diff --git a/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md b/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md
index e3d681e49..4ab996c83 100644
--- a/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md
+++ b/docs/reference/modules/terraform-aws-data-storage/aurora/aurora.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Aurora Module
-View Source
+View Source
Release Notes
@@ -59,7 +59,7 @@ Cluster](http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Aurora.Managing.h
## How do you configure this module?
This module allows you to configure a number of parameters, such as backup windows, maintenance window, port number,
-and encryption. For a list of all available variables and their descriptions, see [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/aurora/variables.tf).
+and encryption. For a list of all available variables and their descriptions, see [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/modules/aurora/variables.tf).
## How do you create a cross-region read replica cluster?
@@ -77,7 +77,7 @@ module "replica" {
}
```
-See the example [here](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/aurora-with-cross-region-replica) for more details.
+See the example [here](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/examples/aurora-with-cross-region-replica) for more details.
## How do you destroy a cross-region read replica?
@@ -137,7 +137,7 @@ see [Limitations of Aurora Serverless](https://docs.aws.amazon.com/AmazonRDS/lat
module "aurora" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -619,7 +619,7 @@ module "aurora" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/aurora?ref=v1.1.0"
}
inputs = {
@@ -2017,11 +2017,11 @@ A list of identifiers for Aurora cluster instances that are writers.
diff --git a/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md b/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md
index 970bff175..e8a0b1298 100644
--- a/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md
+++ b/docs/reference/modules/terraform-aws-data-storage/backup-plan/backup-plan.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Backup Plan Module
-View Source
+View Source
Release Notes
@@ -22,7 +22,7 @@ This Terraform Module creates the following AWS Backup resources:
1. Backup plans - specifying **how and when** to back things up
2. Resource selections - specifying **which resources** to back up
-You associate your plans with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/backup-vault).
+You associate your plans with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/modules/backup-vault).
## What is a Backup Plan?
@@ -91,7 +91,7 @@ module "backup_plan" {
## How do you troubleshoot Backup jobs?
-See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/core-concepts.md#troubleshooting-aws-backup) in the core-concepts guide.
+See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/core-concepts.md#troubleshooting-aws-backup) in the core-concepts guide.
## Sample Usage
@@ -106,7 +106,7 @@ See [Troubleshooting AWS Backup](https://github.com/gruntwork-io/terraform-aws-d
module "backup_plan" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -137,7 +137,7 @@ module "backup_plan" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-plan?ref=v1.1.0"
}
inputs = {
@@ -244,11 +244,11 @@ The ARN of the IAM service role used by Backup plans
diff --git a/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md b/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md
index 35d144b7a..77c14eda1 100644
--- a/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md
+++ b/docs/reference/modules/terraform-aws-data-storage/backup-vault/backup-vault.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Backup Vault Module
-View Source
+View Source
Release Notes
@@ -115,7 +115,7 @@ then you will end up with many potentially large recovery points that you cannot
module "backup_vault" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -159,7 +159,7 @@ module "backup_vault" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/backup-vault?ref=v1.1.0"
}
inputs = {
@@ -322,11 +322,11 @@ A map of tags assigned to the vault resources, including those inherited from th
diff --git a/docs/reference/modules/terraform-aws-data-storage/dms/dms.md b/docs/reference/modules/terraform-aws-data-storage/dms/dms.md
index c6885504c..f68413059 100644
--- a/docs/reference/modules/terraform-aws-data-storage/dms/dms.md
+++ b/docs/reference/modules/terraform-aws-data-storage/dms/dms.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# DMS Module
-View Source
+View Source
Release Notes
@@ -86,10 +86,10 @@ module "dms" {
## Configuration
-* See the [root README](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/README.md) for instructions on using Terraform modules.
-* See the [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/dms/variables.tf) for all the variables you can set on this module.
-* See the [dms-mysql examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/dms-mysql/) folder for instruction on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance.
-* See the [dms-aurora examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/dms-aurora/) folder for instructions on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance.
+* See the [root README](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/README.md) for instructions on using Terraform modules.
+* See the [variables.tf](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/modules/dms/variables.tf) for all the variables you can set on this module.
+* See the [dms-mysql examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/examples/dms-mysql/) folder for instruction on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance.
+* See the [dms-aurora examples](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/examples/dms-aurora/) folder for instructions on how to setup the modules to migrate data from an AWS RDS MySQL Instance to another AWS RDS MySQL Instance.
## Key Variables
@@ -127,7 +127,7 @@ module "dms" {
module "dms" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -371,7 +371,7 @@ module "dms" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/dms?ref=v1.1.0"
}
inputs = {
@@ -1177,11 +1177,11 @@ A map of maps containing the replication tasks created and their full output of
diff --git a/docs/reference/modules/terraform-aws-data-storage/efs/efs.md b/docs/reference/modules/terraform-aws-data-storage/efs/efs.md
index 386860731..722ce129f 100644
--- a/docs/reference/modules/terraform-aws-data-storage/efs/efs.md
+++ b/docs/reference/modules/terraform-aws-data-storage/efs/efs.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# EFS Module
-View Source
+View Source
Release Notes
@@ -108,7 +108,7 @@ sudo mount -t nfs4 -o nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,ret
module "efs" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -227,7 +227,7 @@ module "efs" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/efs?ref=v1.1.0"
}
inputs = {
@@ -641,11 +641,11 @@ The IDs of the security groups created for the file system.
