_days"></a> [cloudwatch\_log\_group\_retention\_in\_days](#input\_cloudwatch\_log\_group\_retention\_in\_days)| Number of days to retain log events. Default retention - 90 days |`number`|`90`| no |
75
+
| <aname="input_cloudwatch_log_resource_policy_name"></a> [cloudwatch\_log\_resource\_policy\_name](#input\_cloudwatch\_log\_resource\_policy\_name)| Name of the resource policy for OpenSearch to log to CloudWatch |`string`|`null`| no |
76
+
| <aname="input_cluster_config"></a> [cluster\_config](#input\_cluster\_config)| Configuration block for the cluster of the domain |`any`| <pre>{<br> "dedicated_master_count": 3,<br> "dedicated_master_enabled": true,<br> "dedicated_master_type": "c5.large.search",<br> "instance_count": 3,<br> "instance_type": "r5.large.search",<br> "zone_awareness_config": {<br> "availability_zone_count": 3<br> },<br> "zone_awareness_enabled": true<br>}</pre> | no |
62
77
| <aname="input_cognito_options"></a> [cognito\_options](#input\_cognito\_options)| Configuration block for authenticating Kibana with Cognito |`any`|`{}`| no |
63
78
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
64
79
| <aname="input_create_access_policy"></a> [create\_access\_policy](#input\_create\_access\_policy)| Determines whether an access policy will be created |`bool`|`true`| no |
65
-
| <aname="input_domain_endpoint_options"></a> [domain\_endpoint\_options](#input\_domain\_endpoint\_options)| Configuration block for domain endpoint HTTP(S) related options |`any`|`{}`| no |
80
+
| <aname="input_create_cloudwatch_log_groups"></a> [create\_cloudwatch\_log\_groups](#input\_create\_cloudwatch\_log\_groups)| Determines whether log groups are created |`bool`|`true`| no |
81
+
| <aname="input_create_cloudwatch_log_resource_policy"></a> [create\_cloudwatch\_log\_resource\_policy](#input\_create\_cloudwatch\_log\_resource\_policy)| Determines whether a resource policy will be created for OpenSearch to log to CloudWatch |`bool`|`true`| no |
82
+
| <aname="input_create_saml_options"></a> [create\_saml\_options](#input\_create\_saml\_options)| Determines whether SAML options will be created |`bool`|`false`| no |
83
+
| <aname="input_create_security_group"></a> [create\_security\_group](#input\_create\_security\_group)| Determines whether the security group is created |`bool`|`true`| no |
84
+
| <aname="input_domain_endpoint_options"></a> [domain\_endpoint\_options](#input\_domain\_endpoint\_options)| Configuration block for domain endpoint HTTP(S) related options |`any`| <pre>{<br> "enforce_https": true,<br> "tls_security_policy": "Policy-Min-TLS-1-2-2019-07"<br>}</pre> | no |
66
85
| <aname="input_domain_name"></a> [domain\_name](#input\_domain\_name)| Name of the domain |`string`|`""`| no |
67
-
| <aname="input_ebs_options"></a> [ebs\_options](#input\_ebs\_options)| Configuration block for EBS related options, may be required based on chosen [instance size](https://aws.amazon.com/elasticsearch-service/pricing/)|`any`|`{}`| no |
86
+
| <aname="input_ebs_options"></a> [ebs\_options](#input\_ebs\_options)| Configuration block for EBS related options, may be required based on chosen [instance size](https://aws.amazon.com/elasticsearch-service/pricing/)|`any`|<pre>{<br> "ebs_enabled": true,<br> "volume_size": 64,<br> "volume_type": "gp3"<br>}</pre>| no |
68
87
| <aname="input_enable_access_policy"></a> [enable\_access\_policy](#input\_enable\_access\_policy)| Determines whether an access policy will be applied to the domain |`bool`|`true`| no |
69
-
| <aname="input_encrypt_at_rest"></a> [encrypt\_at\_rest](#input\_encrypt\_at\_rest)| Configuration block for encrypting at rest |`any`|`{}`| no |
88
+
| <aname="input_encrypt_at_rest"></a> [encrypt\_at\_rest](#input\_encrypt\_at\_rest)| Configuration block for encrypting at rest |`any`|<pre>{<br> "enabled": true<br>}</pre>| no |
70
89
| <aname="input_engine_version"></a> [engine\_version](#input\_engine\_version)| Version of the OpenSearch engine to use |`string`|`"OpenSearch_2.3"`| no |
71
-
| <aname="input_log_publishing_options"></a> [log\_publishing\_options](#input\_log\_publishing\_options)| Configuration block for publishing slow and application logs to CloudWatch Logs. This block can be declared multiple times, for each log\_type, within the same resource |`any`|`[]`| no |
72
-
| <aname="input_node_to_node_encryption"></a> [node\_to\_node\_encryption](#input\_node\_to\_node\_encryption)| Configuration block for node-to-node encryption options |`any`|`{}`| no |
