You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -28,6 +28,12 @@ Sponsored by [Cloudcraft - the best way to draw AWS diagrams](https://cloudcraft
28
28
29
29
<ahref="https://cloudcraft.co/?utm_source=terraform-aws-vpc"target="_blank"><imgsrc="https://raw.githubusercontent.com/antonbabenko/modules.tf-lambda/master/misc/cloudcraft-logo.png"alt="Cloudcraft - the best way to draw AWS diagrams"width="211"height="56" /></a>
30
30
31
+
## Terraform versions
32
+
33
+
For Terraform 0.12 use version `v2.*` of this module.
34
+
35
+
If you are using Terraform 0.11 you can use versions `v1.*`.
36
+
31
37
## Usage
32
38
33
39
```hcl
@@ -183,10 +189,6 @@ Sometimes it is handy to have public access to Redshift clusters (for example if
183
189
enable_public_redshift = true # <= By default Redshift subnets will be associated with the private route table
184
190
```
185
191
186
-
## Terraform version
187
-
188
-
Terraform version 0.10.3 or newer is required for this module to work.
@@ -252,6 +254,15 @@ Terraform version 0.10.3 or newer is required for this module to work.
252
254
| ecr\_dkr\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECR DKR endpoint | string |`"false"`| no |
253
255
| ecr\_dkr\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECR DKR endpoint | list |`[]`| no |
254
256
| ecr\_dkr\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECR dkr endpoint. If omitted, private subnets will be used. | list |`[]`| no |
257
+
| ecs\_agent\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS Agent endpoint | string |`"false"`| no |
258
+
| ecs\_agent\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS Agent endpoint | list |`[]`| no |
259
+
| ecs\_agent\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS Agent endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
260
+
| ecs\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS endpoint | string |`"false"`| no |
261
+
| ecs\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS endpoint | list |`[]`| no |
262
+
| ecs\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
263
+
| ecs\_telemetry\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS Telemetry endpoint | string |`"false"`| no |
264
+
| ecs\_telemetry\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS Telemetry endpoint | list |`[]`| no |
265
+
| ecs\_telemetry\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS Telemetry endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
255
266
| elasticache\_acl\_tags | Additional tags for the elasticache subnets network ACL | map |`{}`| no |
256
267
| elasticache\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for elasticache subnets | string |`"false"`| no |
@@ -269,10 +280,14 @@ Terraform version 0.10.3 or newer is required for this module to work.
269
280
| enable\_ec2messages\_endpoint | Should be true if you want to provision an EC2MESSAGES endpoint to the VPC | string |`"false"`| no |
270
281
| enable\_ecr\_api\_endpoint | Should be true if you want to provision an ecr api endpoint to the VPC | string |`"false"`| no |
271
282
| enable\_ecr\_dkr\_endpoint | Should be true if you want to provision an ecr dkr endpoint to the VPC | string |`"false"`| no |
283
+
| enable\_ecs\_agent\_endpoint | Should be true if you want to provision a ECS Agent endpoint to the VPC | string |`"false"`| no |
284
+
| enable\_ecs\_endpoint | Should be true if you want to provision a ECS endpoint to the VPC | string |`"false"`| no |
285
+
| enable\_ecs\_telemetry\_endpoint | Should be true if you want to provision a ECS Telemetry endpoint to the VPC | string |`"false"`| no |
272
286
| enable\_kms\_endpoint | Should be true if you want to provision a KMS endpoint to the VPC | string |`"false"`| no |
273
287
| enable\_nat\_gateway | Should be true if you want to provision NAT Gateways for each of your private networks | string |`"false"`| no |
274
288
| enable\_public\_redshift | Controls if redshift should have public routing table | string |`"false"`| no |
275
289
| enable\_s3\_endpoint | Should be true if you want to provision an S3 endpoint to the VPC | string |`"false"`| no |
290
+
| enable\_sqs\_endpoint | Should be true if you want to provision an SQS endpoint to the VPC | string |`"false"`| no |
276
291
| enable\_ssm\_endpoint | Should be true if you want to provision an SSM endpoint to the VPC | string |`"false"`| no |
277
292
| enable\_ssmmessages\_endpoint | Should be true if you want to provision a SSMMESSAGES endpoint to the VPC | string |`"false"`| no |
278
293
| enable\_vpn\_gateway | Should be true if you want to create a new VPN Gateway resource and attach it to the VPC | string |`"false"`| no |
@@ -327,21 +342,15 @@ Terraform version 0.10.3 or newer is required for this module to work.
