avm-res-search-searchservice
Azure/avm-res-search-searchservice/azurerm
Terraform Azure Verified Resource Module for Search Service
terraform-azurerm-avm-template This is a template repo for Terraform Azure Verified Modules. Things to do: 1. Set up a GitHub repo environment called test. 1. Configure environment protection rule to ensure that approval is required before deploying to this environment. 1. Create a user-assigned managed identity in your test subscription. 1. Create a role assignment for the managed identity on your test subscription, use the minimum required role. 1. Configure federated identity credentials on the user assigned managed identity. Use the GitHub environment. 1. Search and update TODOs within the code and remove the TODO comments once complete. > [!IMPORTANT] > As the overall AVM framework is not GA (generally available) yet - the CI framework and test automation is not fully functional and i
| Name | Type | Description | Default |
|---|---|---|---|
| name | string | (Required) The name of the this resource. | required |
| resource_group_name | string | (Required) The resource group where the resources will be deployed. | required |
| location | string | (Required) Azure region where the resource should be deployed. | required |
| hosting_mode | string | (Optional) Specifies the Hosting Mode, which allows for High Density partitions | null |
| partition_count | number | Partitions allow for scaling of document count as well as faster indexing by sha | 1 |
| replica_count | number | Replicas distribute search workloads across the service. You need at least two r | 1 |
| semantic_search_sku | string | (Optional) Specifies the Semantic Search SKU which should be used for this Searc | null |
| customer_managed_key_enforcement_enabled | bool | (Optional) Specifies whether the Search Service should enforce that non-customer | null |
| diagnostic_settings | map(object({ name | A map of diagnostic settings to create on the Key Vault. The map key is delibe | {} |
| enable_telemetry | bool | This variable controls whether or not telemetry is enabled for the module. For m | true |
| network_rule_bypass_option | string | (Optional) Whether to allow trusted Azure services to access a network restricte | "None" |
| private_endpoints | map(object({ name = option | A map of private endpoints to create on the Key Vault. The map key is deliberate | {} |
| sku | string | (Required) The pricing tier of the search service you want to create (for exampl | "standard" |
| tags | map(string) | (Optional) Tags of the resource. | null |
| authentication_failure_mode | string | (Optional) Specifies the response that the Search Service should return for requ | null |
| role_assignments | map(object({ role_definiti | A map of role assignments to create on this resource. The map key is deliberatel | {} |
| local_authentication_enabled | bool | (Optional) Specifies whether the Search Service allows authenticating using API | null |
| lock | object({ kind = string | Controls the Resource Lock configuration for this resource. The following proper | null |
| managed_identities | object({ system_assigned | Controls the Managed Identity configuration on this resource. The following prop | {} |
| private_endpoints_manage_dns_zone_group | bool | Whether to manage private DNS zone groups with this module. If set to false, you | true |
| public_network_access_enabled | bool | This variable controls whether or not public network access is enabled for the m | true |
| allowed_ips | list(string) | One or more IP Addresses, or CIDR Blocks which should be able to access the AI S | null |
| customer_managed_key | object({ key_vault_resourc | A map describing customer-managed keys to associate with the resource. This incl | null |
private_endpoints — A map of private endpoints. The map key is the supplied input to var.private_endpoints. The map valuresource — This is the full output for the resource.resource_id — The ID of the machine learning workspace.