Awesome
<!-- BEGIN_TF_DOCS -->Providers
Name | Version |
---|---|
<a name="provider_aws"></a> aws | >= 5.0 |
<a name="provider_random"></a> random | >= 3.0 |
Inputs
Name | Description | Type | Default | Required |
---|---|---|---|---|
<a name="input_admin_user_password"></a> admin_user_password | The password of the administrator for the first database created in the namespace. | string | "" | no |
<a name="input_admin_username"></a> admin_username | The username of the administrator for the first database created in the namespace. | string | "" | no |
<a name="input_amount"></a> amount | The limit amount. If time-based, this amount is in Redshift Processing Units (RPU) consumed per hour. If data-based, this amount is in terabytes (TB) of data transferred between Regions in cross-account sharing. The value must be a positive number. | number | 60 | no |
<a name="input_assume_role_policy"></a> assume_role_policy | Policy that grants an entity permission to assume the role. | any | null | no |
<a name="input_base_capacity"></a> base_capacity | The base data warehouse capacity of the workgroup in Redshift Processing Units (RPUs). | number | 28 | no |
<a name="input_breach_action"></a> breach_action | The action that Amazon Redshift Serverless takes when the limit is reached. Valid values are log, emit-metric, and deactivate. The default is log. | string | "log" | no |
<a name="input_config_parameter"></a> config_parameter | An array of parameters to set for more control over a serverless database. | list(any) | [] | no |
<a name="input_create"></a> create | Determines whether to create Redshift cluster and resources (affects all resources) | bool | true | no |
<a name="input_create_random_password"></a> create_random_password | Determines whether to create random password for cluster master_password | bool | true | no |
<a name="input_db_name"></a> db_name | The name of the first database created in the namespace. | string | "" | no |
<a name="input_default_iam_role_arn"></a> default_iam_role_arn | The Amazon Resource Name (ARN) for the IAM role that was set as default for the cluster when the cluster was created | string | null | no |
<a name="input_endpoint_enable"></a> endpoint_enable | If true , VPC endpoint is enabled | bool | true | no |
<a name="input_endpoint_name"></a> endpoint_name | The Redshift-managed VPC endpoint name | string | "" | no |
<a name="input_enhanced_vpc_routing"></a> enhanced_vpc_routing | If true , enhanced VPC routing is enabled | bool | null | no |
<a name="input_iam_role_enabled"></a> iam_role_enabled | If true , iam role resource is enabled | bool | true | no |
<a name="input_iam_role_name"></a> iam_role_name | The name of the iam role | string | "" | no |
<a name="input_iam_roles"></a> iam_roles | A list of IAM roles to associate with the namespace. | list(any) | [] | no |
<a name="input_kms_alias"></a> kms_alias | The display name of the alias. The name must start with the word 'alias' followed by a forward slash (alias/) | string | "alias/redshift-serverless" | no |
<a name="input_kms_enabled"></a> kms_enabled | If true , kms key is enabled | bool | true | no |
<a name="input_kms_key_id"></a> kms_key_id | The ARN of the Amazon Web Services Key Management Service key used to encrypt your data. | string | "" | no |
<a name="input_log_exports"></a> log_exports | The types of logs the namespace can export. Available export types are userlog, connectionlog, and useractivitylog. | list(string) | [] | no |
<a name="input_namespace_name"></a> namespace_name | The name of the namespace. | string | "" | no |
<a name="input_period"></a> period | The time period that the amount applies to. A weekly period begins on Sunday. Valid values are daily, weekly, and monthly. The default is monthly. | string | "monthly" | no |
<a name="input_policy"></a> policy | If true , iam policy is enabled | any | null | no |
<a name="input_policy_arn"></a> policy_arn | The ARN of the policy you want to apply. | string | "" | no |
<a name="input_policy_enabled"></a> policy_enabled | Whether to Attach Iam policy with role. | bool | true | no |
<a name="input_policy_name"></a> policy_name | The name of the iam policy name. | string | "" | no |
<a name="input_publicly_accessible"></a> publicly_accessible | If true, the cluster can be accessed from a public network | bool | false | no |
<a name="input_random_password_length"></a> random_password_length | Length of random password to create. Defaults to 16 | number | 16 | no |
<a name="input_retention_period"></a> retention_period | How long to retain the created snapshot. Default value is -1. | string | "-1" | no |
