aws-spoke-custom

karolnedza/aws-spoke-custom/aviatrix

Terraform Module HCL AVIATRIX
Install
module "aws-spoke-custom" {
source = "karolnedza/aws-spoke-custom/aviatrix"
version = "1.0.1"
}
plain text: /constructs/tfmod-karolnedza-aws-spoke-custom-aviatrix/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-aviatrix-aws-spoke Description This module deploys a very simple spoke VPC, with a public and a private subnet in each availability zone. Spoke gateways are created in the public subnets of the 2 first AZ's. Compatibility Module version | Terraform version | Controller version | Terraform provider version :--- | :--- | :--- | :--- v1.0.0 | 0.13+0.14 | >=6.5 | >=0.2.20 _Information on older releases can be found in respective release notes._ Diagram with ha_gw set to false, the following will be deployed: Usage Example `` module "spoke_aws_1" { source = "karolnedza/aws-spoke/aviatrix" version = "1.0.0" name = "App1" cidr = "10.1.0.0/20" region = "eu-west-1" account = "AWS" transit_gw = "avx-eu-west-1-transit" } `` Variables The following variables are required: key | value :--- |

Inputs (40)
NameTypeDescriptionDefault
namestringName for this spoke VPC and it's gateways required
tunnel_detection_timenumberThe IPsec tunnel down detection time for the Spoke Gateway in seconds. Must be a required
customer_managed_keysstringCustomer managed key ID for EBS Volume encryption. required
tagsmap(string)Map of tags to assign to the gateway. required
regionstringThe AWS region to deploy this module in required
accountstringThe AWS account name, as known by the Aviatrix controller required
transit_gw_route_tableslist(string)Route tables to propagate routes to for transit_gw attachment[]
transit_gwstringName of the transit gateway to attach this spoke to""
az2stringConcatenates with region to form az names. e.g. eu-central-1b. Only used for ins"b"
transit_gw_egress_route_tableslist(string)Route tables to propagate routes to for transit_gw_egress attachment[]
attachedboolSet to false if you don't want to attach spoke to transit_gw.true
security_domainstringProvide security domain name to which spoke needs to be deployed. Transit gatewa""
included_advertised_spoke_routesstringA list of comma separated CIDRs to be advertised to on-prem as Included CIDR Lis""
vpc_subnet_sizenumberSize of each subnet cidr block in bits28
prefixboolBoolean to determine if name will be prepended with avx-true
inspectionboolSet to true to enable east/west Firenet inspection. Only valid when transit_gw ifalse
auto_advertise_s2c_cidrsboolAuto Advertise Spoke Site2Cloud CIDRs.false
gw_subnetstringSubnet CIDR, for using an existing VPC. Required when use_existing_vpc is true""
suffixboolBoolean to determine if name will be appended with -spoketrue
active_meshboolSet to false to disable active mesh.true
chinaboolSet to true if deploying this module in AWS China.false
attached_gw_egressboolSet to false if you don't want to attach spoke to transit_gw2.true
single_ip_snatboolSpecify whether to enable Source NAT feature in single_ip mode on the gateway orfalse
private_vpc_default_routeboolProgram default route in VPC private route table.false
az1stringConcatenates with region to form az names. e.g. eu-central-1a. Only used for ins"a"
customized_spoke_vpc_routesstringA list of comma separated CIDRs to be customized for the spoke VPC routes. When ""
Outputs (2)
vpc — The created VPC as an object with all of it's attributes. This was created using the aviatrix_vpc re
spoke_gateway — The created Aviatrix spoke gateway as an object with all of it's attributes.
Resources (5)
aviatrix_segmentation_security_domain_associationaviatrix_spoke_gatewayaviatrix_spoke_transit_attachmentaviatrix_transit_firenet_policyaviatrix_vpc
Details
FrameworkTerraform Module
LanguageHCL
Version1.0.1
Cloud AVIATRIX
Total downloads641
Inputs40
Outputs2
Resources5
Namespacekarolnedza
Updated