terraform-community-modules / Tf_aws_sg

Licence: other
[DEPRECATED] Use https://github.com/terraform-aws-modules/terraform-aws-security-group

Labels

Projects that are alternatives of or similar to Tf aws sg

Terraform Oci Oke
The Terraform OKE Module Installer for Oracle Cloud Infrastructure provides a Terraform module that provisions the necessary resources for Oracle Container Engine.
Stars: ✭ 57 (-10.94%)
Mutual labels:  hcl
Docker Vault
Docker Container for Hashicorp's Vault
Stars: ✭ 60 (-6.25%)
Mutual labels:  hcl
Ha Sap Terraform Deployments
Automated SAP/HA Deployments in Public/Private Clouds
Stars: ✭ 61 (-4.69%)
Mutual labels:  hcl
Terraform Google Managed Instance Group
Modular Google Compute Engine managed instance group for Terraform.
Stars: ✭ 57 (-10.94%)
Mutual labels:  hcl
Terraform Lessons
Source Code for Course "Terraform From Beginner to Professional"
Stars: ✭ 60 (-6.25%)
Mutual labels:  hcl
Terraform Kubernetes
Terraform module for provisioning AWS resources to run a Kubernetes cluster
Stars: ✭ 61 (-4.69%)
Mutual labels:  hcl
Terraform Google Gke Gitlab
Installs GitLab on Kubernetes Engine
Stars: ✭ 56 (-12.5%)
Mutual labels:  hcl
Terraform Waf Owasp
Use AWS WAF at terraform to Mitigate OWASP’s Top 10 Web Application Vulnerabilities
Stars: ✭ 63 (-1.56%)
Mutual labels:  hcl
Terraform Ecs Autoscale Alb
ECS cluster with instance and service autoscaling configured and running behind an ALB with path based routing set up
Stars: ✭ 60 (-6.25%)
Mutual labels:  hcl
Terraform Aws Waf Owasp Top 10 Rules
A Terraform module to create AWF WAF Rules for OWASP Top 10 security risks protection.
Stars: ✭ 62 (-3.12%)
Mutual labels:  hcl
Terraform Aws Multi Az Subnets
Terraform module for multi-AZ public and private subnets provisioning
Stars: ✭ 58 (-9.37%)
Mutual labels:  hcl
Terraform Digitalocean Docker Swarm Mode
Terraform module for provisioning a Docker Swarm mode cluster on DigitalOcean
Stars: ✭ 59 (-7.81%)
Mutual labels:  hcl
Terraform Rancher Ha Example
Terraform files for deploying a Rancher HA cluster in AWS
Stars: ✭ 61 (-4.69%)
Mutual labels:  hcl
Terraform Aws Rds Cloudwatch Sns Alarms
Terraform module that configures important RDS alerts using CloudWatch and sends them to an SNS topic
Stars: ✭ 56 (-12.5%)
Mutual labels:  hcl
Curso Aws Com Terraform
🎦 🇧🇷 Arquivos do curso "DevOps: AWS com Terraform Automatizando sua infraestrutura" publicado na Udemy. Você pode me ajudar comprando o curso utilizando o link abaixo.
Stars: ✭ 62 (-3.12%)
Mutual labels:  hcl
Cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Stars: ✭ 1,088 (+1600%)
Mutual labels:  hcl
Terraform Kubernetes Helm
Terraform code and scripts for deploying Helm Server (Helm v2) on a Kubernetes cluster. https://www.gruntwork.io
Stars: ✭ 61 (-4.69%)
Mutual labels:  hcl
Terraform Modules
Reusable Terraform modules
Stars: ✭ 63 (-1.56%)
Mutual labels:  hcl
Wire Server Deploy
Code to install/deploy wire-server (on kubernetes)
Stars: ✭ 63 (-1.56%)
Mutual labels:  hcl
Kubestack Aws
Kubernetes cluster on CoreOS with Terraform
Stars: ✭ 61 (-4.69%)
Mutual labels:  hcl

tf_aws_sg

This module is deprecated and terraform-aws-modules/terraform-aws-security-group module published on the Terraform registry should be used instead.

This repository will not have active support any more.


A Terraform module which contains a number of common configurations for AWS security groups.

