terraform-aws-server/examples/securitygroups/public
Matt Trachier 0d7dbaab1f
fix: update access mod in examples (#47)
Signed-off-by: matttrach <matttrach@gmail.com>
2024-02-09 14:02:50 -06:00
..
README.md make sure the version retricts tf 1.6, send unique id to every example, update readmes, remove the word server from server module attributes 2023-09-14 12:02:50 -05:00
main.tf fix: update access mod in examples (#47) 2024-02-09 14:02:50 -06:00
variables.tf add rhel8 cis, add the ability to set the path to execute files, update all the tests 2023-10-05 16:27:07 -05:00
versions.tf fix: update required version of tf to the latest open source version (#46) 2024-02-09 12:09:18 -06:00

README.md

Public Security Group Example

This is an example of using this module to deploy a small sles15 server on AWS with the "egress" security group type.

This example has been validated using Terratest, a Go sdk and test suite for Terraform. If you would like to test this example go to the ./tests directory and run the test with go test -v -run TestPublic

Security Group Type

We provide a selection of security group "types" which produces archetypical objects in AWS.

The basic security group adds the single IP of the server running Terraform, allowing it access to the server created for the purpose of validation and configuration, we call this type "specific".

The next security group adds to the "specific" group by adding rules to allow for internal subnet traffic, in this type the subnet cidr is allowed for both ingress and egress. This type is called "internal".

The next security group duplicates the "internal" type, then adds rules to allow egress only to the public internet. This is helpful if you want to be able to upgrade your server, or if you need your server to be able to download packages from the internet, but you don't want the public internet to be able to initiate connections with your server. This type is called "egress".

The final, and most permissive security group type is called "public". This adds to the "egress" rule set allowing public access from any IP. This essentially opens your server up to the general public, and is the type selected for this example.