Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.26.4" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.5" lastModifiedVersion="0.22.3"/>

# Network ACL Inbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
an ACL, but also the ephemeral outbound ports for return traffic.

See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-outbound) module for the analogous version of this module, but for opening
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-outbound) module for the analogous version of this module, but for opening
outbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_inbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.5"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_inbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.26.5"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-inbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-inbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "2accefc8c8af8cc2d329c6adbfdca971"
"hash": "4d93096c63de5648dfea7323f80743c3"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.26.4" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.5" lastModifiedVersion="0.22.3"/>

# Network ACL Outbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
outbound to an ACL, but also the ephemeral inbound ports for return traffic.

See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-inbound) module for the analogous version of this module, but for opening
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-inbound) module for the analogous version of this module, but for opening
inbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_outbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.5"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_outbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.26.5"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/network-acl-outbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/network-acl-outbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "2e12bec9117a0c05586d973caec90828"
"hash": "b0f06f03e2ce795c81c5159929422ef6"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.26.4" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.5" lastModifiedVersion="0.22.3"/>

# Port Calculator Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand Down Expand Up @@ -50,7 +50,7 @@ just those ports:

module "port_range_calculator" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.5"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -84,7 +84,7 @@ module "port_range_calculator" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.26.5"
}

inputs = {
Expand Down Expand Up @@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/port-range-calculator/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/port-range-calculator/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "ed65b2baabc8cc77e683221c0c878b8d"
"hash": "5eb43097f18801b84362a998388376e6"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,27 +9,27 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.26.4" lastModifiedVersion="0.26.2"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.5" lastModifiedVersion="0.26.2"/>

# Transit Gateway Attachment Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-attachment" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-attachment" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.26.2" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

This module creates a transit gateway attachment resource. A transit gateway attachment, attaches the transit gateway to a VPC. This module can be used to attach a transit gateway to multiple VPCs. Attaching a transit gateway to one or more VPCs creates a HUB and spoke routing topology, allowing traffic from one VPC to reach other VPCs or from a VPC to reach on-premises networks.

The module accepts a map of VPCs for attachment to the transit gateway. See the examples below for the structure of the map.

See [VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules//_docs/vpc-core-concepts.md) for more information on the core networking components and topologies.
See [VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules//_docs/vpc-core-concepts.md) for more information on the core networking components and topologies.

## What is a Transit Gateway Attachment?

A transit gateway attachment is a way to connect a transit gateway (virtual router) to a VPC. You can think of a VPC attachment just like a cat5e or cat6 network cable. By attaching the transit gateway, you're connecting the cable between the virtual router and a VPC. By attaching the transit gateway and then either configuring a route or enabling route propagation, you can route traffic between VPCs.

## Usage

For usage examples, check out the [examples folder](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/examples/transit-gateway-attachment/).
For usage examples, check out the [examples folder](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/examples/transit-gateway-attachment/).

<!-- BEGIN_TF_DOCS -->

Expand Down Expand Up @@ -90,7 +90,7 @@ No modules.

module "transit_gateway_attachment" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-attachment?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-attachment?ref=v0.26.5"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -156,7 +156,7 @@ module "transit_gateway_attachment" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-attachment?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-attachment?ref=v0.26.5"
}

inputs = {
Expand Down Expand Up @@ -329,11 +329,11 @@ EC2 Transit Gateway Attachment identifier.
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-attachment/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-attachment/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-attachment/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-attachment/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-attachment/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-attachment/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "9d1d61b0d2d4b5c259ead9b3ebe8baf2"
"hash": "bfd825316b2715696185b24ff924cc4a"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,23 +9,23 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.26.4" lastModifiedVersion="0.26.2"/>
<VersionBadge repoTitle="VPC Modules" version="0.26.5" lastModifiedVersion="0.26.2"/>

# Transit Gateway Peering Attachment Accepter Accepter Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-peering-attachment-accepter" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-peering-attachment-accepter" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.26.2" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

This Terraform Module creates Transit Gateway peering resources for the `accepter` side of the connection. This allows for connectivity between multiple regions or multiple AWS accounts. Transit Gateway peering is a one-to-one relationship between two transit gateways. If you need to peer multiple transit gateways, you will need to create multiple transit gateway peering attachments.

See [VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules//_docs/vpc-core-concepts.md) for more information on the core networking components and topologies.
See [VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules//_docs/vpc-core-concepts.md) for more information on the core networking components and topologies.

## What is a Transit Gateway Peering Attachment Accepter?

A transit gateway peering attachment accepter is a way to connect two transit gateways to each other. Much like the VPC attachment, this can be thought of as a network cable. By attaching them, you 'plug' the two transit gateways together. This allows you to route traffic between the two transit gateways. Unlike VPC attachments, peering attachments have two components to the attachment a `requester` and an `accepter`. This is important because each attachment must be accepted prior to the attachment being completed. This is a security measure to ensure a malicious attachment from a random account does not gain network access to your environment. The `accepter` is the side of the peering attachment that accepts the request from the `requester`.

For usage examples, check out the [examples folder](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/examples/transit-gateway-peering-attachment).
For usage examples, check out the [examples folder](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/examples/transit-gateway-peering-attachment).

<!-- BEGIN_TF_DOCS -->

Expand Down Expand Up @@ -86,7 +86,7 @@ No modules.

module "transit_gateway_peering_attachment_accepter" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-peering-attachment-accepter?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-peering-attachment-accepter?ref=v0.26.5"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -130,7 +130,7 @@ module "transit_gateway_peering_attachment_accepter" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-peering-attachment-accepter?ref=v0.26.4"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/transit-gateway-peering-attachment-accepter?ref=v0.26.5"
}

inputs = {
Expand Down Expand Up @@ -259,11 +259,11 @@ The identifer of the transit gateway for the accepter resources.
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-peering-attachment-accepter/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-peering-attachment-accepter/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.4/modules/transit-gateway-peering-attachment-accepter/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-peering-attachment-accepter/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-peering-attachment-accepter/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.26.5/modules/transit-gateway-peering-attachment-accepter/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "546874432eceee34bc8cbb2ed177bfa9"
"hash": "6e5e48bba4b93df776c1be0bf290b5f5"
}
##DOCS-SOURCER-END -->
Loading