You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_enable_public_redshift"></a> [enable\_public\_redshift](#input\_enable\_public\_redshift)| Controls if redshift should have public routing table |`bool`|`false`| no |
506
507
| <aname="input_enable_vpn_gateway"></a> [enable\_vpn\_gateway](#input\_enable\_vpn\_gateway)| Should be true if you want to create a new VPN Gateway resource and attach it to the VPC |`bool`|`false`| no |
507
508
| <aname="input_external_nat_ip_ids"></a> [external\_nat\_ip\_ids](#input\_external\_nat\_ip\_ids)| List of EIP IDs to be assigned to the NAT Gateways (used in combination with reuse\_nat\_ips) |`list(string)`|`[]`| no |
508
-
| <aname="input_external_nat_ips"></a> [external\_nat\_ips](#input\_external\_nat\_ips)| List of EIPs to be used for `nat_public_ips` output (used in combination with reuse\_nat\_ips and external\_nat\_ip\_ids) |`list(string)`|`[]`| no |
509
+
| <aname="input_external_nat_ips"></a> [external\_nat\_ips](#input\_external\_nat\_ips)| List of EIPs to be used for `nat_public_ips` output (used in combination with reuse\_nat\_ips and external\_nat\_ip\_ids). For regional NAT gateways, EIPs will be mapped to availability zones in order.|`list(string)`|`[]`| no |
509
510
| <aname="input_flow_log_cloudwatch_iam_role_arn"></a> [flow\_log\_cloudwatch\_iam\_role\_arn](#input\_flow\_log\_cloudwatch\_iam\_role\_arn)| The ARN for the IAM role that's used to post flow logs to a CloudWatch Logs log group. When flow\_log\_destination\_arn is set to ARN of Cloudwatch Logs, this argument needs to be provided |`string`|`""`| no |
510
511
| <aname="input_flow_log_cloudwatch_iam_role_conditions"></a> [flow\_log\_cloudwatch\_iam\_role\_conditions](#input\_flow\_log\_cloudwatch\_iam\_role\_conditions)| Additional conditions of the CloudWatch role assumption policy | <pre>list(object({<br/> test = string<br/> variable = string<br/> values = list(string)<br/> }))</pre> |`[]`| no |
511
512
| <aname="input_flow_log_cloudwatch_log_group_class"></a> [flow\_log\_cloudwatch\_log\_group\_class](#input\_flow\_log\_cloudwatch\_log\_group\_class)| Specified the log class of the log group. Possible values are: STANDARD or INFREQUENT\_ACCESS |`string`|`null`| no |
@@ -555,7 +556,7 @@ No modules.
555
556
| <aname="input_map_public_ip_on_launch"></a> [map\_public\_ip\_on\_launch](#input\_map\_public\_ip\_on\_launch)| Specify true to indicate that instances launched into the subnet should be assigned a public IP address. Default is `false`|`bool`|`false`| no |
556
557
| <aname="input_name"></a> [name](#input\_name)| Name to be used on all the resources as identifier |`string`|`""`| no |
557
558
| <aname="input_nat_eip_tags"></a> [nat\_eip\_tags](#input\_nat\_eip\_tags)| Additional tags for the NAT EIP |`map(string)`|`{}`| no |
558
-
| <aname="input_nat_gateway_connectivity_type"></a> [nat\_gateway\_connectivity\_type](#input\_nat\_gateway\_connectivity\_type)| Configuration block for NAT Gateway connectivity type.<br/>- availability_mode: "zonal" (default) or "regional"<br/> - 'zonal': Traditional AZ-specific NAT gateways that require public subnets<br/> - 'regional': A single NAT Gateway that automatically scales across all AZs (does not require public subnets)<br/>- eip_allocation: "auto" (default) or "manual"<br/> - 'auto': Automatically provision EIPs for the NAT Gateway<br/> - 'manual': Use existing EIPs provided via external_nat_ip_ids<br/><br/>Regional NAT Gateway support requires Terraform AWS provider >= 6.24.0.<br/>When using 'regional' mode, only one NAT Gateway is created for the entire VPC. |`object({ availability_mode = string, eip_allocation = optional(string, "auto") })`|`{ availability_mode = "zonal", eip_allocation = "auto" }`| no |
559
+
| <aname="input_nat_gateway_connectivity_type"></a> [nat\_gateway\_connectivity\_type](#input\_nat\_gateway\_connectivity\_type)| Configuration block for NAT Gateway connectivity type.<br/>- availability\_mode: "zonal" (default) or "regional"<br/> - 'zonal': Traditional AZ-specific NAT gateways that require public subnets<br/> - 'regional': A single NAT Gateway that automatically scales across all AZs (does not require public subnets)<br/>- eip\_allocation: "auto" (default) or "manual"<br/> - 'auto': Automatically provision EIPs for the NAT Gateway<br/> - 'manual': Will create the set of EIPs based on the number of AZs | <pre>object({<br/> availability_mode = string # "zonal" or "regional"<br/> eip_allocation = string # "auto" or "manual"<br/> })</pre>|<pre>{<br/> "availability_mode": null,<br/> "eip_allocation": null<br/>}</pre>| no |
559
560
| <aname="input_nat_gateway_destination_cidr_block"></a> [nat\_gateway\_destination\_cidr\_block](#input\_nat\_gateway\_destination\_cidr\_block)| Used to pass a custom destination route for private NAT Gateway. If not specified, the default 0.0.0.0/0 is used as a destination route |`string`|`"0.0.0.0/0"`| no |
560
561
| <aname="input_nat_gateway_tags"></a> [nat\_gateway\_tags](#input\_nat\_gateway\_tags)| Additional tags for the NAT gateways |`map(string)`|`{}`| no |
561
562
| <aname="input_one_nat_gateway_per_az"></a> [one\_nat\_gateway\_per\_az](#input\_one\_nat\_gateway\_per\_az)| Should be true if you want only one NAT Gateway per availability zone. Requires `var.azs` to be set, and the number of `public_subnets` created to be greater than or equal to the number of availability zones specified in `var.azs`|`bool`|`false`| no |
0 commit comments