90
+
| <aname="input_log_publishing_options"></a> [log\_publishing\_options](#input\_log\_publishing\_options)| Configuration block for publishing slow and application logs to CloudWatch Logs. This block can be declared multiple times, for each log\_type, within the same resource |`any`| <pre>[<br> {<br> "log_type": "INDEX_SLOW_LOGS"<br> },<br> {<br> "log_type": "SEARCH_SLOW_LOGS"<br> },<br> {<br> "log_type": "AUDIT_LOGS"<br> }<br>]</pre> | no |
91
+
| <aname="input_node_to_node_encryption"></a> [node\_to\_node\_encryption](#input\_node\_to\_node\_encryption)| Configuration block for node-to-node encryption options |`any`| <pre>{<br> "enabled": true<br>}</pre> | no |
92
+
| <aname="input_outbound_connections"></a> [outbound\_connections](#input\_outbound\_connections)| Map of AWS OpenSearch outbound connections to create |`any`|`{}`| no |
93
+
| <aname="input_saml_options"></a> [saml\_options](#input\_saml\_options)| SAML authentication options for an AWS OpenSearch Domain |`any`|`{}`| no |
94
+
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| Description of the security group created |`string`|`null`| no |
95
+
| <aname="input_security_group_name"></a> [security\_group\_name](#input\_security\_group\_name)| Name to use on manged security group created |`string`|`null`| no |
96
+
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| Security group rules to add to the security group created |`any`|`{}`| no |
97
+
| <aname="input_security_group_tags"></a> [security\_group\_tags](#input\_security\_group\_tags)| A map of additional tags to add to the security group created |`map(string)`|`{}`| no |
98
+
| <aname="input_security_group_use_name_prefix"></a> [security\_group\_use\_name\_prefix](#input\_security\_group\_use\_name\_prefix)| Determines whether the security group name (`security_group_name`) is used as a prefix |`bool`|`true`| no |
73
99
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
74
100
| <aname="input_vpc_options"></a> [vpc\_options](#input\_vpc\_options)| Configuration block for VPC related options. Adding or removing this configuration forces a new resource ([documentation](https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/es-vpc.html#es-vpc-limitations)) |`any`|`{}`| no |
75
101
76
102
## Outputs
77
103
78
104
| Name | Description |
79
105
|------|-------------|
106
+
| <aname="output_cloudwatch_logs"></a> [cloudwatch\_logs](#output\_cloudwatch\_logs)| Map of CloudWatch log groups created and their attributes |
80
107
| <aname="output_domain_arn"></a> [domain\_arn](#output\_domain\_arn)| The Amazon Resource Name (ARN) of the domain |
81
108
| <aname="output_domain_endpoint"></a> [domain\_endpoint](#output\_domain\_endpoint)| Domain-specific endpoint used to submit index, search, and data upload requests |
82
109
| <aname="output_domain_id"></a> [domain\_id](#output\_domain\_id)| The unique identifier for the domain |
83
110
| <aname="output_domain_kibana_endpoint"></a> [domain\_kibana\_endpoint](#output\_domain\_kibana\_endpoint)| Domain-specific endpoint for kibana without https scheme |
111
+
| <aname="output_outbound_connections"></a> [outbound\_connections](#output\_outbound\_connections)| Map of outbound connections created and their attributes |
| <aname="output_default_cloudwatch_logs"></a> [default\_cloudwatch\_logs](#output\_default\_cloudwatch\_logs)| Map of CloudWatch log groups created and their attributes |
57
+
| <aname="output_default_domain_arn"></a> [default\_domain\_arn](#output\_default\_domain\_arn)| The Amazon Resource Name (ARN) of the domain |
58
+
| <aname="output_default_domain_endpoint"></a> [default\_domain\_endpoint](#output\_default\_domain\_endpoint)| Domain-specific endpoint used to submit index, search, and data upload requests |
59
+
| <aname="output_default_domain_id"></a> [default\_domain\_id](#output\_default\_domain\_id)| The unique identifier for the domain |
60
+
| <aname="output_default_domain_kibana_endpoint"></a> [default\_domain\_kibana\_endpoint](#output\_default\_domain\_kibana\_endpoint)| Domain-specific endpoint for kibana without https scheme |
61
+
| <aname="output_default_outbound_connections"></a> [default\_outbound\_connections](#output\_default\_outbound\_connections)| Map of outbound connections created and their attributes |
54
62
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
55
63
56
64
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-opensearch/blob/master/LICENSE).
0 commit comments