You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6
Original file line number
Diff line number
Diff line change
@@ -297,8 +297,13 @@ Available targets:
297
297
| <aname="input_delimiter"></a> [delimiter](#input\_delimiter)| Delimiter to be used between ID elements.<br>Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. |`string`|`null`| no |
298
298
| <aname="input_descriptor_formats"></a> [descriptor\_formats](#input\_descriptor\_formats)| Describe additional descriptors to be output in the `descriptors` output map.<br>Map of maps. Keys are names of descriptors. Values are maps of the form<br>`{<br> format = string<br> labels = list(string)<br>}`<br>(Type is `any` so the map values can later be enhanced to provide additional options.)<br>`format` is a Terraform format string to be passed to the `format()` function.<br>`labels` is a list of labels, in order, to pass to `format()` function.<br>Label values will be normalized before being passed to `format()` so they will be<br>identical to how they appear in `id`.<br>Default is `{}` (`descriptors` output will be empty). |`any`|`{}`| no |
299
299
| <aname="input_ebs_root_volume_size"></a> [ebs\_root\_volume\_size](#input\_ebs\_root\_volume\_size)| Size in GiB of the EBS root device volume of the Linux AMI that is used for each EC2 instance. Available in Amazon EMR version 4.x and later |`number`|`10`| no |
300
+
| <aname="input_ec2_autoscaling_role_enabled"></a> [ec2\_autoscaling\_role\_enabled](#input\_ec2\_autoscaling\_role\_enabled)| If set to `false`, will use `existing_ec2_autoscaling_role_arn` for an existing EC2 autoscaling IAM role that was created outside of this module |`bool`|`true`| no |
301
+
| <aname="input_ec2_role_enabled"></a> [ec2\_role\_enabled](#input\_ec2\_role\_enabled)| If set to `false`, will use `existing_ec2_instance_profile_arn` for an existing EC2 IAM role that was created outside of this module |`bool`|`true`| no |
300
302
| <aname="input_enabled"></a> [enabled](#input\_enabled)| Set to false to prevent the module from creating any resources |`bool`|`null`| no |
301
303
| <aname="input_environment"></a> [environment](#input\_environment)| ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' |`string`|`null`| no |
304
+
| <aname="input_existing_ec2_autoscaling_role_arn"></a> [existing\_ec2\_autoscaling\_role\_arn](#input\_existing\_ec2\_autoscaling\_role\_arn)| ARN of an existing EC2 autoscaling role to attach to the cluster |`string`|`""`| no |
305
+
| <aname="input_existing_ec2_instance_profile_arn"></a> [existing\_ec2\_instance\_profile\_arn](#input\_existing\_ec2\_instance\_profile\_arn)| ARN of an existing EC2 instance profile |`string`|`""`| no |
306
+
| <aname="input_existing_service_role_arn"></a> [existing\_service\_role\_arn](#input\_existing\_service\_role\_arn)| ARN of an existing EMR service role to attach to the cluster |`string`|`""`| no |
302
307
| <aname="input_id_length_limit"></a> [id\_length\_limit](#input\_id\_length\_limit)| Limit `id` to this many characters (minimum 6).<br>Set to `0` for unlimited length.<br>Set to `null` for keep the existing setting, which defaults to `0`.<br>Does not affect `id_full`. |`number`|`null`| no |
303
308
| <aname="input_keep_job_flow_alive_when_no_steps"></a> [keep\_job\_flow\_alive\_when\_no\_steps](#input\_keep\_job\_flow\_alive\_when\_no\_steps)| Switch on/off run cluster with no steps or when all steps are complete |`bool`|`true`| no |
304
309
| <aname="input_kerberos_ad_domain_join_password"></a> [kerberos\_ad\_domain\_join\_password](#input\_kerberos\_ad\_domain\_join\_password)| The Active Directory password for ad\_domain\_join\_user. Terraform cannot perform drift detection of this configuration. |`string`|`null`| no |
@@ -334,6 +339,7 @@ Available targets:
334
339
| <aname="input_scale_down_behavior"></a> [scale\_down\_behavior](#input\_scale\_down\_behavior)| The way that individual Amazon EC2 instances terminate when an automatic scale-in activity occurs or an instance group is resized |`string`|`null`| no |
335
340
| <aname="input_security_configuration"></a> [security\_configuration](#input\_security\_configuration)| The security configuration name to attach to the EMR cluster. Only valid for EMR clusters with `release_label` 4.8.0 or greater. See https://www.terraform.io/docs/providers/aws/r/emr_security_configuration.html for more info |`string`|`null`| no |
336
341
| <aname="input_service_access_security_group"></a> [service\_access\_security\_group](#input\_service\_access\_security\_group)| The name of the existing additional security group that will be used for EMR core & task nodes. If empty, a new security group will be created |`string`|`""`| no |
342
+
| <aname="input_service_role_enabled"></a> [service\_role\_enabled](#input\_service\_role\_enabled)| If set to `false`, will use `existing_service_role_arn` for an existing IAM role that was created outside of this module |`bool`|`true`| no |
337
343
| <aname="input_slave_allowed_cidr_blocks"></a> [slave\_allowed\_cidr\_blocks](#input\_slave\_allowed\_cidr\_blocks)| List of CIDR blocks to be allowed to access the slave instances |`list(string)`|`[]`| no |
338
344
| <aname="input_slave_allowed_security_groups"></a> [slave\_allowed\_security\_groups](#input\_slave\_allowed\_security\_groups)| List of security groups to be allowed to connect to the slave instances |`list(string)`|`[]`| no |
339
345
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
