diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
index 2fca4da4ad..c42d7b7faa 100644
--- a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
+++ b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Network ACL Inbound Terraform Module
-View Source
+View Source
Release Notes
@@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
an ACL, but also the ephemeral outbound ports for return traffic.
-See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
+See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
outbound ports.
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "network_acl_inbound" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_inbound" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.0"
}
inputs = {
@@ -221,11 +221,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
index 57cf9a5a94..8659644f3f 100644
--- a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
+++ b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Network ACL Outbound Terraform Module
-View Source
+View Source
Release Notes
@@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
outbound to an ACL, but also the ephemeral inbound ports for return traffic.
-See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
+See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
inbound ports.
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "network_acl_outbound" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_outbound" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.0"
}
inputs = {
@@ -221,11 +221,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
index ede700f621..22abcae94b 100644
--- a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
+++ b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Port Calculator Module
-View Source
+View Source
Release Notes
@@ -50,7 +50,7 @@ just those ports:
module "port_range_calculator" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -84,7 +84,7 @@ module "port_range_calculator" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.0"
}
inputs = {
@@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
index f955b8f6e4..9969e21af1 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
@@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC-App Network ACLs Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
-[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
+[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):
* **Public subnet**: Allow all requests.
@@ -92,7 +92,7 @@ module "network_acls" {
module "vpc_app_network_acls" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -211,7 +211,7 @@ module "vpc_app_network_acls" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.26.0"
}
inputs = {
@@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
index 30d9e82a9a..0697fb3efa 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
@@ -1,5 +1,5 @@
---
-title: "VPC-App Terraform Module"
+title: "IPv6"
hide_title: true
---
@@ -9,16 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
-# VPC-App Terraform Module
+# IPv6
-View Source
+View Source
-Release Notes
-
-This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as
-Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module.)
+Release Notes
## What's a VPC?
@@ -58,8 +55,8 @@ To summarize:
* In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone.
* Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`,
and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all.
-* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt),
- which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
+* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-mgmt),
+ which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
* Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want
to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that.
@@ -74,7 +71,30 @@ nearly all use-cases, and is consistent with many examples and existing document
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
+
+## IPv6 Design
+
+
+
+For more IPv6 information, please see the following documentation from AWS - [IPv6 on AWS](https://docs.aws.amazon.com/whitepapers/latest/ipv6-on-aws/IPv6-on-AWS.html)
+
+## Simple IPv6 Assigned from AWS Example
+
+The following example assigns your VPC a CIDR block from AWS and assigns an IPv6 CIDR block to each public subnet.
+
+```hcl
+module "vpc_app_ipv6_example" {
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.26.0"
+
+ assign_generated_ipv6_cidr_block = true
+ aws_region = var.aws_region
+ cidr_block = "10.0.0.0/16"
+ enable_ipv6 = true
+ num_nat_gateways = 3
+ vpc_name = var.vpc_name
+}
+```
## Sample Usage
@@ -89,7 +109,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_app" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -123,6 +143,15 @@ module "vpc_app" {
# default NACL rules managed by AWS will be used.
apply_default_nacl_rules = false
+ # (Optional) Requests an Amazon-provided IPv6 CIDR block with a /56 prefix
+ # length for the VPC. You cannot specify the range of IP addresses, or the
+ # size of the CIDR block. Conflicts with ipv6_ipam_pool_id
+ assign_generated_ipv6_cidr_block = null
+
+ # (Optional) Specify true to indicate that network interfaces created in the
+ # specified subnet should be assigned an IPv6 address. Default is false
+ assign_ipv6_address_on_creation = false
+
# If true, will associate the default NACL to the public, private, and
# persistence subnets created by this module. Only used if
# var.apply_default_nacl_rules is true. Note that this does not guarantee that
@@ -195,7 +224,7 @@ module "vpc_app" {
# unique name for each rule and the values are objects with the same fields as
# the egress block in the aws_default_network_acl resource:
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl.
