You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -324,7 +324,7 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
324
324
-[Studios](https://github.com/terraform-aws-modules/terraform-aws-emr/tree/master/examples/studio) with either IAM or SSO authentication
325
325
-[Virtual cluster](https://github.com/terraform-aws-modules/terraform-aws-emr/tree/master/examples/virtual-cluster) running on Amazon EKS
326
326
327
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
327
+
<!--BEGIN_TF_DOCS-->
328
328
## Requirements
329
329
330
330
| Name | Version |
@@ -401,7 +401,7 @@ No modules.
401
401
| <aname="input_ec2_attributes"></a> [ec2\_attributes](#input\_ec2\_attributes)| Attributes for the EC2 instances running the job flow |`any`|`{}`| no |
402
402
| <aname="input_iam_instance_profile_description"></a> [iam\_instance\_profile\_description](#input\_iam\_instance\_profile\_description)| Description of the EC2 IAM role/instance profile |`string`|`null`| no |
403
403
| <aname="input_iam_instance_profile_name"></a> [iam\_instance\_profile\_name](#input\_iam\_instance\_profile\_name)| Name to use on EC2 IAM role/instance profile created |`string`|`null`| no |
404
-
| <aname="input_iam_instance_profile_policies"></a> [iam\_instance\_profile\_policies](#input\_iam\_instance\_profile\_policies)| Map of IAM policies to attach to the EC2 IAM role/instance profile |`map(string)`| <pre>{<br> "AmazonElasticMapReduceforEC2Role": "arn:aws:iam::aws:policy/service-role/AmazonElasticMapReduceforEC2Role"<br>}</pre> | no |
404
+
| <aname="input_iam_instance_profile_policies"></a> [iam\_instance\_profile\_policies](#input\_iam\_instance\_profile\_policies)| Map of IAM policies to attach to the EC2 IAM role/instance profile |`map(string)`| <pre>{<br/> "AmazonElasticMapReduceforEC2Role": "arn:aws:iam::aws:policy/service-role/AmazonElasticMapReduceforEC2Role"<br/>}</pre> | no |
405
405
| <aname="input_iam_instance_profile_role_arn"></a> [iam\_instance\_profile\_role\_arn](#input\_iam\_instance\_profile\_role\_arn)| The ARN of an existing IAM role to use if passing in a custom instance profile and creating a service role |`string`|`null`| no |
406
406
| <aname="input_iam_role_path"></a> [iam\_role\_path](#input\_iam\_role\_path)| IAM role path |`string`|`null`| no |
407
407
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
@@ -420,25 +420,25 @@ No modules.
420
420
| <aname="input_master_instance_fleet"></a> [master\_instance\_fleet](#input\_master\_instance\_fleet)| Configuration block to use an [Instance Fleet](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-instance-fleet.html) for the master node type. Cannot be specified if any `master_instance_group` configuration blocks are set |`any`|`{}`| no |
421
421
| <aname="input_master_instance_group"></a> [master\_instance\_group](#input\_master\_instance\_group)| Configuration block to use an [Instance Group](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-instance-group-configuration.html#emr-plan-instance-groups) for the [master node type](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-master-core-task-nodes.html#emr-plan-master)|`any`|`{}`| no |
422
422
| <aname="input_master_security_group_description"></a> [master\_security\_group\_description](#input\_master\_security\_group\_description)| Description of the security group created |`string`|`"Managed master security group"`| no |
423
-
| <aname="input_master_security_group_rules"></a> [master\_security\_group\_rules](#input\_master\_security\_group\_rules)| Security group rules to add to the security group created |`any`| <pre>{<br> "default": {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all egress traffic",<br> "from_port": 0,<br> "ipv6_cidr_blocks": [<br> "::/0"<br> ],<br> "protocol": "-1",<br> "to_port": 0,<br> "type": "egress"<br> }<br>}</pre> | no |
423
+
| <aname="input_master_security_group_rules"></a> [master\_security\_group\_rules](#input\_master\_security\_group\_rules)| Security group rules to add to the security group created |`any`| <pre>{<br/> "default": {<br/> "cidr_blocks": [<br/> "0.0.0.0/0"<br/> ],<br/> "description": "Allow all egress traffic",<br/> "from_port": 0,<br/> "ipv6_cidr_blocks": [<br/> "::/0"<br/> ],<br/> "protocol": "-1",<br/> "to_port": 0,<br/> "type": "egress"<br/> }<br/>}</pre> | no |
424
424
| <aname="input_name"></a> [name](#input\_name)| Name of the job flow |`string`|`""`| no |
425
425
| <aname="input_placement_group_config"></a> [placement\_group\_config](#input\_placement\_group\_config)| The specified placement group configuration |`any`|`{}`| no |
426
426
| <aname="input_release_label"></a> [release\_label](#input\_release\_label)| Release label for the Amazon EMR release |`string`|`null`| no |
427
-
| <aname="input_release_label_filters"></a> [release\_label\_filters](#input\_release\_label\_filters)| Map of release label filters use to lookup a release label |`any`| <pre>{<br> "default": {<br> "prefix": "emr-6"<br> }<br>}</pre> | no |
427
+
| <aname="input_release_label_filters"></a> [release\_label\_filters](#input\_release\_label\_filters)| Map of release label filters use to lookup a release label |`any`| <pre>{<br/> "default": {<br/> "prefix": "emr-6"<br/> }<br/>}</pre> | no |
428
428
| <aname="input_scale_down_behavior"></a> [scale\_down\_behavior](#input\_scale\_down\_behavior)| Way that individual Amazon EC2 instances terminate when an automatic scale-in activity occurs or an instance group is resized |`string`|`"TERMINATE_AT_TASK_COMPLETION"`| no |
429
429
| <aname="input_security_configuration"></a> [security\_configuration](#input\_security\_configuration)| Security configuration to create, or attach if `create_security_configuration` is `false`. Only valid for EMR clusters with `release_label` 4.8.0 or greater |`string`|`null`| no |
430
430
| <aname="input_security_configuration_name"></a> [security\_configuration\_name](#input\_security\_configuration\_name)| Name of the security configuration to create, or attach if `create_security_configuration` is `false`. Only valid for EMR clusters with `release_label` 4.8.0 or greater |`string`|`null`| no |
431
431
| <aname="input_security_configuration_use_name_prefix"></a> [security\_configuration\_use\_name\_prefix](#input\_security\_configuration\_use\_name\_prefix)| Determines whether `security_configuration_name` is used as a prefix |`bool`|`true`| no |
432
432
| <aname="input_service_iam_role_arn"></a> [service\_iam\_role\_arn](#input\_service\_iam\_role\_arn)| The ARN of an existing IAM role to use for the service |`string`|`null`| no |
433
433
| <aname="input_service_iam_role_description"></a> [service\_iam\_role\_description](#input\_service\_iam\_role\_description)| Description of the role |`string`|`null`| no |
434
434
| <aname="input_service_iam_role_name"></a> [service\_iam\_role\_name](#input\_service\_iam\_role\_name)| Name to use on IAM role created |`string`|`null`| no |
435
-
| <aname="input_service_iam_role_policies"></a> [service\_iam\_role\_policies](#input\_service\_iam\_role\_policies)| Map of IAM policies to attach to the service role |`map(string)`| <pre>{<br> "AmazonEMRServicePolicy_v2": "arn:aws:iam::aws:policy/service-role/AmazonEMRServicePolicy_v2"<br>}</pre> | no |
435
+
| <aname="input_service_iam_role_policies"></a> [service\_iam\_role\_policies](#input\_service\_iam\_role\_policies)| Map of IAM policies to attach to the service role |`map(string)`| <pre>{<br/> "AmazonEMRServicePolicy_v2": "arn:aws:iam::aws:policy/service-role/AmazonEMRServicePolicy_v2"<br/>}</pre> | no |
436
436
| <aname="input_service_pass_role_policy_description"></a> [service\_pass\_role\_policy\_description](#input\_service\_pass\_role\_policy\_description)| Description of the policy |`string`|`null`| no |
