You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-21Lines changed: 14 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -218,23 +218,16 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
218
218
* Few tests and edge cases examples: [#46](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-46-no-private-subnets), [#44](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-44-asymmetric-private-subnets), [#108](https://github.com/terraform-aws-modules/terraform-aws-vpc/tree/master/examples/issue-108-route-already-exists)
219
219
220
220
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
221
-
## Requirements
222
-
223
-
| Name | Version |
224
-
|------|---------|
225
-
| terraform |~> 0.12.6 |
226
-
| aws |~> 2.53 |
227
-
228
221
## Providers
229
222
230
223
| Name | Version |
231
224
|------|---------|
232
-
| aws |~> 2.53|
225
+
| aws |~> 2.57|
233
226
234
227
## Inputs
235
228
236
229
| Name | Description | Type | Default | Required |
| amazon\_side\_asn | The Autonomous System Number (ASN) for the Amazon side of the gateway. By default the virtual private gateway is created with the current default Amazon ASN. |`string`|`"64512"`| no |
239
232
| apigw\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for API GW endpoint |`bool`|`false`| no |
240
233
| apigw\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for API GW endpoint |`list(string)`|`[]`| no |
@@ -290,7 +283,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| database\_route\_table\_tags | Additional tags for the database route tables |`map(string)`|`{}`| no |
293
-
| database\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on database subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
286
+
| database\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on database subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
294
287
| database\_subnet\_group\_tags | Additional tags for the database subnet group |`map(string)`|`{}`| no |
295
288
| database\_subnet\_ipv6\_prefixes | Assigns IPv6 database subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
296
289
| database\_subnet\_suffix | Suffix to append to database subnets name |`string`|`"db"`| no |
@@ -343,7 +336,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| elasticache\_route\_table\_tags | Additional tags for the elasticache route tables |`map(string)`|`{}`| no |
346
-
| elasticache\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on elasticache subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
339
+
| elasticache\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on elasticache subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
347
340
| elasticache\_subnet\_ipv6\_prefixes | Assigns IPv6 elasticache subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
348
341
| elasticache\_subnet\_suffix | Suffix to append to elasticache subnets name |`string`|`"elasticache"`| no |
349
342
| elasticache\_subnet\_tags | Additional tags for the elasticache subnets |`map(string)`|`{}`| no |
@@ -355,8 +348,8 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
355
348
| enable\_appmesh\_envoy\_management\_endpoint | Should be true if you want to provision a AppMesh endpoint to the VPC |`bool`|`false`| no |
356
349
| enable\_appstream\_endpoint | Should be true if you want to provision a AppStream endpoint to the VPC |`bool`|`false`| no |
357
350
| enable\_athena\_endpoint | Should be true if you want to provision a Athena endpoint to the VPC |`bool`|`false`| no |
358
-
| enable\_classiclink | Should be true to enable ClassicLink for the VPC. Only valid in regions and accounts that support EC2 Classic. |`bool`|`null`|no|
359
-
| enable\_classiclink\_dns\_support | Should be true to enable ClassicLink DNS Support for the VPC. Only valid in regions and accounts that support EC2 Classic. |`bool`|`null`|no|
351
+
| enable\_classiclink | Should be true to enable ClassicLink for the VPC. Only valid in regions and accounts that support EC2 Classic. |`bool`|n/a|yes|
352
+
| enable\_classiclink\_dns\_support | Should be true to enable ClassicLink DNS Support for the VPC. Only valid in regions and accounts that support EC2 Classic. |`bool`|n/a|yes|
360
353
| enable\_cloud\_directory\_endpoint | Should be true if you want to provision an Cloud Directory endpoint to the VPC |`bool`|`false`| no |
361
354
| enable\_cloudformation\_endpoint | Should be true if you want to provision a Cloudformation endpoint to the VPC |`bool`|`false`| no |
362
355
| enable\_cloudtrail\_endpoint | Should be true if you want to provision a CloudTrail endpoint to the VPC |`bool`|`false`| no |
@@ -411,12 +404,12 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
411
404
| events\_endpoint\_subnet\_ids | The ID of one or more subnets in which to create a network interface for CloudWatch Events endpoint. Only a single subnet within an AZ is supported. If omitted, private subnets will be used. |`list(string)`|`[]`| no |
412
405
| external\_nat\_ip\_ids | List of EIP IDs to be assigned to the NAT Gateways (used in combination with reuse\_nat\_ips) |`list(string)`|`[]`| no |
413
406
| flow\_log\_cloudwatch\_iam\_role\_arn | The ARN for the IAM role that's used to post flow logs to a CloudWatch Logs log group. When flow\_log\_destination\_arn is set to ARN of Cloudwatch Logs, this argument needs to be provided. |`string`|`""`| no |
414
-
| flow\_log\_cloudwatch\_log\_group\_kms\_key\_id | The ARN of the KMS Key to use when encrypting log data for VPC flow logs. |`string`|`null`|no|
407
+
| flow\_log\_cloudwatch\_log\_group\_kms\_key\_id | The ARN of the KMS Key to use when encrypting log data for VPC flow logs. |`string`|n/a|yes|
415
408
