variables.tf (384 lines of code) (raw):

variable "backup_subnet_cidr" { type = string description = "The backup subnet CIDR of the cluster." validation { condition = can(regex("^(\\d+\\.){3}\\d+\\/\\d+$", var.backup_subnet_cidr)) error_message = "The backup subnet CIDR must be in the format 'XXX.XXX.XXX.XXX/XX'." } } variable "cloud_exadata_infrastructure_id" { type = string description = "The cloud Exadata infrastructure ID." } variable "cluster_name" { type = string description = "The name of the the VM Cluster." validation { condition = can(regex("^[a-z0-9-]{3,11}$", var.cluster_name)) error_message = "The name must be between 3 and 11 characters long and can only contain lowercase letters, numbers and hyphens." } } variable "cpu_core_count" { type = number description = "The CPU core count of the cluster." validation { condition = var.cpu_core_count >= 4 error_message = "The CPU core count must be greater or equal than 4." } } variable "data_storage_size_in_tbs" { type = number description = "The data storage size in TBs." } variable "dbnode_storage_size_in_gbs" { type = number description = "The DB node storage size in GBs." } variable "hostname" { type = string description = "The hostname of the cluster." } variable "location" { type = string description = "Azure region where the resource should be deployed." nullable = false } variable "memory_size_in_gbs" { type = number description = "The memory size in GBs." } variable "resource_group_id" { type = string description = "The resource group ID where the resources will be deployed." nullable = false } variable "ssh_public_keys" { type = list(string) description = "The SSH public keys of the cluster." } variable "subnet_id" { type = string description = "The subnet ID." } variable "vnet_id" { type = string description = "The VNet ID." } # required AVM interfaces # remove only if not supported by the resource # tflint-ignore: terraform_unused_declarations variable "customer_managed_key" { type = object({ key_vault_resource_id = string key_name = string key_version = optional(string, null) user_assigned_identity = optional(object({ resource_id = string }), null) }) default = null description = <<DESCRIPTION A map describing customer-managed keys to associate with the resource. This includes the following properties: - `key_vault_resource_id` - The resource ID of the Key Vault where the key is stored. - `key_name` - The name of the key. - `key_version` - (Optional) The version of the key. If not specified, the latest version is used. - `user_assigned_identity` - (Optional) An object representing a user-assigned identity with the following properties: - `resource_id` - The resource ID of the user-assigned identity. DESCRIPTION } variable "data_storage_percentage" { type = number default = 100 description = "The data storage percentage of the cluster." validation { condition = var.data_storage_percentage >= 0 && var.data_storage_percentage <= 100 error_message = "The percentage must be a number between 0 and 100." } } variable "db_servers" { type = list(string) default = [] description = "DB servers of the cluster, if not specified, the default DB servers from the Exadata Infrastructure will be used." } # tflint-ignore: terraform_unused_declarations variable "diagnostic_settings" { type = map(object({ name = optional(string, null) log_categories = optional(set(string), []) log_groups = optional(set(string), ["allLogs"]) metric_categories = optional(set(string), ["AllMetrics"]) log_analytics_destination_type = optional(string, "Dedicated") workspace_resource_id = optional(string, null) storage_account_resource_id = optional(string, null) event_hub_authorization_rule_resource_id = optional(string, null) event_hub_name = optional(string, null) marketplace_partner_resource_id = optional(string, null) })) default = {} description = <<DESCRIPTION A map of diagnostic settings to create on the Key Vault. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - `name` - (Optional) The name of the diagnostic setting. One will be generated if not set, however this will not be unique if you want to create multiple diagnostic setting resources. - `log_categories` - (Optional) A set of log categories to send to the log analytics workspace. Defaults to `[]`. - `log_groups` - (Optional) A set of log groups to send to the log analytics workspace. Defaults to `["allLogs"]`. - `metric_categories` - (Optional) A set of metric categories to send to the log analytics workspace. Defaults to `["AllMetrics"]`. - `log_analytics_destination_type` - (Optional) The destination type for the diagnostic setting. Possible values are `Dedicated` and `AzureDiagnostics`. Defaults to `Dedicated`. - `workspace_resource_id` - (Optional) The resource ID of the log analytics workspace to send logs and metrics to. - `storage_account_resource_id` - (Optional) The resource ID of the storage account to send logs and metrics to. - `event_hub_authorization_rule_resource_id` - (Optional) The resource ID of the event hub authorization rule to send logs and metrics to. - `event_hub_name` - (Optional) The name of the event hub. If none is specified, the default event hub will be selected. - `marketplace_partner_resource_id` - (Optional) The full ARM resource ID of the Marketplace resource to which you would like to send Diagnostic LogsLogs. DESCRIPTION nullable = false validation { condition = alltrue([for _, v in var.diagnostic_settings : contains(["Dedicated", "AzureDiagnostics"], v.log_analytics_destination_type)]) error_message = "Log analytics destination type must be one of: 'Dedicated', 'AzureDiagnostics'." } validation { condition = alltrue( [ for _, v in var.diagnostic_settings : v.workspace_resource_id != null || v.storage_account_resource_id != null || v.event_hub_authorization_rule_resource_id != null || v.marketplace_partner_resource_id != null ] ) error_message = "At least one of `workspace_resource_id`, `storage_account_resource_id`, `marketplace_partner_resource_id`, or `event_hub_authorization_rule_resource_id`, must be set." } } variable "domain" { type = string default = null description = "The domain of the cluster." } variable "enable_telemetry" { type = bool default = true description = <<DESCRIPTION This variable controls whether or not telemetry is enabled for the module. For more information see <https://aka.ms/avm/telemetryinfo>. If it is set to false, then no telemetry will be collected. DESCRIPTION nullable = false } variable "gi_version" { type = string default = "19.0.0.0" description = "The GI version of the cluster." validation { condition = can(regex("^(\\d+\\.){2}\\d+\\.