security-group
clouddrove/security-group/aws
This terraform module creates set of Security Group and Security Group Rules resources in various combinations.
Terraform AWS Security Group This terraform module creates set of Security Group and Security Group Rules resources in various combinations. We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems . Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure. This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic cod
| Name | Type | Description | Default |
|---|---|---|---|
| prefix_list_address_family | string | (Required, Forces new resource) The address family (IPv4 or IPv6) of prefix list | "IPv4" |
| managedby | string | ManagedBy, eg 'CloudDrove'. | "[email protected]" |
| new_sg_ingress_rules_with_self | any | Ingress rules with only self. Should be used when new security group is been dep | {} |
| new_sg_ingress_rules_with_source_sg_id | any | Ingress rules with only source security group id. Should be used when new securi | {} |
| new_sg_egress_rules_with_cidr_blocks | any | Egress rules with only cidr_blockd. Should be used when new security group is be | {} |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "" |
| label_order | list(any) | Label order, e.g. `name`,`application`. | [
"name",
"environment"
] |
| existing_sg_egress_rules_with_self | any | Egress rules with only self. Should be used when there is existing security grou | {} |
| enable | bool | Flag to control module creation. | true |
| existing_sg_egress_rules_with_prefix_list | any | Egress rules with only prefic ist ids. Should be used when there is existing sec | {} |
| name | string | Name (e.g. `app` or `cluster`). | "" |
| max_entries | number | The maximum number of entries that this prefix list can contain. | 5 |
| existing_sg_ingress_rules_with_cidr_blocks | any | Ingress rules with only cidr blocks. Should be used when there is existing secur | {} |
| existing_sg_ingress_rules_with_self | any | Ingress rules with only source security group id. Should be used when new securi | {} |
| repository | string | Terraform current module repo | "https://github.com/clouddrove/terraform |
| prefix_list_ids | list(string) | The ID of the prefix list. | [] |
| prefix_list_enabled | bool | Enable prefix_list. | false |
| entry | list(any) | Can be specified multiple times for each prefix list entry. | [] |
| existing_sg_id | string | Provide existing security group id for updating existing rule | null |
| new_sg_egress_rules_with_self | any | Egress rules with only self. Should be used when new security group is been depl | {} |
prefix_list_id — The ID of the prefix list.security_group_id — IDs on the AWS Security Groups associated with the instance.security_group_arn — IDs on the AWS Security Groups associated with the instance.security_group_tags — A mapping of public tags to assign to the resource.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,