You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ pre-commit run --all-files
73
73
| <aname="input_ui_allow_list"></a> [ui\_allow\_list](#input\_ui\_allow\_list)| List of CIDRs we want to grant access to our Metaflow UI Service. Usually this is our VPN's CIDR blocks. |`list(string)`|`[]`| no |
74
74
| <aname="input_ui_certificate_arn"></a> [ui\_certificate\_arn](#input\_ui\_certificate\_arn)| SSL certificate for UI. If no certificate arn is provided, HTTP will be used. |`string`|`null`| no |
75
75
| <aname="input_ui_static_container_image"></a> [ui\_static\_container\_image](#input\_ui\_static\_container\_image)| Container image for the UI frontend app |`string`|`""`| no |
76
-
| <aname="input_vpc_cidr_block"></a> [vpc\_cidr\_block](#input\_vpc\_cidr\_block)| The VPC CIDR block that we'll access list on our Metadata Service API to allow all internal communications |`string`| n/a | yes |
76
+
| <aname="input_vpc_cidr_blocks"></a> [vpc\_cidr\_blocks](#input\_vpc\_cidr\_blocks)| The VPC CIDR blocks that we'll access list on our Metadata Service API to allow all internal communications |`list(string)`| n/a | yes |
77
77
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The id of the single VPC we stood up for all Metaflow resources to exist in. |`string`| n/a | yes |
| <aname="input_access_list_cidr_blocks"></a> [access\_list\_cidr\_blocks](#input\_access\_list\_cidr\_blocks)| List of CIDRs we want to grant access to our Metaflow Metadata Service. Usually this is our VPN's CIDR blocks. |`list(string)`| n/a | yes |
19
19
| <aname="input_api_basic_auth"></a> [api\_basic\_auth](#input\_api\_basic\_auth)| Enable basic auth for API Gateway? (requires key export) |`bool`|`true`| no |
20
+
| <aname="input_database_name"></a> [database\_name](#input\_database\_name)| The database name |`string`|`"metaflow"`| no |
20
21
| <aname="input_database_password_secret_manager_arn"></a> [database\_password\_secret\_manager\_arn](#input\_database\_password\_secret\_manager\_arn)| The arn of the database password stored in AWS secrets manager |`string`| n/a | yes |
| <aname="input_datastore_s3_bucket_kms_key_arn"></a> [datastore\_s3\_bucket\_kms\_key\_arn](#input\_datastore\_s3\_bucket\_kms\_key\_arn)| The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket |`string`| n/a | yes |
23
24
| <aname="input_ecs_cluster_id"></a> [ecs\_cluster\_id](#input\_ecs\_cluster\_id)| The ID of an existing ECS cluster to run services on. If no cluster ID is specfied, a new cluster will be created. |`string`|`null`| no |
24
25
| <aname="input_fargate_execution_role_arn"></a> [fargate\_execution\_role\_arn](#input\_fargate\_execution\_role\_arn)| The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution\_role for our Fargate instance |`string`| n/a | yes |
25
26
| <aname="input_iam_partition"></a> [iam\_partition](#input\_iam\_partition)| IAM Partition (Select aws-us-gov for AWS GovCloud, otherwise leave as is) |`string`|`"aws"`| no |
26
27
| <aname="input_is_gov"></a> [is\_gov](#input\_is\_gov)| Set to true if IAM partition is 'aws-us-gov' |`bool`|`false`| no |
27
-
| <aname="input_metadata_service_container_image"></a> [metadata\_service\_container\_image](#input\_metadata\_service\_container\_image)| Container image for metadata service |`string`|`""`| no |
28
+
| <aname="input_metadata_service_container_image"></a> [metadata\_service\_container\_image](#input\_metadata\_service\_container\_image)| Container image for metadata service |`string`| n/a | yes |
29
+
| <aname="input_metadata_service_cpu"></a> [metadata\_service\_cpu](#input\_metadata\_service\_cpu)| ECS task CPU unit for metadata service |`number`|`512`| no |
30
+
| <aname="input_metadata_service_memory"></a> [metadata\_service\_memory](#input\_metadata\_service\_memory)| ECS task memory in MiB for metadata service |`number`|`1024`| no |
28
31
| <aname="input_metaflow_vpc_id"></a> [metaflow\_vpc\_id](#input\_metaflow\_vpc\_id)| ID of the Metaflow VPC this SageMaker notebook instance is to be deployed in |`string`| n/a | yes |
29
32
| <aname="input_rds_master_instance_endpoint"></a> [rds\_master\_instance\_endpoint](#input\_rds\_master\_instance\_endpoint)| The database connection endpoint in address:port format |`string`| n/a | yes |
30
33
| <aname="input_resource_prefix"></a> [resource\_prefix](#input\_resource\_prefix)| Prefix given to all AWS resources to differentiate between applications |`string`| n/a | yes |
@@ -33,7 +36,8 @@ If the `access_list_cidr_blocks` variable is set, only traffic originating from
33
36
| <aname="input_standard_tags"></a> [standard\_tags](#input\_standard\_tags)| The standard tags to apply to every AWS resource. |`map(string)`| n/a | yes |
34
37
| <aname="input_subnet1_id"></a> [subnet1\_id](#input\_subnet1\_id)| First private subnet used for availability zone redundancy |`string`| n/a | yes |
35
38
| <aname="input_subnet2_id"></a> [subnet2\_id](#input\_subnet2\_id)| Second private subnet used for availability zone redundancy |`string`| n/a | yes |
36
-
| <aname="input_vpc_cidr_block"></a> [vpc\_cidr\_block](#input\_vpc\_cidr\_block)| The VPC CIDR block that we'll access list on our Metadata Service API to allow all internal communications |`string`| n/a | yes |
39
+
| <aname="input_vpc_cidr_blocks"></a> [vpc\_cidr\_blocks](#input\_vpc\_cidr\_blocks)| The VPC CIDR blocks that we'll access list on our Metadata Service API to allow all internal communications |`list(string)`| n/a | yes |
40
+
| <aname="input_with_public_ip"></a> [with\_public\_ip](#input\_with\_public\_ip)| Enable private IP by default |`bool`|`false`| no |
0 commit comments