You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_alert_manager_definition"></a> [alert\_manager\_definition](#input\_alert\_manager\_definition)| The alert manager definition that you want to be applied. See more in the [AWS Docs](https://docs.aws.amazon.com/prometheus/latest/userguide/AMP-alert-manager.html)|`string`| `"alertmanager_config: |\n route:\n receiver: 'default'\n receivers:\n - name: 'default'\n"` | no |
90
+
| <aname="input_attach_policy"></a> [attach\_policy](#input\_attach\_policy)| Controls if Prometheus Workspace should have policy attached (set to `true` to use value of `policy` as Prometheus Workspace policy) |`bool`|`false`| no |
88
91
| <aname="input_cloudwatch_log_group_class"></a> [cloudwatch\_log\_group\_class](#input\_cloudwatch\_log\_group\_class)| Specified the log class of the log group. Possible values are: `STANDARD` or `INFREQUENT_ACCESS`|`string`|`null`| no |
89
92
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
90
93
| <aname="input_cloudwatch_log_group_name"></a> [cloudwatch\_log\_group\_name](#input\_cloudwatch\_log\_group\_name)| Custom name of CloudWatch log group for a service associated with the container definition |`string`|`null`| no |
@@ -96,6 +99,7 @@ No modules.
96
99
| <aname="input_kms_key_arn"></a> [kms\_key\_arn](#input\_kms\_key\_arn)| The ARN of the KMS Key to for encryption at rest |`string`|`null`| no |
97
100
| <aname="input_limits_per_label_set"></a> [limits\_per\_label\_set](#input\_limits\_per\_label\_set)| Configuration block for setting limits on metrics with specific label sets | <pre>list(object({<br/> label_set = map(string)<br/> limits = object({<br/> max_series = number<br/> })<br/> }))</pre> |`null`| no |
98
101
| <aname="input_logging_configuration"></a> [logging\_configuration](#input\_logging\_configuration)| The logging configuration of the prometheus workspace. | <pre>object({<br/> create_log_group = optional(bool, true)<br/> logging_configuration = optional(string)<br/> })</pre> |`null`| no |
102
+
| <aname="input_policy"></a> [policy](#input\_policy)| (Optional) A valid policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. For more information about building AWS IAM policy documents with Terraform, see the AWS IAM Policy Document Guide. |`string`|`null`| no |
99
103
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
100
104
| <aname="input_retention_period_in_days"></a> [retention\_period\_in\_days](#input\_retention\_period\_in\_days)| Number of days to retain metric data in the workspace |`number`|`null`| no |
101
105
| <aname="input_rule_group_namespaces"></a> [rule\_group\_namespaces](#input\_rule\_group\_namespaces)| A map of one or more rule group namespace definitions | <pre>map(object({<br/> name = string<br/> data = string<br/> }))</pre> |`null`| no |
description="Controls if Prometheus Workspace should have policy attached (set to `true` to use value of `policy` as Prometheus Workspace policy)"
79
+
type=bool
80
+
default=false
81
+
}
82
+
83
+
variable"policy" {
84
+
description="(Optional) A valid policy JSON document. Note that if the policy document is not specific enough (but still valid), Terraform may view the policy as constantly changing in a terraform plan. In this case, please make sure you use the verbose/specific version of the policy. For more information about building AWS IAM policy documents with Terraform, see the AWS IAM Policy Document Guide."
0 commit comments