You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -434,7 +434,7 @@ Each example generates a valid _jx-requirements.yml_ file that can be used to bo
434
434
| <aname="input_apex_domain"></a> [apex\_domain](#input\_apex\_domain)| The main domain to either use directly or to configure a subdomain from |`string`|`""`| no |
435
435
| <aname="input_asm_role"></a> [asm\_role](#input\_asm\_role)| DEPRECATED: Use the new bot\_iam\_role input with he same semantics instead. |`string`|`""`| no |
436
436
| <aname="input_boot_iam_role"></a> [boot\_iam\_role](#input\_boot\_iam\_role)| Specify arn of the role to apply to the boot job service account |`string`|`""`| no |
437
-
| <aname="input_boot_secrets"></a> [boot\_secrets](#input\_boot\_secrets)| n/a | <pre>list(object({<br/> name = string<br/> value = string<br/> type = string<br/> }))</pre> |`[]`| no |
437
+
| <aname="input_boot_secrets"></a> [boot\_secrets](#input\_boot\_secrets)| n/a | <pre>list(object({<br> name = string<br> value = string<br> type = string<br> }))</pre> |`[]`| no |
438
438
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Variable to provide your desired name for the cluster |`string`| n/a | yes |
439
439
| <aname="input_cluster_oidc_issuer_url"></a> [cluster\_oidc\_issuer\_url](#input\_cluster\_oidc\_issuer\_url)| The oidc provider url for the clustrer |`string`| n/a | yes |
440
440
| <aname="input_create_and_configure_subdomain"></a> [create\_and\_configure\_subdomain](#input\_create\_and\_configure\_subdomain)| Flag to create an NS record set for the subdomain in the apex domain's Hosted Zone |`bool`|`false`| no |
@@ -470,7 +470,7 @@ Each example generates a valid _jx-requirements.yml_ file that can be used to bo
470
470
| <aname="input_jx_bot_username"></a> [jx\_bot\_username](#input\_jx\_bot\_username)| Bot username used to interact with the Jenkins X cluster git repository |`string`|`""`| no |
471
471
| <aname="input_jx_git_operator_values"></a> [jx\_git\_operator\_values](#input\_jx\_git\_operator\_values)| Extra values for jx-git-operator chart as a list of yaml formated strings |`list(string)`|`[]`| no |
472
472
| <aname="input_jx_git_url"></a> [jx\_git\_url](#input\_jx\_git\_url)| URL for the Jenkins X cluster git repository |`string`|`""`| no |
473
-
| <aname="input_local-exec-interpreter"></a> [local-exec-interpreter](#input\_local-exec-interpreter)| If provided, this is a list of interpreter arguments used to execute the command |`list(string)`| <pre>[<br/> "/bin/bash",<br/> "-c"<br/>]</pre> | no |
473
+
| <aname="input_local-exec-interpreter"></a> [local-exec-interpreter](#input\_local-exec-interpreter)| If provided, this is a list of interpreter arguments used to execute the command |`list(string)`| <pre>[<br> "/bin/bash",<br> "-c"<br>]</pre> | no |
474
474
| <aname="input_manage_apex_domain"></a> [manage\_apex\_domain](#input\_manage\_apex\_domain)| Flag to control if apex domain should be managed/updated by this module. Set this to false,if your apex domain is managed in a different AWS account or different provider |`bool`|`true`| no |
475
475
| <aname="input_manage_subdomain"></a> [manage\_subdomain](#input\_manage\_subdomain)| Flag to control subdomain creation/management |`bool`|`true`| no |
@@ -490,6 +490,8 @@ Each example generates a valid _jx-requirements.yml_ file that can be used to bo
490
490
| <aname="input_use_asm"></a> [use\_asm](#input\_use\_asm)| Flag to specify if AWS Secrets manager is being used |`bool`|`false`| no |
491
491
| <aname="input_use_kms_s3"></a> [use\_kms\_s3](#input\_use\_kms\_s3)| Flag to determine whether kms should be used for encrypting s3 buckets |`bool`|`false`| no |
492
492
| <aname="input_use_vault"></a> [use\_vault](#input\_use\_vault)| Flag to control vault resource creation |`bool`|`true`| no |
493
+
