You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -170,7 +170,11 @@ Sometimes it is handy to have public access to RDS instances (it is not recommen
170
170
Sometimes it is handy to have public access to Redshift clusters (for example if you need to access it by Kinesis - VPC endpoint for Kinesis is not yet supported by Redshift) by specifying these arguments:
171
171
172
172
```hcl
173
+
<<<<<<< HEAD
173
174
enable_public_redshift = true # <= Default it will be placed into private subnet route table
175
+
=======
176
+
enable_public_redshift = true # <= By default Redshift subnets will be associated with the private route table
177
+
>>>>>>> Redshift public subnets (#222)
174
178
```
175
179
176
180
## Terraform version
@@ -247,6 +251,7 @@ Terraform version 0.10.3 or newer is required for this module to work.
247
251
| enable\_ecr\_api\_endpoint | Should be true if you want to provision an ecr api endpoint to the VPC | string |`"false"`| no |
248
252
| enable\_ecr\_dkr\_endpoint | Should be true if you want to provision an ecr dkr endpoint to the VPC | string |`"false"`| no |
249
253
| enable\_nat\_gateway | Should be true if you want to provision NAT Gateways for each of your private networks | string |`"false"`| no |
254
+
| enable\_public\_redshift | Controls if redshift should have public routing table | string |`"false"`| no |
250
255
| enable\_s3\_endpoint | Should be true if you want to provision an S3 endpoint to the VPC | string |`"false"`| no |
251
256
| enable\_ssm\_endpoint | Should be true if you want to provision an SSM endpoint to the VPC | string |`"false"`| no |
252
257
| enable\_ssmmessages\_endpoint | Should be true if you want to provision a SSMMESSAGES endpoint to the VPC | string |`"false"`| no |
0 commit comments