You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+7
Original file line number
Diff line number
Diff line change
@@ -214,13 +214,19 @@ Available targets:
214
214
| <aname="input_advanced_security_options_master_user_password"></a> [advanced\_security\_options\_master\_user\_password](#input\_advanced\_security\_options\_master\_user\_password)| Master user password (applicable if advanced\_security\_options\_internal\_user\_database\_enabled set to true) |`string`|`""`| no |
215
215
| <aname="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks)| List of CIDR blocks to be allowed to connect to the cluster |`list(string)`|`[]`| no |
216
216
| <aname="input_attributes"></a> [attributes](#input\_attributes)| ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,<br>in the order they appear in the list. New attributes are appended to the<br>end of the list. The elements of the list are joined by the `delimiter`<br>and treated as a single ID element. |`list(string)`|`[]`| no |
217
+
| <aname="input_auto_tune_cron_schedule"></a> [auto\_tune\_cron\_schedule](#input\_auto\_tune\_cron\_schedule)| A cron expression specifying the recurrence pattern for an Auto-Tune maintenance schedule. |`string`| n/a | yes |
218
+
| <aname="input_auto_tune_duration"></a> [auto\_tune\_duration](#input\_auto\_tune\_duration)| Autotune maintanance window duration time in hours. |`number`| n/a | yes |
219
+
| <aname="input_auto_tune_enabled"></a> [auto\_tune\_enabled](#input\_auto\_tune\_enabled)| Whether to enable autotune. |`bool`|`false`| no |
220
+
| <aname="input_auto_tune_rollback_settings"></a> [auto\_tune\_rollback\_settings](#input\_auto\_tune\_rollback\_settings)| Whether to roll back to default Auto-Tune settings when disabling Auto-Tune. |`string`|`"NO_ROLLBACK"`| no |
221
+
| <aname="input_auto_tune_starting_time"></a> [auto\_tune\_starting\_time](#input\_auto\_tune\_starting\_time)| Date and time at which to start the Auto-Tune maintenance schedule in RFC3339 format. Time should be in the future. |`string`|`null`| no |
217
222
| <aname="input_automated_snapshot_start_hour"></a> [automated\_snapshot\_start\_hour](#input\_automated\_snapshot\_start\_hour)| Hour at which automated snapshots are taken, in UTC |`number`|`0`| no |
218
223
| <aname="input_availability_zone_count"></a> [availability\_zone\_count](#input\_availability\_zone\_count)| Number of Availability Zones for the domain to use. |`number`|`2`| no |
219
224
| <aname="input_aws_ec2_service_name"></a> [aws\_ec2\_service\_name](#input\_aws\_ec2\_service\_name)| AWS EC2 Service Name |`list(string)`| <pre>[<br> "ec2.amazonaws.com"<br>]</pre> | no |
220
225
| <aname="input_cognito_authentication_enabled"></a> [cognito\_authentication\_enabled](#input\_cognito\_authentication\_enabled)| Whether to enable Amazon Cognito authentication with Kibana |`bool`|`false`| no |
221
226
| <aname="input_cognito_iam_role_arn"></a> [cognito\_iam\_role\_arn](#input\_cognito\_iam\_role\_arn)| ARN of the IAM role that has the AmazonESCognitoAccess policy attached |`string`|`""`| no |
222
227
| <aname="input_cognito_identity_pool_id"></a> [cognito\_identity\_pool\_id](#input\_cognito\_identity\_pool\_id)| The ID of the Cognito Identity Pool to use |`string`|`""`| no |
223
228
| <aname="input_cognito_user_pool_id"></a> [cognito\_user\_pool\_id](#input\_cognito\_user\_pool\_id)| The ID of the Cognito User Pool to use |`string`|`""`| no |
229
+
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
224
230
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
225
231
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
226
232
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
@@ -236,6 +242,7 @@ Available targets:
236
242
| <aname="input_domain_endpoint_options_tls_security_policy"></a> [domain\_endpoint\_options\_tls\_security\_policy](#input\_domain\_endpoint\_options\_tls\_security\_policy)| The name of the TLS security policy that needs to be applied to the HTTPS endpoint |`string`|`"Policy-Min-TLS-1-0-2019-07"`| no |
