From ce0579c30daaf152d6c8836414d9f1acbce7c782 Mon Sep 17 00:00:00 2001 From: Sijmen Date: Mon, 4 Jan 2021 19:11:39 +0100 Subject: [PATCH] docs/provider: Fix broken links to terraform docs (#16956) Co-authored-by: Brian Flad Co-authored-by: Brian Flad --- website/docs/d/instance.html.markdown | 2 +- website/docs/d/kms_ciphertext.html.markdown | 2 +- website/docs/d/ssm_parameter.html.markdown | 2 +- website/docs/guides/resource-tagging.html.md | 6 +++--- website/docs/guides/version-3-upgrade.html.md | 20 +++++++++---------- website/docs/index.html.markdown | 6 +++--- website/docs/r/acm_certificate.html.markdown | 2 +- .../acm_certificate_validation.html.markdown | 2 +- ...acmpca_certificate_authority.html.markdown | 2 +- .../r/api_gateway_deployment.html.markdown | 4 ++-- .../r/api_gateway_domain_name.html.markdown | 2 +- .../docs/r/api_gateway_rest_api.html.markdown | 2 +- .../api_gateway_rest_api_policy.html.markdown | 2 +- .../docs/r/api_gateway_stage.html.markdown | 2 +- website/docs/r/apigatewayv2_api.html.markdown | 2 +- .../r/apigatewayv2_deployment.html.markdown | 4 ++-- .../r/apigatewayv2_domain_name.html.markdown | 2 +- .../r/autoscaling_attachment.html.markdown | 2 +- .../docs/r/autoscaling_group.html.markdown | 4 ++-- .../docs/r/cloudformation_stack.html.markdown | 2 +- .../r/cloudformation_stack_set.html.markdown | 2 +- ...formation_stack_set_instance.html.markdown | 2 +- .../r/cloudwatch_event_target.html.markdown | 4 ++-- website/docs/r/cognito_user_pool.markdown | 2 +- ...fig_organization_custom_rule.html.markdown | 2 +- ...ig_organization_managed_rule.html.markdown | 2 +- website/docs/r/datasync_agent.html.markdown | 2 +- website/docs/r/datasync_task.html.markdown | 2 +- website/docs/r/dax_cluster.html.markdown | 2 +- .../docs/r/db_cluster_snapshot.html.markdown | 2 +- .../r/db_event_subscription.html.markdown | 2 +- website/docs/r/db_instance.html.markdown | 6 +++--- website/docs/r/db_option_group.html.markdown | 2 +- website/docs/r/db_proxy.html.markdown | 2 +- ...b_proxy_default_target_group.html.markdown | 2 +- website/docs/r/db_snapshot.html.markdown | 2 +- .../docs/r/default_route_table.html.markdown | 2 +- .../directory_service_directory.html.markdown | 2 +- website/docs/r/dms_certificate.html.markdown | 2 +- website/docs/r/dms_endpoint.html.markdown | 2 +- .../r/dms_event_subscription.html.markdown | 2 +- .../r/dms_replication_instance.html.markdown | 2 +- website/docs/r/docdb_cluster.html.markdown | 4 ++-- .../r/docdb_cluster_instance.html.markdown | 4 ++-- .../r/docdb_cluster_snapshot.html.markdown | 2 +- website/docs/r/dx_bgp_peer.html.markdown | 2 +- website/docs/r/dx_gateway.html.markdown | 2 +- .../r/dx_gateway_association.html.markdown | 2 +- ...ed_private_virtual_interface.html.markdown | 2 +- ...e_virtual_interface_accepter.html.markdown | 2 +- ...ted_public_virtual_interface.html.markdown | 2 +- ...c_virtual_interface_accepter.html.markdown | 2 +- ...ed_transit_virtual_interface.html.markdown | 2 +- ...t_virtual_interface_accepter.html.markdown | 2 +- ...dx_private_virtual_interface.html.markdown | 2 +- .../dx_public_virtual_interface.html.markdown | 2 +- ...dx_transit_virtual_interface.html.markdown | 2 +- website/docs/r/dynamodb_table.html.markdown | 2 +- website/docs/r/ebs_snapshot.html.markdown | 2 +- website/docs/r/ec2_fleet.html.markdown | 2 +- website/docs/r/ecr_repository.html.markdown | 2 +- website/docs/r/ecs_service.html.markdown | 4 ++-- website/docs/r/efs_mount_target.html.markdown | 2 +- website/docs/r/eip.html.markdown | 2 +- website/docs/r/eks_cluster.html.markdown | 8 ++++---- .../docs/r/eks_fargate_profile.html.markdown | 2 +- website/docs/r/eks_node_group.html.markdown | 4 ++-- ...lasticache_replication_group.html.markdown | 4 ++-- .../docs/r/elasticsearch_domain.html.markdown | 2 +- website/docs/r/emr_cluster.html.markdown | 6 +++--- .../r/fsx_lustre_file_system.html.markdown | 4 ++-- .../r/fsx_windows_file_system.html.markdown | 4 ++-- website/docs/r/gamelift_fleet.html.markdown | 2 +- website/docs/r/glue_trigger.html.markdown | 2 +- .../r/guardduty_invite_accepter.html.markdown | 2 +- website/docs/r/guardduty_member.html.markdown | 2 +- website/docs/r/iam_role.html.markdown | 2 +- .../r/iam_server_certificate.html.markdown | 2 +- .../r/iam_user_login_profile.html.markdown | 2 +- website/docs/r/instance.html.markdown | 2 +- website/docs/r/kinesis_stream.html.markdown | 2 +- .../docs/r/kinesis_video_stream.html.markdown | 2 +- website/docs/r/kms_ciphertext.html.markdown | 2 +- website/docs/r/kms_external_key.html.markdown | 2 +- website/docs/r/lambda_function.html.markdown | 2 +- ...ovisioned_concurrency_config.html.markdown | 2 +- .../docs/r/launch_configuration.html.markdown | 4 ++-- website/docs/r/lb.html.markdown | 2 +- website/docs/r/mq_broker.html.markdown | 2 +- website/docs/r/neptune_cluster.html.markdown | 2 +- .../r/neptune_cluster_instance.html.markdown | 4 ++-- .../r/neptune_cluster_snapshot.html.markdown | 2 +- .../neptune_event_subscription.html.markdown | 2 +- website/docs/r/network_acl.html.markdown | 4 ++-- .../docs/r/opsworks_instance.html.markdown | 4 ++-- .../docs/r/opsworks_mysql_layer.html.markdown | 2 +- .../r/opsworks_rds_db_instance.html.markdown | 2 +- .../r/organizations_account.html.markdown | 4 ++-- website/docs/r/pinpoint_adm_channel.markdown | 2 +- website/docs/r/pinpoint_apns_channel.markdown | 2 +- .../r/pinpoint_apns_sandbox_channel.markdown | 2 +- .../r/pinpoint_apns_voip_channel.markdown | 2 +- ...inpoint_apns_voip_sandbox_channel.markdown | 2 +- .../docs/r/pinpoint_baidu_channel.markdown | 2 +- website/docs/r/pinpoint_gcm_channel.markdown | 2 +- website/docs/r/rds_cluster.html.markdown | 8 ++++---- .../docs/r/rds_cluster_instance.html.markdown | 6 +++--- .../docs/r/rds_global_cluster.html.markdown | 2 +- website/docs/r/redshift_cluster.html.markdown | 4 ++-- website/docs/r/route.html.markdown | 2 +- .../r/route53_resolver_endpoint.html.markdown | 2 +- website/docs/r/route53_zone.html.markdown | 2 +- .../r/route53_zone_association.html.markdown | 2 +- website/docs/r/route_table.html.markdown | 2 +- website/docs/r/security_group.html.markdown | 6 +++--- ...domain_identity_verification.html.markdown | 2 +- website/docs/r/ssm_document.html.markdown | 2 +- website/docs/r/ssm_parameter.html.markdown | 2 +- .../r/storagegateway_gateway.html.markdown | 4 ++-- ...toragegateway_nfs_file_share.html.markdown | 2 +- ...toragegateway_smb_file_share.html.markdown | 2 +- website/docs/r/subnet.html.markdown | 2 +- website/docs/r/vpc_endpoint.html.markdown | 2 +- ..._endpoint_subnet_association.html.markdown | 2 +- ..._ipv4_cidr_block_association.html.markdown | 2 +- .../r/vpc_peering_connection.html.markdown | 2 +- ..._peering_connection_accepter.html.markdown | 2 +- website/docs/r/vpn_connection.html.markdown | 2 +- .../docs/r/workspaces_workspace.html.markdown | 2 +- 129 files changed, 174 insertions(+), 174 deletions(-) diff --git a/website/docs/d/instance.html.markdown b/website/docs/d/instance.html.markdown index 9d9089df438..11e83a511fc 100644 --- a/website/docs/d/instance.html.markdown +++ b/website/docs/d/instance.html.markdown @@ -111,7 +111,7 @@ interpolation. * `subnet_id` - The VPC subnet ID. * `outpost_arn` - The Amazon Resource Name (ARN) of the Outpost. * `user_data` - SHA-1 hash of User Data supplied to the Instance. -* `user_data_base64` - Base64 encoded contents of User Data supplied to the Instance. Valid UTF-8 contents can be decoded with the [`base64decode` function](/docs/configuration/functions/base64decode.html). This attribute is only exported if `get_user_data` is true. +* `user_data_base64` - Base64 encoded contents of User Data supplied to the Instance. Valid UTF-8 contents can be decoded with the [`base64decode` function](https://www.terraform.io/docs/configuration/functions/base64decode.html). This attribute is only exported if `get_user_data` is true. * `tags` - A map of tags assigned to the Instance. * `tenancy` - The tenancy of the instance: `dedicated`, `default`, `host`. * `host_id` - The Id of the dedicated host the instance will be assigned to. diff --git a/website/docs/d/kms_ciphertext.html.markdown b/website/docs/d/kms_ciphertext.html.markdown index e7b9c50c426..5f02b4fb020 100644 --- a/website/docs/d/kms_ciphertext.html.markdown +++ b/website/docs/d/kms_ciphertext.html.markdown @@ -14,7 +14,7 @@ changes every apply. For a stable ciphertext value, see the [`aws_kms_ciphertext resource](/docs/providers/aws/r/kms_ciphertext.html). ~> **Note:** All arguments including the plaintext be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/d/ssm_parameter.html.markdown b/website/docs/d/ssm_parameter.html.markdown index cd42f7cb08c..44ea48185dd 100644 --- a/website/docs/d/ssm_parameter.html.markdown +++ b/website/docs/d/ssm_parameter.html.markdown @@ -19,7 +19,7 @@ data "aws_ssm_parameter" "foo" { ``` ~> **Note:** The unencrypted value of a SecureString will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ~> **Note:** The data source is currently following the behavior of the [SSM API](https://docs.aws.amazon.com/sdk-for-go/api/service/ssm/#Parameter) to return a string value, regardless of parameter type. For type `StringList`, we can use the built-in [split()](https://www.terraform.io/docs/configuration/functions/split.html) function to get values in a list. Example: `split(",", data.aws_ssm_parameter.subnets.value)` diff --git a/website/docs/guides/resource-tagging.html.md b/website/docs/guides/resource-tagging.html.md index 2148b3952e0..f28afb7186c 100644 --- a/website/docs/guides/resource-tagging.html.md +++ b/website/docs/guides/resource-tagging.html.md @@ -38,7 +38,7 @@ resource "aws_vpc" "example" { The tags for the resource are wholly managed by Terraform except tag keys beginning with `aws:` as these are managed by AWS services and cannot typically be edited or deleted. Any non-AWS tags added to the VPC outside of Terraform will be proposed for removal on the next Terraform execution. Missing tags or those with incorrect values from the Terraform configuration will be proposed for addition or update on the next Terraform execution. Advanced patterns that can adjust these behaviors for special use cases, such as Terraform AWS Provider configurations that affect all resources and the ability to manage resource tags for resources not managed by Terraform, can be found later in this guide. -For most environments and use cases, this is the typical implementation pattern, whether it be in a standalone Terraform configuration or within a [Terraform Module](/docs/modules/). The Terraform configuration language also enables less repetitive configurations via [variables](/docs/configuration/variables.html), [locals](/docs/configuration/locals.html), or potentially a combination of these, e.g. +For most environments and use cases, this is the typical implementation pattern, whether it be in a standalone Terraform configuration or within a [Terraform Module](https://www.terraform.io/docs/modules/). The Terraform configuration language also enables less repetitive configurations via [variables](https://www.terraform.io/docs/configuration/variables.html), [locals](https://www.terraform.io/docs/configuration/locals.html), or potentially a combination of these, e.g. ```hcl # Terraform 0.12 and later syntax @@ -67,7 +67,7 @@ Systems outside of Terraform may automatically interact with the tagging associa ### Ignoring Changes in Individual Resources -All Terraform resources support the [`lifecycle` configuration block `ignore_changes` argument](/docs/configuration/resources.html#ignore_changes), which can be used to explicitly ignore all tags changes on a resource beyond an initial configuration or individual tag values. +All Terraform resources support the [`lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes), which can be used to explicitly ignore all tags changes on a resource beyond an initial configuration or individual tag values. In this example, the `Name` tag will be added to the VPC on resource creation, however any external changes to the `Name` tag value or the addition/removal of any tag (including the `Name` tag) will be ignored: @@ -155,7 +155,7 @@ resource "aws_ec2_tag" "example" { } ``` -To manage multiple tags for a resource in this scenario, [`for_each`](/docs/configuration/resources.html#for_each-multiple-resource-instances-defined-by-a-map-or-set-of-strings) can be used: +To manage multiple tags for a resource in this scenario, [`for_each`](https://www.terraform.io/docs/configuration/meta-arguments/for_each.html) can be used: ```hcl # Terraform 0.12 and later syntax diff --git a/website/docs/guides/version-3-upgrade.html.md b/website/docs/guides/version-3-upgrade.html.md index a889be66ad0..ba3c4896032 100644 --- a/website/docs/guides/version-3-upgrade.html.md +++ b/website/docs/guides/version-3-upgrade.html.md @@ -267,7 +267,7 @@ resources that the for_each depends on. The `domain_validation_options` attribute is now a set type and the resource will attempt to populate the information necessary during the planning phase to handle the above situation in most environments without workarounds. This change also prevents Terraform from showing unexpected differences if the API returns the results in varying order. -Configuration references to this attribute will likely require updates since sets cannot be indexed (e.g. `domain_validation_options[0]` or the older `domain_validation_options.0.` syntax will return errors). If the `domain_validation_options` list previously contained only a single element like the two examples just shown, it may be possible to wrap these references using the [`tolist()` function](/docs/configuration/functions/tolist.html) (e.g. `tolist(aws_acm_certificate.example.domain_validation_options)[0]`) as a quick configuration update, however given the complexity and workarounds required with the previous `domain_validation_options` attribute implementation, different environments will require different configuration updates and migration steps. Below is a more advanced example. Further questions on potential update steps can be submitted to the [community forums](https://discuss.hashicorp.com/c/terraform-providers/tf-aws/33). +Configuration references to this attribute will likely require updates since sets cannot be indexed (e.g. `domain_validation_options[0]` or the older `domain_validation_options.0.` syntax will return errors). If the `domain_validation_options` list previously contained only a single element like the two examples just shown, it may be possible to wrap these references using the [`tolist()` function](https://www.terraform.io/docs/configuration/functions/tolist.html) (e.g. `tolist(aws_acm_certificate.example.domain_validation_options)[0]`) as a quick configuration update, however given the complexity and workarounds required with the previous `domain_validation_options` attribute implementation, different environments will require different configuration updates and migration steps. Below is a more advanced example. Further questions on potential update steps can be submitted to the [community forums](https://discuss.hashicorp.com/c/terraform-providers/tf-aws/33). For example, given this previous configuration using a `count` based resource approach that may have been used in certain environments: @@ -318,7 +318,7 @@ Error: Invalid index This value does not have any indices. ``` -Since the `domain_validation_options` attribute changed from a list to a set and sets cannot be indexed in Terraform, the recommendation is to update the configuration to use the more stable [resource `for_each` support](/docs/configuration/resources.html#for_each-multiple-resource-instances-defined-by-a-map-or-set-of-strings) instead of [`count`](/docs/configuration/resources.html#count-multiple-resource-instances-by-count). Note the slight change in the `validation_record_fqdns` syntax as well. +Since the `domain_validation_options` attribute changed from a list to a set and sets cannot be indexed in Terraform, the recommendation is to update the configuration to use the more stable [resource `for_each` support](https://www.terraform.io/docs/configuration/meta-arguments/for_each.html) instead of [`count`](https://www.terraform.io/docs/configuration/meta-arguments/count.html). Note the slight change in the `validation_record_fqdns` syntax as well. ```hcl resource "aws_route53_record" "existing" { @@ -480,11 +480,11 @@ Terraform will perform the following actions: Plan: 5 to add, 0 to change, 5 to destroy. ``` -Due to the type of configuration change, Terraform does not know that the previous `aws_route53_record` resources (indexed by number in the existing state) and the new resources (indexed by domain names in the updated configuration) are equivalent. Typically in this situation, the [`terraform state mv` command](/docs/commands/state/mv.html) can be used to reduce the plan to show no changes. This is done by associating the count index (e.g. `[1]`) with the equivalent domain name index (e.g. `["existing2.example.com"]`), making