You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
157
+
<!--BEGIN_TF_DOCS-->
158
158
## Requirements
159
159
160
160
| Name | Version |
@@ -189,7 +189,7 @@ No resources.
189
189
| <aname="input_cluster_configuration"></a> [cluster\_configuration](#input\_cluster\_configuration)| The execute command configuration for the cluster |`any`|`{}`| no |
190
190
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the cluster (up to 255 letters, numbers, hyphens, and underscores) |`string`|`""`| no |
191
191
| <aname="input_cluster_service_connect_defaults"></a> [cluster\_service\_connect\_defaults](#input\_cluster\_service\_connect\_defaults)| Configures a default Service Connect namespace |`map(string)`|`{}`| no |
192
-
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br> {<br> "name": "containerInsights",<br> "value": "enabled"<br> }<br>]</pre> | no |
192
+
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br/> {<br/> "name": "containerInsights",<br/> "value": "enabled"<br/> }<br/>]</pre> | no |
193
193
| <aname="input_cluster_tags"></a> [cluster\_tags](#input\_cluster\_tags)| A map of additional tags to add to the cluster |`map(string)`|`{}`| no |
194
194
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
195
195
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
@@ -207,8 +207,8 @@ No resources.
207
207
| <aname="input_task_exec_iam_role_tags"></a> [task\_exec\_iam\_role\_tags](#input\_task\_exec\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
208
208
| <aname="input_task_exec_iam_role_use_name_prefix"></a> [task\_exec\_iam\_role\_use\_name\_prefix](#input\_task\_exec\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`task_exec_iam_role_name`) is used as a prefix |`bool`|`true`| no |
209
209
| <aname="input_task_exec_iam_statements"></a> [task\_exec\_iam\_statements](#input\_task\_exec\_iam\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
210
-
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:secretsmanager:*:*:secret:*"<br>]</pre> | no |
211
-
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/*"<br>]</pre> | no |
210
+
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
211
+
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
212
212
213
213
## Outputs
214
214
@@ -225,7 +225,7 @@ No resources.
225
225
| <aname="output_task_exec_iam_role_arn"></a> [task\_exec\_iam\_role\_arn](#output\_task\_exec\_iam\_role\_arn)| Task execution IAM role ARN |
226
226
| <aname="output_task_exec_iam_role_name"></a> [task\_exec\_iam\_role\_name](#output\_task\_exec\_iam\_role\_name)| Task execution IAM role name |
227
227
| <aname="output_task_exec_iam_role_unique_id"></a> [task\_exec\_iam\_role\_unique\_id](#output\_task\_exec\_iam\_role\_unique\_id)| Stable and unique string identifying the task execution IAM role |
Copy file name to clipboardExpand all lines: examples/complete/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ $ terraform apply
21
21
22
22
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
23
23
24
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
24
+
<!--BEGIN_TF_DOCS-->
25
25
## Requirements
26
26
27
27
| Name | Version |
@@ -68,7 +68,7 @@ No inputs.
68
68
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| ID that identifies the cluster |
69
69
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| Name that identifies the cluster |
70
70
| <aname="output_services"></a> [services](#output\_services)| Map of services created and their attributes |
Copy file name to clipboardExpand all lines: examples/ec2-autoscaling/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ $ terraform apply
21
21
22
22
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
23
23
24
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
24
+
<!--BEGIN_TF_DOCS-->
25
25
## Requirements
26
26
27
27
| Name | Version |
@@ -86,7 +86,7 @@ No inputs.
86
86
| <aname="output_service_tasks_iam_role_arn"></a> [service\_tasks\_iam\_role\_arn](#output\_service\_tasks\_iam\_role\_arn)| Tasks IAM role ARN |
87
87
| <aname="output_service_tasks_iam_role_name"></a> [service\_tasks\_iam\_role\_name](#output\_service\_tasks\_iam\_role\_name)| Tasks IAM role name |
88
88
| <aname="output_service_tasks_iam_role_unique_id"></a> [service\_tasks\_iam\_role\_unique\_id](#output\_service\_tasks\_iam\_role\_unique\_id)| Stable and unique string identifying the tasks IAM role |
Copy file name to clipboardExpand all lines: examples/fargate/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ $ terraform apply
21
21
22
22
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
23
23
24
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
24
+
<!--BEGIN_TF_DOCS-->
25
25
## Requirements
26
26
27
27
| Name | Version |
@@ -91,7 +91,7 @@ No inputs.