diff --git a/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md b/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md
index 47aa64cb5..936f763b1 100644
--- a/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md
+++ b/docs/reference/modules/terraform-aws-data-storage/opensearch/opensearch.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# OpenSearch Module
-View Source
+View Source
Release Notes
@@ -102,7 +102,7 @@ module "opensearch" {
module "opensearch" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -345,7 +345,7 @@ module "opensearch" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/opensearch?ref=v1.1.0"
}
inputs = {
@@ -1223,11 +1223,11 @@ The ID of the security group created for the OpenSearch domain. Null if not in V
diff --git a/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md b/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md
index 0aa626587..06671bfe4 100644
--- a/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md
+++ b/docs/reference/modules/terraform-aws-data-storage/org-backup-policy/org-backup-policy.md
@@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Organization Backup Policies Module
-View Source
+View Source
Release Notes
This Terraform Module creates
the [AWS Organizations Backup Policies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_backup.html).
-You associate your each plan on the backup policies with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/modules/backup-vault).
+You associate your each plan on the backup policies with a [Backup vault](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/modules/backup-vault).
## What are Backup Policies ?
@@ -42,7 +42,7 @@ account. This effective policy instructs AWS Backup how to automatically back up
module "org_backup_policy" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -155,7 +155,7 @@ module "org_backup_policy" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/org-backup-policy?ref=v1.1.0"
}
inputs = {
@@ -734,11 +734,11 @@ ID of the backup policies
diff --git a/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md b/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md
index 371c5c1e6..3bd1bbf04 100644
--- a/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md
+++ b/docs/reference/modules/terraform-aws-data-storage/rds-proxy/rds-proxy.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# RDS Proxy Module
-View Source
+View Source
-Release Notes
+Release Notes
Amazon RDS Proxy is a fully managed database proxy service that makes it easy to manage database
connections for Amazon Relational Database Service (RDS) and Amazon Aurora. It allows you to
@@ -54,7 +54,7 @@ Before using this module, you need to:
## How to use the RDS Proxy Module
In order to setup a RDS proxy, you need to setup database credentials in AWS Secrets Manager and pass it to this module.
-Refer to the [examples/rds-proxy](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.0.0/examples/rds-proxy) or [https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns) for more information.
+Refer to the [examples/rds-proxy](https://github.com/gruntwork-io/terraform-aws-data-storage/tree/v1.1.0/examples/rds-proxy) or [https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-proxy-setup.html#rds-proxy-secrets-arns) for more information.
If you use a customer managed KMS key to encrypt the secret, you will need to provide the KMS key ARN to this module
using the `db_secret_kms_key_arn` parameter.
@@ -143,7 +143,7 @@ Each authentication method can be configured with:
module "rds_proxy" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -262,7 +262,7 @@ module "rds_proxy" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-proxy?ref=v1.1.0"
}
inputs = {
@@ -632,11 +632,11 @@ The ID of the security group associated with the RDS proxy. This security group
diff --git a/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md b/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md
index c02aa14f3..7c4e64dea 100644
--- a/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md
+++ b/docs/reference/modules/terraform-aws-data-storage/rds-replicas/rds-replicas.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# RDS Read Replicas Module
-View Source
+View Source
-Release Notes
+Release Notes
This module creates a read replica (read-only copy) of a DB instance.
@@ -77,7 +77,7 @@ terraform import aws_db_instance.
module "rds_replicas" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -325,7 +325,7 @@ module "rds_replicas" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds-replicas?ref=v1.1.0"
}
inputs = {
@@ -1065,11 +1065,11 @@ The port number on which the read replicas accept connections.
diff --git a/docs/reference/modules/terraform-aws-data-storage/rds/rds.md b/docs/reference/modules/terraform-aws-data-storage/rds/rds.md
index e6fd8140d..df5d38a39 100644
--- a/docs/reference/modules/terraform-aws-data-storage/rds/rds.md
+++ b/docs/reference/modules/terraform-aws-data-storage/rds/rds.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# RDS Module
-View Source
+View Source
-Release Notes
+Release Notes
This module creates an Amazon Relational Database Service (RDS) cluster that can run MySQL, Postgres, MariaDB, Oracle,
or SQL Server. The cluster is managed by AWS and automatically handles standby failover, read replicas, backups,
@@ -159,7 +159,7 @@ Set `multi_az=true`. When setting up a multi-AZ (Availability Zone) RDS deployme
module "rds" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -611,7 +611,7 @@ module "rds" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/rds?ref=v1.1.0"
}
inputs = {
@@ -2060,11 +2060,11 @@ The ID of the security group created for the RDS instance.
diff --git a/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md b/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md
index be891634d..8b2da78c0 100644
--- a/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md
+++ b/docs/reference/modules/terraform-aws-data-storage/redshift/redshift.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Redshift Module
-View Source
+View Source
Release Notes
@@ -65,7 +65,7 @@ workaround, you can re-run the destroy command once the workspace gets deleted c
module "redshift" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.1.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -321,7 +321,7 @@ module "redshift" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.0.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-data-storage.git//modules/redshift?ref=v1.1.0"
}
inputs = {
@@ -1155,11 +1155,11 @@ The ID of the Security Group that controls access to the cluster