Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>

# Network ACL Inbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
an ACL, but also the ephemeral outbound ports for return traffic.

See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound) module for the analogous version of this module, but for opening
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
outbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_inbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_inbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-inbound?ref=v0.25.0"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "c7f369c7bc947aa801770e67227c7495"
"hash": "97f140b6551117baf77a4dd67d61ff81"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>

# Network ACL Outbound Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand All @@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
outbound to an ACL, but also the ephemeral inbound ports for return traffic.

See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound) module for the analogous version of this module, but for opening
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
inbound ports.

## What's a Network ACL?
Expand All @@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow

module "network_acl_outbound" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -134,7 +134,7 @@ module "network_acl_outbound" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/network-acl-outbound?ref=v0.25.0"
}

inputs = {
Expand Down Expand Up @@ -221,11 +221,11 @@ inputs = {
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "ee3662b3885f074df02a26821f8d7fb2"
"hash": "eac4ab274f9f275e391be84f8a8edeb9"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.3"/>
<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.3"/>

# Port Calculator Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

Expand Down Expand Up @@ -50,7 +50,7 @@ just those ports:

module "port_range_calculator" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -84,7 +84,7 @@ module "port_range_calculator" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/port-range-calculator?ref=v0.25.0"
}

inputs = {
Expand Down Expand Up @@ -178,11 +178,11 @@ Map of port ranges to the ranges to allow. This is provided as a convenience out
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "4b78554615b5e3ab47990e53e32ad827"
"hash": "1c169b636305afd4f82161bf21dd7b53"
}
##DOCS-SOURCER-END -->
Original file line number Diff line number Diff line change
Expand Up @@ -9,17 +9,17 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.5"/>
<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.5"/>

# VPC-App Network ACLs Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.5" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

This Terraform Module adds a default set of [Network
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
Architecture](https://www.whaletech.co/2014/10/02/reference-vpc-architecture.html)):

* **Public subnet**: Allow all requests.
Expand Down Expand Up @@ -92,7 +92,7 @@ module "network_acls" {

module "vpc_app_network_acls" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -211,7 +211,7 @@ module "vpc_app_network_acls" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app-network-acls?ref=v0.25.0"
}

inputs = {
Expand Down Expand Up @@ -625,11 +625,11 @@ Use this variable to ensure the Network ACL does not get created until the VPC i
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "bab92e14ebf11d2b4a732d13a4315bf8"
"hash": "e49d6bf1606fca84588abc2d6d4f32b7"
}
##DOCS-SOURCER-END -->
24 changes: 12 additions & 12 deletions docs/reference/modules/terraform-aws-vpc/vpc-app/vpc-app.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,16 +9,16 @@ import VersionBadge from '../../../../../src/components/VersionBadge.tsx';
import { HclListItem, HclListItemDescription, HclListItemTypeDetails, HclListItemDefaultValue, HclGeneralListItem } from '../../../../../src/components/HclListItem.tsx';
import { ModuleUsage } from "../../../../../src/components/ModuleUsage";

<VersionBadge repoTitle="VPC Modules" version="0.23.3" lastModifiedVersion="0.22.8"/>
<VersionBadge repoTitle="VPC Modules" version="0.25.0" lastModifiedVersion="0.22.8"/>

# VPC-App Terraform Module

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app" className="link-button" title="View the source code for this module in GitHub.">View Source</a>
<a href="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app" className="link-button" title="View the source code for this module in GitHub.">View Source</a>

<a href="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.8" className="link-button" title="Release notes for only versions which impacted this module.">Release Notes</a>

This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt) module.)
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module.)

## What's a VPC?

Expand Down Expand Up @@ -58,8 +58,8 @@ To summarize:
* In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone.
* Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`,
and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all.
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt),
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt),
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
* Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want
to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that.

Expand All @@ -74,7 +74,7 @@ nearly all use-cases, and is consistent with many examples and existing document

## Other VPC Core Concepts

Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.

## Sample Usage

Expand All @@ -89,7 +89,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-

module "vpc_app" {

source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0"

# ----------------------------------------------------------------------------------------------------
# REQUIRED VARIABLES
Expand Down Expand Up @@ -420,7 +420,7 @@ module "vpc_app" {
# ------------------------------------------------------------------------------------------------------

terraform {
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.23.3"
source = "git::git@github.com:gruntwork-io/terraform-aws-vpc.git//modules/vpc-app?ref=v0.25.0"
}

inputs = {
Expand Down Expand Up @@ -1452,11 +1452,11 @@ A map of all public subnets, with the subnet name as the key, and all `aws-subne
<!-- ##DOCS-SOURCER-START
{
"originalSources": [
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app/outputs.tf"
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app/readme.md",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app/variables.tf",
"https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app/outputs.tf"
],
"sourcePlugin": "module-catalog-api",
"hash": "bba36203260707323140f85340469b78"
"hash": "ba0043de660950a9dcc7bd4d6f6ae572"
}
##DOCS-SOURCER-END -->
Loading