elasticsearch
foss-cafe/elasticsearch/aws
Terraform module for AWS Elasticsearch service
!Static security analysis for Terraform terraform module for AWS Elasticsearch Service Examples Check the examples folder Requirements | Name | Version | |------|---------| | terraform | >= 0.12.7, = 2.68, = 2.68, { "dedicated_master_count": 3, "dedicated_master_enabled": true, "dedicated_master_type": "r5.large.elasticsearch", "instance_count": 3, "instance_type": "r5.large.elasticsearch", "zone_awareness_enabled": false } | no | | cognito\_options | (Optional) Options for Amazon Cognito Authentication for Kibana | map | { "enabled": false } | no | | create | Do you want to create ES Cluster | bool | true | no | | create\_service\_link\_role | Create service link role for AWS Elasticsearch Service | bool | true | no | | domain\_endpoint\_options | (Optional) Domain endpoint HTTP(S) relate
| Name | Type | Description | Default |
|---|---|---|---|
| access_policies | string | (Optional) IAM policy document specifying the access policies for the domain | required |
| domain_name | string | (Required) Name of the domain. | required |
| cloudwatch_log_kms_key_id | string | (Optional) The ARN of the KMS Key to use when encrypting log data. Please note, | required |
| advanced_options | map(string) | (Optional) Key-value string pairs to specify advanced configuration options. No | {} |
| snapshot_options | any | (Optional) Snapshot related options | {} |
| log_publishing_options | any | (Optional) Options for publishing slow and application logs to CloudWatch Logs. | [
{
"log_type": "INDEX_SLOW_LOGS"
|
| create_service_link_role | bool | Create service link role for AWS Elasticsearch Service | true |
| advanced_security_options | any | (Optional) Options for fine-grained access control. | {} |
| domain_endpoint_options | any | (Optional) Domain endpoint HTTP(S) related options. | {
"enforce_https": true,
"tls_securi |
| cloudwatch_log_group_arn | string | (Optional) ARN of the Cloudwatch log group to which log needs to be published. | "" |
| vpc_options | any | (Optional) VPC related options, Adding or removing this configuration forces a n | {} |
| tags | map | (Optional) A map of tags to assign to the resource | {} |
| timeouts | any | Timeouts map. | {} |
| elasticsearch_version | string | (Optional) The version of Elasticsearch to deploy. Defaults to 1.5 | "1.5" |
| ebs_options | any | (Optional) EBS related options, may be required based on chosen instance size. | {
"ebs_enabled": true,
"volume_size" |
| encrypt_at_rest | any | Optional) Encrypt at rest options. Only available for certain instance types. | {
"enabled": true
} |
| node_to_node_encryption | any | (Optional) Node-to-node encryption options. | {
"enabled": false
} |
| cluster_config | any | (Optional) Cluster configuration of the domain | {
"dedicated_master_count": 3,
"dedi |
| cognito_options | any | (Optional) Options for Amazon Cognito Authentication for Kibana | {} |
| create | bool | Do you want to create ES Cluster | true |
| cloudwatch_log_retention_in_days | number | (Optional) Specifies the number of days you want to retain log events in the spe | 0 |
arn — Amazon Resource Name (ARN) of the domaindomain_id — Unique identifier for the domainendpoint — Domain-specific endpoint used to submit index, search, and data upload requestskibana_endpoint — Domain-specific endpoint for kibana without https schemeAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,