327
342
| reuse\_nat\_ips | Should be true if you don't want EIPs to be created for your NAT Gateways and will instead pass them in via the 'external_nat_ip_ids' variable | string |`"false"`| no |
328
343
| secondary\_cidr\_blocks | List of secondary CIDR blocks to associate with the VPC to extend the IP Address pool | list |`[]`| no |
329
344
| single\_nat\_gateway | Should be true if you want to provision a single shared NAT Gateway across all of your private networks | string |`"false"`| no |
345
+
| sqs\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for SQS endpoint | string |`"false"`| no |
346
+
| sqs\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for SQS endpoint | list |`[]`| no |
347
+
| sqs\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for SQS endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
330
348
| ssm\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for SSM endpoint | string |`"false"`| no |
331
349
| ssm\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for SSM endpoint | list |`[]`| no |
332
350
| ssm\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for SSM endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
333
351
| ssmmessages\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for SSMMESSAGES endpoint | string |`"false"`| no |
334
352
| ssmmessages\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for SSMMESSAGES endpoint | list |`[]`| no |
335
353
| ssmmessages\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for SSMMESSAGES endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
336
-
| ecs\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS endpoint | string |`"false"`| no |
337
-
| ecs\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS endpoint | list |`[]`| no |
338
-
| ecs\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
339
-
| ecs\_agent\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS Agent endpoint | string |`"false"`| no |
340
-
| ecs\_agent\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS Agent endpoint | list |`[]`| no |
341
-
| ecs\_agent\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS Agent endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
342
-
| ecs\_telemetry\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for ECS Telemetry endpoint | string |`"false"`| no |
343
-
| ecs\_telemetry\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for ECS Telemetry endpoint | list |`[]`| no |
344
-
| ecs\_telemetry\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for ECS Telemetry endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. | list |`[]`| no |
345
354
| tags | A map of tags to add to all resources | map |`{}`| no |
346
355
| vpc\_tags | Additional tags for the VPC | map |`{}`| no |
347
356
| vpn\_gateway\_id | ID of VPN Gateway to attach to the VPC | string |`""`| no |
@@ -424,26 +433,29 @@ Terraform version 0.10.3 or newer is required for this module to work.
424
433
| vpc\_endpoint\_ecr\_dkr\_dns\_entry | The DNS entries for the VPC Endpoint for ECR DKR. |
425
434
| vpc\_endpoint\_ecr\_dkr\_id | The ID of VPC endpoint for ECR DKR |
426
435
| vpc\_endpoint\_ecr\_dkr\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECR DKR. |
436
+
| vpc\_endpoint\_ecs\_agent\_dns\_entry | The DNS entries for the VPC Endpoint for ECS Agent. |
437
+
| vpc\_endpoint\_ecs\_agent\_id | The ID of VPC endpoint for ECS Agent |
438
+
| vpc\_endpoint\_ecs\_agent\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS Agent. |
439
+
| vpc\_endpoint\_ecs\_dns\_entry | The DNS entries for the VPC Endpoint for ECS. |
440
+
| vpc\_endpoint\_ecs\_id | The ID of VPC endpoint for ECS |
441
+
| vpc\_endpoint\_ecs\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS. |
442
+
| vpc\_endpoint\_ecs\_telemetry\_dns\_entry | The DNS entries for the VPC Endpoint for ECS Telemetry. |
443
+
| vpc\_endpoint\_ecs\_telemetry\_id | The ID of VPC endpoint for ECS Telemetry |
444
+
| vpc\_endpoint\_ecs\_telemetry\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS Telemetry. |
427
445
| vpc\_endpoint\_kms\_dns\_entry | The DNS entries for the VPC Endpoint for KMS. |
428
446
| vpc\_endpoint\_kms\_id | The ID of VPC endpoint for KMS |
429
447
| vpc\_endpoint\_kms\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for KMS. |
430
448
| vpc\_endpoint\_s3\_id | The ID of VPC endpoint for S3 |
431
449
| vpc\_endpoint\_s3\_pl\_id | The prefix list for the S3 VPC endpoint. |
450
+
| vpc\_endpoint\_sqs\_dns\_entry | The DNS entries for the VPC Endpoint for SQS. |
451
+
| vpc\_endpoint\_sqs\_id | The ID of VPC endpoint for SQS |
452
+
| vpc\_endpoint\_sqs\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for SQS. |
432
453
| vpc\_endpoint\_ssm\_dns\_entry | The DNS entries for the VPC Endpoint for SSM. |
433
454
| vpc\_endpoint\_ssm\_id | The ID of VPC endpoint for SSM |
434
455
| vpc\_endpoint\_ssm\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for SSM. |
435
456
| vpc\_endpoint\_ssmmessages\_dns\_entry | The DNS entries for the VPC Endpoint for SSMMESSAGES. |
436
457
| vpc\_endpoint\_ssmmessages\_id | The ID of VPC endpoint for SSMMESSAGES |
437
458
| vpc\_endpoint\_ssmmessages\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for SSMMESSAGES. |
438
-
| vpc\_endpoint\_ecs\_dns\_entry | The DNS entries for the VPC Endpoint for ECS. |
439
-
| vpc\_endpoint\_ecs\_id | The ID of VPC endpoint for ECS |
440
-
| vpc\_endpoint\_ecs\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS. |
441
-
| vpc\_endpoint\_ecs\_agent\_dns\_entry | The DNS entries for the VPC Endpoint for ECS Agent. |
442
-
| vpc\_endpoint\_ecs\_agent\_id | The ID of VPC endpoint for ECS Agent |
443
-
| vpc\_endpoint\_ecs\_agent\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS Agent. |
444
-
| vpc\_endpoint\_ecs\_telemetry\_dns\_entry | The DNS entries for the VPC Endpoint for ECS Telemetry. |
445
-
| vpc\_endpoint\_ecs\_telemetry\_id | The ID of VPC endpoint for ECS Telemetry |
446
-
| vpc\_endpoint\_ecs\_telemetry\_network\_interface\_ids | One or more network interfaces for the VPC Endpoint for ECS Telemetry. |
447
459
| vpc\_id | The ID of the VPC |
448
460
| vpc\_instance\_tenancy | Tenancy of instances spin up within VPC |
449
461
| vpc\_main\_route\_table\_id | The ID of the main route table associated with this VPC |
0 commit comments