Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
terraform-aws-security-group
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Container Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Terraform Modules
terraform-aws-security-group
Commits
1ae398ef
Commit
1ae398ef
authored
Jan 10, 2018
by
Anton Babenko
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fixed redshift by running update_rules script
parent
3ad579d4
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
27 additions
and
13 deletions
+27
-13
README.md
modules/README.md
+2
-0
main.tf
modules/redshift/main.tf
+9
-2
outputs.tf
modules/redshift/outputs.tf
+0
-10
variables.tf
modules/redshift/variables.tf
+16
-1
No files found.
modules/README.md
View file @
1ae398ef
...
...
@@ -9,6 +9,8 @@ List of Security Groups implemented as Terraform modules
*
[
elasticsearch
](
elasticsearch
)
*
[
http-80
](
http-80
)
*
[
https-443
](
https-443
)
*
[
ipsec-4500
](
ipsec-4500
)
*
[
ipsec-500
](
ipsec-500
)
*
[
kafka
](
kafka
)
*
[
ldaps
](
ldaps
)
*
[
memcached
](
memcached
)
...
...
modules/redshift/main.tf
View file @
1ae398ef
module
"sg"
{
source
=
"../../"
create
=
"
${
var
.
create
}
"
name
=
"
${
var
.
name
}
"
description
=
"
${
var
.
description
}
"
vpc_id
=
"
${
var
.
vpc_id
}
"
...
...
@@ -15,9 +16,12 @@ module "sg" {
# Open for self
ingress_with_self
=
[
"
${
concat
(
var
.
auto_ingress_with_self
,
var
.
ingress_with_self
)
}
"
]
# Open to
cidr_
blocks
# Open to
IPv4 cidr
blocks
ingress_with_cidr_blocks
=
[
"
${
var
.
ingress_with_cidr_blocks
}
"
]
# Open to IPv6 cidr blocks
ingress_with_ipv6_cidr_blocks
=
[
"
${
var
.
ingress_with_ipv6_cidr_blocks
}
"
]
# Open for security group id
ingress_with_source_security_group_id
=
[
"
${
var
.
ingress_with_source_security_group_id
}
"
]
...
...
@@ -37,9 +41,12 @@ module "sg" {
# Open for self
egress_with_self
=
[
"
${
concat
(
var
.
auto_egress_with_self
,
var
.
egress_with_self
)
}
"
]
# Open to
cidr_
blocks
# Open to
IPv4 cidr
blocks
egress_with_cidr_blocks
=
[
"
${
var
.
egress_with_cidr_blocks
}
"
]
# Open to IPv6 cidr blocks
egress_with_ipv6_cidr_blocks
=
[
"
${
var
.
egress_with_ipv6_cidr_blocks
}
"
]
# Open for security group id
egress_with_source_security_group_id
=
[
"
${
var
.
egress_with_source_security_group_id
}
"
]
...
...
modules/redshift/outputs.tf
View file @
1ae398ef
...
...
@@ -22,13 +22,3 @@ output "this_security_group_description" {
description
=
"The description of the security group"
value
=
"
${module
.
sg
.
this_security_group_description
}
"
}
output
"this_security_group_ingress"
{
description
=
"The ingress rules"
value
=
"
${module
.
sg
.
this_security_group_ingress
}
"
}
output
"this_security_group_egress"
{
description
=
"The egress rules"
value
=
"
${module
.
sg
.
this_security_group_egress
}
"
}
modules/redshift/variables.tf
View file @
1ae398ef
#################
# Security group
#################
variable
"create"
{
description
=
"Whether to create security group and all rules"
default
=
true
}
variable
"vpc_id"
{
description
=
"ID of
VPC to create security group into
"
description
=
"ID of
the VPC where to create security group
"
}
variable
"name"
{
...
...
@@ -37,6 +42,11 @@ variable "ingress_with_cidr_blocks" {
default
=
[]
}
variable
"ingress_with_ipv6_cidr_blocks"
{
description
=
"List of ingress rules to create where 'ipv6_cidr_blocks' is used"
default
=
[]
}
variable
"ingress_with_source_security_group_id"
{
description
=
"List of ingress rules to create where 'source_security_group_id' is used"
default
=
[]
...
...
@@ -75,6 +85,11 @@ variable "egress_with_cidr_blocks" {
default
=
[]
}
variable
"egress_with_ipv6_cidr_blocks"
{
description
=
"List of egress rules to create where 'ipv6_cidr_blocks' is used"
default
=
[]
}
variable
"egress_with_source_security_group_id"
{
description
=
"List of egress rules to create where 'source_security_group_id' is used"
default
=
[]
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment