elasticsearch
appzen-oss/elasticsearch/aws
Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash.
terraform-aws-elasticsearch Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash. --- It's 100% Open Source and licensed under the APACHE2. We literally have [hundreds of terraform modules][terraform_modules] that are Open Source and well-maintained. Check them out! Introduction This module will create: - Elasticsearch cluster with the specified node count in the provided subnets in a VPC - Elasticsearch domain policy that accepts a list of IAM role ARNs from which to permit management traffic to the cluster - Security Group to control access to the Elasticsearch domain (inputs to the Security Group are other Security Groups or CIDRs blocks to be allowed to connect to the cluster) - DNS hostname record for Elasticsearch cluster (if DNS
| Name | Type | Description | Default |
|---|---|---|---|
| namespace | string | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp' | null |
| dedicated_master_count | number | Number of dedicated master nodes in the cluster | 0 |
| kibana_subdomain_name | string | The name of the subdomain for Kibana in the DNS zone (_e.g._ `kibana`, `ui`, `ui | "" |
| cognito_user_pool_id | string | The ID of the Cognito User Pool to use | "" |
| cognito_iam_role_arn | string | ARN of the IAM role that has the AmazonESCognitoAccess policy attached | "" |
| custom_endpoint_enabled | bool | Whether to enable custom endpoint for the Elasticsearch domain. | false |
| stage | string | ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'bu | null |
| attributes | list(string) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`, | [] |
| log_publishing_audit_enabled | bool | Specifies whether log publishing option for AUDIT_LOGS is enabled or not | false |
| domain_hostname_enabled | bool | Explicit flag to enable creating a DNS hostname for ES. If `true`, then `var.dns | false |
| regex_replace_chars | string | Terraform regular expression (regex) string. Characters matching the regex will | null |
| ebs_volume_type | string | Storage type of EBS volumes | "gp2" |
| domain_endpoint_options_tls_security_policy | string | The name of the TLS security policy that needs to be applied to the HTTPS endpoi | "Policy-Min-TLS-1-2-2019-07" |
| dedicated_master_enabled | bool | Indicates whether dedicated master nodes are enabled for the cluster | false |
| elasticsearch_subdomain_name | string | The name of the subdomain for Elasticsearch in the DNS zone (_e.g._ `elasticsear | "" |
| warm_count | number | Number of UltraWarm nodes | 2 |
| iam_authorizing_role_arns | list(string) | List of IAM role ARNs to permit to assume the Elasticsearch user role | [] |
| zone_awareness_enabled | bool | Enable zone awareness for Elasticsearch cluster | true |
| advanced_options | map(string) | Key-value string pairs to specify advanced configuration options | {} |
| labels_as_tags | set(string) | Set of labels (ID elements) to include as tags in the `tags` output. Default is | [
"default"
] |
| … and 10 more inputs | |||
domain_arn — ARN of the Elasticsearch domaindomain_name — Name of the Elasticsearch domaindomain_endpoint — Domain-specific endpoint used to submit index, search, and data upload requestskibana_hostname — Kibana hostnamesecurity_group_id — Security Group ID to control access to the Elasticsearch domaindomain_id — Unique identifier for the Elasticsearch domainkibana_endpoint — Domain-specific endpoint for Kibana without https schemedomain_hostname — Elasticsearch domain hostname to submit index, search, and data upload requestselasticsearch_user_iam_role_name — The name of the IAM role to allow access to Elasticsearch clusterelasticsearch_user_iam_role_arn — The ARN of the IAM role to allow access to Elasticsearch clusterAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,