| <aname="input_vault_instance_values"></a> [vault\_instance\_values](#input\_vault\_instance\_values)| Extra values for vault-instance chart as a list of yaml formated strings |`list(string)`|`[]`| no |
494
+
| <aname="input_vault_operator_values"></a> [vault\_operator\_values](#input\_vault\_operator\_values)| Extra values for vault-operator chart as a list of yaml formated strings |`list(string)`|`[]`| no |
493
495
| <aname="input_vault_url"></a> [vault\_url](#input\_vault\_url)| URL to an external Vault instance in case Jenkins X does not create its own system Vault |`string`|`""`| no |
494
496
| <aname="input_velero_namespace"></a> [velero\_namespace](#input\_velero\_namespace)| Kubernetes namespace for Velero |`string`|`"velero"`| no |
495
497
| <aname="input_velero_schedule"></a> [velero\_schedule](#input\_velero\_schedule)| The Velero backup schedule in cron notation to be set in the Velero Schedule CRD (see [default-backup.yaml](https://github.com/jenkins-x/jenkins-x-boot-config/blob/master/systems/velero-backups/templates/default-backup.yaml)) |`string`|`"0 * * * *"`| no |
@@ -507,7 +509,7 @@ Each example generates a valid _jx-requirements.yml_ file that can be used to bo
507
509
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| The name of the created cluster |
508
510
| <aname="output_cluster_ssm_iam_role"></a> [cluster\_ssm\_iam\_role](#output\_cluster\_ssm\_iam\_role)| The IAM Role that the External Secrets pod will assume to authenticate (Parameter Store) |
509
511
| <aname="output_cm_cainjector_iam_role"></a> [cm\_cainjector\_iam\_role](#output\_cm\_cainjector\_iam\_role)| The IAM Role that the CM CA Injector pod will assume to authenticate |
510
-
| <aname="output_connect"></a> [connect](#output\_connect)| "The cluster connection string to use once Terraform apply finishes,<br/>this command is already executed as part of the apply, you may have to provide the region and<br/>profile as environment variables " |
512
+
| <aname="output_connect"></a> [connect](#output\_connect)| "The cluster connection string to use once Terraform apply finishes,<br>this command is already executed as part of the apply, you may have to provide the region and<br>profile as environment variables " |
511
513
| <aname="output_controllerbuild_iam_role"></a> [controllerbuild\_iam\_role](#output\_controllerbuild\_iam\_role)| The IAM Role that the ControllerBuild pod will assume to authenticate |
512
514
| <aname="output_external_dns_iam_role"></a> [external\_dns\_iam\_role](#output\_external\_dns\_iam\_role)| The IAM Role that the External DNS pod will assume to authenticate |
513
515
| <aname="output_jx_requirements"></a> [jx\_requirements](#output\_jx\_requirements)| The jx-requirements rendered output |
Copy file name to clipboardExpand all lines: modules/backup/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ No requirements.
20
20
| <aname="input_enable_acl"></a> [enable\_acl](#input\_enable\_acl)| Flag to enable ACL instead of bucket ownership for S3 storage |`bool`| n/a | yes |
21
21
| <aname="input_enable_backup"></a> [enable\_backup](#input\_enable\_backup)| Whether or not Velero backups should be enabled |`bool`|`false`| no |
22
22
| <aname="input_force_destroy"></a> [force\_destroy](#input\_force\_destroy)| Flag to determine whether storage buckets get forcefully destroyed |`bool`|`false`| no |
23
-
| <aname="input_s3_default_tags"></a> [s3\_default\_tags](#input\_s3\_default\_tags)| Default tags for s3 buckets |`map(any)`| <pre>{<br/> "Owner": "Jenkins-x"<br/>}</pre> | no |
23
+
| <aname="input_s3_default_tags"></a> [s3\_default\_tags](#input\_s3\_default\_tags)| Default tags for s3 buckets |`map(any)`| <pre>{<br> "Owner": "Jenkins-x"<br>}</pre> | no |
24
24
| <aname="input_s3_extra_tags"></a> [s3\_extra\_tags](#input\_s3\_extra\_tags)| Add new tags for s3 buckets |`map(any)`|`{}`| no |
25
25
| <aname="input_s3_kms_arn"></a> [s3\_kms\_arn](#input\_s3\_kms\_arn)| ARN of the kms key used for encrypting s3 buckets |`string`|`""`| no |
26
26
| <aname="input_use_kms_s3"></a> [use\_kms\_s3](#input\_use\_kms\_s3)| Flag to determine whether kms should be used for encrypting s3 buckets |`bool`|`false`| no |
| <aname="input_additional_tekton_role_policy_arns"></a> [additional\_tekton\_role\_policy\_arns](#input\_additional\_tekton\_role\_policy\_arns)| Additional Policy ARNs to attach to Tekton IRSA Role |`list(string)`|`[]`| no |
32
32
| <aname="input_boot_iam_role"></a> [boot\_iam\_role](#input\_boot\_iam\_role)| Specify arn of the role to apply to the boot job service account |`string`|`""`| no |
33
-
| <aname="input_boot_secrets"></a> [boot\_secrets](#input\_boot\_secrets)| n/a | <pre>list(object({<br/> name = string<br/> value = string<br/> type = string<br/> }))</pre> |`[]`| no |
33
+
| <aname="input_boot_secrets"></a> [boot\_secrets](#input\_boot\_secrets)| n/a | <pre>list(object({<br> name = string<br> value = string<br> type = string<br> }))</pre> |`[]`| no |
| <aname="input_cluster_oidc_issuer_url"></a> [cluster\_oidc\_issuer\_url](#input\_cluster\_oidc\_issuer\_url)| The oidc provider url for the clustrer |`string`| n/a | yes |
36
36
| <aname="input_content"></a> [content](#input\_content)| Interpolated jx-requirements.yml |`string`|`""`| no |
@@ -55,9 +55,9 @@ No requirements.
55
55
| <aname="input_jx_bot_username"></a> [jx\_bot\_username](#input\_jx\_bot\_username)| Bot username used to interact with the Jenkins X cluster git repository |`string`|`""`| no |
56
56
| <aname="input_jx_git_operator_values"></a> [jx\_git\_operator\_values](#input\_jx\_git\_operator\_values)| Extra values for jx-git-operator chart as a list of yaml formated strings |`list(string)`|`[]`| no |
57
57
| <aname="input_jx_git_url"></a> [jx\_git\_url](#input\_jx\_git\_url)| URL for the Jenins X cluster git repository |`string`|`""`| no |
58
-
| <aname="input_local-exec-interpreter"></a> [local-exec-interpreter](#input\_local-exec-interpreter)| If provided, this is a list of interpreter arguments used to execute the command |`list(string)`| <pre>[<br/> "/bin/bash",<br/> "-c"<br/>]</pre> | no |
58
+
| <aname="input_local-exec-interpreter"></a> [local-exec-interpreter](#input\_local-exec-interpreter)| If provided, this is a list of interpreter arguments used to execute the command |`list(string)`| <pre>[<br> "/bin/bash",<br> "-c"<br>]</pre> | no |
59
59
| <aname="input_region"></a> [region](#input\_region)| The region to create the resources into |`string`|`"us-east-1"`| no |
60
-
| <aname="input_s3_default_tags"></a> [s3\_default\_tags](#input\_s3\_default\_tags)| Default tags for s3 buckets |`map(any)`| <pre>{<br/> "Owner": "Jenkins-x"<br/>}</pre> | no |
60
+
| <aname="input_s3_default_tags"></a> [s3\_default\_tags](#input\_s3\_default\_tags)| Default tags for s3 buckets |`map(any)`| <pre>{<br> "Owner": "Jenkins-x"<br>}</pre> | no |
61
61
| <aname="input_s3_extra_tags"></a> [s3\_extra\_tags](#input\_s3\_extra\_tags)| Add new tags for s3 buckets |`map(any)`|`{}`| no |
62
62
| <aname="input_s3_kms_arn"></a> [s3\_kms\_arn](#input\_s3\_kms\_arn)| ARN of the kms key used for encrypting s3 buckets |`string`|`""`| no |
63
63
| <aname="input_subnets"></a> [subnets](#input\_subnets)| The subnet ids to create EKS cluster in if create\_vpc is false |`list(string)`|`[]`| no |
| <aname="input_resource_count"></a> [resource\_count](#input\_resource\_count)| Number of resources to create (0 or 1) |`number`| n/a | yes |
18
+
| <aname="input_vault_instance_values"></a> [vault\_instance\_values](#input\_vault\_instance\_values)| Extra values for vault-instance chart as a list of yaml formated strings |`list(string)`|`[]`| no |
19
+
| <aname="input_vault_operator_values"></a> [vault\_operator\_values](#input\_vault\_operator\_values)| Extra values for vault-operator chart as a list of yaml formated strings |`list(string)`|`[]`| no |
0 commit comments