You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add support for `ip_address_type` for VPC endpoint ([#1096](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1096)) ([d868303](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/d868303bd78b8c56cf76e2495672d42b256a1387))
* Update flow log ARNs to use partition from aws_partition data source ([#1112](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1112)) ([72cde38](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/72cde38fb5c500323858bb44eaed2924c7f826f9))
* Restrict flow log policy to use log group ARNs ([#1088](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1088)) ([9256722](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/92567225dc73ef939b86a241b9607cb13329fb75))
* Add route to `0.0.0.0/0` & `::/0` (when IPv6 is enabled) on all public route tables ([#1100](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1100)) ([b3e7803](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/b3e78033bbee8346341a523f78f762ade41eb93b))
* Allow custom VPC Flow Log IAM Role name and IAM Policy name ([#1089](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1089)) ([f8cd168](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/f8cd1681837c8c4a24af6fe73035724a03e1e66e))
* Do not replace NAT gateways when additional subnets are added ([#1055](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1055)) ([cf18c37](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/cf18c37591f860908e2223b4f488787e8a5f74f3))
* Add support for multiple route tables to public and intra subnets ([#1051](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1051)) ([da05f24](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/da05f24c5c603a31d320d5ad92493bb39fea9f3d))
* Create private_ipv6_egress routes only when having at least one private subnet ([#1062](https://github.com/terraform-aws-modules/terraform-aws-vpc/issues/1062)) ([8701204](https://github.com/terraform-aws-modules/terraform-aws-vpc/commit/8701204c28a0ff984c5ade71400c6208c6953bfc))
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
352
353
|[aws_iam_policy_document.flow_log_cloudwatch_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
353
354
|[aws_iam_policy_document.vpc_flow_log_cloudwatch](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
355
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
356
+
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
354
357
355
358
## Inputs
356
359
@@ -369,6 +372,8 @@ No modules.
369
372
| <aname="input_create_flow_log_cloudwatch_iam_role"></a> [create\_flow\_log\_cloudwatch\_iam\_role](#input\_create\_flow\_log\_cloudwatch\_iam\_role)| Whether to create IAM role for VPC Flow Logs |`bool`|`false`| no |
370
373
| <aname="input_create_flow_log_cloudwatch_log_group"></a> [create\_flow\_log\_cloudwatch\_log\_group](#input\_create\_flow\_log\_cloudwatch\_log\_group)| Whether to create CloudWatch log group for VPC Flow Logs |`bool`|`false`| no |
371
374
| <aname="input_create_igw"></a> [create\_igw](#input\_create\_igw)| Controls if an Internet Gateway is created for public subnets and the related routes that connect them |`bool`|`true`| no |
375
+
| <aname="input_create_multiple_intra_route_tables"></a> [create\_multiple\_intra\_route\_tables](#input\_create\_multiple\_intra\_route\_tables)| Indicates whether to create a separate route table for each intra subnet. Default: `false`|`bool`|`false`| no |
376
+
| <aname="input_create_multiple_public_route_tables"></a> [create\_multiple\_public\_route\_tables](#input\_create\_multiple\_public\_route\_tables)| Indicates whether to create a separate route table for each public subnet. Default: `false`|`bool`|`false`| no |
372
377
| <aname="input_create_redshift_subnet_group"></a> [create\_redshift\_subnet\_group](#input\_create\_redshift\_subnet\_group)| Controls if redshift subnet group should be created |`bool`|`true`| no |
373
378
| <aname="input_create_redshift_subnet_route_table"></a> [create\_redshift\_subnet\_route\_table](#input\_create\_redshift\_subnet\_route\_table)| Controls if separate route table for redshift should be created |`bool`|`false`| no |
374
379
| <aname="input_create_vpc"></a> [create\_vpc](#input\_create\_vpc)| Controls if VPC should be created (it affects almost all resources) |`bool`|`true`| no |
@@ -414,6 +419,7 @@ No modules.
