You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -218,6 +218,7 @@ In this module, we have implemented the following CIS Compliance checks for VPC:
218
218
| <aname="input_database_subnet_cidrs"></a> [database\_subnet\_cidrs](#input\_database\_subnet\_cidrs)| Database Tier subnet CIDRs to be created |`list(any)`|`[]`| no |
219
219
| <aname="input_database_subnet_enabled"></a> [database\_subnet\_enabled](#input\_database\_subnet\_enabled)| Set true to enable database subnets |`bool`|`false`| no |
220
220
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 22,<br> "protocol": "tcp",<br> "rule_no": 98,<br> "to_port": 22<br> },<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 3389,<br> "protocol": "tcp",<br> "rule_no": 99,<br> "to_port": 3389<br> },<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
221
+
| <aname="input_enable_database_subnet_group"></a> [enable\_database\_subnet\_group](#input\_enable\_database\_subnet\_group)| Whether create database subnet groups |`bool`|`false`| no |
221
222
| <aname="input_environment"></a> [environment](#input\_environment)| Specify the environment indentifier for the VPC |`string`|`""`| no |
222
223
| <aname="input_flow_log_cloudwatch_log_group_kms_key_arn"></a> [flow\_log\_cloudwatch\_log\_group\_kms\_key\_arn](#input\_flow\_log\_cloudwatch\_log\_group\_kms\_key\_arn)| The ARN of the KMS Key to use when encrypting log data for VPC flow logs |`string`|`null`| no |
223
224
| <aname="input_flow_log_cloudwatch_log_group_retention_in_days"></a> [flow\_log\_cloudwatch\_log\_group\_retention\_in\_days](#input\_flow\_log\_cloudwatch\_log\_group\_retention\_in\_days)| Specifies the number of days you want to retain log events in the specified log group for VPC flow logs. |`number`|`null`| no |
@@ -227,6 +228,7 @@ In this module, we have implemented the following CIS Compliance checks for VPC:
227
228
| <aname="input_intra_subnet_cidrs"></a> [intra\_subnet\_cidrs](#input\_intra\_subnet\_cidrs)| A list of intra subnets CIDR to be created |`list(any)`|`[]`| no |
228
229
| <aname="input_intra_subnet_enabled"></a> [intra\_subnet\_enabled](#input\_intra\_subnet\_enabled)| Set true to enable intra subnets |`bool`|`false`| no |
229
230
| <aname="input_ipv6_enabled"></a> [ipv6\_enabled](#input\_ipv6\_enabled)| Requests an Amazon-provided IPv6 CIDR block with a /56 prefix length for the VPC. You cannot specify the range of IP addresses, or the size of the CIDR block. |`bool`|`false`| no |
231
+
| <aname="input_ipv6_only"></a> [ipv6\_only](#input\_ipv6\_only)| Enable it for deploying native IPv6 network |`bool`|`false`| no |
230
232
| <aname="input_name"></a> [name](#input\_name)| Specify the name of the VPC |`string`|`""`| no |
231
233
| <aname="input_one_nat_gateway_per_az"></a> [one\_nat\_gateway\_per\_az](#input\_one\_nat\_gateway\_per\_az)| Set to true if a NAT Gateway is required per availability zone for Private Subnet Tier |`bool`|`false`| no |
232
234
| <aname="input_private_subnet_assign_ipv6_address_on_creation"></a> [private\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_private\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on private subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
@@ -235,6 +237,8 @@ In this module, we have implemented the following CIS Compliance checks for VPC:
235
237
| <aname="input_public_subnet_assign_ipv6_address_on_creation"></a> [public\_subnet\_assign\_ipv6\_address\_on\_creation](#input\_public\_subnet\_assign\_ipv6\_address\_on\_creation)| Assign IPv6 address on public subnet, must be disabled to change IPv6 CIDRs. This is the IPv6 equivalent of map\_public\_ip\_on\_launch |`bool`|`null`| no |
236
238
| <aname="input_public_subnet_cidrs"></a> [public\_subnet\_cidrs](#input\_public\_subnet\_cidrs)| A list of public subnets CIDR to be created inside the VPC |`list(any)`|`[]`| no |
237
239
| <aname="input_public_subnet_enabled"></a> [public\_subnet\_enabled](#input\_public\_subnet\_enabled)| Set true to enable public subnets |`bool`|`false`| no |
240
+
| <aname="input_secondary_cidr_blocks"></a> [secondary\_cidr\_blocks](#input\_secondary\_cidr\_blocks)| List of the secondary CIDR blocks which can be at most 5 |`list(string)`|`[]`| no |
