This module is deprecated and terraform-aws-modules/terraform-aws-security-group module published on the Terraform registry should be used instead.
A Terraform module which contains a number of common configurations for AWS security groups.
- It assumes you're putting your SGs in a VPC.
This module contains the following security group templates for you to use as modules in service Terraform templates.
- sg_memcached
- It allows incoming TCP 11211 (memcached)
- sg_ssh
- It allows incoming TCP 22 (ssh)
- sg_web - this is a security group for web applications
- It allows incoming TCP 80 (HTTP), TCP 443 (HTTPS), TCP 8080 (HTTP/S), TCP 1099 (JMX)
- sg_zookeeper - this is a security group for zookeeper
- It Allows incoming TCP 2181, TCP 2888, TCP 3888, TCP 7199 (Used for zk JMX)
- sg_https_only - This is a security group for external HTTPS ELBs
- It only allows incoming TCP 443 (HTTPS)
- sg_consul - This is a security group for Consul clusters
- It allows incoming TCP 8300 (Server RPC), TCP 8301 (Serf LAN), UDP 8301 (Serf LAN), TCP 8302 (Serf WAN), and UDP 8302 (Serf WAN)
- It allows incoming TCP 8400 (Consul RPC), TCP 8500 (Consul HTTP), TCP 8600 (Consul DNS), and UDP 8600 (Consul DNS)
- sg_redis - This is a security group for Redis clusters
- It allows incoming TCP 6379 (redis)
- sg_kafka - This is a security group for Kafka clusters
- It allows incoming TCP 6667 (Kafka broker) TCP 9092 (Kafka broker)
- sg_cassandra - This is a security group for Cassandra clusters
- It allows incoming TCP 7199 (JMX), 9042 (Cassandra clients), 9160 (Cassandra Thrift clients)
- sg_mysql - This is a security group for MySQL
- It allows incoming TCP 3306 (MySQL)
- sg_postgresql - This is a security group for PostgreSQL
- It allows incoming TCP 5432 (PostgreSQL)
- sg_elasticsearch - This is a security group for ElasticSearch
- It allows incoming TCP 9200 (REST Interface)
- sg_storm - This is a security group for Apache Storm Cluster
- It allows incoming TCP 6627 (Default Nimbus port), TCP 8080 (Storm UI), TCP 6700, 6701, 6702, 6703 (Default Supervisor port)
- sg_zipkin - This is a security group for Zipkin
- It allows incoming TCP 9990 (zipkin admin port collector), TCP 9901 (zipkin admin port query)
- It allows TCP 9991 (zipkin admin port web), TCP 9411 (zipkin query port), TCP 8080 (zipkin web port)
- sg_ldap - This is a security group for LDAP
- It allows incoming TCP 636 (LDAPS)
- sg_ldaps_only - This is a security group for LDAPS only
- It allows incoming TCP 636 (LDAPS)
- sg_carbon-relay-ng - This is a security group for carbon-relay-ng
- It allows incoming TCP 2003 (carbon-in), 2004 (admin), 2013 (pickle), 8081 (GUI) and UDP 2003 (carbon-in), 2013 (pickle)
- sg_openvpn - This is a security group for OpenVPN
- It allows incoming UDP 1194 (OpenVPN), TCP 443 (user web port), TCP 943 (admin web port)
- sg_docker_swarm - This is a security group for Docker Swarm
- It allows incoming TCP 2377 (Swarm management communication), 7946 (Swarm node communication), UDP 7946 (Swarm node communication), 4789 (Swarm overlay network communication)
You can use these in your terraform template with the following steps.
1.) Adding a module resource to your template, e.g. main.tf
module "sg_web" {
source = "github.com/terraform-community-modules/tf_aws_sg//sg_web"
security_group_name = "${var.security_group_name}-web"
vpc_id = "${var.vpc_id}"
source_cidr_block = ["${var.source_cidr_block}"]
}
2.) Setting values for the following variables, either through terraform.tfvars
or -var
arguments on the CLI
- security_group_name
- vpc_id
- source_cidr_block
Created and maintained by Brandon Burton ([email protected]).
Apache 2 Licensed. See LICENSE for full details.