You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16-16Lines changed: 16 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -234,7 +234,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
234
234
| athena\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for Athena endpoint |`bool`|`false`| no |
235
235
| athena\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for Athena endpoint |`list(string)`|`[]`| no |
236
236
| athena\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for Athena endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. |`list(string)`|`[]`| no |
237
-
| azs | A list of availability zones in the region |`list(string)`|`[]`| no |
237
+
| azs | A list of availability zones names or ids in the region |`list(string)`|`[]`| no |
238
238
| cidr | The CIDR block for the VPC. Default value is a valid CIDR, but not acceptable by AWS and should be overridden |`string`|`"0.0.0.0/0"`| no |
239
239
| cloud\_directory\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for Cloud Directory endpoint |`bool`|`false`| no |
240
240
| cloud\_directory\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for Cloud Directory endpoint |`list(string)`|`[]`| no |
@@ -270,17 +270,17 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
270
270
| customer\_gateways | Maps of Customer Gateway's attributes (BGP ASN and Gateway's Internet-routable external IP address) |`map(map(any))`|`{}`| no |
271
271
| database\_acl\_tags | Additional tags for the database subnets network ACL |`map(string)`|`{}`| no |
272
272
| database\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for database subnets |`bool`|`false`| no |
| database\_route\_table\_tags | Additional tags for the database route tables |`map(string)`|`{}`| no |
276
276
| database\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on database subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
277
277
| database\_subnet\_group\_tags | Additional tags for the database subnet group |`map(string)`|`{}`| no |
278
278
| database\_subnet\_ipv6\_prefixes | Assigns IPv6 database subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
279
279
| database\_subnet\_suffix | Suffix to append to database subnets name |`string`|`"db"`| no |
280
280
| database\_subnet\_tags | Additional tags for the database subnets |`map(string)`|`{}`| no |
281
281
| database\_subnets | A list of database subnets |`list(string)`|`[]`| no |
282
-
| default\_network\_acl\_egress | List of maps of egress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]<br></pre> | no |
283
-
| default\_network\_acl\_ingress | List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]<br></pre> | no |
282
+
| default\_network\_acl\_egress | List of maps of egress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
283
+
| default\_network\_acl\_ingress | List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
284
284
| default\_network\_acl\_name | Name to be used on the Default Network ACL |`string`|`""`| no |
285
285
| default\_network\_acl\_tags | Additional tags for the Default Network ACL |`map(string)`|`{}`| no |
286
286
| default\_vpc\_enable\_classiclink | Should be true to enable ClassicLink in the Default VPC |`bool`|`false`| no |
@@ -289,7 +289,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
289
289
| default\_vpc\_name | Name to be used on the Default VPC |`string`|`""`| no |
290
290
| default\_vpc\_tags | Additional tags for the Default VPC |`map(string)`|`{}`| no |
291
291
| dhcp\_options\_domain\_name | Specifies DNS name for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`""`| no |
292
-
| dhcp\_options\_domain\_name\_servers | Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) |`list(string)`| <pre>[<br> "AmazonProvidedDNS"<br>]<br></pre> | no |
292
+
| dhcp\_options\_domain\_name\_servers | Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) |`list(string)`| <pre>[<br> "AmazonProvidedDNS"<br>]</pre> | no |
293
293
| dhcp\_options\_netbios\_name\_servers | Specify a list of netbios servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
294
294
| dhcp\_options\_netbios\_node\_type | Specify netbios node\_type for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`""`| no |
295
295
| dhcp\_options\_ntp\_servers | Specify a list of NTP servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
@@ -320,8 +320,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
320
320
| efs\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for EFS endpoint. Only a single subnet within an AZ is supported. Ifomitted, private subnets will be used. |`list(string)`|`[]`| no |
321
321
| elasticache\_acl\_tags | Additional tags for the elasticache subnets network ACL |`map(string)`|`{}`| no |
322
322
| elasticache\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for elasticache subnets |`bool`|`false`| no |
| elasticache\_route\_table\_tags | Additional tags for the elasticache route tables |`map(string)`|`{}`| no |
326
326
| elasticache\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on elasticache subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
327
327
| elasticache\_subnet\_ipv6\_prefixes | Assigns IPv6 elasticache subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
@@ -398,8 +398,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
398
398
| instance\_tenancy | A tenancy option for instances launched into the VPC |`string`|`"default"`| no |
399
399
| intra\_acl\_tags | Additional tags for the intra subnets network ACL |`map(string)`|`{}`| no |
400
400
| intra\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for intra subnets |`bool`|`false`| no |
| intra\_route\_table\_tags | Additional tags for the intra route tables |`map(string)`|`{}`| no |
404
404
| intra\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on intra subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
405
405
| intra\_subnet\_ipv6\_prefixes | Assigns IPv6 intra subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
@@ -430,8 +430,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
430
430
| one\_nat\_gateway\_per\_az | Should be true if you want only one NAT Gateway per availability zone. Requires `var.azs` to be set, and the number of `public_subnets` created to be greater than or equal to the number of availability zones specified in `var.azs`. |`bool`|`false`| no |
431
431
| private\_acl\_tags | Additional tags for the private subnets network ACL |`map(string)`|`{}`| no |
432
432
| private\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for private subnets |`bool`|`false`| no |
| private\_route\_table\_tags | Additional tags for the private route tables |`map(string)`|`{}`| no |
436
436
| private\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on private subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
437
437
| private\_subnet\_ipv6\_prefixes | Assigns IPv6 private subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
@@ -442,8 +442,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
442
442
| propagate\_public\_route\_tables\_vgw | Should be true if you want route table propagation |`bool`|`false`| no |
443
443
| public\_acl\_tags | Additional tags for the public subnets network ACL |`map(string)`|`{}`| no |
444
444
| public\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for public subnets |`bool`|`false`| no |
| public\_route\_table\_tags | Additional tags for the public route tables |`map(string)`|`{}`| no |
448
448
| public\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on public subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
449
449
| public\_subnet\_ipv6\_prefixes | Assigns IPv6 public subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
@@ -452,8 +452,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
452
452
| public\_subnets | A list of public subnets inside the VPC |`list(string)`|`[]`| no |
453
453
| redshift\_acl\_tags | Additional tags for the redshift subnets network ACL |`map(string)`|`{}`| no |
454
454
| redshift\_dedicated\_network\_acl | Whether to use dedicated network ACL (not default) and custom rules for redshift subnets |`bool`|`false`| no |
| redshift\_route\_table\_tags | Additional tags for the redshift route tables |`map(string)`|`{}`| no |
458
458
| redshift\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on redshift subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`| n/a | yes |
459
459
| redshift\_subnet\_group\_tags | Additional tags for the redshift subnet group |`map(string)`|`{}`| no |
Copy file name to clipboardExpand all lines: examples/simple-vpc/README.md
+4Lines changed: 4 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,10 @@ Configuration in this directory creates set of VPC resources which may be suffic
4
4
5
5
There is a public and private subnet created per availability zone in addition to single NAT Gateway shared between all 3 availability zones.
6
6
7
+
This configuration uses Availability Zone IDs and Availability Zone names for demonstration purposes. Normally, you need to specify only names or IDs.
8
+
9
+
[Read more about AWS regions, availability zones and local zones](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-regions-availability-zones).
0 commit comments