You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -583,8 +583,8 @@ No modules.
583
583
| <aname="input_single_nat_gateway"></a> [single\_nat\_gateway](#input\_single\_nat\_gateway)| Should be true if you want to provision a single shared NAT Gateway across all of your private networks |`bool`|`false`| no |
584
584
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
585
585
| <aname="input_use_ipam_pool"></a> [use\_ipam\_pool](#input\_use\_ipam\_pool)| Determines whether IPAM pool is used for CIDR allocation |`bool`|`false`| no |
586
-
| <a name="input_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#input\_vpc\_block\_public\_access\_exclusions) | List of VPC Block Public Access Exclusions e.g. to exclude the VPC:<pre>vpc_block_public_access_exclusions = {<br/> exclude_vpc = {<br/> exclude_vpc = true<br/> internet_gateway_exclusion_mode = "allow-bidirectional"<br/> }<br/> }</pre>or to exclude specific subnets:<pre>vpc_block_public_access_exclusions = {<br/> exclude_subnet_private1 = {<br/> exclude_subnet = true<br/> subnet_type = "private"<br/> subnet_index = 1<br/> internet_gateway_exclusion_mode = "allow-egress"<br/> }<br/> exclude_subnet_private2 = {<br/> exclude_subnet = true<br/> subnet_type = "private"<br/> subnet_index = 2<br/> internet_gateway_exclusion_mode = "allow-egress"<br/> }<br/> }</pre>One of `exclude_vpc` or `exclude_subnet` must be set to true.<br/> Value of `subnet_type` can be `public`, `private`, `database`, `redshift`, `elasticache`, `intra` or `custom`.<br/> Value of `subnet_index` is the index of the subnet in the corresponding subnet list.<br/> Value of `internet_gateway_exclusion_mode` can be `allow-egress` and `allow-bidirectional`. | `map(any)` | `{}` | no |
587
-
| <aname="input_vpc_block_public_access_options"></a> [vpc\_block\_public\_access\_options](#input\_vpc\_block\_public\_access\_options)|Map of VPC Block Public Access Options e.g.:<pre>vpc_block_public_access_options = {<br/> internet_gateway_block_mode = "block-bidirectional"<br/> }</pre>Currently only `internet_gateway_block_mode` is supported, for which<br/> valid values are `block-bidirectional`, `block-ingress` and `off`.|`map(string)`|`{}`| no |
586
+
| <aname="input_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#input\_vpc\_block\_public\_access\_exclusions)| A map of VPC block public access exclusions |`map(any)`|`{}`| no |
587
+
| <aname="input_vpc_block_public_access_options"></a> [vpc\_block\_public\_access\_options](#input\_vpc\_block\_public\_access\_options)|A map of VPC block public access options|`map(string)`|`{}`| no |
588
588
| <aname="input_vpc_flow_log_iam_policy_name"></a> [vpc\_flow\_log\_iam\_policy\_name](#input\_vpc\_flow\_log\_iam\_policy\_name)| Name of the IAM policy |`string`|`"vpc-flow-log-to-cloudwatch"`| no |
589
589
| <aname="input_vpc_flow_log_iam_policy_use_name_prefix"></a> [vpc\_flow\_log\_iam\_policy\_use\_name\_prefix](#input\_vpc\_flow\_log\_iam\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`vpc_flow_log_iam_policy_name`) is used as a prefix |`bool`|`true`| no |
590
590
| <aname="input_vpc_flow_log_iam_role_name"></a> [vpc\_flow\_log\_iam\_role\_name](#input\_vpc\_flow\_log\_iam\_role\_name)| Name to use on the VPC Flow Log IAM role created |`string`|`"vpc-flow-log-role"`| no |
@@ -703,7 +703,7 @@ No modules.
703
703
| <aname="output_vgw_arn"></a> [vgw\_arn](#output\_vgw\_arn)| The ARN of the VPN Gateway |
704
704
| <aname="output_vgw_id"></a> [vgw\_id](#output\_vgw\_id)| The ID of the VPN Gateway |
705
705
| <aname="output_vpc_arn"></a> [vpc\_arn](#output\_vpc\_arn)| The ARN of the VPC |
706
-
| <aname="output_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#output\_vpc\_block\_public\_access\_exclusions)|List of VPC block public access exclusions |
706
+
| <aname="output_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#output\_vpc\_block\_public\_access\_exclusions)|A map of VPC block public access exclusions |
707
707
| <aname="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block)| The CIDR block of the VPC |
708
708
| <aname="output_vpc_enable_dns_hostnames"></a> [vpc\_enable\_dns\_hostnames](#output\_vpc\_enable\_dns\_hostnames)| Whether or not the VPC has DNS hostname support |
709
709
| <aname="output_vpc_enable_dns_support"></a> [vpc\_enable\_dns\_support](#output\_vpc\_enable\_dns\_support)| Whether or not the VPC has DNS support |
Copy file name to clipboardExpand all lines: examples/block-public-access/README.md
+48-3Lines changed: 48 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,13 +18,58 @@ $ terraform apply
18
18
19
19
Note that this example may create resources which can cost money (AWS Elastic IP, for example). Run `terraform destroy` when you don't need these resources.
20
20
21
-
After deployment, VPC Block Public Access Options can be verified with the following command:
21
+
In the example below, a map of VPC block public access options is configured:
| <aname="output_vgw_arn"></a> [vgw\_arn](#output\_vgw\_arn)| The ARN of the VPN Gateway |
160
205
| <aname="output_vgw_id"></a> [vgw\_id](#output\_vgw\_id)| The ID of the VPN Gateway |
161
206
| <aname="output_vpc_arn"></a> [vpc\_arn](#output\_vpc\_arn)| The ARN of the VPC |
162
-
| <aname="output_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#output\_vpc\_block\_public\_access\_exclusions)|List of VPC block public access exclusions |
207
+
| <aname="output_vpc_block_public_access_exclusions"></a> [vpc\_block\_public\_access\_exclusions](#output\_vpc\_block\_public\_access\_exclusions)|A map of VPC block public access exclusions |
163
208
| <aname="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block)| The CIDR block of the VPC |
164
209
| <aname="output_vpc_enable_dns_hostnames"></a> [vpc\_enable\_dns\_hostnames](#output\_vpc\_enable\_dns\_hostnames)| Whether or not the VPC has DNS hostname support |
165
210
| <aname="output_vpc_enable_dns_support"></a> [vpc\_enable\_dns\_support](#output\_vpc\_enable\_dns\_support)| Whether or not the VPC has DNS support |
0 commit comments