one of the four commands to fix the above example: `terraform state mv 'aws_route53_record.existing[1]' 'aws_route53_record.existing["existing2.example.com"]'`. It is recommended to use this `terraform state mv` update process where possible to reduce chances of unexpected behaviors or changes in an environment. +Due to the type of configuration change, Terraform does not know that the previous `aws_route53_record` resources (indexed by number in the existing state) and the new resources (indexed by domain names in the updated configuration) are equivalent. Typically in this situation, the [`terraform state mv` command](https://www.terraform.io/docs/commands/state/mv.html) can be used to reduce the plan to show no changes. This is done by associating the count index (e.g. `[1]`) with the equivalent domain name index (e.g. `["existing2.example.com"]`), making one of the four commands to fix the above example: `terraform state mv 'aws_route53_record.existing[1]' 'aws_route53_record.existing["existing2.example.com"]'`. It is recommended to use this `terraform state mv` update process where possible to reduce chances of unexpected behaviors or changes in an environment. If using `terraform state mv` to reduce the plan to show no changes, no additional steps are required. -In larger or more complex environments though, this process can be tedius to match the old resource address to the new resource address and run all the necessary `terraform state mv` commands. Instead, since the `aws_route53_record` resource implements the `allow_overwrite = true` argument, it is possible to just remove the old `aws_route53_record` resources from the Terraform state using the [`terraform state rm` command](/docs/commands/state/rm.html). In this case, Terraform will leave the existing records in Route 53 and plan to just overwrite the existing validation records with the same exact (previous) values. +In larger or more complex environments though, this process can be tedius to match the old resource address to the new resource address and run all the necessary `terraform state mv` commands. Instead, since the `aws_route53_record` resource implements the `allow_overwrite = true` argument, it is possible to just remove the old `aws_route53_record` resources from the Terraform state using the [`terraform state rm` command](https://www.terraform.io/docs/commands/state/rm.html). In this case, Terraform will leave the existing records in Route 53 and plan to just overwrite the existing validation records with the same exact (previous) values. -> This guide is showing the simpler `terraform state rm` option below as a potential shortcut in this specific situation, however in most other cases `terraform state mv` is required to change from `count` based resources to `for_each` based resources and properly match the existing Terraform state to the updated Terraform configuration. @@ -623,7 +623,7 @@ resource "aws_autoscaling_group" "example" { } ``` -If `aws_autoscaling_attachment` resources reference your ASG configurations, you will need to add the [`lifecycle` configuration block](/docs/configuration/resources.html#lifecycle-lifecycle-customizations) with an `ignore_changes` argument to prevent Terraform non-empty plans (i.e. forcing resource update) during the next state refresh. +If `aws_autoscaling_attachment` resources reference your ASG configurations, you will need to add the [`lifecycle` configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with an `ignore_changes` argument to prevent Terraform non-empty plans (i.e. forcing resource update) during the next state refresh. For example, given this previous configuration: @@ -843,7 +843,7 @@ resource "aws_cognito_user_pool" "example" { ### Removal of Automatic aws_dx_gateway_association Import -Previously when importing the `aws_dx_gateway` resource with the [`terraform import` command](/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_dx_gateway_association` resource(s) as well. This automatic resource import has been removed. Use the [`aws_dx_gateway_association` resource import](/docs/providers/aws/r/dx_gateway_association.html#import) to import those resources separately. +Previously when importing the `aws_dx_gateway` resource with the [`terraform import` command](https://www.terraform.io/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_dx_gateway_association` resource(s) as well. This automatic resource import has been removed. Use the [`aws_dx_gateway_association` resource import](/docs/providers/aws/r/dx_gateway_association.html#import) to import those resources separately. ## Resource: aws_dx_gateway_association @@ -1070,7 +1070,7 @@ resource "aws_glue_job" "example" { ### ses_smtp_password Attribute Removal -In many regions today and in all regions after October 1, 2020, the [SES API will only accept version 4 signatures](https://docs.aws.amazon.com/ses/latest/DeveloperGuide/using-ses-api-authentication.html). If referencing the `ses_smtp_password` attribute, switch your Terraform configuration to the `ses_smtp_password_v4` attribute instead. Please note that this signature is based on the region of the Terraform AWS Provider. If you need the SES v4 password in multiple regions, it may require using [multiple provider instances](/docs/configuration/providers.html#alias-multiple-provider-instances). +In many regions today and in all regions after October 1, 2020, the [SES API will only accept version 4 signatures](https://docs.aws.amazon.com/ses/latest/DeveloperGuide/using-ses-api-authentication.html). If referencing the `ses_smtp_password` attribute, switch your Terraform configuration to the `ses_smtp_password_v4` attribute instead. Please note that this signature is based on the region of the Terraform AWS Provider. If you need the SES v4 password in multiple regions, it may require using [multiple provider instances](https://www.terraform.io/docs/configuration/providers.html#alias-multiple-provider-configurations). ## Resource: aws_iam_instance_profile @@ -1232,7 +1232,7 @@ While the returned value will omit the trailing period, use of configurations wi ### Removal of Automatic aws_s3_bucket_policy Import -Previously when importing the `aws_s3_bucket` resource with the [`terraform import` command](/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_s3_bucket_policy` resource as well. This automatic resource import has been removed. Use the [`aws_s3_bucket_policy` resource import](/docs/providers/aws/r/s3_bucket_policy.html#import) to import that resource separately. +Previously when importing the `aws_s3_bucket` resource with the [`terraform import` command](https://www.terraform.io/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_s3_bucket_policy` resource as well. This automatic resource import has been removed. Use the [`aws_s3_bucket_policy` resource import](/docs/providers/aws/r/s3_bucket_policy.html#import) to import that resource separately. ### region Attribute Is Now Read-Only @@ -1284,7 +1284,7 @@ resource "aws_s3_bucket_metric" "example" { ### Removal of Automatic aws_security_group_rule Import -Previously when importing the `aws_security_group` resource with the [`terraform import` command](/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_security_group_rule` resource(s) as well. This automatic resource import has been removed. Use the [`aws_security_group_rule` resource import](/docs/providers/aws/r/security_group_rule.html#import) to import those resources separately. +Previously when importing the `aws_security_group` resource with the [`terraform import` command](https://www.terraform.io/docs/commands/import.html), the Terraform AWS Provider would automatically attempt to import an associated `aws_security_group_rule` resource(s) as well. This automatic resource import has been removed. Use the [`aws_security_group_rule` resource import](/docs/providers/aws/r/security_group_rule.html#import) to import those resources separately. ## Resource: aws_sns_platform_application @@ -1296,7 +1296,7 @@ Previously when the `platform_credential` and `platform_principal` arguments wer ### valid_until Argument No Longer Uses 24 Hour Default -Previously when the `valid_until` argument was not configured, the resource would default to a 24 hour request. This behavior has been removed and allows for non-expiring requests. To recreate the old behavior, the [`time_offset` resource](/docs/providers/time/r/offset.html) can potentially be used. +Previously when the `valid_until` argument was not configured, the resource would default to a 24 hour request. This behavior has been removed and allows for non-expiring requests. To recreate the old behavior, the [`time_offset` resource](https://registry.terraform.io/providers/hashicorp/time/latest/docs/resources/offset) can potentially be used. ## Resource: aws_ssm_maintenance_window_task diff --git a/website/docs/index.html.markdown b/website/docs/index.html.markdown index ba0bfc3cdb0..a40bde3c5a7 100644 --- a/website/docs/index.html.markdown +++ b/website/docs/index.html.markdown @@ -216,7 +216,7 @@ for more information about connecting to alternate AWS endpoints or AWS compatib potentially end up destroying a live environment). Conflicts with `allowed_account_ids`. -* `ignore_tags` - (Optional) Configuration block with resource tag settings to ignore across all resources handled by this provider (except any individual service tag resources such as `aws_ec2_tag`) for situations where external systems are managing certain resource tags. Arguments to the configuration block are described below in the `ignore_tags` Configuration Block section. See the [Terraform multiple provider instances documentation](/docs/configuration/providers.html#alias-multiple-provider-instances) for more information about additional provider configurations. +* `ignore_tags` - (Optional) Configuration block with resource tag settings to ignore across all resources handled by this provider (except any individual service tag resources such as `aws_ec2_tag`) for situations where external systems are managing certain resource tags. Arguments to the configuration block are described below in the `ignore_tags` Configuration Block section. See the [Terraform multiple provider instances documentation](https://www.terraform.io/docs/configuration/providers.html#alias-multiple-provider-configurations) for more information about additional provider configurations. * `insecure` - (Optional) Explicitly allow the provider to perform "insecure" SSL requests. If omitted, the default value is `false`. @@ -388,8 +388,8 @@ provider "aws" { The `ignore_tags` configuration block supports the following arguments: -* `keys` - (Optional) List of exact resource tag keys to ignore across all resources handled by this provider. This configuration prevents Terraform from returning the tag in any `tags` attributes and displaying any configuration difference for the tag value. If any resource configuration still has this tag key configured in the `tags` argument, it will display a perpetual difference until the tag is removed from the argument or [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) is also used. -* `key_prefixes` - (Optional) List of resource tag key prefixes to ignore across all resources handled by this provider. This configuration prevents Terraform from returning any tag key matching the prefixes in any `tags` attributes and displaying any configuration difference for those tag values. If any resource configuration still has a tag matching one of the prefixes configured in the `tags` argument, it will display a perpetual difference until the tag is removed from the argument or [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) is also used. +* `keys` - (Optional) List of exact resource tag keys to ignore across all resources handled by this provider. This configuration prevents Terraform from returning the tag in any `tags` attributes and displaying any configuration difference for the tag value. If any resource configuration still has this tag key configured in the `tags` argument, it will display a perpetual difference until the tag is removed from the argument or [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) is also used. +* `key_prefixes` - (Optional) List of resource tag key prefixes to ignore across all resources handled by this provider. This configuration prevents Terraform from returning any tag key matching the prefixes in any `tags` attributes and displaying any configuration difference for those tag values. If any resource configuration still has a tag matching one of the prefixes configured in the `tags` argument, it will display a perpetual difference until the tag is removed from the argument or [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) is also used. ## Getting the Account ID diff --git a/website/docs/r/acm_certificate.html.markdown b/website/docs/r/acm_certificate.html.markdown index 8d1346eabc9..7e81a6b83a1 100644 --- a/website/docs/r/acm_certificate.html.markdown +++ b/website/docs/r/acm_certificate.html.markdown @@ -142,7 +142,7 @@ Domain validation objects export the following attributes: * `resource_record_type` - The type of DNS record to create * `resource_record_value` - The value the DNS record needs to have -[1]: /docs/configuration/resources.html#lifecycle +[1]: https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html ## Import diff --git a/website/docs/r/acm_certificate_validation.html.markdown b/website/docs/r/acm_certificate_validation.html.markdown index 1cd5fdb019b..ea7ddc68acf 100644 --- a/website/docs/r/acm_certificate_validation.html.markdown +++ b/website/docs/r/acm_certificate_validation.html.markdown @@ -141,7 +141,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`acm_certificate_validation` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`acm_certificate_validation` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `45m`) How long to wait for a certificate to be issued. diff --git a/website/docs/r/acmpca_certificate_authority.html.markdown b/website/docs/r/acmpca_certificate_authority.html.markdown index 79b8c3edea9..205a6663156 100644 --- a/website/docs/r/acmpca_certificate_authority.html.markdown +++ b/website/docs/r/acmpca_certificate_authority.html.markdown @@ -149,7 +149,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_acmpca_certificate_authority` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_acmpca_certificate_authority` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `1m`) How long to wait for a certificate authority to be created. diff --git a/website/docs/r/api_gateway_deployment.html.markdown b/website/docs/r/api_gateway_deployment.html.markdown index 4b5fd322ef2..950c48ef755 100644 --- a/website/docs/r/api_gateway_deployment.html.markdown +++ b/website/docs/r/api_gateway_deployment.html.markdown @@ -10,7 +10,7 @@ description: |- Provides an API Gateway REST Deployment. -~> **Note:** This resource depends on having at least one `aws_api_gateway_integration` created in the REST API, which itself has other dependencies. To avoid race conditions when all resources are being created together, you need to add implicit resource references via the `triggers` argument or explicit resource references using the [resource `depends_on` meta-argument](/docs/configuration/resources.html#depends_on-explicit-resource-dependencies). +~> **Note:** This resource depends on having at least one `aws_api_gateway_integration` created in the REST API, which itself has other dependencies. To avoid race conditions when all resources are being created together, you need to add implicit resource references via the `triggers` argument or explicit resource references using the [resource `depends_on` meta-argument](https://www.terraform.io/docs/configuration/meta-arguments/depends_on.html). -> It is recommended to enable the [resource `lifecycle` configuration block `create_before_destroy` argument](https://www.terraform.io/docs/configuration/resources.html#create_before_destroy) in this resource configuration to properly order redeployments in Terraform. @@ -87,7 +87,7 @@ The following arguments are supported: * `stage_name` - (Optional) The name of the stage. If the specified stage already exists, it will be updated to point to the new deployment. If the stage does not exist, a new one will be created and point to this deployment. * `description` - (Optional) The description of the deployment * `stage_description` - (Optional) The description of the stage -* `triggers` - (Optional) A map of arbitrary keys and values that, when changed, will trigger a redeployment. To force a redeployment without changing these keys/values, use the [`terraform taint` command](/docs/commands/taint.html). +* `triggers` - (Optional) A map of arbitrary keys and values that, when changed, will trigger a redeployment. To force a redeployment without changing these keys/values, use the [`terraform taint` command](https://www.terraform.io/docs/commands/taint.html). * `variables` - (Optional) A map that