You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.scheduled_action](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
215
216
|[aws_iam_policy_document.scheduled_action_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -262,8 +263,13 @@ No modules.
262
263
| <aname="input_logging"></a> [logging](#input\_logging)| Logging configuration for the cluster |`any`|`{}`| no |
263
264
| <aname="input_maintenance_track_name"></a> [maintenance\_track\_name](#input\_maintenance\_track\_name)| The name of the maintenance track for the restored cluster. When you take a snapshot, the snapshot inherits the MaintenanceTrack value from the cluster. The snapshot might be on a different track than the cluster that was the source for the snapshot. Default value is `current`|`string`|`null`| no |
264
265
| <aname="input_manage_master_password"></a> [manage\_master\_password](#input\_manage\_master\_password)| Whether to use AWS SecretsManager to manage the cluster admin credentials. Conflicts with `master_password`. One of `master_password` or `manage_master_password` is required unless `snapshot_identifier` is provided |`bool`|`false`| no |
266
+
| <aname="input_manage_master_password_rotation"></a> [manage\_master\_password\_rotation](#input\_manage\_master\_password\_rotation)| Whether to manage the master user password rotation. Setting this value to false after previously having been set to true will disable automatic rotation. |`bool`|`false`| no |
265
267
| <aname="input_manual_snapshot_retention_period"></a> [manual\_snapshot\_retention\_period](#input\_manual\_snapshot\_retention\_period)| The default number of days to retain a manual snapshot. If the value is -1, the snapshot is retained indefinitely. This setting doesn't change the retention period of existing snapshots. Valid values are between `-1` and `3653`. Default value is `-1`|`number`|`null`| no |
266
268
| <aname="input_master_password"></a> [master\_password](#input\_master\_password)| Password for the master DB user. (Required unless a `snapshot_identifier` is provided). Must contain at least 8 chars, one uppercase letter, one lowercase letter, and one number |`string`|`null`| no |
269
+
| <aname="input_master_password_rotate_immediately"></a> [master\_password\_rotate\_immediately](#input\_master\_password\_rotate\_immediately)| Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window. |`bool`|`null`| no |
270
+
| <aname="input_master_password_rotation_automatically_after_days"></a> [master\_password\_rotation\_automatically\_after\_days](#input\_master\_password\_rotation\_automatically\_after\_days)| Specifies the number of days between automatic scheduled rotations of the secret. Either `master_user_password_rotation_automatically_after_days` or `master_user_password_rotation_schedule_expression` must be specified. |`number`|`null`| no |
271
+
| <aname="input_master_password_rotation_duration"></a> [master\_password\_rotation\_duration](#input\_master\_password\_rotation\_duration)| The length of the rotation window in hours. For example, 3h for a three hour window. |`string`|`null`| no |
272
+
| <aname="input_master_password_rotation_schedule_expression"></a> [master\_password\_rotation\_schedule\_expression](#input\_master\_password\_rotation\_schedule\_expression)| A cron() or rate() expression that defines the schedule for rotating your secret. Either `master_user_password_rotation_automatically_after_days` or `master_user_password_rotation_schedule_expression` must be specified. |`string`|`null`| no |
267
273
| <aname="input_master_password_secret_kms_key_id"></a> [master\_password\_secret\_kms\_key\_id](#input\_master\_password\_secret\_kms\_key\_id)| ID of the KMS key used to encrypt the cluster admin credentials secret |`string`|`null`| no |
268
274
| <aname="input_master_username"></a> [master\_username](#input\_master\_username)| Username for the master DB user (Required unless a `snapshot_identifier` is provided). Defaults to `awsuser`|`string`|`"awsuser"`| no |
269
275
| <aname="input_multi_az"></a> [multi\_az](#input\_multi\_az)| Specifies if the Redshift cluster is multi-AZ |`bool`|`null`| no |
@@ -320,6 +326,7 @@ No modules.
320
326
| <aname="output_cluster_preferred_maintenance_window"></a> [cluster\_preferred\_maintenance\_window](#output\_cluster\_preferred\_maintenance\_window)| The backup window |
321
327
| <aname="output_cluster_public_key"></a> [cluster\_public\_key](#output\_cluster\_public\_key)| The public key for the cluster |
322
328
| <aname="output_cluster_revision_number"></a> [cluster\_revision\_number](#output\_cluster\_revision\_number)| The specific revision number of the database in the cluster |
329
+
| <aname="output_cluster_secretsmanager_secret_rotation_enabled"></a> [cluster\_secretsmanager\_secret\_rotation\_enabled](#output\_cluster\_secretsmanager\_secret\_rotation\_enabled)| Specifies whether automatic rotation is enabled for the secret |
323
330
| <aname="output_cluster_subnet_group_name"></a> [cluster\_subnet\_group\_name](#output\_cluster\_subnet\_group\_name)| The name of a cluster subnet group to be associated with this cluster |
324
331
| <aname="output_cluster_type"></a> [cluster\_type](#output\_cluster\_type)| The Redshift cluster type |
325
332
| <aname="output_cluster_version"></a> [cluster\_version](#output\_cluster\_version)| The version of Redshift engine software |
Copy file name to clipboardExpand all lines: examples/complete/README.md
+1
Original file line number
Diff line number
Diff line change
@@ -92,6 +92,7 @@ No inputs.
92
92
| <aname="output_endpoint_access_port"></a> [endpoint\_access\_port](#output\_endpoint\_access\_port)| The port number on which the cluster accepts incoming connections |
93
93
| <aname="output_endpoint_access_vpc_endpoint"></a> [endpoint\_access\_vpc\_endpoint](#output\_endpoint\_access\_vpc\_endpoint)| The connection endpoint for connecting to an Amazon Redshift cluster through the proxy. See details below |
94
94
| <aname="output_master_password_secret_arn"></a> [master\_password\_secret\_arn](#output\_master\_password\_secret\_arn)| ARN of managed master password secret |
95
+
| <aname="output_master_password_secretsmanager_secret_rotation_enabled"></a> [master\_password\_secretsmanager\_secret\_rotation\_enabled](#output\_master\_password\_secretsmanager\_secret\_rotation\_enabled)| Specifies whether automatic rotation is enabled for the secret |
95
96
| <aname="output_parameter_group_arn"></a> [parameter\_group\_arn](#output\_parameter\_group\_arn)| Amazon Resource Name (ARN) of the parameter group created |
96
97
| <aname="output_parameter_group_id"></a> [parameter\_group\_id](#output\_parameter\_group\_id)| The name of the Redshift parameter group created |
97
98
| <aname="output_scheduled_action_iam_role_arn"></a> [scheduled\_action\_iam\_role\_arn](#output\_scheduled\_action\_iam\_role\_arn)| Scheduled actions IAM role ARN |
description="Whether to manage the master user password rotation. Setting this value to false after previously having been set to true will disable automatic rotation."
518
+
type=bool
519
+
default=false
520
+
}
521
+
522
+
variable"master_password_rotate_immediately" {
523
+
description="Specifies whether to rotate the secret immediately or wait until the next scheduled rotation window."
description="Specifies the number of days between automatic scheduled rotations of the secret. Either `master_user_password_rotation_automatically_after_days` or `master_user_password_rotation_schedule_expression` must be specified."
530
+
type=number
531
+
default=null
532
+
}
533
+
534
+
variable"master_password_rotation_duration" {
535
+
description="The length of the rotation window in hours. For example, 3h for a three hour window."
description="A cron() or rate() expression that defines the schedule for rotating your secret. Either `master_user_password_rotation_automatically_after_days` or `master_user_password_rotation_schedule_expression` must be specified."
0 commit comments