forked from DNXLabs/terraform-aws-network
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsubnet-secure.tf
42 lines (36 loc) · 1.38 KB
/
subnet-secure.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
resource "aws_subnet" "secure" {
count = "${length(data.aws_availability_zones.available.names) > var.max_az ? var.max_az : length(data.aws_availability_zones.available.names)}"
vpc_id = "${aws_vpc.default.id}"
cidr_block = "${cidrsubnet(aws_vpc.default.cidr_block, var.newbits, count.index + var.secure_netnum_offset)}"
availability_zone = "${data.aws_availability_zones.available.names[count.index]}"
map_public_ip_on_launch = false
tags = "${merge(
var.tags,
map(
"Name", "${var.name}-Subnet-Secure-${upper(data.aws_availability_zone.az.*.name_suffix[count.index])}",
"Scheme", "secure",
"EnvName", "${var.name}"
)
)}"
# depends_on = ["aws_nat_gateway.nat_gw"]
}
resource "aws_route_table" "secure" {
vpc_id = "${aws_vpc.default.id}"
tags = "${merge(
var.tags,
map(
"Name", "${var.name}-RouteTable-Secure",
"Scheme", "secure",
"EnvName", "${var.name}"
)
)}"
}
resource "aws_route_table_association" "secure" {
count = "${length(data.aws_availability_zones.available.names) > var.max_az ? var.max_az : length(data.aws_availability_zones.available.names)}"
subnet_id = "${aws_subnet.secure.*.id[count.index]}"
route_table_id = "${aws_route_table.secure.id}"
lifecycle {
ignore_changes = ["subnet_id"]
create_before_destroy = true
}
}