Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Network security groups #117

Merged
merged 15 commits into from
Feb 15, 2024
Merged

Network security groups #117

merged 15 commits into from
Feb 15, 2024

Conversation

bryan-bar
Copy link
Collaborator

@bryan-bar bryan-bar commented Feb 7, 2024

BREAKING CHANGES:

  • service_cidrblocks default open access removed. This can lead to unexpected open ports and expose resources that are not properly secured. You can still manually set 0.0.0.0/0 or make use of the new cli options to dynamically set the service cidr blocks.

Changes:

  • service_cidrblocks can be updated with a list of cidrs to amend the ip allowlist for service connections.
    • TF_VAR_service_cidrblocks='["100.100.200.4/32"]' terraform apply
  • force_dynamic_ip can be set to fetch the controller's ip to be appended to the service_cidrblocks.
    • TF_VAR_force_dynamic_ip=true terraform apply
  • region_ports merged under port with defaults = internal
  • service_ports merged under port with defaults = service
  • port defaults is unused by default to avoid unexpected open connections.
  • 4 port defaults options available:
    • internal - region cidrblocks for internal networking
    • public - any access cidrblocks
    • service - service access cidrblocks
    • "" - no cidrblock defaults

@bryan-bar bryan-bar force-pushed the service-ports branch 9 times, most recently from d266e89 to 3a21f09 Compare February 15, 2024 02:21
Copy link
Contributor

@alfer-edb alfer-edb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@bryan-bar bryan-bar force-pushed the service-ports branch 2 times, most recently from 599cb88 to c9faf4a Compare February 15, 2024 20:58
…nd allow for setting of defaults to internal, public, or service
…d allow for setting of defaults to internal, public, or service
…allow for setting of defaults to internal, public, or service
…s_ports combined as a single list and assigned defaults=service or defaults=internal.
…amic ip may be added to the service_cidrblocks. 0.0.0.0/0 will no longer be set a default to avoid accidental exposure of resources.
…ps to make use of changes and restrict ips to instance when used within the machine module.
…ups to make use of changes and restrict ips to instance when used within the machine module.
…cks' variable so that a list of cidrblocks can be set to restrict 'public' ports
…ds. We should always run 'terraform state list' to see if a remote backend is set.
…dalone block and each aliased block still requires the features block
- Update docs and examples for networking
- Update aws cli install example with v2.
…idr range so port rules only target the region it is configured in. This is not needed for AWS since a security group is created and attached to the VPC.
@bryan-bar bryan-bar merged commit a83be6f into main Feb 15, 2024
@bryan-bar bryan-bar deleted the service-ports branch February 15, 2024 22:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants