You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
319
319
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| The Security Group description. |`string`|`"EC2 instances Security Group"`| no |
320
320
| <aname="input_security_group_enabled"></a> [security\_group\_enabled](#input\_security\_group\_enabled)| Whether to create default Security Group for EC2 instances. |`bool`|`true`| no |
321
-
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)|A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br>],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre>| no |
322
-
| <aname="input_security_group_use_name_prefix"></a> [security\_group\_use\_name\_prefix](#input\_security\_group\_use\_name\_prefix)|Whether to create a default Security Group with unique name beginning with the normalized prefix. |`bool`|`false`| no |
321
+
| <aname="input_security_group_name"></a> [security\_group\_name](#input\_security\_group\_name)|The name to assign to the security group. Must be unique within the VPC.<br>If not provided, will be derived from the `null-label.context` passed in.<br>If `create_before_destroy` is true, will be used as a name prefix. |`list(string)`|`[]`| no |
322
+
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)|A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`|`[]`| no |
323
323
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| A list of Security Group IDs to associate with EC2 instances. |`list(string)`|`[]`| no |
324
324
| <aname="input_source_dest_check"></a> [source\_dest\_check](#input\_source\_dest\_check)| Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
325
325
| <aname="input_ssh_key_pair"></a> [ssh\_key\_pair](#input\_ssh\_key\_pair)| SSH key pair to be provisioned on the instance |`string`|`""`| no |
| <aname="input_root_volume_type"></a> [root\_volume\_type](#input\_root\_volume\_type)| Type of root volume. Can be standard, gp2 or io1 |`string`|`"gp2"`| no |
100
100
| <aname="input_security_group_description"></a> [security\_group\_description](#input\_security\_group\_description)| The Security Group description. |`string`|`"EC2 instances Security Group"`| no |
101
101
| <aname="input_security_group_enabled"></a> [security\_group\_enabled](#input\_security\_group\_enabled)| Whether to create default Security Group for EC2 instances. |`bool`|`true`| no |
102
-
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)|A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`| <pre>[<br> {<br> "cidr_blocks": [<br> "0.0.0.0/0"<br>],<br> "description": "Allow all outbound traffic",<br> "from_port": 0,<br> "protocol": "-1",<br> "to_port": 65535,<br> "type": "egress"<br> }<br>]</pre>| no |
103
-
| <aname="input_security_group_use_name_prefix"></a> [security\_group\_use\_name\_prefix](#input\_security\_group\_use\_name\_prefix)|Whether to create a default Security Group with unique name beginning with the normalized prefix. |`bool`|`false`| no |
102
+
| <aname="input_security_group_name"></a> [security\_group\_name](#input\_security\_group\_name)|The name to assign to the security group. Must be unique within the VPC.<br>If not provided, will be derived from the `null-label.context` passed in.<br>If `create_before_destroy` is true, will be used as a name prefix. |`list(string)`|`[]`| no |
103
+
| <aname="input_security_group_rules"></a> [security\_group\_rules](#input\_security\_group\_rules)|A list of maps of Security Group rules. <br>The values of map is fully complated with `aws_security_group_rule` resource. <br>To get more info see https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule . |`list(any)`|`[]`| no |
104
104
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| A list of Security Group IDs to associate with EC2 instances. |`list(string)`|`[]`| no |
105
105
| <aname="input_source_dest_check"></a> [source\_dest\_check](#input\_source\_dest\_check)| Controls if traffic is routed to the instance when the destination address does not match the instance. Used for NAT or VPNs |`bool`|`true`| no |
106
106
| <aname="input_ssh_key_pair"></a> [ssh\_key\_pair](#input\_ssh\_key\_pair)| SSH key pair to be provisioned on the instance |`string`|`""`| no |
0 commit comments