  • It assumes you're putting your SGs in a VPC.

Security Group Catalog

This module contains the following security group templates for you to use as modules in service Terraform templates.

  • sg_memcached
    • It allows incoming TCP 11211 (memcached)
  • sg_ssh
    • It allows incoming TCP 22 (ssh)
  • sg_web - this is a security group for web applications
    • It allows incoming TCP 80 (HTTP), TCP 443 (HTTPS), TCP 8080 (HTTP/S), TCP 1099 (JMX)
  • sg_zookeeper - this is a security group for zookeeper
    • It Allows incoming TCP 2181, TCP 2888, TCP 3888, TCP 7199 (Used for zk JMX)
  • sg_https_only - This is a security group for external HTTPS ELBs
    • It only allows incoming TCP 443 (HTTPS)
  • sg_consul - This is a security group for Consul clusters
    • It allows incoming TCP 8300 (Server RPC), TCP 8301 (Serf LAN), UDP 8301 (Serf LAN), TCP 8302 (Serf WAN), and UDP 8302 (Serf WAN)
    • It allows incoming TCP 8400 (Consul RPC), TCP 8500 (Consul HTTP), TCP 8600 (Consul DNS), and UDP 8600 (Consul DNS)
  • sg_redis - This is a security group for Redis clusters
    • It allows incoming TCP 6379 (redis)
  • sg_kafka - This is a security group for Kafka clusters
    • It allows incoming TCP 6667 (Kafka broker) TCP 9092 (Kafka broker)
  • sg_cassandra - This is a security group for Cassandra clusters
    • It allows incoming TCP 7199 (JMX), 9042 (Cassandra clients), 9160 (Cassandra Thrift clients)
  • sg_mysql - This is a security group for MySQL
    • It allows incoming TCP 3306 (MySQL)
  • sg_postgresql - This is a security group for PostgreSQL
    • It allows incoming TCP 5432 (PostgreSQL)
  • sg_elasticsearch - This is a security group for ElasticSearch
    • It allows incoming TCP 9200 (REST Interface)
  • sg_storm - This is a security group for Apache Storm Cluster
    • It allows incoming TCP 6627 (Default Nimbus port), TCP 8080 (Storm UI), TCP 6700, 6701, 6702, 6703 (Default Supervisor port)
  • sg_zipkin - This is a security group for Zipkin
    • It allows incoming TCP 9990 (zipkin admin port collector), TCP 9901 (zipkin admin port query)
    • It allows TCP 9991 (zipkin admin port web), TCP 9411 (zipkin query port), TCP 8080 (zipkin web port)
  • sg_ldap - This is a security group for LDAP
    • It allows incoming TCP 636 (LDAPS)
  • sg_ldaps_only - This is a security group for LDAPS only
    • It allows incoming TCP 636 (LDAPS)
  • sg_carbon-relay-ng - This is a security group for carbon-relay-ng
    • It allows incoming TCP 2003 (carbon-in), 2004 (admin), 2013 (pickle), 8081 (GUI) and UDP 2003 (carbon-in), 2013 (pickle)
  • sg_openvpn - This is a security group for OpenVPN
    • It allows incoming UDP 1194 (OpenVPN), TCP 443 (user web port), TCP 943 (admin web port)
  • sg_docker_swarm - This is a security group for Docker Swarm
    • It allows incoming TCP 2377 (Swarm management communication), 7946 (Swarm node communication), UDP 7946 (Swarm node communication), 4789 (Swarm overlay network communication)

Usage

You can use these in your terraform template with the following steps.

1.) Adding a module resource to your template, e.g. main.tf

module "sg_web" {
  source = "github.com/terraform-community-modules/tf_aws_sg//sg_web"
  security_group_name = "${var.security_group_name}-web"
  vpc_id = "${var.vpc_id}"
  source_cidr_block = ["${var.source_cidr_block}"]
}

2.) Setting values for the following variables, either through terraform.tfvars or -var arguments on the CLI

  • security_group_name
  • vpc_id
  • source_cidr_block

Authors

Created and maintained by Brandon Burton ([email protected]).

License

Apache 2 Licensed. See LICENSE for full details.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].