From 55c834ac7d7a70dcc1efa999e47a1d56cc8c1c5e Mon Sep 17 00:00:00 2001
From: "docs-sourcer[bot]"
<99042413+docs-sourcer[bot]@users.noreply.github.com>
Date: Fri, 30 Jun 2023 20:13:23 +0000
Subject: [PATCH] Updated with the [latest
changes](https://github.com/gruntwork-io/terraform-aws-load-balancer/releases/tag/v0.29.8)
from the `terraform-aws-load-balancer@v0.29.8` source branch.
---
.../acm-tls-certificate.md | 16 ++--
.../terraform-aws-load-balancer/alb/alb.md | 85 ++++++++-----------
.../lb-listener-rules/lb-listener-rules.md | 16 ++--
.../terraform-aws-load-balancer/nlb/nlb.md | 12 +--
.../network-acl-inbound.md | 18 ++--
.../network-acl-outbound.md | 18 ++--
.../port-range-calculator.md | 16 ++--
.../vpc-app-network-acls.md | 18 ++--
.../terraform-aws-vpc/vpc-app/vpc-app.md | 24 +++---
.../vpc-dns-forwarder-rules.md | 20 ++---
.../vpc-dns-forwarder/vpc-dns-forwarder.md | 18 ++--
.../vpc-flow-logs/vpc-flow-logs.md | 18 ++--
.../vpc-interface-endpoint.md | 18 ++--
.../vpc-mgmt-network-acls.md | 18 ++--
.../terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md | 22 ++---
.../vpc-peering-cross-accounts-accepter.md | 16 ++--
.../vpc-peering-cross-accounts-requester.md | 16 ++--
.../vpc-peering-external.md | 16 ++--
.../vpc-peering/vpc-peering.md | 20 ++---
19 files changed, 197 insertions(+), 208 deletions(-)
diff --git a/docs/reference/modules/terraform-aws-load-balancer/acm-tls-certificate/acm-tls-certificate.md b/docs/reference/modules/terraform-aws-load-balancer/acm-tls-certificate/acm-tls-certificate.md
index ced49cf68c..093d44f045 100644
--- a/docs/reference/modules/terraform-aws-load-balancer/acm-tls-certificate/acm-tls-certificate.md
+++ b/docs/reference/modules/terraform-aws-load-balancer/acm-tls-certificate/acm-tls-certificate.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# ACM TLS Certificate
-View Source
+View Source
Release Notes
@@ -196,7 +196,7 @@ In this example, the `acm-tls-certificates` module will "wait" until your `aws_r
module "acm_tls_certificate" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/acm-tls-certificate?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/acm-tls-certificate?ref=v0.29.8"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -254,7 +254,7 @@ module "acm_tls_certificate" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/acm-tls-certificate?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/acm-tls-certificate?ref=v0.29.8"
}
inputs = {
@@ -485,11 +485,11 @@ Global tags to apply to all ACM certificates issued via this module. These globa
diff --git a/docs/reference/modules/terraform-aws-load-balancer/alb/alb.md b/docs/reference/modules/terraform-aws-load-balancer/alb/alb.md
index e4608a808d..e2d9e85e7e 100644
--- a/docs/reference/modules/terraform-aws-load-balancer/alb/alb.md
+++ b/docs/reference/modules/terraform-aws-load-balancer/alb/alb.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Application Load Balancer (ALB) Module
-View Source
+View Source
-Release Notes
+Release Notes
This Terraform Module creates an [Application Load Balancer](http://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html)
that you can use as a load balancer for any [ALB Target Group](http://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-target-groups.html).
@@ -191,7 +191,7 @@ There are two ways for you to override this behavior:
module "alb" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/alb?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/alb?ref=v0.29.8"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -282,17 +282,11 @@ module "alb" {
# the tag name and the value is the tag value.
custom_tags = {}
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this body.
- default_action_body = null
-
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this content type.
- default_action_content_type = "text/plain"
-
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this status code.
- default_action_status_code = 404
+ # Define the default action if a request to the load balancer does not match
+ # any of your listener rules. Currently only 'fixed-response' and 'redirect'
+ # are supported.
+ # https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb_listener#default_action
+ default_action = {"fixed-response":{"content_type":"text/plain","message_body":null,"status_code":404}}
# Create a dependency between the resources in this module to the interpolated
# values in this list (and thus the source resources). In other words, the
@@ -405,7 +399,7 @@ module "alb" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/alb?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/alb?ref=v0.29.8"
}
inputs = {
@@ -499,17 +493,11 @@ inputs = {
# the tag name and the value is the tag value.
custom_tags = {}
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this body.
- default_action_body = null
-
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this content type.
- default_action_content_type = "text/plain"
-
- # If a request to the load balancer does not match any of your listener rules,
- # the default action will return a fixed response with this status code.
- default_action_status_code = 404
+ # Define the default action if a request to the load balancer does not match
+ # any of your listener rules. Currently only 'fixed-response' and 'redirect'
+ # are supported.
+ # https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb_listener#default_action
+ default_action = {"fixed-response":{"content_type":"text/plain","message_body":null,"status_code":404}}
# Create a dependency between the resources in this module to the interpolated
# values in this list (and thus the source resources). In other words, the
@@ -784,31 +772,32 @@ A map of custom tags to apply to the ALB and its Security Group. The key is the
-
+
-If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this body.
+Define the default action if a request to the load balancer does not match any of your listener rules. Currently only 'fixed-response' and 'redirect' are supported. https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb_listener#default_action
-
-
-
-
-
-
-If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this content type.
+
-
-
-
+```hcl
+Any types represent complex values of variable type. For details, please consult `variables.tf` in the source repo.
+```
-
-
+
+
-If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this status code.
+```hcl
+{
+ fixed-response = {
+ content_type = "text/plain",
+ message_body = null,
+ status_code = 404
+ }
+}
+```
-
-
+
@@ -1099,11 +1088,11 @@ A map from port to the AWS ARNs of the listeners for the ALB that has been deplo
diff --git a/docs/reference/modules/terraform-aws-load-balancer/lb-listener-rules/lb-listener-rules.md b/docs/reference/modules/terraform-aws-load-balancer/lb-listener-rules/lb-listener-rules.md
index 5ff95cee21..33d35ec870 100644
--- a/docs/reference/modules/terraform-aws-load-balancer/lb-listener-rules/lb-listener-rules.md
+++ b/docs/reference/modules/terraform-aws-load-balancer/lb-listener-rules/lb-listener-rules.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Load Balancer Listener Rules
-View Source
+View Source
Release Notes
@@ -95,7 +95,7 @@ Note that in most cases, your path definitions should be mutually exclusive and
module "lb_listener_rules" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/lb-listener-rules?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/lb-listener-rules?ref=v0.29.8"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -146,7 +146,7 @@ module "lb_listener_rules" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/lb-listener-rules?ref=v0.29.7"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-load-balancer.git//modules/lb-listener-rules?ref=v0.29.8"
}
inputs = {
@@ -725,11 +725,11 @@ The ARNs of the rules of type redirect. The key is the same key of the rule from
diff --git a/docs/reference/modules/terraform-aws-load-balancer/nlb/nlb.md b/docs/reference/modules/terraform-aws-load-balancer/nlb/nlb.md
index 85753114c5..6d72a88437 100644
--- a/docs/reference/modules/terraform-aws-load-balancer/nlb/nlb.md
+++ b/docs/reference/modules/terraform-aws-load-balancer/nlb/nlb.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Network Load Balancer (NLB) Module
-View Source
+View Source
Release Notes
@@ -29,11 +29,11 @@ For information on why the module was removed, refer to the discussion in [PR
diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
index 65180b8e24..8270e16601 100644
--- a/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
+++ b/docs/reference/modules/terraform-aws-vpc/network-acl-inbound/network-acl-inbound.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Network ACL Inbound Terraform Module
-View Source
+View Source
Release Notes
@@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
an ACL, but also the ephemeral outbound ports for return traffic.
-See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/network-acl-outbound) module for the analogous version of this module, but for opening
+See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-outbound) module for the analogous version of this module, but for opening
outbound ports.
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "network_acl_inbound" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_inbound" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.2"
}
inputs = {
@@ -221,11 +221,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
index 9f0a888df2..0ea9b93695 100644
--- a/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
+++ b/docs/reference/modules/terraform-aws-vpc/network-acl-outbound/network-acl-outbound.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Network ACL Outbound Terraform Module
-View Source
+View Source
Release Notes
@@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
outbound to an ACL, but also the ephemeral inbound ports for return traffic.
-See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/network-acl-inbound) module for the analogous version of this module, but for opening
+See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/network-acl-inbound) module for the analogous version of this module, but for opening
inbound ports.
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "network_acl_outbound" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -134,7 +134,7 @@ module "network_acl_outbound" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.2"
}
inputs = {
@@ -221,11 +221,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
index ddd23d2036..3e008db23b 100644
--- a/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
+++ b/docs/reference/modules/terraform-aws-vpc/port-range-calculator/port-range-calculator.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Port Calculator Module
-View Source
+View Source
Release Notes
@@ -50,7 +50,7 @@ just those ports:
module "port_range_calculator" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -84,7 +84,7 @@ module "port_range_calculator" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.2"
}
inputs = {
@@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
index edd30b7246..72b2b01a6d 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-app-network-acls/vpc-app-network-acls.md
@@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC-App Network ACLs Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
-[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
+[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):
* **Public subnet**: Allow all requests.
@@ -92,7 +92,7 @@ module "network_acls" {
module "vpc_app_network_acls" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -211,7 +211,7 @@ module "vpc_app_network_acls" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.2"
}
inputs = {
@@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
index eb5b8bb384..3850620016 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
@@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC-App Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as
-Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-mgmt) module.)
+Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt) module.)
## What's a VPC?
@@ -58,8 +58,8 @@ To summarize:
* In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone.
* Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`,
and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all.
-* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-mgmt),
- which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
+* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt),
+ which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
* Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want
to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that.
@@ -74,7 +74,7 @@ nearly all use-cases, and is consistent with many examples and existing document
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
## Sample Usage
@@ -89,7 +89,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_app" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -420,7 +420,7 @@ module "vpc_app" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.2"
}
inputs = {
@@ -1452,11 +1452,11 @@ A map of all public subnets, with the subnet name as the key, and all `aws-subne
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
index 4806479e7b..b182e46183 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder-rules/vpc-dns-forwarder-rules.md
@@ -9,23 +9,23 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC DNS Forwarder Rules Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module creates [Route 53 Resolver Forwarding
Rules](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-rules-managing.html) for a VPC that will
-utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-dns-forwarder). These forwarding
+utilize Route 53 Resolver Endpoints created with the [vpc-dns-forwarder module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-dns-forwarder). These forwarding
rules, combined with Route 53 Resolvers, allow DNS queries for specific domains to be resolved by peered VPCs.
## How do you specify the hostnames that use the forwarder?
By default, no DNS query will be routed through the Route 53 Resolvers created by the [vpc-dns-forwarder
-module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be
+module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-dns-forwarder). You need to create forwarding rules that specify which specific domains should be
resolved through the Route 53 Resolvers so that they are resolved over the peering connection. You can use this module
to construct the forwarding rules.
@@ -72,7 +72,7 @@ forwarder rule, it will match any domain that ends with `.local` (note the dot),
module "vpc_dns_forwarder_rules" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -126,7 +126,7 @@ module "vpc_dns_forwarder_rules" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder-rules?ref=v0.23.2"
}
inputs = {
@@ -180,11 +180,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
index f9bcdea046..8630b0ddb3 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-dns-forwarder/vpc-dns-forwarder.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC DNS Forwarder Terraform Module
-View Source
+View Source
Release Notes
@@ -47,7 +47,7 @@ private endpoints internal to the target VPC.
By default, no DNS query will be routed through the Route 53 Resolvers created by this module. You need to create
forwarding rules that specify which specific domains should be resolved through the Route 53 Resolvers created by this
-module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-dns-forwarder-rules) to construct the forwarding rules.
+module. You can use the [vpc-dns-forwarder-rules module](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-dns-forwarder-rules) to construct the forwarding rules.
## Sample Usage
@@ -62,7 +62,7 @@ module. You can use the [vpc-dns-forwarder-rules module](https://github.com/grun
module "vpc_dns_forwarder" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -138,7 +138,7 @@ module "vpc_dns_forwarder" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-dns-forwarder?ref=v0.23.2"
}
inputs = {
@@ -380,11 +380,11 @@ The secondary IP address of the DNS resolver in the origin VPC. This is the IP t
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
index 80b1bc0255..f42ffdf510 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-flow-logs/vpc-flow-logs.md
@@ -9,13 +9,13 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC Flow Logs Terraform Module
-View Source
+View Source
-Release Notes
+Release Notes
This Terraform Module creates a [VPC flow log](https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html). The flow log will capture IP traffic information for a given VPC, subnet, or [Elastic Network Interface (ENI)](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html). Flow logs can be configured to capture all traffic, only traffic that is accepted, or only traffic that is rejected. The logs can be published to [Amazon CloudWatch Logs](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html) or an S3 bucket.
@@ -86,7 +86,7 @@ TODO: Publish flow logs to an S3 bucket or CloudWatch Logs group in another acco
module "vpc_flow_logs" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# OPTIONAL VARIABLES
@@ -213,7 +213,7 @@ module "vpc_flow_logs" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-flow-logs?ref=v0.23.2"
}
inputs = {
@@ -710,11 +710,11 @@ The name of the S3 bucket where flow logs are published.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
index 938f6c8069..c0f2026504 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-interface-endpoint/vpc-interface-endpoint.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# Interface VPC Endpoint
-View Source
+View Source
Release Notes
@@ -193,7 +193,7 @@ Not specifying a rule allows all traffic.
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules//_docs/vpc-core-concepts.md) like subnets and NAT Gateways.