- default_nacl_egress_rules = {"AllowAll":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0}}
+ default_nacl_egress_rules = {"AllowAllIPv4":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0},"AllowAllIPv6":{"action":"allow","from_port":0,"ipv6_cidr_block":"::/0","protocol":"-1","rule_no":101,"to_port":0}}
# The ingress rules to apply to the default NACL in the VPC. This is the NACL
# that is used by any subnet that doesn't have its own NACL attached. The
@@ -203,7 +232,7 @@ module "vpc_app" {
# each rule and the values are objects with the same fields as the ingress
# block in the aws_default_network_acl resource:
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl.
- default_nacl_ingress_rules = {"AllowAll":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0}}
+ default_nacl_ingress_rules = {"AllowAllIPv4":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0},"AllowAllIPv6":{"action":"allow","from_port":0,"ipv6_cidr_block":"::/0","protocol":"-1","rule_no":101,"to_port":0}}
# The egress rules to apply to the default security group in the VPC. This is
# the security group that is used by any resource that doesn't have its own
@@ -235,9 +264,54 @@ module "vpc_app" {
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_security_group#removing-aws_default_security_group-from-your-configuration
enable_default_security_group = true
+ # (Optional) A boolean flag to enable/disable DNS hostnames in the VPC.
+ # Defaults true.
+ enable_dns_hostnames = true
+
+ # (Optional) A boolean flag to enable/disable DNS support in the VPC. Defaults
+ # true.
+ enable_dns_support = true
+
+ # (Optional) Enables IPv6 resources for the VPC. Defaults to false.
+ enable_ipv6 = false
+
+ # (Optional) A boolean flag to enable/disable network address usage metrics in
+ # the VPC. Defaults false.
+ enable_network_address_usage_metrics = false
+
# The ID of an IPv4 IPAM pool you want to use for allocating this VPC's CIDR.
ipv4_ipam_pool_id = null
+ # (Optional) The length of the IPv4 CIDR netmask. Requires utilizing an
+ # ipv4_ipam_pool_id. Defaults to null.
+ ipv4_netmask_length = null
+
+ # (Optional) IPv6 CIDR block to request from an IPAM Pool. Can be set
+ # explicitly or derived from IPAM using ipv6_netmask_length. If not provided,
+ # no IPv6 CIDR block will be allocated.
+ ipv6_cidr_block = null
+
+ # (Optional) By default when an IPv6 CIDR is assigned to a VPC a default
+ # ipv6_cidr_block_network_border_group will be set to the region of the VPC.
+ # This can be changed to restrict advertisement of public addresses to
+ # specific Network Border Groups such as LocalZones.
+ ipv6_cidr_block_network_border_group = null
+
+ # (Optional) IPAM Pool ID for a IPv6 pool. Conflicts with
+ # assign_generated_ipv6_cidr_block.
+ ipv6_ipam_pool_id = null
+
+ # (Optional) Netmask length to request from IPAM Pool. Conflicts with
+ # ipv6_cidr_block. This can be omitted if IPAM pool as a
+ # allocation_default_netmask_length set. Valid values: 56.
+ ipv6_netmask_length = null
+
+ # (Optional) The number of additional bits to use in the VPC IPv6 CIDR block.
+ # The end result must be between a /56 netmask and /64 netmask. These bits are
+ # added to the VPC CIDR block bits. Example: /56 + 8 bits = /64 Defaults to 8
+ # bits for a /64.
+ ipv6_subnet_bits = 8
+
# Specify true to indicate that instances launched into the public subnet
# should be assigned a public IP address (versus a private IP address)
map_public_ip_on_launch = false
@@ -359,6 +433,12 @@ module "vpc_app" {
# here will override tags defined as custom_tags in case of conflict.
public_subnet_custom_tags = {}
+ # (Optional) A map listing the specific IPv6 CIDR blocks desired for each
+ # public subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is
+ # the number of Availability Zones. If left blank, we will compute a
+ # reasonable CIDR block for each subnet.
+ public_subnet_ipv6_cidr_blocks = {}
+
# The timeout for the creation of the Route Tables. It defines how long to
# wait for a route table to be created before considering the operation
# failed. Ref:
@@ -420,7 +500,7 @@ module "vpc_app" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.26.0"
}
inputs = {
@@ -457,6 +537,15 @@ inputs = {
# default NACL rules managed by AWS will be used.
apply_default_nacl_rules = false
+ # (Optional) Requests an Amazon-provided IPv6 CIDR block with a /56 prefix
+ # length for the VPC. You cannot specify the range of IP addresses, or the
+ # size of the CIDR block. Conflicts with ipv6_ipam_pool_id
+ assign_generated_ipv6_cidr_block = null
+
+ # (Optional) Specify true to indicate that network interfaces created in the
+ # specified subnet should be assigned an IPv6 address. Default is false
+ assign_ipv6_address_on_creation = false
+
# If true, will associate the default NACL to the public, private, and
# persistence subnets created by this module. Only used if
# var.apply_default_nacl_rules is true. Note that this does not guarantee that
@@ -529,7 +618,7 @@ inputs = {
# unique name for each rule and the values are objects with the same fields as
# the egress block in the aws_default_network_acl resource:
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl.
- default_nacl_egress_rules = {"AllowAll":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0}}
+ default_nacl_egress_rules = {"AllowAllIPv4":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0},"AllowAllIPv6":{"action":"allow","from_port":0,"ipv6_cidr_block":"::/0","protocol":"-1","rule_no":101,"to_port":0}}
# The ingress rules to apply to the default NACL in the VPC. This is the NACL
# that is used by any subnet that doesn't have its own NACL attached. The
@@ -537,7 +626,7 @@ inputs = {
# each rule and the values are objects with the same fields as the ingress
# block in the aws_default_network_acl resource:
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl.
- default_nacl_ingress_rules = {"AllowAll":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0}}
+ default_nacl_ingress_rules = {"AllowAllIPv4":{"action":"allow","cidr_block":"0.0.0.0/0","from_port":0,"protocol":"-1","rule_no":100,"to_port":0},"AllowAllIPv6":{"action":"allow","from_port":0,"ipv6_cidr_block":"::/0","protocol":"-1","rule_no":101,"to_port":0}}
# The egress rules to apply to the default security group in the VPC. This is
# the security group that is used by any resource that doesn't have its own
@@ -569,9 +658,54 @@ inputs = {
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_security_group#removing-aws_default_security_group-from-your-configuration
enable_default_security_group = true
+ # (Optional) A boolean flag to enable/disable DNS hostnames in the VPC.
+ # Defaults true.
+ enable_dns_hostnames = true
+
+ # (Optional) A boolean flag to enable/disable DNS support in the VPC. Defaults
+ # true.
+ enable_dns_support = true
+
+ # (Optional) Enables IPv6 resources for the VPC. Defaults to false.
+ enable_ipv6 = false
+
+ # (Optional) A boolean flag to enable/disable network address usage metrics in
+ # the VPC. Defaults false.
+ enable_network_address_usage_metrics = false
+
# The ID of an IPv4 IPAM pool you want to use for allocating this VPC's CIDR.
ipv4_ipam_pool_id = null
+ # (Optional) The length of the IPv4 CIDR netmask. Requires utilizing an
+ # ipv4_ipam_pool_id. Defaults to null.
+ ipv4_netmask_length = null
+
+ # (Optional) IPv6 CIDR block to request from an IPAM Pool. Can be set
+ # explicitly or derived from IPAM using ipv6_netmask_length. If not provided,
+ # no IPv6 CIDR block will be allocated.
+ ipv6_cidr_block = null
+
+ # (Optional) By default when an IPv6 CIDR is assigned to a VPC a default
+ # ipv6_cidr_block_network_border_group will be set to the region of the VPC.
+ # This can be changed to restrict advertisement of public addresses to
+ # specific Network Border Groups such as LocalZones.
+ ipv6_cidr_block_network_border_group = null
+
+ # (Optional) IPAM Pool ID for a IPv6 pool. Conflicts with
+ # assign_generated_ipv6_cidr_block.
+ ipv6_ipam_pool_id = null
+
+ # (Optional) Netmask length to request from IPAM Pool. Conflicts with
+ # ipv6_cidr_block. This can be omitted if IPAM pool as a
+ # allocation_default_netmask_length set. Valid values: 56.
+ ipv6_netmask_length = null
+
+ # (Optional) The number of additional bits to use in the VPC IPv6 CIDR block.
+ # The end result must be between a /56 netmask and /64 netmask. These bits are
+ # added to the VPC CIDR block bits. Example: /56 + 8 bits = /64 Defaults to 8
+ # bits for a /64.
+ ipv6_subnet_bits = 8
+
# Specify true to indicate that instances launched into the public subnet
# should be assigned a public IP address (versus a private IP address)
map_public_ip_on_launch = false
@@ -693,6 +827,12 @@ inputs = {
# here will override tags defined as custom_tags in case of conflict.
public_subnet_custom_tags = {}
+ # (Optional) A map listing the specific IPv6 CIDR blocks desired for each
+ # public subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is
+ # the number of Availability Zones. If left blank, we will compute a
+ # reasonable CIDR block for each subnet.
+ public_subnet_ipv6_cidr_blocks = {}
+
# The timeout for the creation of the Route Tables. It defines how long to
# wait for a route table to be created before considering the operation
# failed. Ref:
@@ -801,6 +941,24 @@ If true, will apply the default NACL rules in
+
+
+
+(Optional) Requests an Amazon-provided IPv6 CIDR block with a /56 prefix length for the VPC. You cannot specify the range of IP addresses, or the size of the CIDR block. Conflicts with ipv6_ipam_pool_id
+
+
+
+
+
+
+
+
+(Optional) Specify true to indicate that network interfaces created in the specified subnet should be assigned an IPv6 address. Default is false
+
+
+
+
+
@@ -935,13 +1093,21 @@ Any types represent complex values of variable type. For details, please consult
```hcl
{
- AllowAll = {
+ AllowAllIPv4 = {
action = "allow",
cidr_block = "0.0.0.0/0",
from_port = 0,
protocol = "-1",
rule_no = 100,
to_port = 0
+ },
+ AllowAllIPv6 = {
+ action = "allow",
+ from_port = 0,
+ ipv6_cidr_block = "::/0",
+ protocol = "-1",
+ rule_no = 101,
+ to_port = 0
}
}
```
@@ -966,13 +1132,21 @@ Any types represent complex values of variable type. For details, please consult
```hcl
{
- AllowAll = {
+ AllowAllIPv4 = {
action = "allow",
cidr_block = "0.0.0.0/0",
from_port = 0,
protocol = "-1",
rule_no = 100,
to_port = 0
+ },
+ AllowAllIPv6 = {
+ action = "allow",
+ from_port = 0,
+ ipv6_cidr_block = "::/0",
+ protocol = "-1",
+ rule_no = 101,
+ to_port = 0
}
}
```
@@ -1061,6 +1235,42 @@ If set to false, the default security groups will NOT be created. This variable
+
+
+
+(Optional) A boolean flag to enable/disable DNS hostnames in the VPC. Defaults true.
+
+
+
+
+
+
+
+
+(Optional) A boolean flag to enable/disable DNS support in the VPC. Defaults true.
+
+
+
+
+
+
+
+
+(Optional) Enables IPv6 resources for the VPC. Defaults to false.
+
+
+
+
+
+
+
+
+(Optional) A boolean flag to enable/disable network address usage metrics in the VPC. Defaults false.
+
+
+
+
+
@@ -1070,6 +1280,60 @@ The ID of an IPv4 IPAM pool you want to use for allocating this VPC's CIDR.
+
+
+
+(Optional) The length of the IPv4 CIDR netmask. Requires utilizing an ipv4_ipam_pool_id. Defaults to null.
+
+
+
+
+
+
+
+
+(Optional) IPv6 CIDR block to request from an IPAM Pool. Can be set explicitly or derived from IPAM using ipv6_netmask_length. If not provided, no IPv6 CIDR block will be allocated.
+
+
+
+
+
+
+
+
+(Optional) By default when an IPv6 CIDR is assigned to a VPC a default ipv6_cidr_block_network_border_group will be set to the region of the VPC. This can be changed to restrict advertisement of public addresses to specific Network Border Groups such as LocalZones.
+
+
+
+
+
+
+
+
+(Optional) IPAM Pool ID for a IPv6 pool. Conflicts with assign_generated_ipv6_cidr_block.
