You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,13 +59,13 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
59
59
| <aname="input_block_http_traffic"></a> [block\_http\_traffic](#input\_block\_http\_traffic)| True when http traffic has to be blocked for S3. |`bool`|`true`| no |
60
60
| <aname="input_cidr_block"></a> [cidr\_block](#input\_cidr\_block)| CIDR for the VPC. |`string`|`""`| no |
61
61
| <aname="input_create_flow_log_cloudwatch_iam_role"></a> [create\_flow\_log\_cloudwatch\_iam\_role](#input\_create\_flow\_log\_cloudwatch\_iam\_role)| Flag to be set true when cloudwatch iam role is to be created when flow log destination type is set to cloudwatch logs. |`bool`|`true`| no |
62
-
| <aname="input_default_network_acl_egress"></a> [default\_network\_acl\_egress](#input\_default\_network\_acl\_egress)| List of maps of egress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
63
-
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
62
+
| <aname="input_default_network_acl_egress"></a> [default\_network\_acl\_egress](#input\_default\_network\_acl\_egress)| List of maps of egress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br/> {<br/> "action": "allow",<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_no": 100,<br/> "to_port": 0<br/> },<br/> {<br/> "action": "allow",<br/> "from_port": 0,<br/> "ipv6_cidr_block": "::/0",<br/> "protocol": "-1",<br/> "rule_no": 101,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
63
+
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br/> {<br/> "action": "allow",<br/> "cidr_block": "0.0.0.0/0",<br/> "from_port": 0,<br/> "protocol": "-1",<br/> "rule_no": 100,<br/> "to_port": 0<br/> },<br/> {<br/> "action": "allow",<br/> "from_port": 0,<br/> "ipv6_cidr_block": "::/0",<br/> "protocol": "-1",<br/> "rule_no": 101,<br/> "to_port": 0<br/> }<br/>]</pre> | no |
64
64
| <aname="input_default_route_table_routes"></a> [default\_route\_table\_routes](#input\_default\_route\_table\_routes)| Configuration block of routes. |`list(map(string))`|`[]`| no |
65
65
| <aname="input_default_security_group_egress"></a> [default\_security\_group\_egress](#input\_default\_security\_group\_egress)| List of maps of egress rules to set on the default security group |`list(map(string))`|`[]`| no |
66
66
| <aname="input_default_security_group_ingress"></a> [default\_security\_group\_ingress](#input\_default\_security\_group\_ingress)| List of maps of ingress rules to set on the default security group |`list(map(string))`|`[]`| no |
67
67
| <aname="input_dhcp_options_domain_name"></a> [dhcp\_options\_domain\_name](#input\_dhcp\_options\_domain\_name)| Specifies DNS name for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`"service.consul"`| no |
68
-
| <aname="input_dhcp_options_domain_name_servers"></a> [dhcp\_options\_domain\_name\_servers](#input\_dhcp\_options\_domain\_name\_servers)| Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) |`list(string)`| <pre>[<br> "AmazonProvidedDNS"<br>]</pre> | no |
68
+
| <aname="input_dhcp_options_domain_name_servers"></a> [dhcp\_options\_domain\_name\_servers](#input\_dhcp\_options\_domain\_name\_servers)| Specify a list of DNS server addresses for DHCP options set, default to AWS provided (requires enable\_dhcp\_options set to true) |`list(string)`| <pre>[<br/> "AmazonProvidedDNS"<br/>]</pre> | no |
69
69
| <aname="input_dhcp_options_netbios_name_servers"></a> [dhcp\_options\_netbios\_name\_servers](#input\_dhcp\_options\_netbios\_name\_servers)| Specify a list of netbios servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
70
70
| <aname="input_dhcp_options_netbios_node_type"></a> [dhcp\_options\_netbios\_node\_type](#input\_dhcp\_options\_netbios\_node\_type)| Specify netbios node\_type for DHCP options set (requires enable\_dhcp\_options set to true) |`string`|`""`| no |
71
71
| <aname="input_dhcp_options_ntp_servers"></a> [dhcp\_options\_ntp\_servers](#input\_dhcp\_options\_ntp\_servers)| Specify a list of NTP servers for DHCP options set (requires enable\_dhcp\_options set to true) |`list(string)`|`[]`| no |
@@ -100,7 +100,7 @@ This project is licensed under the **MIT** License - see the [LICENSE](https://g
100
100
| <aname="input_name"></a> [name](#input\_name)| Default name tag |`string`| n/a | yes |
101
101
| <aname="input_restrict_default_sg"></a> [restrict\_default\_sg](#input\_restrict\_default\_sg)| Flag to control the restrict default sg creation. |`bool`|`true`| no |
102
102
| <aname="input_s3_sse_algorithm"></a> [s3\_sse\_algorithm](#input\_s3\_sse\_algorithm)| Server-side encryption algorithm to use. Valid values are AES256 and aws:kms|`string`|`"aws:kms"`| no |
| <aname="input_vpc_flow_log_permissions_boundary"></a> [vpc\_flow\_log\_permissions\_boundary](#input\_vpc\_flow\_log\_permissions\_boundary)| The ARN of the Permissions Boundary for the VPC Flow Log IAM Role |`string`|`null`| no |
0 commit comments