\\d+$", var.gi_version)) error_message = "The GI version must be in the format 'XX.XX.XX.XX'." } } variable "is_diagnostic_events_enabled" { type = bool default = false description = "The diagnostic events enabled status of the cluster." } variable "is_health_monitoring_enabled" { type = bool default = false description = "The health monitoring enabled status of the cluster." } variable "is_incident_logs_enabled" { type = bool default = false description = "The incident logs enabled status of the cluster." } variable "is_local_backup_enabled" { type = bool default = false description = "The local backup enabled status of the cluster." } variable "is_sparse_diskgroup_enabled" { type = bool default = false description = "The sparse diskgroup enabled status of the cluster." } variable "license_model" { type = string default = "LicenseIncluded" description = "The license model of the cluster." validation { condition = var.license_model == "LicenseIncluded" || var.license_model == "BringYourOwnLicense" error_message = "The license model must be either 'LicenseIncluded' or 'BringYourOwnLicense'." } } # tflint-ignore: terraform_unused_declarations variable "lock" { type = object({ kind = string name = optional(string, null) }) default = null description = <<DESCRIPTION Controls the Resource Lock configuration for this resource. The following properties can be specified: - `kind` - (Required) The type of lock. Possible values are `\"CanNotDelete\"` and `\"ReadOnly\"`. - `name` - (Optional) The name of the lock. If not specified, a name will be generated based on the `kind` value. Changing this forces the creation of a new resource. DESCRIPTION validation { condition = var.lock != null ? contains(["CanNotDelete", "ReadOnly"], var.lock.kind) : true error_message = "The lock level must be one of: 'None', 'CanNotDelete', or 'ReadOnly'." } } # tflint-ignore: terraform_unused_declarations variable "managed_identities" { type = object({ system_assigned = optional(bool, false) user_assigned_resource_ids = optional(set(string), []) }) default = {} description = <<DESCRIPTION Controls the Managed Identity configuration on this resource. The following properties can be specified: - `system_assigned` - (Optional) Specifies if the System Assigned Managed Identity should be enabled. - `user_assigned_resource_ids` - (Optional) Specifies a list of User Assigned Managed Identity resource IDs to be assigned to this resource. DESCRIPTION nullable = false } variable "nsg_cidrs" { type = set(object({ source = string destination_port_range = object({ min = string max = string }) })) default = null description = <<DESCRIPTION Add additional Network ingress rules for the network security group of the VM cluster: - `source` - The source IP address range. - `destination_port_range` - The destination port range. The following properties can be specified: - `min` - The minimum port number. - `max` - The maximum port number. example: nsg_cidrs = [{ source = 0.0.0.0/0 destination_port_range = { min = "1521" max = "1522" } }] DESCRIPTION } # tflint-ignore: terraform_unused_declarations variable "private_endpoints" { type = map(object({ name = optional(string, null) role_assignments = optional(map(object({ role_definition_id_or_name = string principal_id = string description = optional(string, null) skip_service_principal_aad_check = optional(bool, false) condition = optional(string, null) condition_version = optional(string, null) delegated_managed_identity_resource_id = optional(string, null) principal_type = optional(string, null) })), {}) lock = optional(object({ kind = string name = optional(string, null) }), null) tags = optional(map(string), null) subnet_resource_id = string subresource_name = string # NOTE: `subresource_name` can be excluded if the resource does not support multiple sub resource types (e.g. storage account supports blob, queue, etc) private_dns_zone_group_name = optional(string, "default") private_dns_zone_resource_ids = optional(set(string), []) application_security_group_associations = optional(map(string), {}) private_service_connection_name = optional(string, null) network_interface_name = optional(string, null) location = optional(string, null) resource_group_name = optional(string, null) ip_configurations = optional(map(object({ name = string private_ip_address = string })), {}) })) default = {} description = <<DESCRIPTION A map of private endpoints to create on the Key Vault. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - `name` - (Optional) The name of the private endpoint. One will be generated if not set. - `role_assignments` - (Optional) A map of role assignments to create on the private endpoint. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. See `var.role_assignments` for more information. - `role_definition_id_or_name` - The ID or name of the role definition to assign to the principal. - `principal_id` - The ID of the principal to assign the role to. - `description` - (Optional) The description of the role assignment. - `skip_service_principal_aad_check` - (Optional) If set to true, skips the Azure Active Directory check for the service principal in the tenant. Defaults to false. - `condition` - (Optional) The condition which will be used to scope the role assignment. - `condition_version` - (Optional) The version of the condition syntax. Leave as `null` if you are not using a condition, if you are then valid values are '2.0'. - `delegated_managed_identity_resource_id` - (Optional) The delegated Azure Resource Id which contains a Managed Identity. Changing this forces a new resource to be created. This field is only used in cross-tenant scenario. - `principal_type` - (Optional) The type of the `principal_id`. Possible values are `User`, `Group` and `ServicePrincipal`. It is necessary to explicitly set this attribute when creating role assignments if the principal creating the assignment is constrained by ABAC rules that filters on the PrincipalType attribute. - `lock` - (Optional) The lock level to apply to the private endpoint. Default is `None`. Possible values are `None`, `CanNotDelete`, and `ReadOnly`. - `kind` - (Required) The type of lock. Possible values are `\"CanNotDelete\"` and `\"ReadOnly\"`. - `name` - (Optional) The name of the lock. If not specified, a name will be generated based on the `kind` value. Changing this forces the creation of a new resource. - `tags` - (Optional) A mapping of tags to assign to the private endpoint. - `subnet_resource_id` - The resource ID of the subnet to deploy the private endpoint in. - `subresource_name` - The name of the sub resource for the private endpoint. - `private_dns_zone_group_name` - (Optional) The name of the private DNS zone group. One will be generated if not set. - `private_dns_zone_resource_ids` - (Optional) A set of resource IDs of private DNS zones to associate with the private endpoint. If not set, no zone groups will be created and the private endpoint will not be associated with any private DNS zones. DNS records must be managed external to this module. - `application_security_group_resource_ids` - (Optional) A map of resource IDs of application security groups to associate with the private endpoint. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - `private_service_connection_name` - (Optional) The name of the private service connection. One will be generated if not set. - `network_interface_name` - (Optional) The name of the network interface. One will be generated if not set. - `location` - (Optional) The Azure location where the resources will be deployed. Defaults to the location of the resource group. - `resource_group_name` - (Optional) The resource group where the resources will be deployed. Defaults to the resource group of the Key Vault. - `ip_configurations` - (Optional) A map of IP configurations to create on the private endpoint. If not specified the platform will create one. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - `name` - The name of the IP configuration. - `private_ip_address` - The private IP address of the IP configuration. DESCRIPTION nullable = false } # This variable is used to determine if the private_dns_zone_group block should be included, # or if it is to be managed externally, e.g. using Azure Policy. # https://github.com/Azure/terraform-azurerm-avm-res-keyvault-vault/issues/32 # Alternatively you can use AzAPI, which does not have this issue. # tflint-ignore: terraform_unused_declarations variable "private_endpoints_manage_dns_zone_group" { type = bool default = true description = "Whether to manage private DNS zone groups with this module. If set to false, you must manage private DNS zone groups externally, e.g. using Azure Policy." nullable = false } # tflint-ignore: terraform_unused_declarations variable "role_assignments" { type = map(object({ role_definition_id_or_name = string principal_id = string description = optional(string, null) skip_service_principal_aad_check = optional(bool, false) condition = optional(string, null) condition_version = optional(string, null) delegated_managed_identity_resource_id = optional(string, null) principal_type = optional(string, null) })) default = {} description = <<DESCRIPTION A map of role assignments to create on this resource. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - `role_definition_id_or_name` - The ID or name of the role definition to assign to the principal. - `principal_id` - The ID of the principal to assign the role to. - `description` - The description of the role assignment. - `skip_service_principal_aad_check` - If set to true, skips the Azure Active Directory check for the service principal in the tenant. Defaults to false. - `condition` - The condition which will be used to scope the role assignment. - `condition_version` - The version of the condition syntax. Valid values are '2.0'. > Note: only set `skip_service_principal_aad_check` to true if you are assigning a role to a service principal. DESCRIPTION nullable = false } variable "scan_listener_port_tcp" { type = number default = 1521 description = "The TCP Single Client Access Name (SCAN) port. The default port is 1521." } variable "scan_listener_port_tcp_ssl" { type = number default = 2484 description = "The TCP Single Client Access Name (SCAN) port for SSL. The default port is 2484." } variable "system_version" { type = string default = "24.1.8.0.0.250130" description = "Operating system version of the image." validation { condition = can(regex("^(\\d+\\.){5}\\d{6}$", var.system_version)) error_message = "The system version must be in the format 'XX.XX.XX.XX.XX.XXXXXX'." } } # tflint-ignore: terraform_unused_declarations variable "tags" { type = map(string) default = null description = "(Optional) Tags of the resource." } variable "time_zone" { type = string default = "UTC" description = "The time zone of the cluster." }