<a name="input_secrets_manager_enabled"></a> secrets_manager_enabled | If true , secrets manages resource is enabled | bool | true | no |
<a name="input_secrets_manager_name"></a> secrets_manager_name | The name of the secrets manager. | string | "" | no |
<a name="input_security_group_ids"></a> security_group_ids | An array of security group IDs to associate with the workgroup. | list(any) | [] | no |
<a name="input_serverless_resource_policy"></a> serverless_resource_policy | If true , serverless resource policy is enabled | any | null | no |
<a name="input_snapshot_enable"></a> snapshot_enable | If true , snapshot is enabled | bool | false | no |
<a name="input_snapshot_name"></a> snapshot_name | The name of the snapshot. | string | "" | no |
<a name="input_snapshot_policy_enable"></a> snapshot_policy_enable | If true , snapshot policy is enabled | bool | false | no |
<a name="input_subnet_ids"></a> subnet_ids | An array of VPC subnet IDs to use in the subnet group | list(string) | null | no |
<a name="input_tags"></a> tags | A map of tags to add to all resources | map(string) | {} | no |
<a name="input_usage_type"></a> usage_type | The type of Amazon Redshift Serverless usage to create a usage limit for. Valid values are serverless-compute or cross-region-datasharing. | string | "serverless-compute" | no |
<a name="input_workgroup_name"></a> workgroup_name | The name of the workgroup. | string | "" | no |
Resources
Outputs
Name | Description |
---|---|
<a name="output_endpoint_access_arn"></a> endpoint_access_arn | Amazon Resource Name (ARN) of the Redshift Serverless Endpoint Access. |
<a name="output_endpoint_access_name"></a> endpoint_access_name | Amazon Resource Name (ARN) of the Redshift Serverless Endpoint Access. |
<a name="output_limit_arn"></a> limit_arn | Amazon Resource Name (ARN) of the Redshift Serverless Usage Limit. |
<a name="output_limit_id"></a> limit_id | The Redshift Usage Limit id. |
<a name="output_namespace_arn"></a> namespace_arn | The Redshift Namespace ID. |
<a name="output_namespace_id"></a> namespace_id | The Redshift Namespace ID. |
<a name="output_namespace_name"></a> namespace_name | The Redshift Namespace Name. |
<a name="output_snapshot_accounts_with_restore_access"></a> snapshot_accounts_with_restore_access | All of the Amazon Web Services accounts that have access to restore a snapshot to a namespace. |
<a name="output_snapshot_admin_username"></a> snapshot_admin_username | The username of the database within a snapshot. |
<a name="output_snapshot_arn"></a> snapshot_arn | The Amazon Resource Name (ARN) of the namespace the snapshot was created from. |
<a name="output_snapshot_name"></a> snapshot_name | The name of the snapshot. |
<a name="output_snapshot_namespace_arn"></a> snapshot_namespace_arn | The Amazon Resource Name (ARN) of the namespace the snapshot was created from. |
<a name="output_snapshot_owner_account"></a> snapshot_owner_account | The owner Amazon Web Services; account of the snapshot. |
<a name="output_vpc_endpoint"></a> vpc_endpoint | The VPC endpoint or the Redshift Serverless workgroup |
<a name="output_workgroup_arn"></a> workgroup_arn | Amazon Resource Name (ARN) of the Redshift Serverless Workgroup. |
<a name="output_workgroup_id"></a> workgroup_id | The Redshift Workgroup ID. |
<a name="output_workgroup_name"></a> workgroup_name | The Redshift Workgroup Name. |
🚀 Built by opsZero!
<a href="https://opszero.com"><img src="https://opszero.com/wp-content/uploads/2024/07/opsZero_logo_svg.svg" width="300px"/></a>
Since 2016 opsZero has been providing Kubernetes expertise to companies of all sizes on any Cloud. With a focus on AI and Compliance we can say we seen it all whether SOC2, HIPAA, PCI-DSS, ITAR, FedRAMP, CMMC we have you and your customers covered.
We provide support to organizations in the following ways:
- Modernize or Migrate to Kubernetes
- Cloud Infrastructure with Kubernetes on AWS, Azure, Google Cloud, or Bare Metal
- Building AI and Data Pipelines on Kubernetes
- Optimizing Existing Kubernetes Workloads
We do this with a high-touch support model where you:
- Get access to us on Slack, Microsoft Teams or Email
- Get 24/7 coverage of your infrastructure
- Get an accelerated migration to Kubernetes
Please schedule a call if you need support.
<br/><br/>
<div style="display: block"> <img src="https://opszero.com/wp-content/uploads/2024/07/aws-advanced.png" width="150px" /> <img src="https://opszero.com/wp-content/uploads/2024/07/AWS-public-sector.png" width="150px" /> <img src="https://opszero.com/wp-content/uploads/2024/07/AWS-eks.png" width="150px" /> </div> <!-- END_TF_DOCS -->