Browse the Repo

file-type-icon.circleci
file-type-iconexamples
file-type-iconmodules
file-type-iconkinesis
file-type-iconsns
file-type-iconsqs
file-type-iconREADME.md
file-type-iconmain.tf
file-type-iconoutputs.tf
file-type-iconvars.tf
file-type-icontest
file-type-icon.gitignore
file-type-iconCODEOWNERS
file-type-iconLICENSE.txt
file-type-iconREADME.md

Browse the Repo

file-type-icon.circleci
file-type-iconexamples
file-type-iconmodules
file-type-iconkinesis
file-type-iconsns
file-type-iconsqs
file-type-iconREADME.md
file-type-iconmain.tf
file-type-iconoutputs.tf
file-type-iconvars.tf
file-type-icontest
file-type-icon.gitignore
file-type-iconCODEOWNERS
file-type-iconLICENSE.txt
file-type-iconREADME.md
SQS

SQS

Create SQS queues with support for FIFO, message retention, message delays, content-based deduplication, dead-letter queues, and access controls.

Code Preview

Preview the Code

mobile file icon

vars.tf

down
  • # ---------------------------------------------------------------------------------------------------------------------
  • # REQUIRED PARAMETERS
  • # These variables are expected to be passed in by the operator when calling this terraform module
  • # ---------------------------------------------------------------------------------------------------------------------
  • variable "name" {
  • description = "The name of the queue. Note that this module may append '.fifo' to this name depending on the value of var.fifo_queue."
  • type = string
  • }
  • # ---------------------------------------------------------------------------------------------------------------------
  • # OPTIONAL MODULE PARAMETERS
  • # These variables have defaults, but may be overridden by the operator.
  • # ---------------------------------------------------------------------------------------------------------------------
  • # NOTE
  • # If var.apply_ip_queue_policy = true anonymous access will be allowed from any IP within var.allowed_cidr_blocks
  • # For more restrictive policies set var.apply_ip_queue_policy = false and add a custom policy outside of this module.
  • variable "allowed_cidr_blocks" {
  • description = "A list of CIDR-formatted IP address ranges that are allowed to access this queue. Required when var.apply_ip_queue_policy = true."
  • type = list(string)
  • # If var.apply_ip_queue_policy = true, a VALID CDIR block must be provided (e.g. "0.0.0.0/0")
  • default = []
  • }

Questions? Ask away.

We're here to talk about our services, answer any questions, give advice, or just to chat.

Ready to hand off the Gruntwork?