defines variables for the stage ## Attributes Reference diff --git a/website/docs/r/api_gateway_domain_name.html.markdown b/website/docs/r/api_gateway_domain_name.html.markdown index 36b65c21ab2..eee2427b32b 100644 --- a/website/docs/r/api_gateway_domain_name.html.markdown +++ b/website/docs/r/api_gateway_domain_name.html.markdown @@ -36,7 +36,7 @@ from the validation resource where it will be available after the resource creat `regional_certificate_arn = aws_acm_certificate_validation.cert.certificate_arn`. ~> **Note:** All arguments including the private key will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/api_gateway_rest_api.html.markdown b/website/docs/r/api_gateway_rest_api.html.markdown index e18cfba9284..46cb85b9664 100644 --- a/website/docs/r/api_gateway_rest_api.html.markdown +++ b/website/docs/r/api_gateway_rest_api.html.markdown @@ -10,7 +10,7 @@ description: |- Provides an API Gateway REST API. --> **Note:** Amazon API Gateway Version 1 resources are used for creating and deploying REST APIs. To create and deploy WebSocket and HTTP APIs, use Amazon API Gateway Version 2 [resources](https://www.terraform.io/docs/providers/aws/r/apigatewayv2_api.html). +-> **Note:** Amazon API Gateway Version 1 resources are used for creating and deploying REST APIs. To create and deploy WebSocket and HTTP APIs, use Amazon API Gateway Version 2 [resources](/docs/providers/aws/r/apigatewayv2_api.html). ## Example Usage diff --git a/website/docs/r/api_gateway_rest_api_policy.html.markdown b/website/docs/r/api_gateway_rest_api_policy.html.markdown index c01f3d0c857..3e18dbc0d7f 100644 --- a/website/docs/r/api_gateway_rest_api_policy.html.markdown +++ b/website/docs/r/api_gateway_rest_api_policy.html.markdown @@ -10,7 +10,7 @@ description: |- Provides an API Gateway REST API Policy. --> **Note:** Amazon API Gateway Version 1 resources are used for creating and deploying REST APIs. To create and deploy WebSocket and HTTP APIs, use Amazon API Gateway Version 2 [resources](https://www.terraform.io/docs/providers/aws/r/apigatewayv2_api.html). +-> **Note:** Amazon API Gateway Version 1 resources are used for creating and deploying REST APIs. To create and deploy WebSocket and HTTP APIs, use Amazon API Gateway Version 2 [resources](/docs/providers/aws/r/apigatewayv2_api.html). ## Example Usage diff --git a/website/docs/r/api_gateway_stage.html.markdown b/website/docs/r/api_gateway_stage.html.markdown index a90d54a6042..c06c2bfe59d 100644 --- a/website/docs/r/api_gateway_stage.html.markdown +++ b/website/docs/r/api_gateway_stage.html.markdown @@ -66,7 +66,7 @@ resource "aws_api_gateway_integration" "test" { API Gateway provides the ability to [enable CloudWatch API logging](https://docs.aws.amazon.com/apigateway/latest/developerguide/set-up-logging.html). To manage the CloudWatch Log Group when this feature is enabled, the [`aws_cloudwatch_log_group` resource](/docs/providers/aws/r/cloudwatch_log_group.html) can be used where the name matches the API Gateway naming convention. If the CloudWatch Log Group previously exists, the [`aws_cloudwatch_log_group` resource can be imported into Terraform](/docs/providers/aws/r/cloudwatch_log_group.html#import) as a one time operation and recreation of the environment can occur without import. --> The below configuration uses [`depends_on`](/docs/configuration/resources.html#depends_on-explicit-resource-dependencies) to prevent ordering issues with API Gateway automatically creating the log group first and a variable for naming consistency. Other ordering and naming methodologies may be more appropriate for your environment. +-> The below configuration uses [`depends_on`](https://www.terraform.io/docs/configuration/meta-arguments/depends_on.html) to prevent ordering issues with API Gateway automatically creating the log group first and a variable for naming consistency. Other ordering and naming methodologies may be more appropriate for your environment. ```hcl variable "stage_name" { diff --git a/website/docs/r/apigatewayv2_api.html.markdown b/website/docs/r/apigatewayv2_api.html.markdown index 4143f26d90f..be8c0777d04 100644 --- a/website/docs/r/apigatewayv2_api.html.markdown +++ b/website/docs/r/apigatewayv2_api.html.markdown @@ -10,7 +10,7 @@ description: |- Manages an Amazon API Gateway Version 2 API. --> **Note:** Amazon API Gateway Version 2 resources are used for creating and deploying WebSocket and HTTP APIs. To create and deploy REST APIs, use Amazon API Gateway Version 1 [resources](https://www.terraform.io/docs/providers/aws/r/api_gateway_rest_api.html). +-> **Note:** Amazon API Gateway Version 2 resources are used for creating and deploying WebSocket and HTTP APIs. To create and deploy REST APIs, use Amazon API Gateway Version 1 [resources](/docs/providers/aws/r/api_gateway_rest_api.html). ## Example Usage diff --git a/website/docs/r/apigatewayv2_deployment.html.markdown b/website/docs/r/apigatewayv2_deployment.html.markdown index 56770b10961..181de827201 100644 --- a/website/docs/r/apigatewayv2_deployment.html.markdown +++ b/website/docs/r/apigatewayv2_deployment.html.markdown @@ -11,7 +11,7 @@ description: |- Manages an Amazon API Gateway Version 2 deployment. More information can be found in the [Amazon API Gateway Developer Guide](https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-websocket-api.html). --> **Note:** Creating a deployment for an API requires at least one `aws_apigatewayv2_route` resource associated with that API. To avoid race conditions when all resources are being created together, you need to add implicit resource references via the `triggers` argument or explicit resource references using the [resource `depends_on` meta-argument](/docs/configuration/resources.html#depends_on-explicit-resource-dependencies). +-> **Note:** Creating a deployment for an API requires at least one `aws_apigatewayv2_route` resource associated with that API. To avoid race conditions when all resources are being created together, you need to add implicit resource references via the `triggers` argument or explicit resource references using the [resource `depends_on` meta-argument](https://www.terraform.io/docs/configuration/meta-arguments/depends_on.html). -> It is recommended to enable the [resource `lifecycle` configuration block `create_before_destroy` argument](https://www.terraform.io/docs/configuration/resources.html#create_before_destroy) in this resource configuration to properly order redeployments in Terraform. @@ -58,7 +58,7 @@ The following arguments are supported: * `api_id` - (Required) The API identifier. * `description` - (Optional) The description for the deployment resource. Must be less than or equal to 1024 characters in length. -* `triggers` - (Optional) A map of arbitrary keys and values that, when changed, will trigger a redeployment. To force a redeployment without changing these keys/values, use the [`terraform taint` command](/docs/commands/taint.html). +* `triggers` - (Optional) A map of arbitrary keys and values that, when changed, will trigger a redeployment. To force a redeployment without changing these keys/values, use the [`terraform taint` command](https://www.terraform.io/docs/commands/taint.html). ## Attributes Reference diff --git a/website/docs/r/apigatewayv2_domain_name.html.markdown b/website/docs/r/apigatewayv2_domain_name.html.markdown index ed301014f20..c28383ab6dc 100644 --- a/website/docs/r/apigatewayv2_domain_name.html.markdown +++ b/website/docs/r/apigatewayv2_domain_name.html.markdown @@ -90,7 +90,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_apigatewayv2_domain_name` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_apigatewayv2_domain_name` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `update` - (Default `60 minutes`) Used for updating the domain name diff --git a/website/docs/r/autoscaling_attachment.html.markdown b/website/docs/r/autoscaling_attachment.html.markdown index d5ae0c324f0..6c6fc929f0a 100644 --- a/website/docs/r/autoscaling_attachment.html.markdown +++ b/website/docs/r/autoscaling_attachment.html.markdown @@ -17,7 +17,7 @@ with `load_balancers` and `target_group_arns` defined in-line. These two methods mutually-exclusive. If `aws_autoscaling_attachment` resources are used, either alone or with inline `load_balancers` or `target_group_arns`, the `aws_autoscaling_group` resource must be configured to ignore changes to the `load_balancers` and `target_group_arns` arguments within a -[`lifecycle` configuration block](/docs/configuration/resources.html#lifecycle-lifecycle-customizations). +[`lifecycle` configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html). ## Example Usage diff --git a/website/docs/r/autoscaling_group.html.markdown b/website/docs/r/autoscaling_group.html.markdown index bfceea975dd..e83ff3edc96 100644 --- a/website/docs/r/autoscaling_group.html.markdown +++ b/website/docs/r/autoscaling_group.html.markdown @@ -19,7 +19,7 @@ with `load_balancers` and `target_group_arns` defined in-line. These two methods mutually-exclusive. If `aws_autoscaling_attachment` resources are used, either alone or with inline `load_balancers` or `target_group_arns`, the `aws_autoscaling_group` resource must be configured to ignore changes to the `load_balancers` and `target_group_arns` arguments within a -[`lifecycle` configuration block](/docs/configuration/resources.html#lifecycle-lifecycle-customizations). +[`lifecycle` configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html). ## Example Usage @@ -445,7 +445,7 @@ care to not duplicate these hooks in `aws_autoscaling_lifecycle_hook`. ## Timeouts `autoscaling_group` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `delete` - (Default `10 minutes`) Used for destroying ASG. diff --git a/website/docs/r/cloudformation_stack.html.markdown b/website/docs/r/cloudformation_stack.html.markdown index 903334fa16c..b0848753120 100644 --- a/website/docs/r/cloudformation_stack.html.markdown +++ b/website/docs/r/cloudformation_stack.html.markdown @@ -87,7 +87,7 @@ $ terraform import aws_cloudformation_stack.stack networking-stack ## Timeouts `aws_cloudformation_stack` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Used for Creating Stacks - `update` - (Default `30 minutes`) Used for Stack modifications diff --git a/website/docs/r/cloudformation_stack_set.html.markdown b/website/docs/r/cloudformation_stack_set.html.markdown index 12456490f9b..fc5477fc8fe 100644 --- a/website/docs/r/cloudformation_stack_set.html.markdown +++ b/website/docs/r/cloudformation_stack_set.html.markdown @@ -105,7 +105,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_cloudformation_stack_set` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_cloudformation_stack_set` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `update` - (Default `30m`) How long to wait for a StackSet to be updated. diff --git a/website/docs/r/cloudformation_stack_set_instance.html.markdown b/website/docs/r/cloudformation_stack_set_instance.html.markdown index 4de9c15095f..99f84c9834a 100644 --- a/website/docs/r/cloudformation_stack_set_instance.html.markdown +++ b/website/docs/r/cloudformation_stack_set_instance.html.markdown @@ -85,7 +85,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_cloudformation_stack_set_instance` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_cloudformation_stack_set_instance` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `30m`) How long to wait for a Stack to be created. * `update` - (Default `30m`) How long to wait for a Stack to be updated. diff --git a/website/docs/r/cloudwatch_event_target.html.markdown b/website/docs/r/cloudwatch_event_target.html.markdown index fe2d730b050..afef8c36bd9 100644 --- a/website/docs/r/cloudwatch_event_target.html.markdown +++ b/website/docs/r/cloudwatch_event_target.html.markdown @@ -288,8 +288,8 @@ resource "aws_cloudwatch_event_rule" "example" { -> **Note:** In order to be able to have your AWS Lambda function or SNS topic invoked by an EventBridge rule, you must setup the right permissions - using [`aws_lambda_permission`](https://www.terraform.io/docs/providers/aws/r/lambda_permission.html) - or [`aws_sns_topic.policy`](https://www.terraform.io/docs/providers/aws/r/sns_topic.html#policy). + using [`aws_lambda_permission`](/docs/providers/aws/r/lambda_permission.html) + or [`aws_sns_topic.policy`](/docs/providers/aws/r/sns_topic.html#policy). More info [here](https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/resource-based-policies-cwe.html). The following arguments are supported: diff --git a/website/docs/r/cognito_user_pool.markdown b/website/docs/r/cognito_user_pool.markdown index e47e3acbcdf..db80695b8ec 100644 --- a/website/docs/r/cognito_user_pool.markdown +++ b/website/docs/r/cognito_user_pool.markdown @@ -80,7 +80,7 @@ The following arguments are supported: * `password_policy` (Optional) - A container for information about the [user pool password policy](#password-policy). * `schema` (Optional) - A container with the [schema attributes](#schema-attributes) of a user pool. Schema attributes from the [standard attribute set](https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-attributes.html#cognito-user-pools-standard-attributes) only need to be specified if they are different from the default configuration. Maximum of 50 attributes. * `sms_authentication_message` - (Optional) A string representing the SMS authentication message. The message must contain the `{####}` placeholder, which will be replaced with the code. -* `sms_configuration` (Optional) - Configuration block for Short Message Service (SMS) settings. Detailed below. These settings apply to SMS user verification and SMS Multi-Factor Authentication (MFA). Due to Cognito API restrictions, the SMS configuration cannot be removed without recreating the Cognito User Pool. For user data safety, this resource will ignore the removal of this configuration by disabling drift detection. To force resource recreation after this configuration has been applied, see the [`taint` command](/docs/commands/taint.html). +* `sms_configuration` (Optional) - Configuration block for Short Message Service (SMS) settings. Detailed below. These settings apply to SMS user verification and SMS Multi-Factor Authentication (MFA). Due to Cognito API restrictions, the SMS configuration cannot be removed without recreating the Cognito User Pool. For user data safety, this resource will ignore the removal of this configuration by disabling drift detection. To force resource recreation after this configuration has been applied, see the [`taint` command](https://www.terraform.io/docs/commands/taint.html). * `sms_verification_message` - (Optional) A string representing the SMS verification message. Conflicts with `verification_message_template` configuration block `sms_message` argument. * `software_token_mfa_configuration` - (Optional) Configuration block for software token Mult-Factor Authentication (MFA) settings. Detailed below. * `tags` - (Optional) A map of tags to assign to the User Pool. diff --git a/website/docs/r/config_organization_custom_rule.html.markdown b/website/docs/r/config_organization_custom_rule.html.markdown index 761b0b20de3..b3b21b39db0 100644 --- a/website/docs/r/config_organization_custom_rule.html.markdown +++ b/website/docs/r/config_organization_custom_rule.html.markdown @@ -66,7 +66,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_config_organization_custom_rule` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_config_organization_custom_rule` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `5m`) How long to wait for the rule to be created. diff --git a/website/docs/r/config_organization_managed_rule.html.markdown b/website/docs/r/config_organization_managed_rule.html.markdown index 63a9f0716f6..bf6cf84c072 100644 --- a/website/docs/r/config_organization_managed_rule.html.markdown +++ b/website/docs/r/config_organization_managed_rule.html.markdown @@ -53,7 +53,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_config_organization_managed_rule` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_config_organization_managed_rule` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `5m`) How long to wait for the rule to be created. diff --git a/website/docs/r/datasync_agent.html.markdown b/website/docs/r/datasync_agent.html.markdown index 402aa9d5905..e4d5415eb04 100644 --- a/website/docs/r/datasync_agent.html.markdown +++ b/website/docs/r/datasync_agent.html.markdown @@ -39,7 +39,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_datasync_agent` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_datasync_agent` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for agent activation and connection to DataSync. diff --git a/website/docs/r/datasync_task.html.markdown b/website/docs/r/datasync_task.html.markdown index 08a316b9587..e16ef80e904 100644 --- a/website/docs/r/datasync_task.html.markdown +++ b/website/docs/r/datasync_task.html.markdown @@ -60,7 +60,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_datasync_task` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_datasync_task` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `5m`) How long to wait for DataSync Task availability. diff --git a/website/docs/r/dax_cluster.html.markdown b/website/docs/r/dax_cluster.html.markdown index 801543db9d1..d77981acbb2 100644 --- a/website/docs/r/dax_cluster.html.markdown +++ b/website/docs/r/dax_cluster.html.markdown @@ -90,7 +90,7 @@ consisting of a DNS name and a port number ## Timeouts `aws_dax_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `45 minutes`) Used for creating a DAX cluster - `update` - (Default `45 minutes`) Used for cluster modifications diff --git a/website/docs/r/db_cluster_snapshot.html.markdown b/website/docs/r/db_cluster_snapshot.html.markdown index 877b63690f5..955c252dce4 100644 --- a/website/docs/r/db_cluster_snapshot.html.markdown +++ b/website/docs/r/db_cluster_snapshot.html.markdown @@ -46,7 +46,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_db_cluster_snapshot` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_db_cluster_snapshot` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `20m`) How long to wait for the snapshot to be available. diff --git a/website/docs/r/db_event_subscription.html.markdown b/website/docs/r/db_event_subscription.html.markdown index e7cc3bdad88..21f7f226724 100644 --- a/website/docs/r/db_event_subscription.html.markdown +++ b/website/docs/r/db_event_subscription.html.markdown @@ -74,7 +74,7 @@ The following additional atttributes are provided: ## Timeouts -`aws_db_event_subscription` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_db_event_subscription` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `40m`) How long to wait for an RDS event notification subscription to be ready. diff --git a/website/docs/r/db_instance.html.markdown b/website/docs/r/db_instance.html.markdown index 9030a8d2e6b..20a5e0337d7 100644 --- a/website/docs/r/db_instance.html.markdown +++ b/website/docs/r/db_instance.html.markdown @@ -27,7 +27,7 @@ server reboots. See the AWS Docs on [RDS Maintenance][2] for more information. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. [Read more about sensitive data in -state](/docs/state/sensitive-data.html). +state](https://www.terraform.io/docs/state/sensitive-data.html). ## RDS Instance Class Types Amazon RDS supports three types of instance classes: Standard, Memory Optimized, @@ -212,7 +212,7 @@ standalone database. -> **Note:** You can restore to any point in time before the source DB instance's `latest_restorable_time` or a point up to the number of days specified in the source DB instance's `backup_retention_period`. For more information, please refer to the [Developer Guide](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_PIT.html). -This setting does not apply to `aurora-mysql` or `aurora-postgresql` DB engines. For Aurora, refer to the [`aws_rds_cluster` resource documentation](https://www.terraform.io/docs/providers/aws/r/rds_cluster.html#restore_in_time). +This setting does not apply to `aurora-mysql` or `aurora-postgresql` DB engines. For Aurora, refer to the [`aws_rds_cluster` resource documentation](/docs/providers/aws/r/rds_cluster.html#restore_in_time). The `restore_to_point_in_time` block supports the following arguments: @@ -248,7 +248,7 @@ This will not recreate the resource if the S3 object changes in some way. It's ### Timeouts `aws_db_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `40 minutes`) Used for Creating Instances, Replicas, and restoring from Snapshots. diff --git a/website/docs/r/db_option_group.html.markdown b/website/docs/r/db_option_group.html.markdown index b2ecb282fc5..428241cd265 100644 --- a/website/docs/r/db_option_group.html.markdown +++ b/website/docs/r/db_option_group.html.markdown @@ -86,7 +86,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_db_option_group` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `delete` - (Default `15 minutes`) diff --git a/website/docs/r/db_proxy.html.markdown b/website/docs/r/db_proxy.html.markdown index cdd1a9ccd3f..1aac841c7c9 100644 --- a/website/docs/r/db_proxy.html.markdown +++ b/website/docs/r/db_proxy.html.markdown @@ -70,7 +70,7 @@ In addition to all arguments above, the following attributes are exported: ### Timeouts -`aws_db_proxy` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_db_proxy` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Used for creating DB proxies. - `update` - (Default `30 minutes`) Used for modifying DB proxies. diff --git a/website/docs/r/db_proxy_default_target_group.html.markdown b/website/docs/r/db_proxy_default_target_group.html.markdown index 8ad63d82233..c5aec6ce920 100644 --- a/website/docs/r/db_proxy_default_target_group.html.markdown +++ b/website/docs/r/db_proxy_default_target_group.html.markdown @@ -76,7 +76,7 @@ In addition to all arguments above, the following attributes are exported: ### Timeouts -`aws_db_proxy_default_target_group` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_db_proxy_default_target_group` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Timeout for modifying DB proxy target group on creation. - `update` - (Default `30 minutes`) Timeout for modifying DB proxy target group on update. diff --git a/website/docs/r/db_snapshot.html.markdown b/website/docs/r/db_snapshot.html.markdown index a29312815b0..384d2b4347a 100644 --- a/website/docs/r/db_snapshot.html.markdown +++ b/website/docs/r/db_snapshot.html.markdown @@ -64,7 +64,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_db_snapshot` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_db_snapshot` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `read` - (Default `20 minutes`) Length of time to wait for the snapshot to become available diff --git a/website/docs/r/default_route_table.html.markdown b/website/docs/r/default_route_table.html.markdown index d868f83311e..57ab6f7ed8d 100644 --- a/website/docs/r/default_route_table.html.markdown +++ b/website/docs/r/default_route_table.html.markdown @@ -62,7 +62,7 @@ The following arguments are supported: * `default_route_table_id` - (Required) The ID of the Default Routing Table. * `route` - (Optional) A list of route objects. Their keys are documented below. - This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). + This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `tags` - (Optional) A map of tags to assign to the resource. * `propagating_vgws` - (Optional) A list of virtual gateways for propagation. diff --git a/website/docs/r/directory_service_directory.html.markdown b/website/docs/r/directory_service_directory.html.markdown index 3cdd29495bf..fddf2014434 100644 --- a/website/docs/r/directory_service_directory.html.markdown +++ b/website/docs/r/directory_service_directory.html.markdown @@ -11,7 +11,7 @@ description: |- Provides a Simple or Managed Microsoft directory in AWS Directory Service. ~> **Note:** All arguments including the password and customer username will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/dms_certificate.html.markdown b/website/docs/r/dms_certificate.html.markdown index 9464510c252..51774c19e3e 100644 --- a/website/docs/r/dms_certificate.html.markdown +++ b/website/docs/r/dms_certificate.html.markdown @@ -11,7 +11,7 @@ description: |- Provides a DMS (Data Migration Service) certificate resource. DMS certificates can be created, deleted, and imported. ~> **Note:** All arguments including the PEM encoded certificate will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/dms_endpoint.html.markdown b/website/docs/r/dms_endpoint.html.markdown index 308719e4e3a..140aaefb505 100644 --- a/website/docs/r/dms_endpoint.html.markdown +++ b/website/docs/r/dms_endpoint.html.markdown @@ -11,7 +11,7 @@ description: |- Provides a DMS (Data Migration Service) endpoint resource. DMS endpoints can be created, updated, deleted, and imported. ~> **Note:** All arguments including the password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/dms_event_subscription.html.markdown b/website/docs/r/dms_event_subscription.html.markdown index 795c65f3793..e0f69d24182 100644 --- a/website/docs/r/dms_event_subscription.html.markdown +++ b/website/docs/r/dms_event_subscription.html.markdown @@ -40,7 +40,7 @@ The following arguments are supported: ## Timeouts -`aws_dms_event_subscription` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_dms_event_subscription` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10m`) Used for creating event subscriptions. - `update` - (Default `10m`) Used for event subscription modifications. diff --git a/website/docs/r/dms_replication_instance.html.markdown b/website/docs/r/dms_replication_instance.html.markdown index d26a22df1b8..b40204af91b 100644 --- a/website/docs/r/dms_replication_instance.html.markdown +++ b/website/docs/r/dms_replication_instance.html.markdown @@ -129,7 +129,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dms_replication_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Used for Creating Instances - `update` - (Default `30 minutes`) Used for Database modifications diff --git a/website/docs/r/docdb_cluster.html.markdown b/website/docs/r/docdb_cluster.html.markdown index 8f05fcad538..37a5daa0e01 100644 --- a/website/docs/r/docdb_cluster.html.markdown +++ b/website/docs/r/docdb_cluster.html.markdown @@ -19,7 +19,7 @@ phase because a modification has not yet taken place. You can use the ~> **Note:** using `apply_immediately` can result in a brief downtime as the server reboots. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage @@ -90,7 +90,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_docdb_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `120 minutes`) Used for Cluster creation - `update` - (Default `120 minutes`) Used for Cluster modifications diff --git a/website/docs/r/docdb_cluster_instance.html.markdown b/website/docs/r/docdb_cluster_instance.html.markdown index 210253c9d75..7c4ceddb09f 100644 --- a/website/docs/r/docdb_cluster_instance.html.markdown +++ b/website/docs/r/docdb_cluster_instance.html.markdown @@ -81,13 +81,13 @@ In addition to all arguments above, the following attributes are exported: [1]: /docs/providers/aws/r/docdb_cluster.html [2]: https://docs.aws.amazon.com/documentdb/latest/developerguide/db-cluster-manage-performance.html#db-cluster-manage-scaling-instance -[3]: /docs/configuration/resources.html#count +[3]: https://www.terraform.io/docs/configuration/meta-arguments/count.html [4]: https://docs.aws.amazon.com/documentdb/latest/developerguide/db-instance-classes.html#db-instance-class-specs ## Timeouts `aws_docdb_cluster_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `90 minutes`) Used for Creating Instances, Replicas, and restoring from Snapshots diff --git a/website/docs/r/docdb_cluster_snapshot.html.markdown b/website/docs/r/docdb_cluster_snapshot.html.markdown index e63b0ca7fac..84dfd2099a1 100644 --- a/website/docs/r/docdb_cluster_snapshot.html.markdown +++ b/website/docs/r/docdb_cluster_snapshot.html.markdown @@ -43,7 +43,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_docdb_cluster_snapshot` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_docdb_cluster_snapshot` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `20m`) How long to wait for the snapshot to be available. diff --git a/website/docs/r/dx_bgp_peer.html.markdown b/website/docs/r/dx_bgp_peer.html.markdown index ac092175675..39aa635099d 100644 --- a/website/docs/r/dx_bgp_peer.html.markdown +++ b/website/docs/r/dx_bgp_peer.html.markdown @@ -45,7 +45,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_bgp_peer` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating BGP peer - `delete` - (Default `10 minutes`) Used for destroying BGP peer diff --git a/website/docs/r/dx_gateway.html.markdown b/website/docs/r/dx_gateway.html.markdown index 4d0b6c26895..a0ef2722e35 100644 --- a/website/docs/r/dx_gateway.html.markdown +++ b/website/docs/r/dx_gateway.html.markdown @@ -36,7 +36,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_gateway` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating the gateway - `delete` - (Default `10 minutes`) Used for destroying the gateway diff --git a/website/docs/r/dx_gateway_association.html.markdown b/website/docs/r/dx_gateway_association.html.markdown index e2cf50fa28a..bd8811c6884 100644 --- a/website/docs/r/dx_gateway_association.html.markdown +++ b/website/docs/r/dx_gateway_association.html.markdown @@ -116,7 +116,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_gateway_association` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Used for creating the association - `update` - (Default `30 minutes`) Used for updating the association diff --git a/website/docs/r/dx_hosted_private_virtual_interface.html.markdown b/website/docs/r/dx_hosted_private_virtual_interface.html.markdown index 0bf85b94449..1c36e486cb4 100644 --- a/website/docs/r/dx_hosted_private_virtual_interface.html.markdown +++ b/website/docs/r/dx_hosted_private_virtual_interface.html.markdown @@ -51,7 +51,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_private_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `update` - (Default `10 minutes`) Used for virtual interface modifications diff --git a/website/docs/r/dx_hosted_private_virtual_interface_accepter.html.markdown b/website/docs/r/dx_hosted_private_virtual_interface_accepter.html.markdown index cd10037105a..97c7597eb66 100644 --- a/website/docs/r/dx_hosted_private_virtual_interface_accepter.html.markdown +++ b/website/docs/r/dx_hosted_private_virtual_interface_accepter.html.markdown @@ -86,7 +86,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_private_virtual_interface_accepter` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `delete` - (Default `10 minutes`) Used for destroying virtual interface diff --git a/website/docs/r/dx_hosted_public_virtual_interface.html.markdown b/website/docs/r/dx_hosted_public_virtual_interface.html.markdown index f7c7a318165..233f63a17f5 100644 --- a/website/docs/r/dx_hosted_public_virtual_interface.html.markdown +++ b/website/docs/r/dx_hosted_public_virtual_interface.html.markdown @@ -58,7 +58,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_public_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `delete` - (Default `10 minutes`) Used for destroying virtual interface diff --git a/website/docs/r/dx_hosted_public_virtual_interface_accepter.html.markdown b/website/docs/r/dx_hosted_public_virtual_interface_accepter.html.markdown index dc07803b6c5..26d74d6c734 100644 --- a/website/docs/r/dx_hosted_public_virtual_interface_accepter.html.markdown +++ b/website/docs/r/dx_hosted_public_virtual_interface_accepter.html.markdown @@ -84,7 +84,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_public_virtual_interface_accepter` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `delete` - (Default `10 minutes`) Used for destroying virtual interface diff --git a/website/docs/r/dx_hosted_transit_virtual_interface.html.markdown b/website/docs/r/dx_hosted_transit_virtual_interface.html.markdown index 75718b5caf5..5a38a6ecdcd 100644 --- a/website/docs/r/dx_hosted_transit_virtual_interface.html.markdown +++ b/website/docs/r/dx_hosted_transit_virtual_interface.html.markdown @@ -52,7 +52,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_transit_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `update` - (Default `10 minutes`) Used for virtual interface modifications diff --git a/website/docs/r/dx_hosted_transit_virtual_interface_accepter.html.markdown b/website/docs/r/dx_hosted_transit_virtual_interface_accepter.html.markdown index d3cf96e8047..ec73c108d88 100644 --- a/website/docs/r/dx_hosted_transit_virtual_interface_accepter.html.markdown +++ b/website/docs/r/dx_hosted_transit_virtual_interface_accepter.html.markdown @@ -82,7 +82,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_hosted_transit_virtual_interface_accepter` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `delete` - (Default `10 minutes`) Used for destroying virtual interface diff --git a/website/docs/r/dx_private_virtual_interface.html.markdown b/website/docs/r/dx_private_virtual_interface.html.markdown index c1bd5846cb9..278e6d13839 100644 --- a/website/docs/r/dx_private_virtual_interface.html.markdown +++ b/website/docs/r/dx_private_virtual_interface.html.markdown @@ -53,7 +53,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_private_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `update` - (Default `10 minutes`) Used for virtual interface modifications diff --git a/website/docs/r/dx_public_virtual_interface.html.markdown b/website/docs/r/dx_public_virtual_interface.html.markdown index 091213f5347..ca88dafefac 100644 --- a/website/docs/r/dx_public_virtual_interface.html.markdown +++ b/website/docs/r/dx_public_virtual_interface.html.markdown @@ -57,7 +57,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_public_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `delete` - (Default `10 minutes`) Used for destroying virtual interface diff --git a/website/docs/r/dx_transit_virtual_interface.html.markdown