Virtual Private Cloud (VPC)
Deploy a VPC on AWS.
View on GitHubReference
- Inputs
- Outputs
allow_private_persistence_internet_access
— Should the private persistence subnet be allowed outbound access to the internet?
apply_default_nacl_rules
— If true, will apply the default NACL rules indefault_nacl_ingress_rules
anddefault_nacl_egress_rules
to the public, private, and persistence subnets created by this module. Note that every VPC has default NACL rules that apply to subnets. When this is false, the original default NACL rules managed by AWS will be used. If you are managing NACLs for the subnets using another module or for some reason do not want to use the default NACLs, set this to false.
availability_zone_exclude_names
— Specific Availability Zones in which subnets SHOULD NOT be created. Useful for when features / support is missing from a given AZ.
aws_region
— The AWS region in which all resources will be created
cidr_block
— The IP address range of the VPC in CIDR notation. A prefix of /18 is recommended. Do not use a prefix higher than /27. Examples include '10.100.0.0/18', '10.200.0.0/18', etc.
create_dns_forwarder
— Whether or not to create DNS forwarders from the Mgmt VPC to the App VPC to resolve private Route 53 endpoints. This is most useful when you want to keep your EKS Kubernetes API endpoint private to the VPC, but want to access it from the Mgmt VPC (where your VPN/Bastion servers are).
create_flow_logs
— If you set this variable to false, this module will not create VPC Flow Logs resources. This is used as a workaround because Terraform does not allow you to use the 'count' parameter on modules. By using this parameter, you can optionally create or not create the resources within this module.
create_network_acls
— If set to false, this module will NOT create Network ACLs. This is useful if you don't want to use Network ACLs or you want to provide your own Network ACLs outside of this module.
create_peering_connection
— Whether or not to create a peering connection to another VPC.
create_private_app_subnet_nacls
— If set to false, this module will NOT create the NACLs for the private app subnet tier.
create_private_app_subnets
— If set to false, this module will NOT create the private app subnet tier.
create_private_persistence_subnet_nacls
— If set to false, this module will NOT create the NACLs for the private persistence subnet tier.
create_private_persistence_subnets
— If set to false, this module will NOT create the private persistence subnet tier.
create_public_subnet_nacls
— If set to false, this module will NOT create the NACLs for the public subnet tier. This is useful for VPCs that only need private subnets.
create_public_subnets
— If set to false, this module will NOT create the public subnet tier. This is useful for VPCs that only need private subnets. Note that setting this to false also means the module will NOT create an Internet Gateway or the NAT gateways, so if you want any public Internet access in the VPC (even outbound access—e.g., to run apt get), you'll need to provide it yourself via some other mechanism (e.g., via VPC peering, a Transit Gateway, Direct Connect, etc).
create_vpc_endpoints
— Create VPC endpoints for S3 and DynamoDB.
custom_tags
— A map of tags to apply to the VPC, Subnets, Route Tables, Internet Gateway, default security group, and default NACLs. The key is the tag name and the value is the tag value. Note that the tag 'Name' is automatically added by this module but may be optionally overwritten by this variable.
default_nacl_egress_rules
— The egress rules to apply to the default NACL in the VPC. This is the security group that is used by any subnet that doesn't have its own NACL attached. The value for this variable must be a map where the keys are a unique name for each rule and the values are objects with the same fields as the egress block in theaws_default_network_acl
resource:https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl
.
default_nacl_ingress_rules
— The ingress rules to apply to the default NACL in the VPC. This is the NACL that is used by any subnet that doesn't have its own NACL attached. The value for this variable must be a map where the keys are a unique name for each rule and the values are objects with the same fields as the ingress block in theaws_default_network_acl
resource:https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_network_acl
.
default_security_group_egress_rules
— The egress rules to apply to the default security group in the VPC. This is the security group that is used by any resource that doesn't have its own security group attached. The value for this variable must be a map where the keys are a unique name for each rule and the values are objects with the same fields as the egress block in theaws_default_security_group
resource:https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_security_group
#egress-block.
