karthikmuralidharan / tf_aws_sg

A Terraform module with a collection of common security group settings.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

tf_aws_sg

A Terraform module which contains a number of common configurations for AWS security groups.

  • It assumes you're putting your SGs in a VPC.

Security Group Catalog

This module contains the following security group templates for you to use as modules in service Terraform templates.

  • sg_memcached
    • It allows incoming TCP 11211 (memcached)
  • sg_ssh
    • It allows incoming TCP 22 (ssh)
  • sg_web - this is a security group for web applications
    • It allows incoming TCP 80 (HTTP), TCP 443 (HTTPS), TCP 8080 (HTTP/S), TCP 1099 (JMX)
  • sg_zookeeper - this is a security group for zookeeper
    • It Allows incoming TCP 2181, TCP 2888, TCP 3888, TCP 7199 (Used for zk JMX)
  • sg_https_only - This is a security group for external HTTPS ELBs
    • It only allows incoming TCP 443 (HTTPS)
  • sg_consul - This is a security group for Consul clusters
    • It allows incoming TCP 8300 (Server RPC), TCP 8301 (Serf LAN), and UDP 8301 (Serf LAN)
    • It allows incoming TCP 8400 (Consul RPC), TCP 8500 (Consul HTTP), TCP 8600 (Consul DNS), and UDP 8600 (Consul DNS)
  • sg_redis - This is a security group for Redis clusters
    • It allows incoming TCP 6379 (redis)
  • sg_kafka - This is a security group for Kafka clusters
    • It allows incoming TCP 6667 (Kafka broker) TCP 9092 (Kafka broker)
  • sg_cassandra - This is a security group for Cassandra clusters
    • It allows incoming TCP 7199 (JMX), 9042 (Cassandra clients), 9160 (Cassandra Thrift clients)
  • sg_mysql - This is a security group for MySQL
    • It allows incoming TCP 3306 (MySQL)
  • sg_postgresql - This is a security group for PostgreSQL
    • It allows incoming TCP 5432 (PostgreSQL)
  • sg_elasticsearch - This is a security group for ElasticSearch
    • It allows incoming TCP 9200 (REST Interface)
  • sg_storm - This is a security group for Apache Storm Cluster
    • It allows incoming TCP 6627 (Default Nimbus port), TCP 8080 (Storm UI), TCP 6700, 6701, 6702, 6703 (Default Supervisor port)
  • sg_zipkin - This is a security group for Zipkin
    • It allows incoming TCP 9990 (zipkin admin port collector), TCP 9901 (zipkin admin port query)
    • It allows TCP 9991 (zipkin admin port web), TCP 9411 (zipkin query port), TCP 8080 (zipkin web port)
  • sg_ldap - This is a security group for LDAP
    • It allows incoming TCP 636 (LDAPS)
  • sg_ldaps_only - This is a security group for LDAPS only
    • It allows incoming TCP 636 (LDAPS)
  • sg_carbon-relay-ng - This is a security group for carbon-relay-ng
    • It allows incoming TCP 2003 (carbon-in), 2004 (admin), 2013 (pickle), 8081 (GUI) and UDP 2003 (carbon-in), 2013 (pickle)

Usage

You can use these in your terraform template with the following steps.

1.) Adding a module resource to your template, e.g. main.tf

module "sg_web" {
  source = "github.com/terraform-community-modules/tf_aws_sg//sg_web"
  security_group_name = "${var.security_group_name}-web"
  vpc_id = "${var.vpc_id}"
  source_cidr_block = ["${var.source_cidr_block}"]
}

2.) Setting values for the following variables, either through terraform.tfvars or -var arguments on the CLI

  • security_group_name
  • vpc_id
  • source_cidr_block

Authors

Created and maintained by Brandon Burton (brandon@inatree.org).

License

Apache 2 Licensed. See LICENSE for full details.

About

A Terraform module with a collection of common security group settings.

License:Other


Languages

Language:HCL 100.0%