b/website/docs/r/dx_transit_virtual_interface.html.markdown index c45b35462d9..230783776ce 100644 --- a/website/docs/r/dx_transit_virtual_interface.html.markdown +++ b/website/docs/r/dx_transit_virtual_interface.html.markdown @@ -59,7 +59,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_dx_transit_virtual_interface` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating virtual interface - `update` - (Default `10 minutes`) Used for virtual interface modifications diff --git a/website/docs/r/dynamodb_table.html.markdown b/website/docs/r/dynamodb_table.html.markdown index 5779e9e5d5c..d93972c0c09 100644 --- a/website/docs/r/dynamodb_table.html.markdown +++ b/website/docs/r/dynamodb_table.html.markdown @@ -10,7 +10,7 @@ description: |- Provides a DynamoDB table resource -~> **Note:** It is recommended to use `lifecycle` [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) for `read_capacity` and/or `write_capacity` if there's [autoscaling policy](/docs/providers/aws/r/appautoscaling_policy.html) attached to the table. +~> **Note:** It is recommended to use `lifecycle` [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) for `read_capacity` and/or `write_capacity` if there's [autoscaling policy](/docs/providers/aws/r/appautoscaling_policy.html) attached to the table. ## Example Usage diff --git a/website/docs/r/ebs_snapshot.html.markdown b/website/docs/r/ebs_snapshot.html.markdown index a9e344514fb..190630ff90c 100644 --- a/website/docs/r/ebs_snapshot.html.markdown +++ b/website/docs/r/ebs_snapshot.html.markdown @@ -42,7 +42,7 @@ The following arguments are supported: ### Timeouts `aws_ebs_snapshot` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating the ebs snapshot - `delete` - (Default `10 minutes`) Used for deleting the ebs snapshot diff --git a/website/docs/r/ec2_fleet.html.markdown b/website/docs/r/ec2_fleet.html.markdown index 3e40e8b700d..9a0f06c01a6 100644 --- a/website/docs/r/ec2_fleet.html.markdown +++ b/website/docs/r/ec2_fleet.html.markdown @@ -124,7 +124,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_ec2_fleet` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_ec2_fleet` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for a fleet to be active. * `update` - (Default `10m`) How long to wait for a fleet to be modified. diff --git a/website/docs/r/ecr_repository.html.markdown b/website/docs/r/ecr_repository.html.markdown index 207b72b4fb7..20f9d7d57d1 100644 --- a/website/docs/r/ecr_repository.html.markdown +++ b/website/docs/r/ecr_repository.html.markdown @@ -49,7 +49,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_ecr_repository` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_ecr_repository` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `delete` - (Default `20 minutes`) How long to wait for a repository to be deleted. diff --git a/website/docs/r/ecs_service.html.markdown b/website/docs/r/ecs_service.html.markdown index a6f249075a9..73e43562fc7 100644 --- a/website/docs/r/ecs_service.html.markdown +++ b/website/docs/r/ecs_service.html.markdown @@ -45,7 +45,7 @@ resource "aws_ecs_service" "mongo" { ### Ignoring Changes to Desired Count -You can utilize the generic Terraform resource [lifecycle configuration block](/docs/configuration/resources.html#lifecycle) with `ignore_changes` to create an ECS service with an initial count of running instances, then ignore any changes to that count caused externally (e.g. Application Autoscaling). +You can utilize the generic Terraform resource [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` to create an ECS service with an initial count of running instances, then ignore any changes to that count caused externally (e.g. Application Autoscaling). ```hcl resource "aws_ecs_service" "example" { @@ -193,7 +193,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_ecs_service` provides the following -[Timeouts](/docs/configuration/resources.html#operation-timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `delete` - (Default `20 minutes`) diff --git a/website/docs/r/efs_mount_target.html.markdown b/website/docs/r/efs_mount_target.html.markdown index 530420988b0..e5eeec3c07e 100644 --- a/website/docs/r/efs_mount_target.html.markdown +++ b/website/docs/r/efs_mount_target.html.markdown @@ -44,7 +44,7 @@ be for the same VPC as subnet specified) in effect for the mount target. ~> **Note:** The `dns_name` and `mount_target_dns_name` attributes are only useful if the mount target is in a VPC that has support for DNS hostnames enabled. See [Using DNS with Your VPC](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/vpc-dns.html) -and [VPC resource](https://www.terraform.io/docs/providers/aws/r/vpc.html#enable_dns_hostnames) in Terraform for more information. +and [VPC resource](/docs/providers/aws/r/vpc.html#enable_dns_hostnames) in Terraform for more information. In addition to all arguments above, the following attributes are exported: diff --git a/website/docs/r/eip.html.markdown b/website/docs/r/eip.html.markdown index 82d9ce0ed7d..ad7a1b85109 100644 --- a/website/docs/r/eip.html.markdown +++ b/website/docs/r/eip.html.markdown @@ -135,7 +135,7 @@ In addition to all arguments above, the following attributes are exported: ~> **Note:** The resource computes the `public_dns` and `private_dns` attributes according to the [VPC DNS Guide](https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns.html#vpc-dns-hostnames) as they are not available with the EC2 API. ## Timeouts -`aws_eip` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_eip` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `read` - (Default `15 minutes`) How long to wait querying for information about EIPs. - `update` - (Default `5 minutes`) How long to wait for an EIP to be updated. diff --git a/website/docs/r/eks_cluster.html.markdown b/website/docs/r/eks_cluster.html.markdown index 24cd8f96b88..0e4babbc901 100644 --- a/website/docs/r/eks_cluster.html.markdown +++ b/website/docs/r/eks_cluster.html.markdown @@ -79,7 +79,7 @@ resource "aws_iam_role_policy_attachment" "example-AmazonEKSVPCResourceControlle [EKS Control Plane Logging](https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html) can be enabled via the `enabled_cluster_log_types` argument. To manage the CloudWatch Log Group retention period, the [`aws_cloudwatch_log_group` resource](/docs/providers/aws/r/cloudwatch_log_group.html) can be used. --> The below configuration uses [`depends_on`](/docs/configuration/resources.html#depends_on-explicit-resource-dependencies) to prevent ordering issues with EKS automatically creating the log group first and a variable for naming consistency. Other ordering and naming methodologies may be more appropriate for your environment. +-> The below configuration uses [`depends_on`](https://www.terraform.io/docs/configuration/meta-arguments/depends_on.html) to prevent ordering issues with EKS automatically creating the log group first and a variable for naming consistency. Other ordering and naming methodologies may be more appropriate for your environment. ```hcl variable "cluster_name" { @@ -147,14 +147,14 @@ resource "aws_iam_role" "example" { } ``` -After adding inline IAM Policies (e.g. [`aws_iam_role_policy` resource](/docs/providers/aws/r/iam_role_policy.html)) or attaching IAM Policies (e.g. [`aws_iam_policy` resource](/docs/providers/aws/r/iam_policy.html) and [`aws_iam_role_policy_attachment` resource](/docs/providers/aws/r/iam_policy.html)) with the desired permissions to the IAM Role, annotate the Kubernetes service account (e.g. [`kubernetes_service_account` resource](/docs/providers/kubernetes/r/service_account.html)) and recreate any pods. +After adding inline IAM Policies (e.g. [`aws_iam_role_policy` resource](/docs/providers/aws/r/iam_role_policy.html)) or attaching IAM Policies (e.g. [`aws_iam_policy` resource](/docs/providers/aws/r/iam_policy.html) and [`aws_iam_role_policy_attachment` resource](/docs/providers/aws/r/iam_policy.html)) with the desired permissions to the IAM Role, annotate the Kubernetes service account (e.g. [`kubernetes_service_account` resource](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/service_account)) and recreate any pods. ## Argument Reference The following arguments are supported: * `name` – (Required) Name of the cluster. -* `role_arn` - (Required) The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf. Ensure the resource configuration includes explicit dependencies on the IAM Role permissions by adding [`depends_on`](/docs/configuration/resources.html#depends_on-explicit-resource-dependencies) if using the [`aws_iam_role_policy` resource](/docs/providers/aws/r/iam_role_policy.html) or [`aws_iam_role_policy_attachment` resource](/docs/providers/aws/r/iam_role_policy_attachment.html), otherwise EKS cannot delete EKS managed EC2 infrastructure such as Security Groups on EKS Cluster deletion. +* `role_arn` - (Required) The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf. Ensure the resource configuration includes explicit dependencies on the IAM Role permissions by adding [`depends_on`](https://www.terraform.io/docs/configuration/meta-arguments/depends_on.html) if using the [`aws_iam_role_policy` resource](/docs/providers/aws/r/iam_role_policy.html) or [`aws_iam_role_policy_attachment` resource](/docs/providers/aws/r/iam_role_policy_attachment.html), otherwise EKS cannot delete EKS managed EC2 infrastructure such as Security Groups on EKS Cluster deletion. * `vpc_config` - (Required) Nested argument for the VPC associated with your cluster. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see [Cluster VPC Considerations](https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html) and [Cluster Security Group Considerations](https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html) in the Amazon EKS User Guide. Configuration detailed below. * `enabled_cluster_log_types` - (Optional) A list of the desired control plane logging to enable. For more information, see [Amazon EKS Control Plane Logging](https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html) * `encryption_config` - (Optional) Configuration block with encryption configuration for the cluster. Only available on Kubernetes 1.13 and above clusters created after March 6, 2020. Detailed below. @@ -217,7 +217,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_eks_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `30 minutes`) How long to wait for the EKS Cluster to be created. * `update` - (Default `60 minutes`) How long to wait for the EKS Cluster to be updated. diff --git a/website/docs/r/eks_fargate_profile.html.markdown b/website/docs/r/eks_fargate_profile.html.markdown index 8a2d34a3a02..6294a069306 100644 --- a/website/docs/r/eks_fargate_profile.html.markdown +++ b/website/docs/r/eks_fargate_profile.html.markdown @@ -83,7 +83,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_eks_fargate_profile` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_eks_fargate_profile` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10 minutes`) How long to wait for the EKS Fargate Profile to be created. * `delete` - (Default `10 minutes`) How long to wait for the EKS Fargate Profile to be deleted. diff --git a/website/docs/r/eks_node_group.html.markdown b/website/docs/r/eks_node_group.html.markdown index 061b62b7838..e22a29131bd 100644 --- a/website/docs/r/eks_node_group.html.markdown +++ b/website/docs/r/eks_node_group.html.markdown @@ -37,7 +37,7 @@ resource "aws_eks_node_group" "example" { ### Ignoring Changes to Desired Size -You can utilize the generic Terraform resource [lifecycle configuration block](/docs/configuration/resources.html#lifecycle-lifecycle-customizations) with `ignore_changes` to create an EKS Node Group with an initial size of running instances, then ignore any changes to that count caused externally (e.g. Application Autoscaling). +You can utilize the generic Terraform resource [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` to create an EKS Node Group with an initial size of running instances, then ignore any changes to that count caused externally (e.g. Application Autoscaling). ```hcl resource "aws_eks_node_group" "example" { @@ -169,7 +169,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_eks_node_group` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `60 minutes`) How long to wait for the EKS Node Group to be created. * `update` - (Default `60 minutes`) How long to wait for the EKS Node Group to be updated. Note that the `update` timeout is used separately for both configuration and version update operations. diff --git a/website/docs/r/elasticache_replication_group.html.markdown b/website/docs/r/elasticache_replication_group.html.markdown index 03c4bc96d53..cd886521b48 100644 --- a/website/docs/r/elasticache_replication_group.html.markdown +++ b/website/docs/r/elasticache_replication_group.html.markdown @@ -42,7 +42,7 @@ resource "aws_elasticache_replication_group" "example" { You have two options for adjusting the number of replicas: * Adjusting `number_cache_clusters` directly. This will attempt to automatically add or remove replicas, but provides no granular control (e.g. preferred availability zone, cache cluster ID) for the added or removed replicas. This also currently expects cache cluster IDs in the form of `replication_group_id-00#`. -* Otherwise for fine grained control of the underlying cache clusters, they can be added or removed with the [`aws_elasticache_cluster` resource](/docs/providers/aws/r/elasticache_cluster.html) and its `replication_group_id` attribute. In this situation, you will need to utilize the [lifecycle configuration block](/docs/configuration/resources.html) with `ignore_changes` to prevent perpetual differences during Terraform plan with the `number_cache_cluster` attribute. +* Otherwise for fine grained control of the underlying cache clusters, they can be added or removed with the [`aws_elasticache_cluster` resource](/docs/providers/aws/r/elasticache_cluster.html) and its `replication_group_id` attribute. In this situation, you will need to utilize the [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` to prevent perpetual differences during Terraform plan with the `number_cache_cluster` attribute. ```hcl resource "aws_elasticache_replication_group" "example" { @@ -153,7 +153,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_elasticache_replication_group` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_elasticache_replication_group` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `60m`) How long to wait for a replication group to be created. diff --git a/website/docs/r/elasticsearch_domain.html.markdown b/website/docs/r/elasticsearch_domain.html.markdown index 74d7f6a0a2d..ddaca8b3f36 100644 --- a/website/docs/r/elasticsearch_domain.html.markdown +++ b/website/docs/r/elasticsearch_domain.html.markdown @@ -321,7 +321,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_elasticsearch_domain` provides the following [Timeouts](/docs/configuration/resources.html#operation-timeouts) configuration options: +`aws_elasticsearch_domain` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `update` - (Optional, Default: `60m`) How long to wait for updates. diff --git a/website/docs/r/emr_cluster.html.markdown b/website/docs/r/emr_cluster.html.markdown index d3e0a235474..7e956794071 100644 --- a/website/docs/r/emr_cluster.html.markdown +++ b/website/docs/r/emr_cluster.html.markdown @@ -242,7 +242,7 @@ resource "aws_emr_instance_fleet" "task" { [Debug logging in EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-plan-debugging.html) is implemented as a step. It is highly recommended to utilize the -[lifecycle configuration block](/docs/configuration/resources.html) with `ignore_changes` if other +[lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` if other steps are being managed outside of Terraform. ```hcl @@ -365,7 +365,7 @@ EOF * `visible_to_all_users` - (Optional) Whether the job flow is visible to all IAM users of the AWS account associated with the job flow. Default `true` * `autoscaling_role` - (Optional) An IAM role for automatic scaling policies. The IAM role provides permissions that the automatic scaling feature requires to launch and terminate EC2 instances in an instance group. -* `step` - (Optional) List of steps to run when creating the cluster. Defined below. It is highly recommended to utilize the [lifecycle configuration block](/docs/configuration/resources.html) with `ignore_changes` if other steps are being managed outside of Terraform. This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). +* `step` - (Optional) List of steps to run when creating the cluster. Defined below. It is highly recommended to utilize the [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` if other steps are being managed outside of Terraform. This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `step_concurrency_level` - (Optional) The number of steps that can be executed concurrently. You can specify a maximum of 256 steps. Only valid for EMR clusters with `release_label` 5.28.0 or greater. (default is 1) * `tags` - (Optional) list of tags to apply to the EMR Cluster @@ -850,7 +850,7 @@ EMR clusters can be imported using the `id`, e.g. $ terraform import aws_emr_cluster.cluster j-123456ABCDEF ``` -Since the API does not return the actual values for Kerberos configurations, environments with those Terraform configurations will need to use the [`lifecycle` configuration block `ignore_changes` argument](/docs/configuration/resources.html#ignore_changes) available to all Terraform resources to prevent perpetual differences, e.g. +Since the API does not return the actual values for Kerberos configurations, environments with those Terraform configurations will need to use the [`lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) available to all Terraform resources to prevent perpetual differences, e.g. ```hcl resource "aws_emr_cluster" "example" { diff --git a/website/docs/r/fsx_lustre_file_system.html.markdown b/website/docs/r/fsx_lustre_file_system.html.markdown index 39c331dfe2a..2e1ed2bca23 100644 --- a/website/docs/r/fsx_lustre_file_system.html.markdown +++ b/website/docs/r/fsx_lustre_file_system.html.markdown @@ -56,7 +56,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_fsx_lustre_file_system` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_fsx_lustre_file_system` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `30m`) How long to wait for the file system to be created. @@ -70,7 +70,7 @@ FSx File Systems can be imported using the `id`, e.g. $ terraform import aws_fsx_lustre_file_system.example fs-543ab12b1ca672f33 ``` -Certain resource arguments, like `security_group_ids`, do not have a FSx API method for reading the information after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `security_group_ids`, do not have a FSx API method for reading the information after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_fsx_lustre_file_system" "example" { diff --git a/website/docs/r/fsx_windows_file_system.html.markdown b/website/docs/r/fsx_windows_file_system.html.markdown index cb40e7786b4..9a9ccce83cc 100644 --- a/website/docs/r/fsx_windows_file_system.html.markdown +++ b/website/docs/r/fsx_windows_file_system.html.markdown @@ -95,7 +95,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_fsx_windows_file_system` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_fsx_windows_file_system` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `45m`) How long to wait for the file system to be created. @@ -110,7 +110,7 @@ FSx File Systems can be imported using the `id`, e.g. $ terraform import aws_fsx_windows_file_system.example fs-543ab12b1ca672f33 ``` -Certain resource arguments, like `security_group_ids` and the `self_managed_active_directory` configuation block `password`, do not have a FSx API method for reading the information after creation. If these arguments are set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `security_group_ids` and the `self_managed_active_directory` configuation block `password`, do not have a FSx API method for reading the information after creation. If these arguments are set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_fsx_windows_file_system" "example" { diff --git a/website/docs/r/gamelift_fleet.html.markdown b/website/docs/r/gamelift_fleet.html.markdown index cfce329e742..d8b85441a16 100644 --- a/website/docs/r/gamelift_fleet.html.markdown +++ b/website/docs/r/gamelift_fleet.html.markdown @@ -81,7 +81,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_gamelift_fleet` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_gamelift_fleet` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `70m`) How long to wait for a fleet to be created. * `delete` - (Default `20m`) How long to wait for a fleet to be deleted. diff --git a/website/docs/r/glue_trigger.html.markdown b/website/docs/r/glue_trigger.html.markdown index f6e4cad4092..04ecdca7e4a 100644 --- a/website/docs/r/glue_trigger.html.markdown +++ b/website/docs/r/glue_trigger.html.markdown @@ -152,7 +152,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_glue_trigger` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_glue_trigger` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `5m`) How long to wait for a trigger to be created. diff --git a/website/docs/r/guardduty_invite_accepter.html.markdown b/website/docs/r/guardduty_invite_accepter.html.markdown index 8d511a2ecff..4314fdc5eff 100644 --- a/website/docs/r/guardduty_invite_accepter.html.markdown +++ b/website/docs/r/guardduty_invite_accepter.html.markdown @@ -61,7 +61,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_guardduty_invite_accepter` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_guardduty_invite_accepter` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `1m`) How long to wait for an invite to accept. diff --git a/website/docs/r/guardduty_member.html.markdown b/website/docs/r/guardduty_member.html.markdown index aa0f8d87fd3..7b692071b36 100644 --- a/website/docs/r/guardduty_member.html.markdown +++ b/website/docs/r/guardduty_member.html.markdown @@ -45,7 +45,7 @@ The following arguments are supported: ## Timeouts -`aws_guardduty_member` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_guardduty_member` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `60s`) How long to wait for a verification to be done against inviting GuardDuty member account. diff --git a/website/docs/r/iam_role.html.markdown b/website/docs/r/iam_role.html.markdown index 8fd1c17e6f7..641cb7aca1e 100644 --- a/website/docs/r/iam_role.html.markdown +++ b/website/docs/r/iam_role.html.markdown @@ -48,7 +48,7 @@ The following arguments are supported: * `name_prefix` - (Optional, Forces new resource) Creates a unique name beginning with the specified prefix. Conflicts with `name`. * `assume_role_policy` - (Required) The policy that grants an entity permission to assume the role. -~> **NOTE:** This `assume_role_policy` is very similar but slightly different than just a standard IAM policy and cannot use an `aws_iam_policy` resource. It _can_ however, use an `aws_iam_policy_document` [data source](https://www.terraform.io/docs/providers/aws/d/iam_policy_document.html), see example below for how this could work. +~> **NOTE:** This `assume_role_policy` is very similar but slightly different than just a standard IAM policy and cannot use an `aws_iam_policy` resource. It _can_ however, use an `aws_iam_policy_document` [data source](/docs/providers/aws/d/iam_policy_document.html), see example below for how this could work. * `force_detach_policies` - (Optional) Specifies to force detaching any policies the role has before destroying it. Defaults to `false`. * `path` - (Optional) The path to the role. diff --git a/website/docs/r/iam_server_certificate.html.markdown b/website/docs/r/iam_server_certificate.html.markdown index f0236a626cd..e6ed655fcfa 100644 --- a/website/docs/r/iam_server_certificate.html.markdown +++ b/website/docs/r/iam_server_certificate.html.markdown @@ -20,7 +20,7 @@ For information about server certificates in IAM, see [Managing Server Certificates][2] in AWS Documentation. ~> **Note:** All arguments including the private key will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/iam_user_login_profile.html.markdown b/website/docs/r/iam_user_login_profile.html.markdown index 818e94a242a..9749630b733 100644 --- a/website/docs/r/iam_user_login_profile.html.markdown +++ b/website/docs/r/iam_user_login_profile.html.markdown @@ -58,7 +58,7 @@ IAM User Login Profiles can be imported without password information support via $ terraform import aws_iam_user_login_profile.example myusername ``` -Since Terraform has no method to read the PGP or password information during import, use the [Terraform resource `lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/resources.html#ignore_changes) to ignore them unless password recreation is desired. e.g. +Since Terraform has no method to read the PGP or password information during import, use the [Terraform resource `lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to ignore them unless password recreation is desired. e.g. ```hcl resource "aws_iam_user_login_profile" "example" { diff --git a/website/docs/r/instance.html.markdown b/website/docs/r/instance.html.markdown index 60905b374f6..f5520686d1b 100644 --- a/website/docs/r/instance.html.markdown +++ b/website/docs/r/instance.html.markdown @@ -9,7 +9,7 @@ description: |- # Resource: aws_instance Provides an EC2 instance resource. This allows instances to be created, updated, -and deleted. Instances also support [provisioning](/docs/provisioners/index.html). +and deleted. Instances also support [provisioning](https://www.terraform.io/docs/provisioners/index.html). ## Example Usage diff --git a/website/docs/r/kinesis_stream.html.markdown b/website/docs/r/kinesis_stream.html.markdown index 5391e4a0236..5492ca9e271 100644 --- a/website/docs/r/kinesis_stream.html.markdown +++ b/website/docs/r/kinesis_stream.html.markdown @@ -57,7 +57,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_kinesis_stream` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_kinesis_stream` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `5 minutes`) Used for Creating a Kinesis Stream - `update` - (Default `120 minutes`) Used for Updating a Kinesis Stream diff --git a/website/docs/r/kinesis_video_stream.html.markdown b/website/docs/r/kinesis_video_stream.html.markdown index afbb5e7e1d5..9b72933eed1 100644 --- a/website/docs/r/kinesis_video_stream.html.markdown +++ b/website/docs/r/kinesis_video_stream.html.markdown @@ -50,7 +50,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_kinesis_video_stream` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_kinesis_video_stream` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `5 minutes`) Used for Creating a Kinesis Stream - `update` - (Default `120 minutes`) Used for Updating a Kinesis Stream diff --git a/website/docs/r/kms_ciphertext.html.markdown b/website/docs/r/kms_ciphertext.html.markdown index 959cde4aae6..cf629172a57 100644 --- a/website/docs/r/kms_ciphertext.html.markdown +++ b/website/docs/r/kms_ciphertext.html.markdown @@ -14,7 +14,7 @@ is stable across every apply. For a changing ciphertext value each apply, see the [`aws_kms_ciphertext` data source](/docs/providers/aws/d/kms_ciphertext.html). ~> **Note:** All arguments including the plaintext be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/kms_external_key.html.markdown b/website/docs/r/kms_external_key.html.markdown index f264a634db3..60f09b2fa37 100644 --- a/website/docs/r/kms_external_key.html.markdown +++ b/website/docs/r/kms_external_key.html.markdown @@ -10,7 +10,7 @@ description: |- Manages a KMS Customer Master Key that uses external key material. To instead manage a KMS Customer Master Key where AWS automatically generates and potentially rotates key material, see the [`aws_kms_key` resource](/docs/providers/aws/r/kms_key.html). -~> **Note:** All arguments including the key material will be stored in the raw state as plain-text. [Read more about sensitive data in state](/docs/state/sensitive-data.html). +~> **Note:** All arguments including the key material will be stored in the raw state as plain-text. [Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/lambda_function.html.markdown b/website/docs/r/lambda_function.html.markdown index 36d63545464..f900acd25b1 100644 --- a/website/docs/r/lambda_function.html.markdown +++ b/website/docs/r/lambda_function.html.markdown @@ -305,7 +305,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_lambda_function` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_lambda_function` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for slow uploads or EC2 throttling errors. diff --git a/website/docs/r/lambda_provisioned_concurrency_config.html.markdown b/website/docs/r/lambda_provisioned_concurrency_config.html.markdown index 6664ad06a17..4399028be0e 100644 --- a/website/docs/r/lambda_provisioned_concurrency_config.html.markdown +++ b/website/docs/r/lambda_provisioned_concurrency_config.html.markdown @@ -48,7 +48,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_lambda_provisioned_concurrency_config` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_lambda_provisioned_concurrency_config` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `15 minutes`) How long to wait for the Lambda Provisioned Concurrency Config to be ready on creation. * `update` - (Default `15 minutes`) How long to wait for the Lambda Provisioned Concurrency Config to be ready on update. diff --git a/website/docs/r/launch_configuration.html.markdown b/website/docs/r/launch_configuration.html.markdown index ddd47210a35..dd5395a8d43 100644 --- a/website/docs/r/launch_configuration.html.markdown +++ b/website/docs/r/launch_configuration.html.markdown @@ -222,7 +222,7 @@ identified by the `virtual_name` in the format `"ephemeral{0..N}"`. ~> **NOTE:** Changes to `*_block_device` configuration of _existing_ resources cannot currently be detected by Terraform. After updating to block device configuration, resource recreation can be manually triggered by using the -[`taint` command](/docs/commands/taint.html). +[`taint` command](https://www.terraform.io/docs/commands/taint.html). ## Attributes Reference @@ -233,7 +233,7 @@ In addition to all arguments above, the following attributes are exported: * `name` - The name of the launch configuration. [1]: /docs/providers/aws/r/autoscaling_group.html -[2]: /docs/configuration/resources.html#lifecycle +[2]: https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html [3]: /docs/providers/aws/r/spot_instance_request.html ## Import diff --git a/website/docs/r/lb.html.markdown b/website/docs/r/lb.html.markdown index 442e1996d4a..d6c35626706 100644 --- a/website/docs/r/lb.html.markdown +++ b/website/docs/r/lb.html.markdown @@ -150,7 +150,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_lb` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for Creating LB - `update` - (Default `10 minutes`) Used for LB modifications diff --git a/website/docs/r/mq_broker.html.markdown b/website/docs/r/mq_broker.html.markdown index 3646c4a4fbc..a9d16acc33c 100644 --- a/website/docs/r/mq_broker.html.markdown +++ b/website/docs/r/mq_broker.html.markdown @@ -23,7 +23,7 @@ phase because a modification has not yet taken place. You can use the brief downtime as the broker reboots. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/neptune_cluster.html.markdown b/website/docs/r/neptune_cluster.html.markdown index 865c56a35a4..74a1c75bd55 100644 --- a/website/docs/r/neptune_cluster.html.markdown +++ b/website/docs/r/neptune_cluster.html.markdown @@ -80,7 +80,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_neptune_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `120 minutes`) Used for Cluster creation - `update` - (Default `120 minutes`) Used for Cluster modifications diff --git a/website/docs/r/neptune_cluster_instance.html.markdown b/website/docs/r/neptune_cluster_instance.html.markdown index b743332ebec..d59fdbe3767 100644 --- a/website/docs/r/neptune_cluster_instance.html.markdown +++ b/website/docs/r/neptune_cluster_instance.html.markdown @@ -75,12 +75,12 @@ In addition to all arguments above, the following attributes are exported: * `storage_encrypted` - Specifies whether the neptune cluster is encrypted. * `writer` – Boolean indicating if this instance is writable. `False` indicates this instance is a read replica. -[1]: /docs/configuration/resources.html#count +[1]: https://www.terraform.io/docs/configuration/meta-arguments/count.html ## Timeouts `aws_neptune_cluster_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `90 minutes`) How long to wait for creating instances to become available. - `update` - (Default `90 minutes`) How long to wait for updating instances to complete updates. diff --git a/website/docs/r/neptune_cluster_snapshot.html.markdown b/website/docs/r/neptune_cluster_snapshot.html.markdown index 7faae112bfd..3160e963bad 100644 --- a/website/docs/r/neptune_cluster_snapshot.html.markdown +++ b/website/docs/r/neptune_cluster_snapshot.html.markdown @@ -45,7 +45,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_neptune_cluster_snapshot` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_neptune_cluster_snapshot` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `20m`) How long to wait for the snapshot to be available. diff --git a/website/docs/r/neptune_event_subscription.html.markdown b/website/docs/r/neptune_event_subscription.html.markdown index 133747fc5be..770403341e3 100644 --- a/website/docs/r/neptune_event_subscription.html.markdown +++ b/website/docs/r/neptune_event_subscription.html.markdown @@ -83,7 +83,7 @@ The following additional atttributes are provided: ## Timeouts -`aws_neptune_event_subscription` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_neptune_event_subscription` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `40m`) How long to wait for creating event subscription to become available. diff --git a/website/docs/r/network_acl.html.markdown b/website/docs/r/network_acl.html.markdown index dd9b82c5120..12180b46bb2 100644 --- a/website/docs/r/network_acl.html.markdown +++ b/website/docs/r/network_acl.html.markdown @@ -54,9 +54,9 @@ The following arguments are supported: * `vpc_id` - (Required) The ID of the associated VPC. * `subnet_ids` - (Optional) A list of Subnet IDs to apply the ACL to * `ingress` - (Optional) Specifies an ingress rule. Parameters defined below. - This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). + This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `egress` - (Optional) Specifies an egress rule. Parameters defined below. - This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). + This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `tags` - (Optional) A map of tags to assign to the resource. Both `egress` and `ingress` support the following keys: diff --git a/website/docs/r/opsworks_instance.html.markdown b/website/docs/r/opsworks_instance.html.markdown index 68680918d88..61d22039baa 100644 --- a/website/docs/r/opsworks_instance.html.markdown +++ b/website/docs/r/opsworks_instance.html.markdown @@ -110,7 +110,7 @@ identified by the `virtual_name` in the format `"ephemeral{0..N}"`. ~> **NOTE:** Currently, changes to `*_block_device` configuration of _existing_ resources cannot be automatically detected by Terraform. After making updates to block device configuration, resource recreation can be manually triggered by -using the [`taint` command](/docs/commands/taint.html). +using the [`taint` command](https://www.terraform.io/docs/commands/taint.html). ## Attributes Reference @@ -136,7 +136,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_opsworks_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used when the instance is created. It should cover the time needed for the instance to start successfully. - `delete` - (Default `10 minutes`) Used when the instance is deleted. It should cover the time needed for the instance to stop successfully. diff --git a/website/docs/r/opsworks_mysql_layer.html.markdown b/website/docs/r/opsworks_mysql_layer.html.markdown index b8fd4ff0501..f8f7ccd4df3 100644 --- a/website/docs/r/opsworks_mysql_layer.html.markdown +++ b/website/docs/r/opsworks_mysql_layer.html.markdown @@ -11,7 +11,7 @@ description: |- Provides an OpsWorks MySQL layer resource. ~> **Note:** All arguments including the root password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/opsworks_rds_db_instance.html.markdown b/website/docs/r/opsworks_rds_db_instance.html.markdown index 7b95a6fd457..b2a9d9e2ba7 100644 --- a/website/docs/r/opsworks_rds_db_instance.html.markdown +++ b/website/docs/r/opsworks_rds_db_instance.html.markdown @@ -11,7 +11,7 @@ description: |- Provides an OpsWorks RDS DB Instance resource. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/organizations_account.html.markdown b/website/docs/r/organizations_account.html.markdown index 262ec41fe2d..cc7edd97712 100644 --- a/website/docs/r/organizations_account.html.markdown +++ b/website/docs/r/organizations_account.html.markdown @@ -31,7 +31,7 @@ The following arguments are supported: * `email` - (Required) The email address of the owner to assign to the new member account. This email address must not already be associated with another AWS account. * `iam_user_access_to_billing` - (Optional) If set to `ALLOW`, the new account enables IAM users to access account billing information if they have the required permissions. If set to `DENY`, then only the root user of the new account can access account billing information. * `parent_id` - (Optional) Parent Organizational Unit ID or Root ID for the account. Defaults to the Organization default Root ID. A configuration must be present for this argument to perform drift detection. -* `role_name` - (Optional) The name of an IAM role that Organizations automatically preconfigures in the new member account. This role trusts the master account, allowing users in the master account to assume the role, as permitted by the master account administrator. The role has administrator permissions in the new member account. The Organizations API provides no method for reading this information after account creation, so Terraform cannot perform drift detection on its value and will always show a difference for a configured value after import unless [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) is used. +* `role_name` - (Optional) The name of an IAM role that Organizations automatically preconfigures in the new member account. This role trusts the master account, allowing users in the master account to assume the role, as permitted by the master account administrator. The role has administrator permissions in the new member account. The Organizations API provides no method for reading this information after account creation, so Terraform cannot perform drift detection on its value and will always show a difference for a configured value after import unless [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) is used. * `tags` - (Optional) Key-value map of resource tags. ## Attributes Reference @@ -49,7 +49,7 @@ The AWS member account can be imported by using the `account_id`, e.g. $ terraform import aws_organizations_account.my_org 111111111111 ``` -Certain resource arguments, like `role_name`, do not have an Organizations API method for reading the information after account creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `role_name`, do not have an Organizations API method for reading the information after account creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_organizations_account" "account" { diff --git a/website/docs/r/pinpoint_adm_channel.markdown b/website/docs/r/pinpoint_adm_channel.markdown index 807b5a50283..c3de242a374 100644 --- a/website/docs/r/pinpoint_adm_channel.markdown +++ b/website/docs/r/pinpoint_adm_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint ADM (Amazon Device Messaging) Channel resource. ~> **Note:** All arguments including the Client ID and Client Secret will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_apns_channel.markdown b/website/docs/r/pinpoint_apns_channel.markdown index 27e68da221c..63c37c1a3a1 100644 --- a/website/docs/r/pinpoint_apns_channel.markdown +++ b/website/docs/r/pinpoint_apns_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint APNs Channel resource. ~> **Note:** All arguments, including certificates and tokens, will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_apns_sandbox_channel.markdown b/website/docs/r/pinpoint_apns_sandbox_channel.markdown index 3664f4f9e49..e960514236d 100644 --- a/website/docs/r/pinpoint_apns_sandbox_channel.markdown +++ b/website/docs/r/pinpoint_apns_sandbox_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint APNs Sandbox Channel resource. ~> **Note:** All arguments, including certificates and tokens, will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_apns_voip_channel.markdown b/website/docs/r/pinpoint_apns_voip_channel.markdown index b015ec0beee..f4ad7f4c2d6 100644 --- a/website/docs/r/pinpoint_apns_voip_channel.markdown +++ b/website/docs/r/pinpoint_apns_voip_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint APNs VoIP Channel resource. ~> **Note:** All arguments, including certificates and tokens, will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_apns_voip_sandbox_channel.markdown b/website/docs/r/pinpoint_apns_voip_sandbox_channel.markdown index bbe496d9943..16a6da76193 100644 --- a/website/docs/r/pinpoint_apns_voip_sandbox_channel.markdown +++ b/website/docs/r/pinpoint_apns_voip_sandbox_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint APNs VoIP Sandbox Channel resource. ~> **Note:** All arguments, including certificates and tokens, will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_baidu_channel.markdown b/website/docs/r/pinpoint_baidu_channel.markdown index f4e15a265ef..cbe3767c647 100644 --- a/website/docs/r/pinpoint_baidu_channel.markdown +++ b/website/docs/r/pinpoint_baidu_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint Baidu Channel resource. ~> **Note:** All arguments including the Api Key and Secret Key will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/pinpoint_gcm_channel.markdown b/website/docs/r/pinpoint_gcm_channel.markdown index 89ed41878f1..72adcda5205 100644 --- a/website/docs/r/pinpoint_gcm_channel.markdown +++ b/website/docs/r/pinpoint_gcm_channel.markdown @@ -11,7 +11,7 @@ description: |- Provides a Pinpoint GCM Channel resource. ~> **Note:** Api Key argument will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage diff --git a/website/docs/r/rds_cluster.html.markdown b/website/docs/r/rds_cluster.html.markdown index 4a1c011f3de..0fb0c9c303b 100644 --- a/website/docs/r/rds_cluster.html.markdown +++ b/website/docs/r/rds_cluster.html.markdown @@ -26,7 +26,7 @@ brief downtime as the server reboots. See the AWS Docs on [RDS Maintenance][4] for more information. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage @@ -99,7 +99,7 @@ The following arguments are supported: * `allow_major_version_upgrade` - (Optional) Enable to allow major engine version upgrades when changing engine versions. Defaults to `false`. * `apply_immediately` - (Optional) Specifies whether any cluster modifications are applied immediately, or during the next maintenance window. Default is `false`. See [Amazon RDS Documentation for more information.](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.DBInstance.Modifying.html) -* `availability_zones` - (Optional) A list of EC2 Availability Zones for the DB cluster storage where DB cluster instances can be created. RDS automatically assigns 3 AZs if less than 3 AZs are configured, which will show as a difference requiring resource recreation next Terraform apply. It is recommended to specify 3 AZs or use [the `lifecycle` configuration block `ignore_changes` argument](/docs/configuration/resources.html#ignore_changes) if necessary. +* `availability_zones` - (Optional) A list of EC2 Availability Zones for the DB cluster storage where DB cluster instances can be created. RDS automatically assigns 3 AZs if less than 3 AZs are configured, which will show as a difference requiring resource recreation next Terraform apply. It is recommended to specify 3 AZs or use [the `lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) if necessary. * `backtrack_window` - (Optional) The target backtrack window, in seconds. Only available for `aurora` engine currently. To disable backtracking, set this value to `0`. Defaults to `0`. Must be between `0` and `259200` (72 hours) * `backup_retention_period` - (Optional) The days to retain backups for. Default `1` * `cluster_identifier_prefix` - (Optional, Forces new resource) Creates a unique cluster identifier beginning with the specified prefix. Conflicts with `cluster_identifier`. @@ -124,7 +124,7 @@ The following arguments are supported: * `port` - (Optional) The port on which the DB accepts connections * `preferred_backup_window` - (Optional) The daily time range during which automated backups are created if automated backups are enabled using the BackupRetentionPeriod parameter.Time in UTC. Default: A 30-minute window selected at random from an 8-hour block of time per region. e.g. 04:00-09:00 * `preferred_maintenance_window` - (Optional) The weekly time range during which system maintenance can occur, in (UTC) e.g. wed:04:00-wed:04:30 -* `replication_source_identifier` - (Optional) ARN of a source DB cluster or DB instance if this DB cluster is to be created as a Read Replica. If DB Cluster is part of a Global Cluster, use the [`lifecycle` configuration block `ignore_changes` argument](/docs/configuration/resources.html#ignore_changes) to prevent Terraform from showing differences for this argument instead of configuring this value. +* `replication_source_identifier` - (Optional) ARN of a source DB cluster or DB instance if this DB cluster is to be created as a Read Replica. If DB Cluster is part of a Global Cluster, use the [`lifecycle` configuration block `ignore_changes` argument](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to prevent Terraform from showing differences for this argument instead of configuring this value. * `restore_to_point_in_time` - (Optional) Nested attribute for [point in time restore](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_PIT.html). More details below. * `scaling_configuration` - (Optional) Nested attribute with scaling properties. Only valid when `engine_mode` is set to `serverless`. More details below. * `skip_final_snapshot` - (Optional) Determines whether a final DB snapshot is created before the DB cluster is deleted. If true is specified, no DB snapshot is created. If false is specified, a DB snapshot is created before the DB cluster is deleted, using the value from `final_snapshot_identifier`. Default is `false`. @@ -248,7 +248,7 @@ load-balanced across replicas ## Timeouts `aws_rds_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `120 minutes`) Used for Cluster creation - `update` - (Default `120 minutes`) Used for Cluster modifications diff --git a/website/docs/r/rds_cluster_instance.html.markdown b/website/docs/r/rds_cluster_instance.html.markdown index 2de3a6c99aa..aec821f6ba7 100644 --- a/website/docs/r/rds_cluster_instance.html.markdown +++ b/website/docs/r/rds_cluster_instance.html.markdown @@ -58,7 +58,7 @@ The following arguments are supported: For information on the difference between the available Aurora MySQL engines see [Comparison between Aurora MySQL 1 and Aurora MySQL 2](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/AuroraMySQL.Updates.20180206.html) in the Amazon RDS User Guide. -* `engine_version` - (Optional) The database engine version. When managing the engine version in the cluster, it is recommended to add the [lifecycle `ignore_changes` configuration](/docs/configuration/resources.html#ignore_changes) for this argument to prevent Terraform from proposing changes to the instance engine version directly. +* `engine_version` - (Optional) The database engine version. When managing the engine version in the cluster, it is recommended to add the [lifecycle `ignore_changes` configuration](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) for this argument to prevent Terraform from proposing changes to the instance engine version directly. * `instance_class` - (Required) The instance class to use. For details on CPU and memory, see [Scaling Aurora DB Instances][4]. Aurora uses `db.