You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
16
+
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
17
17
18
18
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3"className="link-button"title="Release notes for only versions which impacted this module.">Release Notes</a>
19
19
@@ -24,7 +24,7 @@ with because they are stateless, which means that opening an inbound port is oft
24
24
which your services use to respond. This can be very easy to forget, so this module adds not only the inbound ports to
25
25
an ACL, but also the ephemeral outbound ports for return traffic.
26
26
27
-
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound) module for the analogous version of this module, but for opening
27
+
See the [network-acl-outbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound) module for the analogous version of this module, but for opening
28
28
outbound ports.
29
29
30
30
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-outbound"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
16
+
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-outbound"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
17
17
18
18
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3"className="link-button"title="Release notes for only versions which impacted this module.">Release Notes</a>
19
19
@@ -24,7 +24,7 @@ because they are stateless, which means that opening an outbound port is often n
24
24
which the remote services can use to respond. This can be very easy to forget, so this module adds not only the
25
25
outbound to an ACL, but also the ephemeral inbound ports for return traffic.
26
26
27
-
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/network-acl-inbound) module for the analogous version of this module, but for opening
27
+
See the [network-acl-inbound](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/network-acl-inbound) module for the analogous version of this module, but for opening
28
28
inbound ports.
29
29
30
30
## What's a Network ACL?
@@ -47,7 +47,7 @@ EC2 instance), a network ACL controls what inbound and outbound traffic is allow
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/port-range-calculator"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
16
+
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/port-range-calculator"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
17
17
18
18
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.3"className="link-button"title="Release notes for only versions which impacted this module.">Release Notes</a>
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app-network-acls"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
16
+
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app-network-acls"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
17
17
18
18
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.5"className="link-button"title="Release notes for only versions which impacted this module.">Release Notes</a>
19
19
20
20
This Terraform Module adds a default set of [Network
21
21
ACLs](http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html) to a VPC created using the
22
-
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
22
+
[vpc-app](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app) module. The ACLs enforce the following security settings (based on [A Reference VPC
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-app"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
16
+
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-app"className="link-button"title="View the source code for this module in GitHub.">View Source</a>
17
17
18
18
<ahref="https://github.com/gruntwork-io/terraform-aws-vpc/releases/tag/v0.22.8"className="link-button"title="Release notes for only versions which impacted this module.">Release Notes</a>
19
19
20
20
This Terraform Module launches a single VPC meant to house applications. By contrast, DevOps-related services such as
21
-
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt) module.)
21
+
Jenkins or InfluxDB should be in a "mgmt" VPC. (See the [vpc-mgmt](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt) module.)
22
22
23
23
## What's a VPC?
24
24
@@ -58,8 +58,8 @@ To summarize:
58
58
* In a given subnet tier, there are usually three or four actual subnets, one for each Availability Zone.
59
59
* Therefore, if we created a single VPC in the `us-west-2` region, which has Availability Zones `us-west-2a`,`us-west-2b`,
60
60
and `us-west-2c`, each subnet tier would have three subnets (one per Availability Zone) for a total of 9 subnets in all.
61
-
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-mgmt),
62
-
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
61
+
* The only way to reach this VPC is from the public Internet via a publicly exposed sevice, or via the [mgmt VPC](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-mgmt),
62
+
which uses [VPC Peering](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules/vpc-peering) to make this VPC accessible from the mgmt VPC.
63
63
* Philosophically, everything in a VPC should be isolated from all resources in any other VPC. In particular, we want
64
64
to ensure that our stage environment is completely independent from prod. This architecture helps to reinforce that.
65
65
@@ -74,7 +74,7 @@ nearly all use-cases, and is consistent with many examples and existing document
74
74
75
75
## Other VPC Core Concepts
76
76
77
-
Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.23.3/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
77
+
Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-aws-vpc/tree/v0.25.0/modules//_docs/vpc-core-concepts.md) like subnets, NAT Gateways, and VPC Endpoints.
78
78
79
79
## Sample Usage
80
80
@@ -89,7 +89,7 @@ Learn about [Other VPC Core Concepts](https://github.com/gruntwork-io/terraform-
0 commit comments