You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_certificate_arn"></a> [certificate\_arn](#input\_certificate\_arn)| SSL certificate ARN. The certificate will be used by the UI load balancer.|`string`| n/a | yes |
| <aname="input_datastore_s3_bucket_kms_key_arn"></a> [datastore\_s3\_bucket\_kms\_key\_arn](#input\_datastore\_s3\_bucket\_kms\_key\_arn)| The ARN of the KMS key used to encrypt the Metaflow datastore S3 bucket |`string`| n/a | yes |
17
17
| <aname="input_extra_ui_backend_env_vars"></a> [extra\_ui\_backend\_env\_vars](#input\_extra\_ui\_backend\_env\_vars)| Additional environment variables for UI backend container |`map(string)`|`{}`| no |
18
18
| <aname="input_extra_ui_static_env_vars"></a> [extra\_ui\_static\_env\_vars](#input\_extra\_ui\_static\_env\_vars)| Additional environment variables for UI static app |`map(string)`|`{}`| no |
19
-
| <aname="input_fargate_execution_role_arn"></a> [fargate\_execution\_role\_arn](#input\_fargate\_execution\_role\_arn)|The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution\_role for our Fargate instance|`string`| n/a | yes |
19
+
| <aname="input_fargate_execution_role_arn"></a> [fargate\_execution\_role\_arn](#input\_fargate\_execution\_role\_arn)|This role allows Fargate to pull container images and logs. We'll use it as execution\_role for our Fargate task|`string`| n/a | yes |
20
20
| <aname="input_iam_partition"></a> [iam\_partition](#input\_iam\_partition)| IAM Partition (Select aws-us-gov for AWS GovCloud, otherwise leave as is) |`string`|`"aws"`| no |
21
21
| <aname="input_is_gov"></a> [is\_gov](#input\_is\_gov)| Set to true if IAM partition is 'aws-us-gov' |`bool`|`false`| no |
22
-
| <aname="input_metadata_service_security_group_id"></a> [metadata\_service\_security\_group\_id](#input\_metadata\_service\_security\_group\_id)| The security group ID used by the MetaData service. We'll grant this access to our DB. |`string`| n/a | yes |
23
-
| <aname="input_metaflow_vpc_id"></a> [metaflow\_vpc\_id](#input\_metaflow\_vpc\_id)|ID of the Metaflow VPC this SageMaker notebook instance is to be deployed in|`string`| n/a | yes |
22
+
| <aname="input_metadata_service_security_group_id"></a> [metadata\_service\_security\_group\_id](#input\_metadata\_service\_security\_group\_id)| The security group ID used by the MetaData service. This security group should allow connections to the RDS instance. |`string`| n/a | yes |
| <aname="input_rds_master_instance_endpoint"></a> [rds\_master\_instance\_endpoint](#input\_rds\_master\_instance\_endpoint)| The database connection endpoint in address:port format |`string`| n/a | yes |
25
25
| <aname="input_resource_prefix"></a> [resource\_prefix](#input\_resource\_prefix)| Prefix given to all AWS resources to differentiate between applications |`string`| n/a | yes |
26
26
| <aname="input_resource_suffix"></a> [resource\_suffix](#input\_resource\_suffix)| Suffix given to all AWS resources to differentiate between environment and workspace |`string`| n/a | yes |
27
-
| <aname="input_s3_bucket_arn"></a> [s3\_bucket\_arn](#input\_s3\_bucket\_arn)| The ARN of the bucket we'll be using as blob storage|`string`| n/a | yes |
27
+
| <aname="input_s3_bucket_arn"></a> [s3\_bucket\_arn](#input\_s3\_bucket\_arn)| The ARN of the bucket used for Metaflow datastore|`string`| n/a | yes |
28
28
| <aname="input_standard_tags"></a> [standard\_tags](#input\_standard\_tags)| The standard tags to apply to every AWS resource. |`map(string)`| n/a | yes |
29
29
| <aname="input_subnet1_id"></a> [subnet1\_id](#input\_subnet1\_id)| First private subnet used for availability zone redundancy |`string`| n/a | yes |
30
30
| <aname="input_subnet2_id"></a> [subnet2\_id](#input\_subnet2\_id)| Second private subnet used for availability zone redundancy |`string`| n/a | yes |
description="The IAM role that grants access to ECS and Batch services which we'll use as our Metadata Service API's execution_role for our Fargate instance"
19
+
description="This role allows Fargate to pull container images and logs. We'll use it as execution_role for our Fargate task"
20
20
}
21
21
22
22
variable"iam_partition" {
@@ -33,7 +33,7 @@ variable "is_gov" {
33
33
34
34
variable"metaflow_vpc_id" {
35
35
type=string
36
-
description="ID of the Metaflow VPC this SageMaker notebook instance is to be deployed in"
0 commit comments