+
+
+
+
+
+
+
+
+(Optional) Netmask length to request from IPAM Pool. Conflicts with ipv6_cidr_block. This can be omitted if IPAM pool as a allocation_default_netmask_length set. Valid values: 56.
+
+
+
+
+
+
+
+
+(Optional) The number of additional bits to use in the VPC IPv6 CIDR block. The end result must be between a /56 netmask and /64 netmask. These bits are added to the VPC CIDR block bits. Example: /56 + 8 bits = /64 Defaults to 8 bits for a /64.
+
+
+
+
+
@@ -1259,6 +1523,15 @@ A map of tags to apply to the public Subnet, on top of the custom_tags. The key
+
+
+
+(Optional) A map listing the specific IPv6 CIDR blocks desired for each public subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is the number of Availability Zones. If left blank, we will compute a reasonable CIDR block for each subnet.
+
+
+
+
+
@@ -1355,6 +1628,14 @@ A map of tags to apply just to the VPC itself, but not any of the other resource
+
+
+
+The IPv6 CIDR block associated with the VPC.
+
+
+
+
@@ -1416,6 +1697,9 @@ A map of all private-persistence subnets, with the subnet name as the key, and a
+
+
+
@@ -1452,11 +1736,11 @@ A map of all public subnets, with the subnet name as the key, and all `aws-subne
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
index 8fb52149b2..c1db7e5543 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
@@ -9,23 +9,23 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC DNS Forwarder Rules Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module creates [Route 53 Resolver Forwarding
Rules](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-rules-managing.html) for a VPC that will
-utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder). These forwarding
+utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-dns-forwarder). These forwarding
rules, combined with Route 53 Resolvers, allow DNS queries for specific domains to be resolved by peered VPCs.
## How do you specify the hostnames that use the forwarder?
By default, no DNS query will be routed through the Route 53 Resolvers created by the [vpc-dns-forwarder
-module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be
+module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be
resolved through the Route 53 Resolvers so that they are resolved over the peering connection. You can use this module
to construct the forwarding rules.
@@ -72,7 +72,7 @@ forwarder rule, it will match any domain that ends with `.local` (note the dot),
module "vpc_dns_forwarder_rules" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -126,7 +126,7 @@ module "vpc_dns_forwarder_rules" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.26.0"
}
inputs = {
@@ -180,11 +180,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
index b2d9cd4480..6a17f9d9f9 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC DNS Forwarder Terraform Module
-View Source
+View Source
Release Notes
@@ -47,7 +47,7 @@ private endpoints internal to the target VPC.
By default, no DNS query will be routed through the Route 53 Resolvers created by this module. You need to create
forwarding rules that specify which specific domains should be resolved through the Route 53 Resolvers created by this
-module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-dns-forwarder-rules) to construct the forwarding rules.
+module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-dns-forwarder-rules) to construct the forwarding rules.
## Sample Usage
@@ -62,7 +62,7 @@ module. You can use the [vpc-dns-forwarder-rules module](https://github.com/grun
module "vpc_dns_forwarder" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -138,7 +138,7 @@ module "vpc_dns_forwarder" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.26.0"
}
inputs = {
@@ -380,11 +380,11 @@ The secondary IP address of the DNS resolver in the origin VPC. This is the IP t
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
index 4b4d6065d0..376ac58101 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC Flow Logs Terraform Module
-View Source
+View Source
Release Notes
@@ -86,7 +86,7 @@ TODO: Publish flow logs to an S3 bucket or CloudWatch Logs group in another acco
module "vpc_flow_logs" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# OPTIONAL VARIABLES
@@ -232,7 +232,7 @@ module "vpc_flow_logs" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.26.0"
}
inputs = {
@@ -784,11 +784,11 @@ The name of the S3 bucket where flow logs are published.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
index 2325669147..65561ade3f 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Interface VPC Endpoint
-View Source
+View Source
Release Notes
@@ -193,7 +193,7 @@ Not specifying a rule allows all traffic.
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways.