437
437
| <aname="input_service_pass_role_policy_name"></a> [service\_pass\_role\_policy\_name](#input\_service\_pass\_role\_policy\_name)| Name to use on IAM policy created |`string`|`null`| no |
438
438
| <aname="input_service_security_group_description"></a> [service\_security\_group\_description](#input\_service\_security\_group\_description)| Description of the security group created |`string`|`"Managed service access security group"`| no |
439
439
| <aname="input_service_security_group_rules"></a> [service\_security\_group\_rules](#input\_service\_security\_group\_rules)| Security group rules to add to the security group created |`any`|`{}`| no |
440
440
| <aname="input_slave_security_group_description"></a> [slave\_security\_group\_description](#input\_slave\_security\_group\_description)| Description of the security group created |`string`|`"Managed slave security group"`| no |
441
-
| <aname="input_slave_security_group_rules"></a> [slave\_security\_group\_rules](#input\_slave\_security\_group\_rules)| Security group rules to add to the security group created |`any`| <pre>{<br> "default": {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all egress traffic",<br> "from_port": 0,<br> "ipv6_cidr_blocks": [<br> "::/0"<br> ],<br> "protocol": "-1",<br> "to_port": 0,<br> "type": "egress"<br> }<br>}</pre> | no |
441
+
| <aname="input_slave_security_group_rules"></a> [slave\_security\_group\_rules](#input\_slave\_security\_group\_rules)| Security group rules to add to the security group created |`any`| <pre>{<br/> "default": {<br/> "cidr_blocks": [<br/> "0.0.0.0/0"<br/> ],<br/> "description": "Allow all egress traffic",<br/> "from_port": 0,<br/> "ipv6_cidr_blocks": [<br/> "::/0"<br/> ],<br/> "protocol": "-1",<br/> "to_port": 0,<br/> "type": "egress"<br/> }<br/>}</pre> | no |
442
442
| <aname="input_step"></a> [step](#input\_step)| Steps to run when creating the cluster |`any`|`{}`| no |
443
443
| <aname="input_step_concurrency_level"></a> [step\_concurrency\_level](#input\_step\_concurrency\_level)| Number of steps that can be executed concurrently. You can specify a maximum of 256 steps. Only valid for EMR clusters with `release_label` 5.28.0 or greater (default is 1) |`number`|`null`| no |
444
444
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
@@ -478,7 +478,7 @@ No modules.
478
478
| <aname="output_service_iam_role_arn"></a> [service\_iam\_role\_arn](#output\_service\_iam\_role\_arn)| Service IAM role ARN |
479
479
| <aname="output_service_iam_role_name"></a> [service\_iam\_role\_name](#output\_service\_iam\_role\_name)| Service IAM role name |
480
480
| <aname="output_service_iam_role_unique_id"></a> [service\_iam\_role\_unique\_id](#output\_service\_iam\_role\_unique\_id)| Stable and unique string identifying the service IAM role |
Copy file name to clipboardExpand all lines: examples/private-cluster/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ $ terraform apply
22
22
23
23
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
24
24
25
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
25
+
<!--BEGIN_TF_DOCS-->
26
26
## Requirements
27
27
28
28
| Name | Version |
@@ -147,6 +147,6 @@ No inputs.
147
147
| <aname="output_group_service_iam_role_arn"></a> [group\_service\_iam\_role\_arn](#output\_group\_service\_iam\_role\_arn)| Service IAM role ARN |
148
148
| <aname="output_group_service_iam_role_name"></a> [group\_service\_iam\_role\_name](#output\_group\_service\_iam\_role\_name)| Service IAM role name |
149
149
| <aname="output_group_service_iam_role_unique_id"></a> [group\_service\_iam\_role\_unique\_id](#output\_group\_service\_iam\_role\_unique\_id)| Stable and unique string identifying the service IAM role |
150
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
150
+
<!--END_TF_DOCS-->
151
151
152
152
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-emr/blob/master/LICENSE).
