You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_elb_scheme"></a> [elb\_scheme](#input\_elb\_scheme)| Specify `internal` if you want to create an internal load balancer in your Amazon VPC so that your Elastic Beanstalk application cannot be accessed from outside your Amazon VPC |`string`|`"public"`| no |
336
333
| <aname="input_enable_capacity_rebalancing"></a> [enable\_capacity\_rebalancing](#input\_enable\_capacity\_rebalancing)| Specifies whether to enable the Capacity Rebalancing feature for Spot Instances in your Auto Scaling Group |`bool`|`false`| no |
334
+
| <aname="input_enable_loadbalancer_logs"></a> [enable\_loadbalancer\_logs](#input\_enable\_loadbalancer\_logs)| Whether to enable Load Balancer Logging to the S3 bucket. |`bool`|`true`| no |
337
335
| <aname="input_enable_log_publication_control"></a> [enable\_log\_publication\_control](#input\_enable\_log\_publication\_control)| Copy the log files for your application's Amazon EC2 instances to the Amazon S3 bucket associated with your application |`bool`|`false`| no |
338
336
| <aname="input_enable_spot_instances"></a> [enable\_spot\_instances](#input\_enable\_spot\_instances)| Enable Spot Instance requests for your environment |`bool`|`false`| no |
339
337
| <aname="input_enable_stream_logs"></a> [enable\_stream\_logs](#input\_enable\_stream\_logs)| Whether to create groups in CloudWatch Logs for proxy and deployment logs, and stream logs from each instance in your environment |`bool`|`false`| no |
@@ -394,7 +392,6 @@ Available targets:
394
392
| <aname="input_root_volume_throughput"></a> [root\_volume\_throughput](#input\_root\_volume\_throughput)| The type of the EBS root volume (only applies for gp3 type) |`number`|`null`| no |
395
393
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| The type of the EBS root volume |`string`|`"gp2"`| no |
396
394
| <aname="input_s3_bucket_access_log_bucket_name"></a> [s3\_bucket\_access\_log\_bucket\_name](#input\_s3\_bucket\_access\_log\_bucket\_name)| Name of the S3 bucket where s3 access log will be sent to |`string`|`""`| no |
397
-
| <aname="input_s3_bucket_encryption_enabled"></a> [s3\_bucket\_encryption\_enabled](#input\_s3\_bucket\_encryption\_enabled)| When set to 'true' the resource will have aes256 encryption enabled by default |`bool`|`true`| no |
398
395
| <aname="input_s3_bucket_versioning_enabled"></a> [s3\_bucket\_versioning\_enabled](#input\_s3\_bucket\_versioning\_enabled)| When set to 'true' the s3 origin bucket will have versioning enabled |`bool`|`true`| no |
399
396
| <aname="input_scheduled_actions"></a> [scheduled\_actions](#input\_scheduled\_actions)| Define a list of scheduled actions | <pre>list(object({<br> name = string<br> minsize = string<br> maxsize = string<br> desiredcapacity = string<br> starttime = string<br> endtime = string<br> recurrence = string<br> suspend = bool<br> }))</pre> |`[]`| no |
400
397
| <aname="input_security_group_create_before_destroy"></a> [security\_group\_create\_before\_destroy](#input\_security\_group\_create\_before\_destroy)| Set `true` to enable Terraform `create_before_destroy` behavior on the created security group.<br>We recommend setting this `true` on new security groups, but default it to `false` because `true`<br>will cause existing security groups to be replaced, possibly requiring the resource to be deleted and recreated.<br>Note that changing this value will always cause the security group to be replaced. |`bool`|`false`| no |
@@ -434,6 +431,7 @@ Available targets:
434
431
| <aname="output_id"></a> [id](#output\_id)| ID of the Elastic Beanstalk environment |
435
432
| <aname="output_instances"></a> [instances](#output\_instances)| Instances used by this environment |
436
433
| <aname="output_launch_configurations"></a> [launch\_configurations](#output\_launch\_configurations)| Launch configurations in use by this environment |
434
+
| <aname="output_load_balancer_log_bucket"></a> [load\_balancer\_log\_bucket](#output\_load\_balancer\_log\_bucket)| Name of bucket where Load Balancer logs are stored (if enabled) |
437
435
| <aname="output_load_balancers"></a> [load\_balancers](#output\_load\_balancers)| Elastic Load Balancers in use by this environment |
438
436
| <aname="output_name"></a> [name](#output\_name)| Name of the Elastic Beanstalk environment |
439
437
| <aname="output_queues"></a> [queues](#output\_queues)| SQS queues in use by this environment |
@@ -594,8 +592,8 @@ Check out [our other projects][github], [follow us on twitter][twitter], [apply
| <aname="input_elb_scheme"></a> [elb\_scheme](#input\_elb\_scheme)| Specify `internal` if you want to create an internal load balancer in your Amazon VPC so that your Elastic Beanstalk application cannot be accessed from outside your Amazon VPC |`string`|`"public"`| no |
91
92
| <aname="input_enable_capacity_rebalancing"></a> [enable\_capacity\_rebalancing](#input\_enable\_capacity\_rebalancing)| Specifies whether to enable the Capacity Rebalancing feature for Spot Instances in your Auto Scaling Group |`bool`|`false`| no |
93
+
| <aname="input_enable_loadbalancer_logs"></a> [enable\_loadbalancer\_logs](#input\_enable\_loadbalancer\_logs)| Whether to enable Load Balancer Logging to the S3 bucket. |`bool`|`true`| no |
92
94
| <aname="input_enable_log_publication_control"></a> [enable\_log\_publication\_control](#input\_enable\_log\_publication\_control)| Copy the log files for your application's Amazon EC2 instances to the Amazon S3 bucket associated with your application |`bool`|`false`| no |
93
95
| <aname="input_enable_spot_instances"></a> [enable\_spot\_instances](#input\_enable\_spot\_instances)| Enable Spot Instance requests for your environment |`bool`|`false`| no |
94
96
| <aname="input_enable_stream_logs"></a> [enable\_stream\_logs](#input\_enable\_stream\_logs)| Whether to create groups in CloudWatch Logs for proxy and deployment logs, and stream logs from each instance in your environment |`bool`|`false`| no |
@@ -149,7 +151,6 @@
149
151
| <aname="input_root_volume_throughput"></a> [root\_volume\_throughput](#input\_root\_volume\_throughput)| The type of the EBS root volume (only applies for gp3 type) |`number`|`null`| no |
150
152
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| The type of the EBS root volume |`string`|`"gp2"`| no |
151
153
| <aname="input_s3_bucket_access_log_bucket_name"></a> [s3\_bucket\_access\_log\_bucket\_name](#input\_s3\_bucket\_access\_log\_bucket\_name)| Name of the S3 bucket where s3 access log will be sent to |`string`|`""`| no |
152
-
| <aname="input_s3_bucket_encryption_enabled"></a> [s3\_bucket\_encryption\_enabled](#input\_s3\_bucket\_encryption\_enabled)| When set to 'true' the resource will have aes256 encryption enabled by default |`bool`|`true`| no |
153
154
| <aname="input_s3_bucket_versioning_enabled"></a> [s3\_bucket\_versioning\_enabled](#input\_s3\_bucket\_versioning\_enabled)| When set to 'true' the s3 origin bucket will have versioning enabled |`bool`|`true`| no |
154
155
| <aname="input_scheduled_actions"></a> [scheduled\_actions](#input\_scheduled\_actions)| Define a list of scheduled actions | <pre>list(object({<br> name = string<br> minsize = string<br> maxsize = string<br> desiredcapacity = string<br> starttime = string<br> endtime = string<br> recurrence = string<br> suspend = bool<br> }))</pre> |`[]`| no |
155
156
| <aname="input_security_group_create_before_destroy"></a> [security\_group\_create\_before\_destroy](#input\_security\_group\_create\_before\_destroy)| Set `true` to enable Terraform `create_before_destroy` behavior on the created security group.<br>We recommend setting this `true` on new security groups, but default it to `false` because `true`<br>will cause existing security groups to be replaced, possibly requiring the resource to be deleted and recreated.<br>Note that changing this value will always cause the security group to be replaced. |`bool`|`false`| no |
@@ -189,6 +190,7 @@
189
190
| <aname="output_id"></a> [id](#output\_id)| ID of the Elastic Beanstalk environment |
190
191
| <aname="output_instances"></a> [instances](#output\_instances)| Instances used by this environment |
191
192
| <aname="output_launch_configurations"></a> [launch\_configurations](#output\_launch\_configurations)| Launch configurations in use by this environment |
193
+
| <aname="output_load_balancer_log_bucket"></a> [load\_balancer\_log\_bucket](#output\_load\_balancer\_log\_bucket)| Name of bucket where Load Balancer logs are stored (if enabled) |
192
194
| <aname="output_load_balancers"></a> [load\_balancers](#output\_load\_balancers)| Elastic Load Balancers in use by this environment |
193
195
| <aname="output_name"></a> [name](#output\_name)| Name of the Elastic Beanstalk environment |
194
196
| <aname="output_queues"></a> [queues](#output\_queues)| SQS queues in use by this environment |
0 commit comments