You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,7 @@ No modules.
384
384
| <aname="input_database_subnet_suffix"></a> [database\_subnet\_suffix](#input\_database\_subnet\_suffix)| Suffix to append to database subnets name |`string`|`"db"`| no |
385
385
| <aname="input_database_subnet_tags"></a> [database\_subnet\_tags](#input\_database\_subnet\_tags)| Additional tags for the database subnets |`map(string)`|`{}`| no |
386
386
| <aname="input_database_subnet_tags_per_az"></a> [database\_subnet\_tags\_per\_az](#input\_database\_subnet\_tags\_per\_az)| Additional tags for the database subnets where the primary key is the AZ |`map(map(string))`|`{}`| no |
387
+
| <aname="input_database_subnet_tags_per_cidr"></a> [database\_subnet\_tags\_per\_cidr](#input\_database\_subnet\_tags\_per\_cidr)| Additional tags for the database subnets where the primary key is the CIDR |`map(map(string))`|`{}`| no |
387
388
| <aname="input_database_subnets"></a> [database\_subnets](#input\_database\_subnets)| A list of database subnets |`list(string)`|`[]`| no |
388
389
| <aname="input_default_network_acl_egress"></a> [default\_network\_acl\_egress](#input\_default\_network\_acl\_egress)| List of maps of egress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
389
390
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
@@ -497,6 +498,7 @@ No modules.
497
498
| <aname="input_private_subnet_suffix"></a> [private\_subnet\_suffix](#input\_private\_subnet\_suffix)| Suffix to append to private subnets name |`string`|`"private"`| no |
498
499
| <aname="input_private_subnet_tags"></a> [private\_subnet\_tags](#input\_private\_subnet\_tags)| Additional tags for the private subnets |`map(string)`|`{}`| no |
499
500
| <aname="input_private_subnet_tags_per_az"></a> [private\_subnet\_tags\_per\_az](#input\_private\_subnet\_tags\_per\_az)| Additional tags for the private subnets where the primary key is the AZ |`map(map(string))`|`{}`| no |
501
+
| <aname="input_private_subnet_tags_per_cidr"></a> [private\_subnet\_tags\_per\_cidr](#input\_private\_subnet\_tags\_per\_cidr)| Additional tags for the private subnets where the primary key is the CIDR |`map(map(string))`|`{}`| no |
500
502
| <aname="input_private_subnets"></a> [private\_subnets](#input\_private\_subnets)| A list of private subnets inside the VPC |`list(string)`|`[]`| no |
501
503
| <aname="input_propagate_intra_route_tables_vgw"></a> [propagate\_intra\_route\_tables\_vgw](#input\_propagate\_intra\_route\_tables\_vgw)| Should be true if you want route table propagation |`bool`|`false`| no |
502
504
| <aname="input_propagate_private_route_tables_vgw"></a> [propagate\_private\_route\_tables\_vgw](#input\_propagate\_private\_route\_tables\_vgw)| Should be true if you want route table propagation |`bool`|`false`| no |
@@ -512,6 +514,7 @@ No modules.
512
514
| <aname="input_public_subnet_suffix"></a> [public\_subnet\_suffix](#input\_public\_subnet\_suffix)| Suffix to append to public subnets name |`string`|`"public"`| no |
513
515
| <aname="input_public_subnet_tags"></a> [public\_subnet\_tags](#input\_public\_subnet\_tags)| Additional tags for the public subnets |`map(string)`|`{}`| no |
514
516
| <aname="input_public_subnet_tags_per_az"></a> [public\_subnet\_tags\_per\_az](#input\_public\_subnet\_tags\_per\_az)| Additional tags for the public subnets where the primary key is the AZ |`map(map(string))`|`{}`| no |
517
+
| <aname="input_public_subnet_tags_per_cidr"></a> [public\_subnet\_tags\_per\_cidr](#input\_public\_subnet\_tags\_per\_cidr)| Additional tags for the public subnets where the primary key is the CIDR |`map(map(string))`|`{}`| no |
515
518
| <aname="input_public_subnets"></a> [public\_subnets](#input\_public\_subnets)| A list of public subnets inside the VPC |`list(string)`|`[]`| no |
516
519
| <aname="input_putin_khuylo"></a> [putin\_khuylo](#input\_putin\_khuylo)| Do you agree that Putin doesn't respect Ukrainian sovereignty and territorial integrity? More info: https://en.wikipedia.org/wiki/Putin_khuylo!|`bool`|`true`| no |
517
520
| <aname="input_redshift_acl_tags"></a> [redshift\_acl\_tags](#input\_redshift\_acl\_tags)| Additional tags for the redshift subnets network ACL |`map(string)`|`{}`| no |
0 commit comments