You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_auto_assign_public_ip"></a> [auto\_assign\_public\_ip](#input\_auto\_assign\_public\_ip)| Specify true to indicate that instances launched into the subnet should be assigned a public IP address. |`bool`|`false`| no |
216
219
| <aname="input_availability_zones"></a> [availability\_zones](#input\_availability\_zones)| Number of Availability Zone to be used by VPC Subnets |`list(any)`|`[]`| no |
220
+
| <aname="input_create_ipam_pool"></a> [create\_ipam\_pool](#input\_create\_ipam\_pool)| Whether create new IPAM pool |`bool`|`true`| no |
217
221
| <aname="input_database_subnet_assign_ipv6_address_on_creation"></a> [database\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_database\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on database subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
218
222
| <aname="input_database_subnet_cidrs"></a> [database\_subnet\_cidrs](#input\_database\_subnet\_cidrs)| Database Tier subnet CIDRs to be created |`list(any)`|`[]`| no |
219
223
| <aname="input_database_subnet_enabled"></a> [database\_subnet\_enabled](#input\_database\_subnet\_enabled)| Set true to enable database subnets |`bool`|`false`| no |
220
224
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 22,<br> "protocol": "tcp",<br> "rule_no": 98,<br> "to_port": 22<br> },<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 3389,<br> "protocol": "tcp",<br> "rule_no": 99,<br> "to_port": 3389<br> },<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
221
225
| <aname="input_enable_database_subnet_group"></a> [enable\_database\_subnet\_group](#input\_enable\_database\_subnet\_group)| Whether create database subnet groups |`bool`|`false`| no |
222
226
| <aname="input_environment"></a> [environment](#input\_environment)| Specify the environment indentifier for the VPC |`string`|`""`| no |
227
+
| <aname="input_existing_ipam_managed_cidr"></a> [existing\_ipam\_managed\_cidr](#input\_existing\_ipam\_managed\_cidr)| The existing IPAM pool CIDR |`string`|`""`| no |
223
228
| <aname="input_flow_log_cloudwatch_log_group_kms_key_arn"></a> [flow\_log\_cloudwatch\_log\_group\_kms\_key\_arn](#input\_flow\_log\_cloudwatch\_log\_group\_kms\_key\_arn)| The ARN of the KMS Key to use when encrypting log data for VPC flow logs |`string`|`null`| no |
224
229
| <aname="input_flow_log_cloudwatch_log_group_retention_in_days"></a> [flow\_log\_cloudwatch\_log\_group\_retention\_in\_days](#input\_flow\_log\_cloudwatch\_log\_group\_retention\_in\_days)| Specifies the number of days you want to retain log events in the specified log group for VPC flow logs. |`number`|`null`| no |
225
230
| <aname="input_flow_log_enabled"></a> [flow\_log\_enabled](#input\_flow\_log\_enabled)| Whether or not to enable VPC Flow Logs |`bool`|`false`| no |
226
231
| <aname="input_flow_log_max_aggregation_interval"></a> [flow\_log\_max\_aggregation\_interval](#input\_flow\_log\_max\_aggregation\_interval)| The maximum interval of time during which a flow of packets is captured and aggregated into a flow log record. Valid Values: `60` seconds or `600` seconds. |`number`|`60`| no |
227
232
| <aname="input_intra_subnet_assign_ipv6_address_on_creation"></a> [intra\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_intra\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on intra subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
228
233
| <aname="input_intra_subnet_cidrs"></a> [intra\_subnet\_cidrs](#input\_intra\_subnet\_cidrs)| A list of intra subnets CIDR to be created |`list(any)`|`[]`| no |
229
234
| <aname="input_intra_subnet_enabled"></a> [intra\_subnet\_enabled](#input\_intra\_subnet\_enabled)| Set true to enable intra subnets |`bool`|`false`| no |
235
+
| <aname="input_ipam_enabled"></a> [ipam\_enabled](#input\_ipam\_enabled)| Whether enable IPAM managed VPC or not |`bool`|`false`| no |
236
+
| <aname="input_ipam_pool_id"></a> [ipam\_pool\_id](#input\_ipam\_pool\_id)| The existing IPAM pool id if any |`string`|`null`| no |
237
+
| <aname="input_ipv4_netmask_length"></a> [ipv4\_netmask\_length](#input\_ipv4\_netmask\_length)| The netmask length for IPAM managed VPC |`number`|`16`| no |
230
238
| <aname="input_ipv6_enabled"></a> [ipv6\_enabled](#input\_ipv6\_enabled)| Requests an Amazon-provided IPv6 CIDR block with a /56 prefix length for the VPC. You cannot specify the range of IP addresses, or the size of the CIDR block. |`bool`|`false`| no |
231
239
| <aname="input_ipv6_only"></a> [ipv6\_only](#input\_ipv6\_only)| Enable it for deploying native IPv6 network |`bool`|`false`| no |
232
240
| <aname="input_name"></a> [name](#input\_name)| Specify the name of the VPC |`string`|`""`| no |
@@ -237,6 +245,7 @@ In this module, we have implemented the following CIS Compliance checks for VPC:
237
245
| <aname="input_public_subnet_assign_ipv6_address_on_creation"></a> [public\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_public\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on public subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
238
246
| <aname="input_public_subnet_cidrs"></a> [public\_subnet\_cidrs](#input\_public\_subnet\_cidrs)| A list of public subnets CIDR to be created inside the VPC |`list(any)`|`[]`| no |
239
247
| <aname="input_public_subnet_enabled"></a> [public\_subnet\_enabled](#input\_public\_subnet\_enabled)| Set true to enable public subnets |`bool`|`false`| no |
248
+
| <aname="input_region"></a> [region](#input\_region)| The AWS region name |`string`| n/a | yes |
240
249
| <aname="input_secondary_cidr_blocks"></a> [secondary\_cidr\_blocks](#input\_secondary\_cidr\_blocks)| List of the secondary CIDR blocks which can be at most 5 |`list(string)`|`[]`| no |
241
250
| <aname="input_secondry_cidr_enabled"></a> [secondry\_cidr\_enabled](#input\_secondry\_cidr\_enabled)| Whether enable secondary CIDR with VPC |`bool`|`false`| no |
242
251
| <aname="input_vpc_cidr"></a> [vpc\_cidr](#input\_vpc\_cidr)| The CIDR block of the VPC |`string`|`"10.0.0.0/16"`| no |
Configuration in this directory creates set of VPC resources with IPAM managed CIDRs
4
+
5
+
IPAM pool with desired CIDR and its allocation which restricts the overlapping of CIDRs
6
+
7
+
[Read more about AWS regions, availability zones and local zones](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html#concepts-regions-availability-zones).
8
+
9
+
## Usage
10
+
11
+
To run this example you need to execute:
12
+
13
+
```bash
14
+
$ terraform init
15
+
$ terraform plan
16
+
$ terraform apply
17
+
```
18
+
19
+
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
20
+
21
+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
Copy file name to clipboardExpand all lines: examples/vpc-native-ipv6/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
-
# VPC with IPv6 support
1
+
# VPC with Native IPv6 support
2
2
3
3
4
-
VPC with dual stack IP mode enabled IPv6 and IPv4 includes public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
4
+
VPC with native IPv6 which includes public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
Copy file name to clipboardExpand all lines: examples/vpc-with-secondary-cidr/README.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
-
# VPC with Private Subnets
1
+
# VPC with Multiple CIDR Supports
2
2
3
3
4
-
A public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
4
+
MUltiple CIDRs can be attached with a VPC in addition of increasing numbers of IPs. A public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
0 commit comments