*` instance classes/types. Please see [AWS Documentation][7] for currently available instance classes and complete details. * `publicly_accessible` - (Optional) Bool to control if instance is publicly accessible. @@ -108,14 +108,14 @@ In addition to all arguments above, the following attributes are exported: [2]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Aurora.html [3]: /docs/providers/aws/r/rds_cluster.html [4]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Aurora.Managing.html -[5]: /docs/configuration/resources.html#count +[5]: https://www.terraform.io/docs/configuration/meta-arguments/count.html [6]: https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_CreateDBInstance.html [7]: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.DBInstanceClass.html ## Timeouts `aws_rds_cluster_instance` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `90 minutes`) Used for Creating Instances, Replicas, and restoring from Snapshots diff --git a/website/docs/r/rds_global_cluster.html.markdown b/website/docs/r/rds_global_cluster.html.markdown index 41da2e052a3..de76a8e4327 100644 --- a/website/docs/r/rds_global_cluster.html.markdown +++ b/website/docs/r/rds_global_cluster.html.markdown @@ -121,7 +121,7 @@ $ terraform import aws_rds_global_cluster.example example Certain resource arguments, like `force_destroy`, only exist within Terraform. If the argument is set in the Terraform configuration on an imported resource, Terraform will show a difference on the first plan after import to update the state value. This change is safe to apply immediately so the state matches the desired configuration. -Certain resource arguments, like `source_db_cluster_identifier`, do not have an API method for reading the information after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `source_db_cluster_identifier`, do not have an API method for reading the information after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_rds_global_cluster" "example" { diff --git a/website/docs/r/redshift_cluster.html.markdown b/website/docs/r/redshift_cluster.html.markdown index 266c870fb78..e46ad1e4644 100644 --- a/website/docs/r/redshift_cluster.html.markdown +++ b/website/docs/r/redshift_cluster.html.markdown @@ -11,7 +11,7 @@ description: |- Provides a Redshift Cluster Resource. ~> **Note:** All arguments including the username and password will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Example Usage @@ -76,7 +76,7 @@ string. ### Timeouts `aws_redshift_cluster` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `75 minutes`) Used for creating Clusters. - `update` - (Default `75 minutes`) Used for updating Clusters. diff --git a/website/docs/r/route.html.markdown b/website/docs/r/route.html.markdown index f96657c680f..4dc66df7bb7 100644 --- a/website/docs/r/route.html.markdown +++ b/website/docs/r/route.html.markdown @@ -84,7 +84,7 @@ will be exported as an attribute once the resource is created. ## Timeouts `aws_route` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `2 minutes`) Used for route creation - `delete` - (Default `5 minutes`) Used for route deletion diff --git a/website/docs/r/route53_resolver_endpoint.html.markdown b/website/docs/r/route53_resolver_endpoint.html.markdown index 215d1d5104a..5c6dd617aed 100644 --- a/website/docs/r/route53_resolver_endpoint.html.markdown +++ b/website/docs/r/route53_resolver_endpoint.html.markdown @@ -66,7 +66,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts `aws_route53_resolver_endpoint` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating Route 53 Resolver endpoint - `update` - (Default `10 minutes`) Used for updating Route 53 Resolver endpoint diff --git a/website/docs/r/route53_zone.html.markdown b/website/docs/r/route53_zone.html.markdown index b50dbeec2a1..56a7e1a5cfd 100644 --- a/website/docs/r/route53_zone.html.markdown +++ b/website/docs/r/route53_zone.html.markdown @@ -50,7 +50,7 @@ resource "aws_route53_record" "dev-ns" { ### Private Zone -~> **NOTE:** Terraform provides both exclusive VPC associations defined in-line in this resource via `vpc` configuration blocks and a separate [Zone VPC Association](/docs/providers/aws/r/route53_zone_association.html) resource. At this time, you cannot use in-line VPC associations in conjunction with any `aws_route53_zone_association` resources with the same zone ID otherwise it will cause a perpetual difference in plan output. You can optionally use the generic Terraform resource [lifecycle configuration block](/docs/configuration/resources.html#lifecycle) with `ignore_changes` to manage additional associations via the `aws_route53_zone_association` resource. +~> **NOTE:** Terraform provides both exclusive VPC associations defined in-line in this resource via `vpc` configuration blocks and a separate [Zone VPC Association](/docs/providers/aws/r/route53_zone_association.html) resource. At this time, you cannot use in-line VPC associations in conjunction with any `aws_route53_zone_association` resources with the same zone ID otherwise it will cause a perpetual difference in plan output. You can optionally use the generic Terraform resource [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` to manage additional associations via the `aws_route53_zone_association` resource. ~> **NOTE:** Private zones require at least one VPC association at all times. diff --git a/website/docs/r/route53_zone_association.html.markdown b/website/docs/r/route53_zone_association.html.markdown index dde709ee8e6..c39fef313eb 100644 --- a/website/docs/r/route53_zone_association.html.markdown +++ b/website/docs/r/route53_zone_association.html.markdown @@ -12,7 +12,7 @@ Manages a Route53 Hosted Zone VPC association. VPC associations can only be made ~> **NOTE:** Unless explicit association ordering is required (e.g. a separate cross-account association authorization), usage of this resource is not recommended. Use the `vpc` configuration blocks available within the [`aws_route53_zone` resource](/docs/providers/aws/r/route53_zone.html) instead. -~> **NOTE:** Terraform provides both this standalone Zone VPC Association resource and exclusive VPC associations defined in-line in the [`aws_route53_zone` resource](/docs/providers/aws/r/route53_zone.html) via `vpc` configuration blocks. At this time, you cannot use those in-line VPC associations in conjunction with this resource and the same zone ID otherwise it will cause a perpetual difference in plan output. You can optionally use the generic Terraform resource [lifecycle configuration block](/docs/configuration/resources.html#lifecycle) with `ignore_changes` in the `aws_route53_zone` resource to manage additional associations via this resource. +~> **NOTE:** Terraform provides both this standalone Zone VPC Association resource and exclusive VPC associations defined in-line in the [`aws_route53_zone` resource](/docs/providers/aws/r/route53_zone.html) via `vpc` configuration blocks. At this time, you cannot use those in-line VPC associations in conjunction with this resource and the same zone ID otherwise it will cause a perpetual difference in plan output. You can optionally use the generic Terraform resource [lifecycle configuration block](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html) with `ignore_changes` in the `aws_route53_zone` resource to manage additional associations via this resource. ## Example Usage diff --git a/website/docs/r/route_table.html.markdown b/website/docs/r/route_table.html.markdown index 51bbffe4b6f..a3c4e945aa4 100644 --- a/website/docs/r/route_table.html.markdown +++ b/website/docs/r/route_table.html.markdown @@ -56,7 +56,7 @@ resource "aws_route_table" "r" { The following arguments are supported: * `vpc_id` - (Required) The VPC ID. -* `route` - (Optional) A list of route objects. Their keys are documented below. This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). +* `route` - (Optional) A list of route objects. Their keys are documented below. This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `tags` - (Optional) A map of tags to assign to the resource. * `propagating_vgws` - (Optional) A list of virtual gateways for propagation. diff --git a/website/docs/r/security_group.html.markdown b/website/docs/r/security_group.html.markdown index da0f0c21efd..f96cf766e40 100644 --- a/website/docs/r/security_group.html.markdown +++ b/website/docs/r/security_group.html.markdown @@ -66,10 +66,10 @@ assign a random, unique name to classify your security groups in a way that can be updated, use `tags`. * `ingress` - (Optional) Can be specified multiple times for each ingress rule. Each ingress block supports fields documented below. - This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). + This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `egress` - (Optional, VPC only) Can be specified multiple times for each egress rule. Each egress block supports fields documented below. - This argument is processed in [attribute-as-blocks mode](/docs/configuration/attr-as-blocks.html). + This argument is processed in [attribute-as-blocks mode](https://www.terraform.io/docs/configuration/attr-as-blocks.html). * `revoke_rules_on_delete` - (Optional) Instruct Terraform to revoke all of the Security Groups attached ingress and egress rules before deleting the rule itself. This is normally not needed, however certain AWS services such as @@ -171,7 +171,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_security_group` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_security_group` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10m`) How long to wait for a security group to be created. diff --git a/website/docs/r/ses_domain_identity_verification.html.markdown b/website/docs/r/ses_domain_identity_verification.html.markdown index 56069476a99..2edfa29a94c 100644 --- a/website/docs/r/ses_domain_identity_verification.html.markdown +++ b/website/docs/r/ses_domain_identity_verification.html.markdown @@ -53,7 +53,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`acm_ses_domain_identity_verification` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`acm_ses_domain_identity_verification` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `45m`) How long to wait for a domain identity to be verified. diff --git a/website/docs/r/ssm_document.html.markdown b/website/docs/r/ssm_document.html.markdown index cedf8114c5f..ffeb17ac3ce 100644 --- a/website/docs/r/ssm_document.html.markdown +++ b/website/docs/r/ssm_document.html.markdown @@ -102,7 +102,7 @@ SSM Documents can be imported using the name, e.g. $ terraform import aws_ssm_document.example example ``` -The `attachments_source` argument does not have an SSM API method for reading the attachment information detail after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +The `attachments_source` argument does not have an SSM API method for reading the attachment information detail after creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_ssm_document" "test" { diff --git a/website/docs/r/ssm_parameter.html.markdown b/website/docs/r/ssm_parameter.html.markdown index 30b252b603a..a97415e3fd8 100644 --- a/website/docs/r/ssm_parameter.html.markdown +++ b/website/docs/r/ssm_parameter.html.markdown @@ -51,7 +51,7 @@ resource "aws_ssm_parameter" "secret" { ``` ~> **Note:** The unencrypted value of a SecureString will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ## Argument Reference diff --git a/website/docs/r/storagegateway_gateway.html.markdown b/website/docs/r/storagegateway_gateway.html.markdown index 0a1a1d2581a..c07f62bf937 100644 --- a/website/docs/r/storagegateway_gateway.html.markdown +++ b/website/docs/r/storagegateway_gateway.html.markdown @@ -115,7 +115,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_storagegateway_gateway` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_storagegateway_gateway` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for gateway activation and connection to Storage Gateway. @@ -127,7 +127,7 @@ In addition to all arguments above, the following attributes are exported: $ terraform import aws_storagegateway_gateway.example arn:aws:storagegateway:us-east-1:123456789012:gateway/sgw-12345678 ``` -Certain resource arguments, like `gateway_ip_address` do not have a Storage Gateway API method for reading the information after creation, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `gateway_ip_address` do not have a Storage Gateway API method for reading the information after creation, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl diff --git a/website/docs/r/storagegateway_nfs_file_share.html.markdown b/website/docs/r/storagegateway_nfs_file_share.html.markdown index e439e04dd6d..deebc12898a 100644 --- a/website/docs/r/storagegateway_nfs_file_share.html.markdown +++ b/website/docs/r/storagegateway_nfs_file_share.html.markdown @@ -70,7 +70,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_storagegateway_nfs_file_share` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_storagegateway_nfs_file_share` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for file share creation. * `update` - (Default `10m`) How long to wait for file share updates. diff --git a/website/docs/r/storagegateway_smb_file_share.html.markdown b/website/docs/r/storagegateway_smb_file_share.html.markdown index 3d340016c67..cd4256f8a2f 100644 --- a/website/docs/r/storagegateway_smb_file_share.html.markdown +++ b/website/docs/r/storagegateway_smb_file_share.html.markdown @@ -83,7 +83,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_storagegateway_smb_file_share` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +`aws_storagegateway_smb_file_share` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: * `create` - (Default `10m`) How long to wait for file share creation. * `update` - (Default `10m`) How long to wait for file share updates. diff --git a/website/docs/r/subnet.html.markdown b/website/docs/r/subnet.html.markdown index 90f55a30606..e3184e6b520 100644 --- a/website/docs/r/subnet.html.markdown +++ b/website/docs/r/subnet.html.markdown @@ -74,7 +74,7 @@ In addition to all arguments above, the following attributes are exported: ## Timeouts -`aws_subnet` provides the following [Timeouts](/docs/configuration/resources.html#timeouts) +`aws_subnet` provides the following [Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10m`) How long to wait for a subnet to be created. diff --git a/website/docs/r/vpc_endpoint.html.markdown b/website/docs/r/vpc_endpoint.html.markdown index 36837b9d978..3a82dbd7e6b 100644 --- a/website/docs/r/vpc_endpoint.html.markdown +++ b/website/docs/r/vpc_endpoint.html.markdown @@ -128,7 +128,7 @@ Defaults to `false`. ### Timeouts `aws_vpc_endpoint` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating a VPC endpoint - `update` - (Default `10 minutes`) Used for VPC endpoint modifications diff --git a/website/docs/r/vpc_endpoint_subnet_association.html.markdown b/website/docs/r/vpc_endpoint_subnet_association.html.markdown index 56fb455d5c9..783e3e038c6 100644 --- a/website/docs/r/vpc_endpoint_subnet_association.html.markdown +++ b/website/docs/r/vpc_endpoint_subnet_association.html.markdown @@ -37,7 +37,7 @@ The following arguments are supported: ### Timeouts `aws_vpc_endpoint_subnet_association` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating the association - `delete` - (Default `10 minutes`) Used for destroying the association diff --git a/website/docs/r/vpc_ipv4_cidr_block_association.html.markdown b/website/docs/r/vpc_ipv4_cidr_block_association.html.markdown index 6534308b93b..0435df8c707 100644 --- a/website/docs/r/vpc_ipv4_cidr_block_association.html.markdown +++ b/website/docs/r/vpc_ipv4_cidr_block_association.html.markdown @@ -36,7 +36,7 @@ The following arguments are supported: ## Timeouts `aws_vpc_ipv4_cidr_block_association` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `10 minutes`) Used for creating the association - `delete` - (Default `10 minutes`) Used for destroying the association diff --git a/website/docs/r/vpc_peering_connection.html.markdown b/website/docs/r/vpc_peering_connection.html.markdown index cc4799ea48b..56bbb88ba5a 100644 --- a/website/docs/r/vpc_peering_connection.html.markdown +++ b/website/docs/r/vpc_peering_connection.html.markdown @@ -140,7 +140,7 @@ connection. ### Timeouts `aws_vpc_peering_connection` provides the following -[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `1 minute`) Used for creating a peering connection - `update` - (Default `1 minute`) Used for peering connection modifications diff --git a/website/docs/r/vpc_peering_connection_accepter.html.markdown b/website/docs/r/vpc_peering_connection_accepter.html.markdown index cb3962282dd..e80165ce49b 100644 --- a/website/docs/r/vpc_peering_connection_accepter.html.markdown +++ b/website/docs/r/vpc_peering_connection_accepter.html.markdown @@ -125,7 +125,7 @@ VPC Peering Connection Accepters can be imported by using the Peering Connection $ terraform import aws_vpc_peering_connection_accepter.example pcx-12345678 ``` -Certain resource arguments, like `auto_accept`, do not have an EC2 API method for reading the information after peering connection creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](/docs/configuration/resources.html#ignore_changes) to hide the difference, e.g. +Certain resource arguments, like `auto_accept`, do not have an EC2 API method for reading the information after peering connection creation. If the argument is set in the Terraform configuration on an imported resource, Terraform will always show a difference. To workaround this behavior, either omit the argument from the Terraform configuration or use [`ignore_changes`](https://www.terraform.io/docs/configuration/meta-arguments/lifecycle.html#ignore_changes) to hide the difference, e.g. ```hcl resource "aws_vpc_peering_connection_accepter" "example" { diff --git a/website/docs/r/vpn_connection.html.markdown b/website/docs/r/vpn_connection.html.markdown index c9b046e07cb..3b7edab9947 100644 --- a/website/docs/r/vpn_connection.html.markdown +++ b/website/docs/r/vpn_connection.html.markdown @@ -11,7 +11,7 @@ description: |- Manages an EC2 VPN connection. These objects can be connected to customer gateways, and allow you to establish tunnels between your network and Amazon. ~> **Note:** All arguments including `tunnel1_preshared_key` and `tunnel2_preshared_key` will be stored in the raw state as plain-text. -[Read more about sensitive data in state](/docs/state/sensitive-data.html). +[Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html). ~> **Note:** The CIDR blocks in the arguments `tunnel1_inside_cidr` and `tunnel2_inside_cidr` must have a prefix of /30 and be a part of a specific range. [Read more about this in the AWS documentation](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_VpnTunnelOptionsSpecification.html). diff --git a/website/docs/r/workspaces_workspace.html.markdown b/website/docs/r/workspaces_workspace.html.markdown index d4db3eaaa3f..a62b266f437 100644 --- a/website/docs/r/workspaces_workspace.html.markdown +++ b/website/docs/r/workspaces_workspace.html.markdown @@ -66,7 +66,7 @@ The following arguments are supported: ### Timeouts `aws_workspaces_workspace` provides the following -[Timeouts](/docs/configuration/resources.html#operation-timeouts) configuration options: +[Timeouts](https://www.terraform.io/docs/configuration/blocks/resources/syntax.html#operation-timeouts) configuration options: - `create` - (Default `30 minutes`) Used for WorkSpace creation. - `update` - (Default `10 minutes`) Used for WorkSpace updating.