## Sample Usage
@@ -208,7 +208,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_interface_endpoint" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -2023,7 +2023,7 @@ module "vpc_interface_endpoint" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.26.0"
}
inputs = {
@@ -8331,11 +8331,11 @@ If you have private dns enabled, then your streaming calls would automatically g
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
index c4085fd848..f7cc1831c7 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# \[DEPRECATED] VPC-Mgmt Network ACLs Terraform Module
-View Source
+View Source
Release Notes
@@ -28,7 +28,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app`
This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
-[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC
+[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):
* **Public subnet**: Allow all requests.
@@ -63,7 +63,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "vpc_mgmt_network_acls" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -142,7 +142,7 @@ module "vpc_mgmt_network_acls" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.26.0"
}
inputs = {
@@ -345,11 +345,11 @@ The number to use for the first rule that is created by this module. All rules i
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
index e555ee853d..e036e49e3e 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# \[DEPRECATED] VPC-Mgmt Terraform Module
-View Source
+View Source
Release Notes
@@ -27,7 +27,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app`
`vpc-mgmt` entirely.
This Terraform Module launches a single VPC meant to house DevOps and other management services. By contrast, the apps
-that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module.)
+that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app) module.)
## What's a VPC?
@@ -65,7 +65,7 @@ To summarize:
## VPC Peering
-Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) module.
+Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-peering) module.
## SSH Access via the Bastion Host
@@ -79,7 +79,7 @@ examples](https://github.com/gruntwork-io/terraform-aws-server/tree/main/example
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
## Sample Usage
@@ -94,7 +94,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_mgmt" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -301,7 +301,7 @@ module "vpc_mgmt" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.26.0"
}
inputs = {
@@ -1011,11 +1011,11 @@ A null_resource that indicates that the VPC is ready, including all of its resou
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
index e43cf6af10..b6b0eeac23 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# vpc-peering-cross-accounts-accepter
-View Source
+View Source
-Release Notes
+Release Notes
This module manages the accepter's side of the VPC Peering Connection between two differents accounts that you control.
@@ -78,7 +78,7 @@ No modules.
module "vpc_peering_cross_accounts_accepter" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -136,7 +136,7 @@ module "vpc_peering_cross_accounts_accepter" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.26.0"
}
inputs = {
@@ -297,11 +297,11 @@ Peering connection ID.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
index 4d48d5b52a..fd33a3081f 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# vpc-peering-cross-accounts-requester
-View Source
+View Source
-Release Notes
+Release Notes
This module manages the requester's side of the VPC Peering Connection between two differents accounts that you control.
@@ -73,7 +73,7 @@ No modules.
module "vpc_peering_cross_accounts_requester" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -131,7 +131,7 @@ module "vpc_peering_cross_accounts_requester" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.26.0"
}
inputs = {
@@ -299,11 +299,11 @@ Peering connection ID.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
index 1bb1124ac5..1d341b1d4a 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC Peering For External VPCs Module
-View Source
+View Source
Release Notes
@@ -87,7 +87,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "vpc_peering_external" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -202,7 +202,7 @@ module "vpc_peering_external" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.26.0"
}
inputs = {
@@ -317,11 +317,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
index f98fcb482e..2b1386a543 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
@@ -9,19 +9,19 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC-Peering Terraform Module
-View Source
+View Source
-Release Notes
+Release Notes
This Terraform Module creates [VPC Peering
Connections](http://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/Welcome.html) between VPCs. Normally, VPCs are
completely isolated from each other, but sometimes, you want to allow traffic to flow between them, such as allowing
-DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see
-[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of
+DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see
+[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.0/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of
cross-VPC communication possible.
## What's a VPC?
@@ -57,7 +57,7 @@ and production, someone in staging *cannot* access production.
module "vpc_peering" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.26.0"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -141,7 +141,7 @@ module "vpc_peering" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.25.0"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.26.0"
}
inputs = {
@@ -225,11 +225,11 @@ inputs = {
diff --git a/static/img/reference/modules/terraform-aws-vpc/vpc-app/_dual_stack_vpc.png b/static/img/reference/modules/terraform-aws-vpc/vpc-app/_dual_stack_vpc.png
new file mode 100644
index 0000000000..0cf5474b4f
Binary files /dev/null and b/static/img/reference/modules/terraform-aws-vpc/vpc-app/_dual_stack_vpc.png differ