Copy file name to clipboardExpand all lines: examples/public-cluster/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ $ terraform apply
20
20
21
21
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
22
22
23
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
23
+
<!--BEGIN_TF_DOCS-->
24
24
## Requirements
25
25
26
26
| Name | Version |
@@ -107,6 +107,6 @@ No inputs.
107
107
| <aname="output_group_service_iam_role_arn"></a> [group\_service\_iam\_role\_arn](#output\_group\_service\_iam\_role\_arn)| Service IAM role ARN |
108
108
| <aname="output_group_service_iam_role_name"></a> [group\_service\_iam\_role\_name](#output\_group\_service\_iam\_role\_name)| Service IAM role name |
109
109
| <aname="output_group_service_iam_role_unique_id"></a> [group\_service\_iam\_role\_unique\_id](#output\_group\_service\_iam\_role\_unique\_id)| Stable and unique string identifying the service IAM role |
110
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
110
+
<!--END_TF_DOCS-->
111
111
112
112
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-emr/blob/master/LICENSE).
Copy file name to clipboardExpand all lines: examples/serverless-cluster/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ $ terraform apply
20
20
21
21
Note that this example may create resources which will incur monetary charges on your AWS bill. Run `terraform destroy` when you no longer need these resources.
22
22
23
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
23
+
<!--BEGIN_TF_DOCS-->
24
24
## Requirements
25
25
26
26
| Name | Version |
@@ -69,6 +69,6 @@ No inputs.
69
69
| <aname="output_spark_id"></a> [spark\_id](#output\_spark\_id)| ID of the application |
70
70
| <aname="output_spark_security_group_arn"></a> [spark\_security\_group\_arn](#output\_spark\_security\_group\_arn)| Amazon Resource Name (ARN) of the security group |
71
71
| <aname="output_spark_security_group_id"></a> [spark\_security\_group\_id](#output\_spark\_security\_group\_id)| ID of the security group |
72
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
72
+
<!--END_TF_DOCS-->
73
73
74
74
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-emr/blob/master/LICENSE).
Copy file name to clipboardExpand all lines: examples/studio/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ $ terraform plan
16
16
$ terraform apply
17
17
```
18
18
19
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
19
+
<!--BEGIN_TF_DOCS-->
20
20
## Requirements
21
21
22
22
| Name | Version |
@@ -111,6 +111,6 @@ No inputs.
111
111
| <aname="output_sso_user_iam_role_unique_id"></a> [sso\_user\_iam\_role\_unique\_id](#output\_sso\_user\_iam\_role\_unique\_id)| Stable and unique string identifying the user IAM role |
112
112
| <aname="output_sso_workspace_security_group_arn"></a> [sso\_workspace\_security\_group\_arn](#output\_sso\_workspace\_security\_group\_arn)| Amazon Resource Name (ARN) of the workspace security group |
113
113
| <aname="output_sso_workspace_security_group_id"></a> [sso\_workspace\_security\_group\_id](#output\_sso\_workspace\_security\_group\_id)| ID of the workspace security group |
114
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
114
+
<!--END_TF_DOCS-->
115
115
116
116
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-emr/blob/master/LICENSE).
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
42
+
<!--BEGIN_TF_DOCS-->
43
43
## Requirements
44
44
45
45
| Name | Version |
@@ -96,6 +96,6 @@ No inputs.
96
96
| <aname="output_complete_job_execution_role_unique_id"></a> [complete\_job\_execution\_role\_unique\_id](#output\_complete\_job\_execution\_role\_unique\_id)| Stable and unique string identifying the job execution IAM role |
97
97
| <aname="output_complete_virtual_cluster_arn"></a> [complete\_virtual\_cluster\_arn](#output\_complete\_virtual\_cluster\_arn)| ARN of the EMR virtual cluster |
98
98
| <aname="output_complete_virtual_cluster_id"></a> [complete\_virtual\_cluster\_id](#output\_complete\_virtual\_cluster\_id)| ID of the EMR virtual cluster |
99
-
<!--END OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
99
+
<!--END_TF_DOCS-->
100
100
101
101
Apache-2.0 Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-aws-emr/blob/master/LICENSE).
0 commit comments