237
243
| <aname="input_domain_hostname_enabled"></a> [domain\_hostname\_enabled](#input\_domain\_hostname\_enabled)| Explicit flag to enable creating a DNS hostname for ES. If `true`, then `var.dns_zone_id` is required. |`bool`|`false`| no |
238
244
| <aname="input_ebs_iops"></a> [ebs\_iops](#input\_ebs\_iops)| The baseline input/output (I/O) performance of EBS volumes attached to data nodes. Applicable only for the Provisioned IOPS EBS volume type |`number`|`0`| no |
245
+
| <aname="input_ebs_throughput"></a> [ebs\_throughput](#input\_ebs\_throughput)| Specifies the throughput (in MiB/s) of the EBS volumes attached to data nodes. Applicable only for the gp3 volume type. Valid values are between 125 and 1000. |`number`|`null`| no |
239
246
| <aname="input_ebs_volume_size"></a> [ebs\_volume\_size](#input\_ebs\_volume\_size)| EBS volumes for data storage in GB |`number`|`0`| no |
240
247
| <aname="input_ebs_volume_type"></a> [ebs\_volume\_type](#input\_ebs\_volume\_type)| Storage type of EBS volumes |`string`|`"gp2"`| no |
241
248
| <aname="input_elasticsearch_subdomain_name"></a> [elasticsearch\_subdomain\_name](#input\_elasticsearch\_subdomain\_name)| The name of the subdomain for Elasticsearch in the DNS zone (\_e.g.\_`elasticsearch`, `ui`, `ui-es`, `search-ui`) |`string`|`""`| no |
Copy file name to clipboardexpand all lines: docs/terraform.md
+7
Original file line number
Diff line number
Diff line change
@@ -51,13 +51,19 @@
51
51
| <aname="input_advanced_security_options_master_user_password"></a> [advanced\_security\_options\_master\_user\_password](#input\_advanced\_security\_options\_master\_user\_password)| Master user password (applicable if advanced\_security\_options\_internal\_user\_database\_enabled set to true) |`string`|`""`| no |
52
52
| <aname="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks)| List of CIDR blocks to be allowed to connect to the cluster |`list(string)`|`[]`| no |
53
53
| <aname="input_attributes"></a> [attributes](#input\_attributes)| ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,<br>in the order they appear in the list. New attributes are appended to the<br>end of the list. The elements of the list are joined by the `delimiter`<br>and treated as a single ID element. |`list(string)`|`[]`| no |
54
+
| <aname="input_auto_tune_cron_schedule"></a> [auto\_tune\_cron\_schedule](#input\_auto\_tune\_cron\_schedule)| A cron expression specifying the recurrence pattern for an Auto-Tune maintenance schedule. |`string`| n/a | yes |
55
+
| <aname="input_auto_tune_duration"></a> [auto\_tune\_duration](#input\_auto\_tune\_duration)| Autotune maintanance window duration time in hours. |`number`| n/a | yes |
56
+
| <aname="input_auto_tune_enabled"></a> [auto\_tune\_enabled](#input\_auto\_tune\_enabled)| Whether to enable autotune. |`bool`|`false`| no |
57
+
| <aname="input_auto_tune_rollback_settings"></a> [auto\_tune\_rollback\_settings](#input\_auto\_tune\_rollback\_settings)| Whether to roll back to default Auto-Tune settings when disabling Auto-Tune. |`string`|`"NO_ROLLBACK"`| no |
58
+
| <aname="input_auto_tune_starting_time"></a> [auto\_tune\_starting\_time](#input\_auto\_tune\_starting\_time)| Date and time at which to start the Auto-Tune maintenance schedule in RFC3339 format. Time should be in the future. |`string`|`null`| no |
54
59
| <aname="input_automated_snapshot_start_hour"></a> [automated\_snapshot\_start\_hour](#input\_automated\_snapshot\_start\_hour)| Hour at which automated snapshots are taken, in UTC |`number`|`0`| no |
55
60
| <aname="input_availability_zone_count"></a> [availability\_zone\_count](#input\_availability\_zone\_count)| Number of Availability Zones for the domain to use. |`number`|`2`| no |
56
61
| <aname="input_aws_ec2_service_name"></a> [aws\_ec2\_service\_name](#input\_aws\_ec2\_service\_name)| AWS EC2 Service Name |`list(string)`| <pre>[<br> "ec2.amazonaws.com"<br>]</pre> | no |
57
62
| <aname="input_cognito_authentication_enabled"></a> [cognito\_authentication\_enabled](#input\_cognito\_authentication\_enabled)| Whether to enable Amazon Cognito authentication with Kibana |`bool`|`false`| no |
58
63
| <aname="input_cognito_iam_role_arn"></a> [cognito\_iam\_role\_arn](#input\_cognito\_iam\_role\_arn)| ARN of the IAM role that has the AmazonESCognitoAccess policy attached |`string`|`""`| no |
59
64
| <aname="input_cognito_identity_pool_id"></a> [cognito\_identity\_pool\_id](#input\_cognito\_identity\_pool\_id)| The ID of the Cognito Identity Pool to use |`string`|`""`| no |
60
65
| <aname="input_cognito_user_pool_id"></a> [cognito\_user\_pool\_id](#input\_cognito\_user\_pool\_id)| The ID of the Cognito User Pool to use |`string`|`""`| no |
66
+
| <aname="input_cold_storage_enabled"></a> [cold\_storage\_enabled](#input\_cold\_storage\_enabled)| Enables cold storage support. |`bool`|`false`| no |
61
67
| <aname="input_context"></a> [context](#input\_context)| Single object for setting entire context at once.<br>See description of individual variables for details.<br>Leave string and numeric variables as `null` to use default value.<br>Individual variable settings (non-null) override settings in context object,<br>except for attributes, tags, and additional\_tag\_map, which are merged. |`any`| <pre>{<br> "additional_tag_map": {},<br> "attributes": [],<br> "delimiter": null,<br> "descriptor_formats": {},<br> "enabled": true,<br> "environment": null,<br> "id_length_limit": null,<br> "label_key_case": null,<br> "label_order": [],<br> "label_value_case": null,<br> "labels_as_tags": [<br> "unset"<br> ],<br> "name": null,<br> "namespace": null,<br> "regex_replace_chars": null,<br> "stage": null,<br> "tags": {},<br> "tenant": null<br>}</pre> | no |
62
68
| <aname="input_create_iam_service_linked_role"></a> [create\_iam\_service\_linked\_role](#input\_create\_iam\_service\_linked\_role)| Whether to create `AWSServiceRoleForAmazonElasticsearchService` service-linked role. Set it to `false` if you already have an ElasticSearch cluster created in the AWS account and AWSServiceRoleForAmazonElasticsearchService already exists. See https://github.com/terraform-providers/terraform-provider-aws/issues/5218 for more info |`bool`|`true`| no |
63
69
| <aname="input_custom_endpoint"></a> [custom\_endpoint](#input\_custom\_endpoint)| Fully qualified domain for custom endpoint. |`string`|`""`| no |
@@ -73,6 +79,7 @@
73
79
| <aname="input_domain_endpoint_options_tls_security_policy"></a> [domain\_endpoint\_options\_tls\_security\_policy](#input\_domain\_endpoint\_options\_tls\_security\_policy)| The name of the TLS security policy that needs to be applied to the HTTPS endpoint |`string`|`"Policy-Min-TLS-1-0-2019-07"`| no |
74
80
| <aname="input_domain_hostname_enabled"></a> [domain\_hostname\_enabled](#input\_domain\_hostname\_enabled)| Explicit flag to enable creating a DNS hostname for ES. If `true`, then `var.dns_zone_id` is required. |`bool`|`false`| no |
75
81
| <aname="input_ebs_iops"></a> [ebs\_iops](#input\_ebs\_iops)| The baseline input/output (I/O) performance of EBS volumes attached to data nodes. Applicable only for the Provisioned IOPS EBS volume type |`number`|`0`| no |
82
+
| <aname="input_ebs_throughput"></a> [ebs\_throughput](#input\_ebs\_throughput)| Specifies the throughput (in MiB/s) of the EBS volumes attached to data nodes. Applicable only for the gp3 volume type. Valid values are between 125 and 1000. |`number`|`null`| no |
76
83
| <aname="input_ebs_volume_size"></a> [ebs\_volume\_size](#input\_ebs\_volume\_size)| EBS volumes for data storage in GB |`number`|`0`| no |
77
84
| <aname="input_ebs_volume_type"></a> [ebs\_volume\_type](#input\_ebs\_volume\_type)| Storage type of EBS volumes |`string`|`"gp2"`| no |
78
85
| <aname="input_elasticsearch_subdomain_name"></a> [elasticsearch\_subdomain\_name](#input\_elasticsearch\_subdomain\_name)| The name of the subdomain for Elasticsearch in the DNS zone (\_e.g.\_`elasticsearch`, `ui`, `ui-es`, `search-ui`) |`string`|`""`| no |
0 commit comments