You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -350,8 +350,8 @@ Available targets:
350
350
| <aname="input_ipv6_cidrs"></a> [ipv6\_cidrs](#input\_ipv6\_cidrs)| Lists of CIDRs to assign to subnets. Order of CIDRs in the lists must not change over time.<br>Lists may contain more CIDRs than needed. | <pre>list(object({<br> private = list(string)<br> public = list(string)<br> }))</pre> |`[]`| no |
351
351
| <aname="input_ipv6_egress_only_igw_id"></a> [ipv6\_egress\_only\_igw\_id](#input\_ipv6\_egress\_only\_igw\_id)| The Egress Only Internet Gateway ID the private IPv6 subnets will route traffic to.<br>Used if `private_route_table_enabled` is `true` and `ipv6_enabled` is `true`, ignored otherwise. |`list(string)`|`[]`| no |
352
352
| <aname="input_ipv6_enabled"></a> [ipv6\_enabled](#input\_ipv6\_enabled)| Set true to enable IPv6 addresses in the subnets |`bool`|`false`| no |
353
-
| <aname="input_ipv6_private_instance_hostnames_enabled"></a> [ipv6\_private\_instance\_hostnames\_enabled](#input\_ipv6\_private\_instance\_hostnames\_enabled)| If `true`, DNS queries for instance hostnames in the private subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
354
-
| <aname="input_ipv6_public_instance_hostnames_enabled"></a> [ipv6\_public\_instance\_hostnames\_enabled](#input\_ipv6\_public\_instance\_hostnames\_enabled)| If `true`, DNS queries for instance hostnames in the public subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
353
+
| <aname="input_ipv6_private_instance_hostnames_enabled"></a> [ipv6\_private\_instance\_hostnames\_enabled](#input\_ipv6\_private\_instance\_hostnames\_enabled)| If `true` (or if `ipv4_enabled` is false), DNS queries for instance hostnames in the private subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
354
+
| <aname="input_ipv6_public_instance_hostnames_enabled"></a> [ipv6\_public\_instance\_hostnames\_enabled](#input\_ipv6\_public\_instance\_hostnames\_enabled)| If `true` (or if `ipv4_enabled` is false), DNS queries for instance hostnames in the public subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
355
355
| <aname="input_label_key_case"></a> [label\_key\_case](#input\_label\_key\_case)| Controls the letter case of the `tags` keys (label names) for tags generated by this module.<br>Does not affect keys of tags passed in via the `tags` input.<br>Possible values: `lower`, `title`, `upper`.<br>Default value: `title`. |`string`|`null`| no |
356
356
| <aname="input_label_order"></a> [label\_order](#input\_label\_order)| The order in which the labels (ID elements) appear in the `id`.<br>Defaults to ["namespace", "environment", "stage", "name", "attributes"].<br>You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. |`list(string)`|`null`| no |
357
357
| <aname="input_label_value_case"></a> [label\_value\_case](#input\_label\_value\_case)| Controls the letter case of ID elements (labels) as included in `id`,<br>set as tag values, and output by this module individually.<br>Does not affect values of tags passed in via the `tags` input.<br>Possible values: `lower`, `title`, `upper` and `none` (no transformation).<br>Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.<br>Default value: `lower`. |`string`|`null`| no |
@@ -374,7 +374,7 @@ Available targets:
374
374
| <aname="input_open_network_acl_ipv4_rule_number"></a> [open\_network\_acl\_ipv4\_rule\_number](#input\_open\_network\_acl\_ipv4\_rule\_number)| The `rule_no` assigned to the network ACL rules for IPv4 traffic generated by this module |`number`|`100`| no |
375
375
| <aname="input_open_network_acl_ipv6_rule_number"></a> [open\_network\_acl\_ipv6\_rule\_number](#input\_open\_network\_acl\_ipv6\_rule\_number)| The `rule_no` assigned to the network ACL rules for IPv6 traffic generated by this module |`number`|`111`| no |
376
376
| <aname="input_private_assign_ipv6_address_on_creation"></a> [private\_assign\_ipv6\_address\_on\_creation](#input\_private\_assign\_ipv6\_address\_on\_creation)| If `true`, network interfaces created in a private subnet will be assigned an IPv6 address |`bool`|`true`| no |
377
-
