Resource Creation Controls
Determines whether resources will be created (affects all resources). Default:
true.Cluster
Name of the ECS cluster (up to 255 letters, numbers, hyphens, and underscores). Default:
"".The execute command configuration for the cluster.Default: sets
cloud_watch_log_group_name = "placeholder".Default Service Connect namespace for the cluster.Default:
null.Cluster settings. Used to enable Container Insights. Default:
[{ name = "containerInsights", value = "enabled" }].Capacity Providers
List of capacity provider names (e.g.,
["FARGATE", "FARGATE_SPOT"]) to associate with the cluster. Providers created by this module are automatically added. Default: [].Duration to wait after the cluster becomes active before attaching capacity providers. Default:
"20s".Default capacity provider strategy for the cluster.Default:
{}.Map of capacity provider definitions to create.Default:
{}.CloudWatch Logging
Create a CloudWatch log group for cluster logs. Default:
true.Custom CloudWatch Log Group name. Default:
null.Log retention in days. Default:
90.KMS Key ARN for log group encryption. Default:
null.Log class:
STANDARD or INFREQUENT_ACCESS. Default: null.Additional tags for the log group. Default:
{}.IAM — Infrastructure Role
Create the ECS infrastructure IAM role. Default:
true.Name for the infrastructure IAM role. Default:
null.Use name as prefix. Default:
true.IAM role path. Default:
null.Role description. Default:
null.Permissions boundary ARN. Default:
null.Policy documents merged into role (unique sids). Default:
[].Policy documents that override matching statements. Default:
[].Custom IAM policy statements. Default:
null.Additional tags. Default:
{}.IAM — Task Execution Role
Create a cluster-level task execution IAM role. Default:
false.Name for the task execution role. Default:
null.Use name as prefix. Default:
true.IAM role path. Default:
null.Role description. Default:
null.Permissions boundary ARN. Default:
null.Policy ARNs to attach. Default:
{}.Additional tags. Default:
{}.Create the task execution policy with ECR pull, CloudWatch logging, Secrets Manager, and SSM access. Default:
true.Secrets Manager ARNs the execution role can read. Default:
[].SSM parameter ARNs the execution role can read. Default:
[].Custom IAM statements for the execution role. Default:
null.IAM — Node Role (Managed Instances)
Create an IAM instance profile for Managed Instances nodes. Default:
true.Name for the node IAM role/instance profile. Default:
null.Use name as prefix. Default:
true.IAM role path. Default:
null.Role description. Default:
"ECS Managed Instances node IAM role".Permissions boundary ARN. Default:
null.Additional policy ARNs to attach. Default:
{}.Policy documents merged into node role. Default:
[].Policy documents that override matching statements. Default:
[].Custom IAM statements for the node role. Default:
null.Additional tags. Default:
{}.Security Group (Managed Instances)
Create a security group for Managed Instances. Default:
true.Security group name. Default:
null.Use name as prefix. Default:
true.Security group description. Default:
null.Ingress rules for the security group. Default:
{}.Egress rules. Default includes allow-all IPv4 and IPv6.
Additional tags. Default:
{}.VPC ID for the security group. Default:
null.Misc
AWS region. Defaults to provider region. Default:
null.Tags for all resources. Default:
{}.Deprecated — will be removed in v8.0. Disables v7.0 name/description postfixes. Default:
false.