## Sample Usage
@@ -208,7 +208,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_interface_endpoint" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -2023,7 +2023,7 @@ module "vpc_interface_endpoint" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-interface-endpoint?ref=v0.23.2"
}
inputs = {
@@ -8331,11 +8331,11 @@ If you have private dns enabled, then your streaming calls would automatically g
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
index dcdb8c6abe..c387e65873 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt-network-acls/vpc-mgmt-network-acls.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# \[DEPRECATED] VPC-Mgmt Network ACLs Terraform Module
-View Source
+View Source
Release Notes
@@ -28,7 +28,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app`
This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
-[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC
+[vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):
* **Public subnet**: Allow all requests.
@@ -63,7 +63,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "vpc_mgmt_network_acls" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -142,7 +142,7 @@ module "vpc_mgmt_network_acls" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt-network-acls?ref=v0.23.2"
}
inputs = {
@@ -345,11 +345,11 @@ The number to use for the first rule that is created by this module. All rules i
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
index 134dc362c9..b35078a01c 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-mgmt/vpc-mgmt.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# \[DEPRECATED] VPC-Mgmt Terraform Module
-View Source
+View Source
Release Notes
@@ -27,7 +27,7 @@ aware that, in a future release, once we feel the new functionality in `vpc-app`
`vpc-mgmt` entirely.
This Terraform Module launches a single VPC meant to house DevOps and other management services. By contrast, the apps
-that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-app) module.)
+that power your business should run in an "app" VPC. (See the [vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app) module.)
## What's a VPC?
@@ -65,7 +65,7 @@ To summarize:
## VPC Peering
-Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-peering) module.
+Learn more about VPC Peering in the [vpc-peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-peering) module.
## SSH Access via the Bastion Host
@@ -79,7 +79,7 @@ examples](https://github.com/gruntwork-io/terraform-aws-server/tree/main/example
## Other VPC Core Concepts
-Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
+Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
## Sample Usage
@@ -94,7 +94,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
module "vpc_mgmt" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -301,7 +301,7 @@ module "vpc_mgmt" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-mgmt?ref=v0.23.2"
}
inputs = {
@@ -1011,11 +1011,11 @@ A null_resource that indicates that the VPC is ready, including all of its resou
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
index 6cc1b45d80..96d599e05f 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-accepter/vpc-peering-cross-accounts-accepter.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# vpc-peering-cross-accounts-accepter
-View Source
+View Source
Release Notes
@@ -78,7 +78,7 @@ No modules.
module "vpc_peering_cross_accounts_accepter" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -144,7 +144,7 @@ module "vpc_peering_cross_accounts_accepter" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-accepter?ref=v0.23.2"
}
inputs = {
@@ -331,11 +331,11 @@ Peering connection ID.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
index 176deeb0f7..b1cdb62a35 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-cross-accounts-requester/vpc-peering-cross-accounts-requester.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# vpc-peering-cross-accounts-requester
-View Source
+View Source
Release Notes
@@ -73,7 +73,7 @@ No modules.
module "vpc_peering_cross_accounts_requester" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -131,7 +131,7 @@ module "vpc_peering_cross_accounts_requester" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-cross-accounts-requester?ref=v0.23.2"
}
inputs = {
@@ -299,11 +299,11 @@ Peering connection ID.
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
index b131a00ce7..6eec721960 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering-external/vpc-peering-external.md
@@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC Peering For External VPCs Module
-View Source
+View Source
Release Notes
@@ -87,7 +87,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
module "vpc_peering_external" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -202,7 +202,7 @@ module "vpc_peering_external" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering-external?ref=v0.23.2"
}
inputs = {
@@ -317,11 +317,11 @@ inputs = {
diff --git a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
index 7c05ecef29..38fa2c0c65 100644
--- a/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
+++ b/docs/reference/modules/terraform-aws-vpc/vpc-peering/vpc-peering.md
@@ -9,19 +9,19 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";
-
+
# VPC-Peering Terraform Module
-View Source
+View Source
Release Notes
This Terraform Module creates [VPC Peering
Connections](http://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/Welcome.html) between VPCs. Normally, VPCs are
completely isolated from each other, but sometimes, you want to allow traffic to flow between them, such as allowing
-DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see
-[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/pete%2FKB-743%2Fflow-log-params/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of
+DevOps tools running in a Mgmt VPC (see [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-mgmt)) to talk to apps running in a Stage or Prod VPC (see
+[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.2/modules/vpc-app)). This module can create peering connections and route table entries that make this sort of
cross-VPC communication possible.
## What's a VPC?
@@ -57,7 +57,7 @@ and production, someone in staging *cannot* access production.
module "vpc_peering" {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.2"
# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
@@ -149,7 +149,7 @@ module "vpc_peering" {
# ------------------------------------------------------------------------------------------------------
terraform {
- source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.1"
+ source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-peering?ref=v0.23.2"
}
inputs = {
@@ -241,11 +241,11 @@ inputs = {