| <aname="input_private_dns64_nat64_enabled"></a> [private\_dns64\_nat64\_enabled](#input\_private\_dns64\_nat64\_enabled)| If `true` and IPv6 is enabled, DNS queries made to the Amazon-provided DNS Resolver in private subnets will return synthetic<br>IPv6 addresses for IPv4-only destinations, and these addresses will be routed to the NAT Gateway.<br>Requires `public_subnets_enabled`, `nat_gateway_enabled`, and `private_route_table_enabled` to be `true` to be fully operational.|`bool`|`true`| no |
377
+
| <aname="input_private_dns64_nat64_enabled"></a> [private\_dns64\_nat64\_enabled](#input\_private\_dns64\_nat64\_enabled)| If `true` and IPv6 is enabled, DNS queries made to the Amazon-provided DNS Resolver in private subnets will return synthetic<br>IPv6 addresses for IPv4-only destinations, and these addresses will be routed to the NAT Gateway.<br>Requires `public_subnets_enabled`, `nat_gateway_enabled`, and `private_route_table_enabled` to be `true` to be fully operational.<br>Defaults to `true` unless there is no public IPv4 subnet for egress, in which case it defaults to false. |`bool`|`null`| no |
378
378
| <aname="input_private_label"></a> [private\_label](#input\_private\_label)| The string to use in IDs and elsewhere to distinguish resources for the private subnets from resources for the public subnets |`string`|`"private"`| no |
379
379
| <aname="input_private_open_network_acl_enabled"></a> [private\_open\_network\_acl\_enabled](#input\_private\_open\_network\_acl\_enabled)| If `true`, a single network ACL be created and it will be associated with every private subnet, and a rule (number 100)<br>will be created allowing all ingress and all egress. You can add additional rules to this network ACL<br>using the `aws_network_acl_rule` resource.<br>If `false`, you will will need to manage the network ACL external to this module. |`bool`|`true`| no |
380
380
| <aname="input_private_route_table_enabled"></a> [private\_route\_table\_enabled](#input\_private\_route\_table\_enabled)| If true, a network route table and default route to the NAT gateway, NAT instance, or egress-only gateway<br>will be created for each private subnet (1:1). If false, you will need to create your own route table(s) and route(s). |`bool`|`true`| no |
Copy file name to clipboardExpand all lines: docs/terraform.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,8 +91,8 @@
91
91
| <aname="input_ipv6_cidrs"></a> [ipv6\_cidrs](#input\_ipv6\_cidrs)| Lists of CIDRs to assign to subnets. Order of CIDRs in the lists must not change over time.<br>Lists may contain more CIDRs than needed. | <pre>list(object({<br> private = list(string)<br> public = list(string)<br> }))</pre> |`[]`| no |
92
92
| <aname="input_ipv6_egress_only_igw_id"></a> [ipv6\_egress\_only\_igw\_id](#input\_ipv6\_egress\_only\_igw\_id)| The Egress Only Internet Gateway ID the private IPv6 subnets will route traffic to.<br>Used if `private_route_table_enabled` is `true` and `ipv6_enabled` is `true`, ignored otherwise. |`list(string)`|`[]`| no |
93
93
| <aname="input_ipv6_enabled"></a> [ipv6\_enabled](#input\_ipv6\_enabled)| Set true to enable IPv6 addresses in the subnets |`bool`|`false`| no |
94
-
| <aname="input_ipv6_private_instance_hostnames_enabled"></a> [ipv6\_private\_instance\_hostnames\_enabled](#input\_ipv6\_private\_instance\_hostnames\_enabled)| If `true`, DNS queries for instance hostnames in the private subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
95
-
| <aname="input_ipv6_public_instance_hostnames_enabled"></a> [ipv6\_public\_instance\_hostnames\_enabled](#input\_ipv6\_public\_instance\_hostnames\_enabled)| If `true`, DNS queries for instance hostnames in the public subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
94
+
| <aname="input_ipv6_private_instance_hostnames_enabled"></a> [ipv6\_private\_instance\_hostnames\_enabled](#input\_ipv6\_private\_instance\_hostnames\_enabled)| If `true` (or if `ipv4_enabled` is false), DNS queries for instance hostnames in the private subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
95
+
| <aname="input_ipv6_public_instance_hostnames_enabled"></a> [ipv6\_public\_instance\_hostnames\_enabled](#input\_ipv6\_public\_instance\_hostnames\_enabled)| If `true` (or if `ipv4_enabled` is false), DNS queries for instance hostnames in the public subnets will be answered with AAAA (IPv6) records. |`bool`|`false`| no |
96
96
