Skip to content

Commit d9e35c3

Browse files
author
vijay-stephen
committed
Module refactoring (#86)
* removed dependency cloudposse * removed dependency cloudposse * * Working version * Tested Simple and custom exmaples * Added feature to create subnets easy way * updated documentation * removed unwanted modules * corrected output * fixed tf lock file
1 parent 8aa00da commit d9e35c3

File tree

1 file changed

+5
-16
lines changed
  • docs/arc-iac-docs/modules/terraform-aws-ref-arch-network/docs/module-usage-guide

1 file changed

+5
-16
lines changed

docs/arc-iac-docs/modules/terraform-aws-ref-arch-network/docs/module-usage-guide/README.md

Lines changed: 5 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To incorporate the module into your main Terraform configuration file (e.g., mai
2929
```hcl
3030
module "network" {
3131
source = "sourcefuse/arc-network/aws"
32-
version = "2.6.10"
32+
version = "3.0.0"
3333
# insert the required variables here
3434
}
3535
```
@@ -87,25 +87,14 @@ For basic usage, see the [example](https://github.com/sourcefuse/terraform-aws-a
8787

8888
This example will create:
8989

90-
- A VPC with CIDR block `10.9.0.0/16`
91-
- Two subnets in availability zones : `"us-east-1a"`, `"us-east-1b"`
90+
- A VPC with CIDR block `10.0.0.0/16`
91+
- Two subnets in availability zones : `"us-east-1a"`, `"us-east-1b"` and `"us-east-1c"`
9292
- Route tables, internet gateway, NAT Gateways
93-
- vpc endpoints for the services: s3, kms, cloudwatch, elb, dynamodb, ec2, sns, sqs, ecs, rds
93+
- vpc endpoints for the services: s3, dynamodb
9494

9595
### Tips and Recommendations
9696

97-
- If you want to create custom subnet ranges, check [example](https://github.com/sourcefuse/terraform-aws-arc-network/tree/main/examples/custom-subnets)
98-
- If you want to create your own nat gateway(s) check [example](https://github.com/sourcefuse/terraform-aws-arc-network/tree/main/examples/custom-nat-gateways)
99-
- If you have disabled the default nat gateways for your custom subnets
100-
then you need to pass a nat gateway id for each private subnet that
101-
you are creating. If custom_az_ngw_ids is left empty in this case
102-
then no default route is created by the module.
103-
- Creating nat gateway as demonstrated in this example is a 3 step process:
104-
- STEP 1 : Apply the configuration without any nat gateway and eip resources and without custom_az_ngw_ids value
105-
- STEP 2 : Add nat gateway and eip resources and run apply
106-
- STEP 3 : finally add custom_az_ngw_ids input map and run apply
107-
This does introduce a cyclical dependency between the network module and the nat and eip resources, but it is expected
108-
since its a deviation from the [recommended aws nat gateway configuration](https://aws.amazon.com/blogs/networking-and-content-delivery/using-nat-gateways-with-multiple-amazon-vpcs-at-scale/).
97+
- The module allows you to define and create subnets with granular control over placement in specific availability zones (AZs). You can configure subnet attributes like CIDR blocks, public or private subnet type, NAT Gateway attachment etc, please refer [custom subnets](https://github.com/sourcefuse/terraform-aws-arc-network/tree/main/examples/custom-subnets) folder.
10998

11099
<details><summary>tldr</summary>
111100

0 commit comments

Comments
 (0)