subnet
clouddrove/subnet/aws
Terraform module to create public, private and public-private subnet with network acl, route table, Elastic IP, nat gateway, flow log.
Terraform AWS Subnet Terraform module to create public, private and public-private subnet with network acl, route table, Elastic IP, nat gateway, flow log. We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems . Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure. This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with m
| Name | Type | Description | Default |
|---|---|---|---|
| vpc_id | string | VPC ID. | required |
| flow_log_hive_compatible_partitions | bool | (Optional) Indicates whether to use Hive-compatible prefixes for flow logs store | false |
| attributes | list(any) | Additional attributes (e.g. `1`). | [] |
| managedby | string | ManagedBy, eg 'CloudDrove'. | "[email protected]" |
| ipv6_cidr_block | string | Base CIDR block which is divided into subnet CIDR blocks (e.g. `10.0.0.0/16`). | null |
| igw_id | string | Internet Gateway ID that is used as a default route when creating public subnets | "" |
| enable_flow_log | bool | Enable subnet_flow_log logs. | false |
| enable | bool | Set to false to prevent the module from creating any resources. | true |
| public_subnet_enable_resource_name_dns_a_record_on_launch | bool | Indicates whether to respond to DNS queries for instance hostnames with DNS A re | false |
| map_public_ip_on_launch | bool | Specify true to indicate that instances launched into the public subnet should b | false |
| flow_log_traffic_type | string | Type of traffic to capture. Valid values: ACCEPT,REJECT, ALL. | "ALL" |
| flow_log_log_format | string | The fields to include in the flow log record, in the order in which they should | null |
| single_nat_gateway | bool | Enable for only single NAT Gateway in one Availability Zone | false |
| public_rt_ipv6_destination_cidr | string | The destination ipv6 CIDR block. | "::/0" |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "" |
| ipv4_private_cidrs | list(any) | Subnet CIDR blocks (e.g. `10.0.0.0/16`). | [] |
| public_rt_ipv4_destination_cidr | string | The destination ipv4 CIDR block. | "0.0.0.0/0" |
| flow_log_destination_arn | string | ARN of resource in which flow log will be sent. | null |
| flow_log_iam_role_arn | string | The ARN for the IAM role that's used to post flow logs to a CloudWatch Logs log | null |
| flow_log_per_hour_partition | bool | (Optional) Indicates whether to partition the flow log per hour. This reduces th | false |
| private_subnet_assign_ipv6_address_on_creation | bool | Specify true to indicate that network interfaces created in the specified subnet | false |
| … and 10 more inputs | |||
private_acl — The ID of the network ACL.private_subnet_id — The ID of the private subnet.public_route_tables_id — The ID of the routing table.private_route_tables_id — The ID of the routing table.public_acl — The ID of the network ACL.nat_gateway_private_ip — The private IPv4 address to assign to the NAT Gateway. If you don't provide an address, a private IPpublic_subnet_id — The ID of the subnet.private_subnet_cidrs_ipv6 — CIDR blocks of the created private subnets.private_tags — A mapping of private tags to assign to the resource.public_tags — A mapping of public tags to assign to the resource.public_subnet_cidrs — CIDR blocks of the created public subnets.public_subnet_cidrs_ipv6 — CIDR blocks of the created public subnets.private_subnet_cidrs — CIDR blocks of the created private subnets.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,