You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Adding support for secondary private ips
* Update github workflows
* Auto Format
---------
Co-authored-by: Joe Niland <joe@originalmind.com.au>
Co-authored-by: cloudpossebot <11232728+cloudpossebot@users.noreply.github.com>
Copy file name to clipboardExpand all lines: README.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -311,6 +311,7 @@ Available targets:
311
311
| <aname="input_root_throughput"></a> [root\_throughput](#input\_root\_throughput)| Amount of throughput. This must be set if root\_volume\_type is set to `gp3`|`number`|`0`| no |
312
312
| <aname="input_root_volume_size"></a> [root\_volume\_size](#input\_root\_volume\_size)| Size of the root volume in gigabytes |`number`|`10`| no |
313
313
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| Type of root volume. Can be standard, gp2, gp3, io1 or io2 |`string`|`"gp2"`| no |
314
+
| <aname="input_secondary_private_ips"></a> [secondary\_private\_ips](#input\_secondary\_private\_ips)| List of secondary private IP addresses to associate with the instance in the VPC |`list(string)`|`[]`| no |
314
315
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| The Security Group description. |`string`|`"EC2 Security Group"`| no |
315
316
| <aname="input_security_group_enabled"></a> [security\_group\_enabled](#input\_security\_group\_enabled)| Whether to create default Security Group for EC2. |`bool`|`true`| no |
316
317
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)| A list of maps of Security Group rules.<br>The values of map is fully complated with `aws_security_group_rule` resource.<br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br> ],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre> | no |
0 commit comments