| flow\_log\_cloudwatch\_log\_group\_name\_prefix | Specifies the name prefix of CloudWatch Log Group for VPC flow logs. |`string`|`"/aws/vpc-flow-log/"`| no |
416
-
| flow\_log\_cloudwatch\_log\_group\_retention\_in\_days | Specifies the number of days you want to retain log events in the specified log group for VPC flow logs. |`number`|`null`|no|
409
+
| flow\_log\_cloudwatch\_log\_group\_retention\_in\_days | Specifies the number of days you want to retain log events in the specified log group for VPC flow logs. |`number`|n/a|yes|
417
410
| flow\_log\_destination\_arn | The ARN of the CloudWatch log group or S3 bucket where VPC Flow Logs will be pushed. If this ARN is a S3 bucket the appropriate permissions need to be set on that bucket's policy. When create\_flow\_log\_cloudwatch\_log\_group is set to false this argument must be provided. |`string`|`""`| no |
418
411
| flow\_log\_destination\_type | Type of flow log destination. Can be s3 or cloud-watch-logs. |`string`|`"cloud-watch-logs"`| no |
419
-
| flow\_log\_log\_format | The fields to include in the flow log record, in the order in which they should appear. |`string`|`null`|no|
412
+
| flow\_log\_log\_format | The fields to include in the flow log record, in the order in which they should appear. |`string`|n/a|yes|
420
413
| flow\_log\_traffic\_type | The type of traffic to capture. Valid values: ACCEPT, REJECT, ALL. |`string`|`"ALL"`| no |
421
414
| git\_codecommit\_endpoint\_private\_dns\_enabled | Whether or not to associate a private hosted zone with the specified VPC for Git Codecommit endpoint |`bool`|`false`| no |
422
415
| git\_codecommit\_endpoint\_security\_group\_ids | The ID of one or more security groups to associate with the network interface for Git Codecommit endpoint |`list`|`[]`| no |
@@ -431,7 +424,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| intra\_route\_table\_tags | Additional tags for the intra route tables |`map(string)`|`{}`| no |
434
-
| intra\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on intra subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
427
+
| intra\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on intra subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
435
428
| intra\_subnet\_ipv6\_prefixes | Assigns IPv6 intra subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
436
429
| intra\_subnet\_suffix | Suffix to append to intra subnets name |`string`|`"intra"`| no |
437
430
| intra\_subnet\_tags | Additional tags for the intra subnets |`map(string)`|`{}`| no |
@@ -463,7 +456,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| private\_route\_table\_tags | Additional tags for the private route tables |`map(string)`|`{}`| no |
466
-
| private\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on private subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
459
+
| private\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on private subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
467
460
| private\_subnet\_ipv6\_prefixes | Assigns IPv6 private subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
468
461
| private\_subnet\_suffix | Suffix to append to private subnets name |`string`|`"private"`| no |
469
462
| private\_subnet\_tags | Additional tags for the private subnets |`map(string)`|`{}`| no |
@@ -476,7 +469,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| public\_route\_table\_tags | Additional tags for the public route tables |`map(string)`|`{}`| no |
479
-
| public\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on public subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
472
+
| public\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on public subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
480
473
| public\_subnet\_ipv6\_prefixes | Assigns IPv6 public subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
481
474
| public\_subnet\_suffix | Suffix to append to public subnets name |`string`|`"public"`| no |
482
475
| public\_subnet\_tags | Additional tags for the public subnets |`map(string)`|`{}`| no |
@@ -486,7 +479,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
| redshift\_route\_table\_tags | Additional tags for the redshift route tables |`map(string)`|`{}`| no |
489
-
| redshift\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on redshift subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`|no|
482
+
| redshift\_subnet\_assign\_ipv6\_address\_on\_creation | Assign IPv6 address on redshift subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|n/a|yes|
490
483
| redshift\_subnet\_group\_tags | Additional tags for the redshift subnet group |`map(string)`|`{}`| no |
491
484
| redshift\_subnet\_ipv6\_prefixes | Assigns IPv6 redshift subnet id based on the Amazon provided /56 prefix base 10 integer (0-256). Must be of equal length to the corresponding IPv4 subnet list |`list`|`[]`| no |
492
485
| redshift\_subnet\_suffix | Suffix to append to redshift subnets name |`string`|`"redshift"`| no |
@@ -542,7 +535,7 @@ It is possible to integrate this VPC module with [terraform-aws-transit-gateway
542
535
| vpc\_endpoint\_tags | Additional tags for the VPC Endpoints |`map(string)`|`{}`| no |
543
536
| vpc\_flow\_log\_tags | Additional tags for the VPC Flow Logs |`map(string)`|`{}`| no |
544
537
| vpc\_tags | Additional tags for the VPC |`map(string)`|`{}`| no |
545
-
| vpn\_gateway\_az | The Availability Zone for the VPN Gateway |`string`|`null`|no|
538
+
| vpn\_gateway\_az | The Availability Zone for the VPN Gateway |`string`|n/a|yes|
546
539
| vpn\_gateway\_id | ID of VPN Gateway to attach to the VPC |`string`|`""`| no |
547
540
| vpn\_gateway\_tags | Additional tags for the VPN gateway |`map(string)`|`{}`| no |
0 commit comments