241
+
| <aname="input_secondry_cidr_enabled"></a> [secondry\_cidr\_enabled](#input\_secondry\_cidr\_enabled)| Whether enable secondary CIDR with VPC |`bool`|`false`| no |
238
242
| <aname="input_vpc_cidr"></a> [vpc\_cidr](#input\_vpc\_cidr)| The CIDR block of the VPC |`string`|`"10.0.0.0/16"`| no |
239
243
| <aname="input_vpn_key_pair_name"></a> [vpn\_key\_pair\_name](#input\_vpn\_key\_pair\_name)| Specify the name of AWS Keypair to be used for VPN Server |`string`|`""`| no |
240
244
| <aname="input_vpn_server_enabled"></a> [vpn\_server\_enabled](#input\_vpn\_server\_enabled)| Set to true if you want to deploy VPN Gateway resource and attach it to the VPC |`bool`|`false`| no |
@@ -252,6 +256,7 @@ In this module, we have implemented the following CIS Compliance checks for VPC:
252
256
| <aname="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block)| IPV4 CIDR Block for this VPC |
253
257
| <aname="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id)| The ID of the VPC |
254
258
| <aname="output_vpc_ipv6_association_id"></a> [vpc\_ipv6\_association\_id](#output\_vpc\_ipv6\_association\_id)| The association ID for the IPv6 CIDR block |
259
+
| <aname="output_vpc_secondary_cidr_blocks"></a> [vpc\_secondary\_cidr\_blocks](#output\_vpc\_secondary\_cidr\_blocks)| List of secondary CIDR blocks of the VPC |
255
260
| <aname="output_vpn_host_public_ip"></a> [vpn\_host\_public\_ip](#output\_vpn\_host\_public\_ip)| IP Address of VPN Server |
256
261
| <aname="output_vpn_security_group"></a> [vpn\_security\_group](#output\_vpn\_security\_group)| Security Group ID of VPN Server |
VPC with dual stack IP mode enabled IPv6 and IPv4 includes public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
5
+
6
+
## Usage
7
+
8
+
To run this example you need to execute:
9
+
10
+
```bash
11
+
$ terraform init
12
+
$ terraform plan
13
+
$ terraform apply
14
+
```
15
+
16
+
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
17
+
18
+
19
+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
| <aname="output_database_subnets"></a> [database\_subnets](#output\_database\_subnets)| List of IDs of database subnets |
47
+
| <aname="output_intra_subnets"></a> [intra\_subnets](#output\_intra\_subnets)| List of IDs of Intra subnets |
48
+
| <aname="output_ipv6_vpc_cidr_block"></a> [ipv6\_vpc\_cidr\_block](#output\_ipv6\_vpc\_cidr\_block)| The IPv6 CIDR block |
49
+
| <aname="output_private_subnets"></a> [private\_subnets](#output\_private\_subnets)| List of IDs of private subnets |
50
+
| <aname="output_public_subnets"></a> [public\_subnets](#output\_public\_subnets)| List of IDs of public subnets |
51
+
| <aname="output_region"></a> [region](#output\_region)| AWS Region |
52
+
| <aname="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block)| The CIDR of the VPC |
53
+
| <aname="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id)| The ID of the VPC |
54
+
| <aname="output_vpc_ipv6_association_id"></a> [vpc\_ipv6\_association\_id](#output\_vpc\_ipv6\_association\_id)| The association ID for the IPv6 CIDR block |
A public and private subnet will be created per availability zone in addition to single NAT Gateway shared between all availability zones.
5
+
6
+
## Usage
7
+
8
+
To run this example you need to execute:
9
+
10
+
```bash
11
+
$ terraform init
12
+
$ terraform plan
13
+
$ terraform apply
14
+
```
15
+
16
+
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
17
+
18
+
19
+
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
| <aname="output_private_subnets"></a> [private\_subnets](#output\_private\_subnets)| List of IDs of private subnets |
47
+
| <aname="output_public_subnets"></a> [public\_subnets](#output\_public\_subnets)| List of IDs of public subnets |
48
+
| <aname="output_region"></a> [region](#output\_region)| AWS Region |
49
+
| <aname="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block)| AWS Region |
50
+
| <aname="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id)| The ID of the VPC |
51
+
| <aname="output_vpc_secondary_cidr_blocks"></a> [vpc\_secondary\_cidr\_blocks](#output\_vpc\_secondary\_cidr\_blocks)| List of secondary CIDR blocks of the VPC |
0 commit comments