| <aname="input_label_key_case"></a> [label\_key\_case](#input\_label\_key\_case)| Controls the letter case of the `tags` keys (label names) for tags generated by this module.<br>Does not affect keys of tags passed in via the `tags` input.<br>Possible values: `lower`, `title`, `upper`.<br>Default value: `title`. |`string`|`null`| no |
97
97
| <aname="input_label_order"></a> [label\_order](#input\_label\_order)| The order in which the labels (ID elements) appear in the `id`.<br>Defaults to ["namespace", "environment", "stage", "name", "attributes"].<br>You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. |`list(string)`|`null`| no |
98
98
| <aname="input_label_value_case"></a> [label\_value\_case](#input\_label\_value\_case)| Controls the letter case of ID elements (labels) as included in `id`,<br>set as tag values, and output by this module individually.<br>Does not affect values of tags passed in via the `tags` input.<br>Possible values: `lower`, `title`, `upper` and `none` (no transformation).<br>Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.<br>Default value: `lower`. |`string`|`null`| no |
@@ -115,7 +115,7 @@
115
115
| <aname="input_open_network_acl_ipv4_rule_number"></a> [open\_network\_acl\_ipv4\_rule\_number](#input\_open\_network\_acl\_ipv4\_rule\_number)| The `rule_no` assigned to the network ACL rules for IPv4 traffic generated by this module |`number`|`100`| no |
116
116
| <aname="input_open_network_acl_ipv6_rule_number"></a> [open\_network\_acl\_ipv6\_rule\_number](#input\_open\_network\_acl\_ipv6\_rule\_number)| The `rule_no` assigned to the network ACL rules for IPv6 traffic generated by this module |`number`|`111`| no |
117
117
| <aname="input_private_assign_ipv6_address_on_creation"></a> [private\_assign\_ipv6\_address\_on\_creation](#input\_private\_assign\_ipv6\_address\_on\_creation)| If `true`, network interfaces created in a private subnet will be assigned an IPv6 address |`bool`|`true`| no |
118
-
| <aname="input_private_dns64_nat64_enabled"></a> [private\_dns64\_nat64\_enabled](#input\_private\_dns64\_nat64\_enabled)| If `true` and IPv6 is enabled, DNS queries made to the Amazon-provided DNS Resolver in private subnets will return synthetic<br>IPv6 addresses for IPv4-only destinations, and these addresses will be routed to the NAT Gateway.<br>Requires `public_subnets_enabled`, `nat_gateway_enabled`, and `private_route_table_enabled` to be `true` to be fully operational.|`bool`|`true`| no |
118
+
| <aname="input_private_dns64_nat64_enabled"></a> [private\_dns64\_nat64\_enabled](#input\_private\_dns64\_nat64\_enabled)| If `true` and IPv6 is enabled, DNS queries made to the Amazon-provided DNS Resolver in private subnets will return synthetic<br>IPv6 addresses for IPv4-only destinations, and these addresses will be routed to the NAT Gateway.<br>Requires `public_subnets_enabled`, `nat_gateway_enabled`, and `private_route_table_enabled` to be `true` to be fully operational.<br>Defaults to `true` unless there is no public IPv4 subnet for egress, in which case it defaults to false. |`bool`|`null`| no |
119
119
| <aname="input_private_label"></a> [private\_label](#input\_private\_label)| The string to use in IDs and elsewhere to distinguish resources for the private subnets from resources for the public subnets |`string`|`"private"`| no |
120
120
| <aname="input_private_open_network_acl_enabled"></a> [private\_open\_network\_acl\_enabled](#input\_private\_open\_network\_acl\_enabled)| If `true`, a single network ACL be created and it will be associated with every private subnet, and a rule (number 100)<br>will be created allowing all ingress and all egress. You can add additional rules to this network ACL<br>using the `aws_network_acl_rule` resource.<br>If `false`, you will will need to manage the network ACL external to this module. |`bool`|`true`| no |
121
121
| <aname="input_private_route_table_enabled"></a> [private\_route\_table\_enabled](#input\_private\_route\_table\_enabled)| If true, a network route table and default route to the NAT gateway, NAT instance, or egress-only gateway<br>will be created for each private subnet (1:1). If false, you will need to create your own route table(s) and route(s). |`bool`|`true`| no |
0 commit comments