default_security_group_ingress_rules
— The ingress rules to apply to the default security group in the VPC. This is the security group that is used by any resource that doesn't have its own security group attached. The value for this variable must be a map where the keys are a unique name for each rule and the values are objects with the same fields as the ingress block in theaws_default_security_group
resource:https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_security_group
#ingress-block.
destination_vpc_resolver_name
— Name to set for the destination VPC resolver (inbound from origin VPC to destination VPC). If null (default), defaults to'DESTINATION_VPC_NAME-from-ORIGIN_VPC_NAME
-in'.
eks_cluster_names
— The names of EKS clusters that will be deployed into the VPC, iftag_for_use_with_eks
is true.
enable_default_security_group
— If set to false, the default security groups will NOT be created.
flow_log_cloudwatch_iam_role_name
— The name to use for the flow log IAM role. This can be useful if you provision the VPC without admin privileges which needs setting IAM:PassRole on deployment role. When null, a default name based on the VPC name will be chosen.
flow_log_cloudwatch_log_group_name
— The name to use for the CloudWatch Log group used for storing flow log. When null, a default name based on the VPC name will be chosen.
flow_logs_traffic_type
— The type of traffic to capture in the VPC flow log. Valid values include ACCEPT, REJECT, or ALL. Defaults to REJECT. Only used ifcreate_flow_logs
is true.
kms_key_arn
— The ARN of a KMS key to use for encrypting VPC the flow log. A new KMS key will be created if this is not supplied.
kms_key_user_iam_arns
— VPC Flow Logs will be encrypted with a KMS Key (a Customer Master Key). The IAM Users specified in this list will have access to this key.
nat_gateway_custom_tags
— A map of tags to apply to the NAT gateways, on top of thecustom_tags
. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
num_availability_zones
— How many AWS Availability Zones (AZs) to use. One subnet of each type (public, private app) will be created in each AZ. Note that this must be less than or equal to the total number of AZs in a region. A value of null means all AZs should be used. For example, if you specify 3 in a region with 5 AZs, subnets will be created in just 3 AZs instead of all 5. Defaults to all AZs in a region.
num_nat_gateways
— The number of NAT Gateways to launch for this VPC. For production VPCs, a NAT Gateway should be placed in each Availability Zone (so likely 3 total), whereas for non-prod VPCs, just one Availability Zone (and hence 1 NAT Gateway) will suffice.
origin_vpc_cidr_block
— The CIDR block of the origin VPC.
origin_vpc_id
— The ID of the origin VPC to use when creating peering connections and DNS forwarding.
origin_vpc_name
— The name of the origin VPC to use when creating peering connections and DNS forwarding.
origin_vpc_public_subnet_ids
— The public subnets in the origin VPC to use when creating route53 resolvers. These are public subnets due to network ACLs restrictions. Although the forwarder is addressable publicly, access is blocked by security groups.
origin_vpc_resolver_name
— Name to set for the origin VPC resolver (outbound from origin VPC to destination VPC). If null (default), defaults to'ORIGIN_VPC_NAME-to-DESTINATION_VPC_NAME
-out'.
origin_vpc_route_table_ids
— A list of route tables from the origin VPC that should have routes to this app VPC.
persistence_subnet_bits
— Takes the CIDR prefix and adds these many bits to it for calculating subnet ranges. MAKE SURE if you change this you also change the CIDR spacing or you may hit errors. See cidrsubnet interpolation in terraform config for more information.
persistence_subnet_spacing
— The amount of spacing between the private persistence subnets. Default: 2 times the value ofprivate_subnet_spacing
.
private_app_allow_inbound_ports_from_cidr
— A map of unique names to client IP CIDR block and inbound ports that should be exposed in the private app subnet tier nACLs. This is useful when exposing your service on a privileged port with an NLB, where the address isn't translated.
private_app_subnet_cidr_blocks
— A map listing the specific CIDR blocks desired for each private-app subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is the number of Availability Zones. If left blank, we will compute a reasonable CIDR block for each subnet.
