You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* add public subnet for redshift to enable access for kinesis
* fix redshift subnet group name
* fix redshift public association
* add public redshift to documentation
* fix doc typo
* update code after review
Copy file name to clipboardExpand all lines: README.md
+9Lines changed: 9 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -165,6 +165,14 @@ Sometimes it is handy to have public access to RDS instances (it is not recommen
165
165
enable_dns_support = true
166
166
```
167
167
168
+
## Public access to Redshift cluster
169
+
170
+
Sometimes it is handy to have public access to Redshift clusters (for example if you need to access it by Kinesis - VPC endpoint for Kinesis is not yet supported by Redshift) by specifying these arguments:
171
+
172
+
```hcl
173
+
enable_public_redshift = true # <= Default it will be placed into private subnet route table
174
+
```
175
+
168
176
## Terraform version
169
177
170
178
Terraform version 0.10.3 or newer is required for this module to work.
@@ -271,6 +279,7 @@ Terraform version 0.10.3 or newer is required for this module to work.
271
279
| redshift\_subnet\_suffix | Suffix to append to redshift subnets name | string |`"redshift"`| no |
272
280
| redshift\_subnet\_tags | Additional tags for the redshift subnets | map |`{}`| no |
273
281
| redshift\_subnets | A list of redshift subnets | list |`[]`| no |
282
+
| enable\_public\_redshift | Should be true if you want Redshift cluster to be placed into public subnet route table | string |`"false"`| no |
274
283
| reuse\_nat\_ips | Should be true if you don't want EIPs to be created for your NAT Gateways and will instead pass them in via the 'external_nat_ip_ids' variable | string |`"false"`| no |
275
284
| secondary\_cidr\_blocks | List of secondary CIDR blocks to associate with the VPC to extend the IP Address pool | list |`[]`| no |
276
285
| single\_nat\_gateway | Should be true if you want to provision a single shared NAT Gateway across all of your private networks | string |`"false"`| no |
0 commit comments