414
419
| <aname="input_default_vpc_tags"></a> [default\_vpc\_tags](#input\_default\_vpc\_tags)| Additional tags for the Default VPC |`map(string)`|`{}`| no |
415
420
| <aname="input_dhcp_options_domain_name"></a> [dhcp\_options\_domain\_name](#input\_dhcp\_options\_domain\_name)| Specifies DNS name for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`""`| no |
416
421
| <aname="input_dhcp_options_domain_name_servers"></a> [dhcp\_options\_domain\_name\_servers](#input\_dhcp\_options\_domain\_name\_servers)| Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) |`list(string)`| <pre>[<br> "AmazonProvidedDNS"<br>]</pre> | no |
422
+
| <aname="input_dhcp_options_ipv6_address_preferred_lease_time"></a> [dhcp\_options\_ipv6\_address\_preferred\_lease\_time](#input\_dhcp\_options\_ipv6\_address\_preferred\_lease\_time)| How frequently, in seconds, a running instance with an IPv6 assigned to it goes through DHCPv6 lease renewal (requires enable\_dhcp\_options set to true) |`number`|`null`| no |
417
423
| <aname="input_dhcp_options_netbios_name_servers"></a> [dhcp\_options\_netbios\_name\_servers](#input\_dhcp\_options\_netbios\_name\_servers)| Specify a list of netbios servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
418
424
| <aname="input_dhcp_options_netbios_node_type"></a> [dhcp\_options\_netbios\_node\_type](#input\_dhcp\_options\_netbios\_node\_type)| Specify netbios node\_type for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`""`| no |
419
425
| <aname="input_dhcp_options_ntp_servers"></a> [dhcp\_options\_ntp\_servers](#input\_dhcp\_options\_ntp\_servers)| Specify a list of NTP servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
@@ -588,6 +594,10 @@ No modules.
588
594
| <aname="input_single_nat_gateway"></a> [single\_nat\_gateway](#input\_single\_nat\_gateway)| Should be true if you want to provision a single shared NAT Gateway across all of your private networks |`bool`|`false`| no |
589
595
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
590
596
| <aname="input_use_ipam_pool"></a> [use\_ipam\_pool](#input\_use\_ipam\_pool)| Determines whether IPAM pool is used for CIDR allocation |`bool`|`false`| no |
597
+
| <aname="input_vpc_flow_log_iam_policy_name"></a> [vpc\_flow\_log\_iam\_policy\_name](#input\_vpc\_flow\_log\_iam\_policy\_name)| Name of the IAM policy |`string`|`"vpc-flow-log-to-cloudwatch"`| no |
598
+
| <aname="input_vpc_flow_log_iam_policy_use_name_prefix"></a> [vpc\_flow\_log\_iam\_policy\_use\_name\_prefix](#input\_vpc\_flow\_log\_iam\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`vpc_flow_log_iam_policy_name`) is used as a prefix |`bool`|`true`| no |
599
+
| <aname="input_vpc_flow_log_iam_role_name"></a> [vpc\_flow\_log\_iam\_role\_name](#input\_vpc\_flow\_log\_iam\_role\_name)| Name to use on the VPC Flow Log IAM role created |`string`|`"vpc-flow-log-role"`| no |
600
+
| <aname="input_vpc_flow_log_iam_role_use_name_prefix"></a> [vpc\_flow\_log\_iam\_role\_use\_name\_prefix](#input\_vpc\_flow\_log\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`vpc_flow_log_iam_role_name_name`) is used as a prefix |`bool`|`true`| no |
591
601
| <aname="input_vpc_flow_log_permissions_boundary"></a> [vpc\_flow\_log\_permissions\_boundary](#input\_vpc\_flow\_log\_permissions\_boundary)| The ARN of the Permissions Boundary for the VPC Flow Log IAM Role |`string`|`null`| no |
592
602
| <aname="input_vpc_flow_log_tags"></a> [vpc\_flow\_log\_tags](#input\_vpc\_flow\_log\_tags)| Additional tags for the VPC Flow Logs |`map(string)`|`{}`| no |
593
603
| <aname="input_vpc_tags"></a> [vpc\_tags](#input\_vpc\_tags)| Additional tags for the VPC |`map(string)`|`{}`| no |
0 commit comments