You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_ami.rhel9](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ami)| data source |
99
139
100
140
## Inputs
101
141
@@ -110,6 +150,9 @@ module "vpc" {
110
150
|------|-------------|
111
151
| <aname="output_account_role_prefix"></a> [account\_role\_prefix](#output\_account\_role\_prefix)| The prefix used for all generated AWS resources. |
112
152
| <aname="output_account_roles_arn"></a> [account\_roles\_arn](#output\_account\_roles\_arn)| A map of Amazon Resource Names (ARNs) associated with the AWS IAM roles created. The key in the map represents the name of an AWS IAM role, while the corresponding value represents the associated Amazon Resource Name (ARN) of that role. |
153
+
| <aname="output_bastion_host_public_ip"></a> [bastion\_host\_public\_ip](#output\_bastion\_host\_public\_ip)| Bastion Host Public IP |
154
+
| <aname="output_cluster_api_url"></a> [cluster\_api\_url](#output\_cluster\_api\_url)| The URL of the API server. |
155
+
| <aname="output_cluster_console_url"></a> [cluster\_console\_url](#output\_cluster\_console\_url)| The URL of the console. |
113
156
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| Unique identifier of the cluster. |
114
157
| <aname="output_oidc_config_id"></a> [oidc\_config\_id](#output\_oidc\_config\_id)| The unique identifier associated with users authenticated through OpenID Connect (OIDC) generated by this OIDC config. |
115
158
| <aname="output_oidc_endpoint_url"></a> [oidc\_endpoint\_url](#output\_oidc\_endpoint\_url)| Registered OIDC configuration issuer URL, generated by this OIDC config. |
This is a Terraform manifest example for creating a bastion host aws ec2 instance. This example provides a structured configuration template that demonstrates how to deploy vpc and bastion host to your AWS environment by using Terraform.
6
+
7
+
This example includes:
8
+
- A VPC with both public and private subnets.
9
+
- An EC2 instance attached to the public subnet of the vpc that allows connection to it so it may access the private network from within it.
| <aname="input_ami_id"></a> [ami\_id](#input\_ami\_id)| Amazon Machine Image to run the bastion host with |`string`|`null`| no |
77
+
| <aname="input_cidr_blocks"></a> [cidr\_blocks](#input\_cidr\_blocks)| CIDR ranges to include as ingress allowed ranges |`list(string)`|`null`| no |
78
+
| <aname="input_instance_type"></a> [instance\_type](#input\_instance\_type)| Instance type of the bastion hosts |`string`|`"t2.micro"`| no |
79
+
| <aname="input_prefix"></a> [prefix](#input\_prefix)| Prefix for the name of each AWS resource |`string`| n/a | yes |
80
+
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| Set of subnet IDs to instantiate a bastion host against |`list(string)`| n/a | yes |
81
+
| <aname="input_user_data_file"></a> [user\_data\_file](#input\_user\_data\_file)| User data for proxy configuration |`string`|`null`| no |
82
+
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| ID of the AWS VPC resource |`string`| n/a | yes |
83
+
84
+
## Outputs
85
+
86
+
| Name | Description |
87
+
|------|-------------|
88
+
| <aname="output_bastion_host_public_ip"></a> [bastion\_host\_public\_ip](#output\_bastion\_host\_public\_ip)| Bastion Host Public IP |
0 commit comments