Copy file name to clipboardExpand all lines: docs/terraform.md
+6
Original file line number
Diff line number
Diff line change
@@ -91,8 +91,13 @@
91
91
| <aname="input_delimiter"></a> [delimiter](#input\_delimiter)| Delimiter to be used between ID elements.<br>Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. |`string`|`null`| no |
92
92
| <aname="input_descriptor_formats"></a> [descriptor\_formats](#input\_descriptor\_formats)| Describe additional descriptors to be output in the `descriptors` output map.<br>Map of maps. Keys are names of descriptors. Values are maps of the form<br>`{<br> format = string<br> labels = list(string)<br>}`<br>(Type is `any` so the map values can later be enhanced to provide additional options.)<br>`format` is a Terraform format string to be passed to the `format()` function.<br>`labels` is a list of labels, in order, to pass to `format()` function.<br>Label values will be normalized before being passed to `format()` so they will be<br>identical to how they appear in `id`.<br>Default is `{}` (`descriptors` output will be empty). |`any`|`{}`| no |
93
93
| <aname="input_ebs_root_volume_size"></a> [ebs\_root\_volume\_size](#input\_ebs\_root\_volume\_size)| Size in GiB of the EBS root device volume of the Linux AMI that is used for each EC2 instance. Available in Amazon EMR version 4.x and later |`number`|`10`| no |
94
+
| <aname="input_ec2_autoscaling_role_enabled"></a> [ec2\_autoscaling\_role\_enabled](#input\_ec2\_autoscaling\_role\_enabled)| If set to `false`, will use `existing_ec2_autoscaling_role_arn` for an existing EC2 autoscaling IAM role that was created outside of this module |`bool`|`true`| no |
95
+
| <aname="input_ec2_role_enabled"></a> [ec2\_role\_enabled](#input\_ec2\_role\_enabled)| If set to `false`, will use `existing_ec2_instance_profile_arn` for an existing EC2 IAM role that was created outside of this module |`bool`|`true`| no |
94
96
| <aname="input_enabled"></a> [enabled](#input\_enabled)| Set to false to prevent the module from creating any resources |`bool`|`null`| no |
95
97
| <aname="input_environment"></a> [environment](#input\_environment)| ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' |`string`|`null`| no |
98
+
| <aname="input_existing_ec2_autoscaling_role_arn"></a> [existing\_ec2\_autoscaling\_role\_arn](#input\_existing\_ec2\_autoscaling\_role\_arn)| ARN of an existing EC2 autoscaling role to attach to the cluster |`string`|`""`| no |
99
+
| <aname="input_existing_ec2_instance_profile_arn"></a> [existing\_ec2\_instance\_profile\_arn](#input\_existing\_ec2\_instance\_profile\_arn)| ARN of an existing EC2 instance profile |`string`|`""`| no |
100
+
| <aname="input_existing_service_role_arn"></a> [existing\_service\_role\_arn](#input\_existing\_service\_role\_arn)| ARN of an existing EMR service role to attach to the cluster |`string`|`""`| no |
96
101
| <aname="input_id_length_limit"></a> [id\_length\_limit](#input\_id\_length\_limit)| Limit `id` to this many characters (minimum 6).<br>Set to `0` for unlimited length.<br>Set to `null` for keep the existing setting, which defaults to `0`.<br>Does not affect `id_full`. |`number`|`null`| no |
97
102
| <aname="input_keep_job_flow_alive_when_no_steps"></a> [keep\_job\_flow\_alive\_when\_no\_steps](#input\_keep\_job\_flow\_alive\_when\_no\_steps)| Switch on/off run cluster with no steps or when all steps are complete |`bool`|`true`| no |
98
103
| <aname="input_kerberos_ad_domain_join_password"></a> [kerberos\_ad\_domain\_join\_password](#input\_kerberos\_ad\_domain\_join\_password)| The Active Directory password for ad\_domain\_join\_user. Terraform cannot perform drift detection of this configuration. |`string`|`null`| no |
@@ -128,6 +133,7 @@
128
133
| <aname="input_scale_down_behavior"></a> [scale\_down\_behavior](#input\_scale\_down\_behavior)| The way that individual Amazon EC2 instances terminate when an automatic scale-in activity occurs or an instance group is resized |`string`|`null`| no |
129
134
| <aname="input_security_configuration"></a> [security\_configuration](#input\_security\_configuration)| The security configuration name to attach to the EMR cluster. Only valid for EMR clusters with `release_label` 4.8.0 or greater. See https://www.terraform.io/docs/providers/aws/r/emr_security_configuration.html for more info |`string`|`null`| no |
130
135
| <aname="input_service_access_security_group"></a> [service\_access\_security\_group](#input\_service\_access\_security\_group)| The name of the existing additional security group that will be used for EMR core & task nodes. If empty, a new security group will be created |`string`|`""`| no |
136
+
| <aname="input_service_role_enabled"></a> [service\_role\_enabled](#input\_service\_role\_enabled)| If set to `false`, will use `existing_service_role_arn` for an existing IAM role that was created outside of this module |`bool`|`true`| no |
131
137
| <aname="input_slave_allowed_cidr_blocks"></a> [slave\_allowed\_cidr\_blocks](#input\_slave\_allowed\_cidr\_blocks)| List of CIDR blocks to be allowed to access the slave instances |`list(string)`|`[]`| no |
132
138
| <aname="input_slave_allowed_security_groups"></a> [slave\_allowed\_security\_groups](#input\_slave\_allowed\_security\_groups)| List of security groups to be allowed to connect to the slave instances |`list(string)`|`[]`| no |
133
139
| <aname="input_stage"></a> [stage](#input\_stage)| ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
0 commit comments