security-group

devops-workflow/security-group/aws

Terraform Module HCL AWS

Terraform module which creates EC2-VPC security groups on AWS

Install
module "security-group" {
source = "devops-workflow/security-group/aws"
version = "2.2.0"
}
plain text: /constructs/tfmod-devops-workflow-security-group-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

![CircleCI](https://circleci.com/gh/devops-workflow/terraform-aws-security-group) AWS EC2-VPC Security Group Terraform module =========================================== Terraform module which creates EC2 security group within VPC on AWS. These types of resources are supported: EC2-VPC Security Group EC2-VPC Security Group Rule Features -------- This module aims to implement ALL combinations of arguments supported by AWS and latest stable version of Terraform: IPv4/IPv6 CIDR blocks VPC endpoint prefix lists (use data source aws_prefix_list) Access from source security groups Access from self Named rules (see the rules here) Named groups of rules with ingress (inbound) and egress (outbound) ports open for common scenarios (eg, ssh, http-80, mysql, see the whole list here) Conditionally crea

Inputs (35)
NameTypeDescriptionDefault
environmentanyEnvironment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. required
vpc_idanyID of the VPC where to create security group required
nameanyBase name for resource required
egress_with_cidr_blocksanyList of egress rules to create where 'cidr_blocks' is used[]
descriptionanyDescription of security group"Security Group managed by Terraform"
ingress_with_source_security_group_idanyList of ingress rules to create where 'source_security_group_id' is used[]
enabledanySet to false to prevent the module from creating anythingtrue
tagsanyA map of additional tags{}
teamanyTAG: Department/team of people responsible for service"UNDEF-SG"
ingress_cidr_blocksanyList of IPv4 CIDR ranges to use on all ingress rules[]
auto_groupsanyMap of groups of security group rules to use to generate modules (see update_gro{ "carbon-relay-ng": { "egress_rul
delimiteranyDelimiter to be used between `name`, `namespaces`, `attributes`, etc."-"
rulesanyMap of known security group rules (define as 'name' = ['from port', 'to port', '{ "_": [ "", "", "", "
ingress_ipv6_cidr_blocksanyList of IPv6 CIDR ranges to use on all ingress rules[]
ingress_prefix_list_idsanyList of prefix list IDs (for allowing access to VPC endpoints) to use on all ing[]
egress_prefix_list_idsanyList of prefix list IDs (for allowing access to VPC endpoints) to use on all egr[]
namespace-envanyPrefix name with the environment. If true, format is: <env>-<name>true
ingress_with_cidr_blocksanyList of ingress rules to create where 'cidr_blocks' is used[]
egress_with_selfanyList of egress rules to create where 'self' is defined[]
serviceanyTAG: Application (microservice) name"UNDEF-SG"
ingress_with_ipv6_cidr_blocksanyList of ingress rules to create where 'ipv6_cidr_blocks' is used[]
egress_cidr_blocksanyList of IPv4 CIDR ranges to use on all egress rules[ "0.0.0.0/0" ]
egress_ipv6_cidr_blocksanyList of IPv6 CIDR ranges to use on all egress rules[ "::/0" ]
Outputs (9)
egress — The egress rules
ingress_rules_ids — Ingress rule IDs
vpc_id — The VPC ID
owner_id — The owner ID
ingress — The ingress rules
egress_rules_ids — Egress rule IDs
id — The ID of the security group
name — The name of the security group
description — The description of the security group
Resources (2)
aws_security_groupaws_security_group_rule
Details
FrameworkTerraform Module
LanguageHCL
Version2.2.0
Cloud AWS
★ Stars0
Forks1
Total downloads31.4k
Inputs35
Outputs9
Resources2
Examples3
Submodules25
LicenseNOASSERTION
Namespacedevops-workflow
Updated