private_app_subnet_custom_tags
— A map of tags to apply to the private-app Subnet, on top of thecustom_tags
. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
private_persistence_subnet_cidr_blocks
— A map listing the specific CIDR blocks desired for each private-persistence subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is the number of Availability Zones. If left blank, we will compute a reasonable CIDR block for each subnet.
private_persistence_subnet_custom_tags
— A map of tags to apply to the private-persistence Subnet, on top of thecustom_tags
. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
private_subnet_bits
— Takes the CIDR prefix and adds these many bits to it for calculating subnet ranges. MAKE SURE if you change this you also change the CIDR spacing or you may hit errors. See cidrsubnet interpolation in terraform config for more information.
private_subnet_spacing
— The amount of spacing between private app subnets. Defaults tosubnet_spacing
in vpc-app module if not set.
public_subnet_bits
— Takes the CIDR prefix and adds these many bits to it for calculating subnet ranges. MAKE SURE if you change this you also change the CIDR spacing or you may hit errors. See cidrsubnet interpolation in terraform config for more information.
public_subnet_cidr_blocks
— A map listing the specific CIDR blocks desired for each public subnet. The key must be in the form AZ-0, AZ-1, ... AZ-n where n is the number of Availability Zones. If left blank, we will compute a reasonable CIDR block for each subnet.
public_subnet_custom_tags
— A map of tags to apply to the public Subnet, on top of thecustom_tags
. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
security_group_tags
— A map of tags to apply to the default Security Group, on top of thecustom_tags
. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
subnet_spacing
— The amount of spacing between the different subnet types
tag_for_use_with_eks
— The VPC resources need special tags for discoverability by Kubernetes to use with certain features, like deploying ALBs.
tenancy
— The allowed tenancy of instances launched into the selected VPC. Must be one of: default, dedicated, or host.
vpc_custom_tags
— A map of tags to apply just to the VPC itself, but not any of the other resources. The key is the tag name and the value is the tag value. Note that tags defined here will override tags defined ascustom_tags
in case of conflict.
vpc_name
— Name of the VPC. Examples include 'prod', 'dev', 'mgmt', etc.
availability_zones
— The availability zones of the VPC
default_security_group_id
— The ID of the default security group of this VPC.
nat_gateway_public_ip_count
— Count of public IPs from the NAT Gateway
nat_gateway_public_ips
— A list of public IPs from the NAT Gateway
num_availability_zones
— The number of availability zones of the VPC
private_app_subnet_cidr_blocks
— The private IP address range of the VPC in CIDR notation.
private_app_subnet_ids
— A list of IDs of the private app subnets in the VPC
private_app_subnet_route_table_ids
— A list of IDs of the private app subnet routing table.
private_app_subnets
— A map of all private-app subnets, with the subnet name as key, and allaws-subnet
properties as the value.
private_app_subnets_network_acl_id
— The ID of the private subnet's ACL
private_persistence_route_table_ids
— A list of IDs of the private persistence subnet routing table.
private_persistence_subnet_cidr_blocks
— The private IP address range of the VPC Persistence tier in CIDR notation.
private_persistence_subnet_ids
— The IDs of the private persistence tier subnets of the VPC.
private_persistence_subnets
— A map of all private-persistence subnets, with the subnet name as key, and allaws-subnet
properties as the value.
private_persistence_subnets_network_acl_id
— The ID of the private persistence subnet's ACL
public_subnet_cidr_blocks
— The public IP address range of the VPC in CIDR notation.
public_subnet_ids
— A list of IDs of the public subnets of the VPC.
public_subnet_route_table_id
— The ID of the public routing table.
public_subnets
— A map of all public subnets, with the subnet name as key, and allaws-subnet
properties as the value.
public_subnets_network_acl_id
— The ID of the public subnet's ACL
vpc_cidr_block
— The IP address range of the VPC in CIDR notation.
vpc_id
— The ID of the VPC.
vpc_name
— The name configured for VPC.
vpc_ready
— Indicates whether or not the VPC has finished creating