You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -305,12 +305,13 @@ Available targets:
305
305
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
306
306
| <aname="input_region"></a> [region](#input\_region)| AWS Region the instance is launched in |`string`|`""`| no |
307
307
| <aname="input_root_block_device_encrypted"></a> [root\_block\_device\_encrypted](#input\_root\_block\_device\_encrypted)| Whether to encrypt the root block device |`bool`|`true`| no |
308
+
| <aname="input_root_block_device_kms_key_id"></a> [root\_block\_device\_kms\_key\_id](#input\_root\_block\_device\_kms\_key\_id)| KMS key ID used to encrypt EBS volume. When specifying root\_block\_device\_kms\_key\_id, root\_block\_device\_encrypted needs to be set to true |`string`|`null`| no |
308
309
| <aname="input_root_iops"></a> [root\_iops](#input\_root\_iops)| Amount of provisioned IOPS. This must be set if root\_volume\_type is set to `io1`|`number`|`0`| no |
309
310
| <aname="input_root_volume_size"></a> [root\_volume\_size](#input\_root\_volume\_size)| Size of the root volume in gigabytes |`number`|`10`| no |
310
311
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
311
312
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| The Security Group description. |`string`|`"EC2 Security Group"`| no |
312
313
| <aname="input_security_group_enabled"></a> [security\_group\_enabled](#input\_security\_group\_enabled)| Whether to create default Security Group for EC2. |`bool`|`true`| no |
313
-
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| A list of maps of Security Group rules.<br>The values of map is fully complated with `aws_security_group_rule` resource.<br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
314
+
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| A list of maps of Security Group rules.<br>The values of map is fully complated with `aws_security_group_rule` resource.<br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
314
315
| <aname="input_security_group_use_name_prefix"></a> [security\_group\_use\_name\_prefix](#input\_security\_group\_use\_name\_prefix)| Whether to create a default Security Group with unique name beginning with the normalized prefix. |`bool`|`false`| no |
315
316
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| A list of Security Group IDs to associate with EC2 instance. |`list(string)`|`[]`| no |
316
317
| <aname="input_source_dest_check"></a> [source\_dest\_check](#input\_source\_dest\_check)| Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
Copy file name to clipboardExpand all lines: docs/terraform.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -108,12 +108,13 @@
108
108
| <aname="input_regex_replace_chars"></a> [regex\_replace\_chars](#input\_regex\_replace\_chars)| Terraform regular expression (regex) string.<br>Characters matching the regex will be removed from the ID elements.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
109
109
| <aname="input_region"></a> [region](#input\_region)| AWS Region the instance is launched in |`string`|`""`| no |
110
110
| <aname="input_root_block_device_encrypted"></a> [root\_block\_device\_encrypted](#input\_root\_block\_device\_encrypted)| Whether to encrypt the root block device |`bool`|`true`| no |
111
+
| <aname="input_root_block_device_kms_key_id"></a> [root\_block\_device\_kms\_key\_id](#input\_root\_block\_device\_kms\_key\_id)| KMS key ID used to encrypt EBS volume. When specifying root\_block\_device\_kms\_key\_id, root\_block\_device\_encrypted needs to be set to true |`string`|`null`| no |
111
112
| <aname="input_root_iops"></a> [root\_iops](#input\_root\_iops)| Amount of provisioned IOPS. This must be set if root\_volume\_type is set to `io1`|`number`|`0`| no |
112
113
| <aname="input_root_volume_size"></a> [root\_volume\_size](#input\_root\_volume\_size)| Size of the root volume in gigabytes |`number`|`10`| no |
113
114
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
114
115
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| The Security Group description. |`string`|`"EC2 Security Group"`| no |
115
116
| <aname="input_security_group_enabled"></a> [security\_group\_enabled](#input\_security\_group\_enabled)| Whether to create default Security Group for EC2. |`bool`|`true`| no |
116
-
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| A list of maps of Security Group rules.<br>The values of map is fully complated with `aws_security_group_rule` resource.<br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
117
+
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| A list of maps of Security Group rules.<br>The values of map is fully complated with `aws_security_group_rule` resource.<br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
117
118
| <aname="input_security_group_use_name_prefix"></a> [security\_group\_use\_name\_prefix](#input\_security\_group\_use\_name\_prefix)| Whether to create a default Security Group with unique name beginning with the normalized prefix. |`bool`|`false`| no |
118
119
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| A list of Security Group IDs to associate with EC2 instance. |`list(string)`|`[]`| no |
119
120
| <aname="input_source_dest_check"></a> [source\_dest\_check](#input\_source\_dest\_check)| Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
0 commit comments