91
91
| <aname="output_service_tasks_iam_role_name"></a> [service\_tasks\_iam\_role\_name](#output\_service\_tasks\_iam\_role\_name)| Tasks IAM role name |
92
92
| <aname="output_service_tasks_iam_role_unique_id"></a> [service\_tasks\_iam\_role\_unique\_id](#output\_service\_tasks\_iam\_role\_unique\_id)| Stable and unique string identifying the tasks IAM role |
93
93
| <aname="output_task_definition_run_task_command"></a> [task\_definition\_run\_task\_command](#output\_task\_definition\_run\_task\_command)| awscli command to run the standalone task |
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
132
+
<!--BEGIN_TF_DOCS-->
133
133
## Requirements
134
134
135
135
| Name | Version |
@@ -174,7 +174,7 @@ No modules.
174
174
| <aname="input_cluster_configuration"></a> [cluster\_configuration](#input\_cluster\_configuration)| The execute command configuration for the cluster |`any`|`{}`| no |
175
175
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the cluster (up to 255 letters, numbers, hyphens, and underscores) |`string`|`""`| no |
176
176
| <aname="input_cluster_service_connect_defaults"></a> [cluster\_service\_connect\_defaults](#input\_cluster\_service\_connect\_defaults)| Configures a default Service Connect namespace |`map(string)`|`{}`| no |
177
-
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br> {<br> "name": "containerInsights",<br> "value": "enabled"<br> }<br>]</pre> | no |
177
+
| <aname="input_cluster_settings"></a> [cluster\_settings](#input\_cluster\_settings)| List of configuration block(s) with cluster settings. For example, this can be used to enable CloudWatch Container Insights for a cluster |`any`| <pre>[<br/> {<br/> "name": "containerInsights",<br/> "value": "enabled"<br/> }<br/>]</pre> | no |
178
178
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
179
179
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
180
180
| <aname="input_create_task_exec_iam_role"></a> [create\_task\_exec\_iam\_role](#input\_create\_task\_exec\_iam\_role)| Determines whether the ECS task definition IAM role should be created |`bool`|`false`| no |
@@ -190,8 +190,8 @@ No modules.
190
190
| <aname="input_task_exec_iam_role_tags"></a> [task\_exec\_iam\_role\_tags](#input\_task\_exec\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
191
191
| <aname="input_task_exec_iam_role_use_name_prefix"></a> [task\_exec\_iam\_role\_use\_name\_prefix](#input\_task\_exec\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`task_exec_iam_role_name`) is used as a prefix |`bool`|`true`| no |
192
192
| <aname="input_task_exec_iam_statements"></a> [task\_exec\_iam\_statements](#input\_task\_exec\_iam\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
193
-
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:secretsmanager:*:*:secret:*"<br>]</pre> | no |
194
-
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br> "arn:aws:ssm:*:*:parameter/*"<br>]</pre> | no |
193
+
| <aname="input_task_exec_secret_arns"></a> [task\_exec\_secret\_arns](#input\_task\_exec\_secret\_arns)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
194
+
| <aname="input_task_exec_ssm_param_arns"></a> [task\_exec\_ssm\_param\_arns](#input\_task\_exec\_ssm\_param\_arns)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
195
195
196
196
## Outputs
197
197
@@ -207,7 +207,7 @@ No modules.
207
207
| <aname="output_task_exec_iam_role_arn"></a> [task\_exec\_iam\_role\_arn](#output\_task\_exec\_iam\_role\_arn)| Task execution IAM role ARN |
208
208
| <aname="output_task_exec_iam_role_name"></a> [task\_exec\_iam\_role\_name](#output\_task\_exec\_iam\_role\_name)| Task execution IAM role name |
209
209
| <aname="output_task_exec_iam_role_unique_id"></a> [task\_exec\_iam\_role\_unique\_id](#output\_task\_exec\_iam\_role\_unique\_id)| Stable and unique string identifying the task execution IAM role |
0 commit comments