Skip to content

Commit 0c73d85

Browse files
Merge branch 'release-v1.0.2' into 'main'
Readme Fixes and enhancements for v1.0.2 See merge request sq-ia/aws/network!20
2 parents 7837386 + 0a012a1 commit 0c73d85

File tree

7 files changed

+57
-30
lines changed

7 files changed

+57
-30
lines changed

README.md

Lines changed: 53 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,9 @@
55

66
[squareops_avatar]: https://squareops.com/wp-content/uploads/2022/12/squareops-logo.png
77

8-
### [SquareOps Technologies](https://squareops.com/) Provide end to end solution for all your DevOps needs
8+
### [SquareOps Technologies](https://squareops.com/) Your DevOps Partner for Accelerating cloud journey.
99

1010
<br>
11-
1211
Terraform module to create Networking resources for workload deployment on AWS Cloud.
1312

1413
## Usage Example
@@ -28,7 +27,6 @@ module "vpc" {
2827
2928
environment = "production"
3029
name = "skaf"
31-
region = "us-east-1"
3230
vpc_cidr = "10.0.0.0/16"
3331
azs = ["us-east-1a", "us-east-1b"]
3432
enable_public_subnet = true
@@ -45,12 +43,12 @@ module "vpc" {
4543
4644
}
4745
```
48-
Refer [examples](examples) for all examples.
46+
Refer [examples](https://github.com/squareops/terraform-aws-vpc/tree/main/examples) for all examples.
4947

5048
## Important Note
5149
To prevent destruction interruptions, any resources that have been created outside of Terraform and attached to the resources provisioned by Terraform must be deleted before the module is destroyed.
5250

53-
The private key generated by Keypair module will be stored in AWS Systems Manager Parameter Store. FOr more details refer [this](https://registry.terraform.io/modules/squareops/keypair/aws)
51+
The private key generated by Keypair module will be stored in AWS Systems Manager Parameter Store. For more details refer [this](https://registry.terraform.io/modules/squareops/keypair/aws)
5452

5553
## Network Scenarios
5654

@@ -62,17 +60,17 @@ This module supports three scenarios to create Network resource on AWS. Each wil
6260
- `vpc_cidr = ""`
6361
- `enable_public_subnet = true`
6462
- **vpc-with-private-sub:** To create a VPC with public subnets, private subnets, IGW gateway and NAT gateway.
65-
- `vpc_cidr = local.vpc_cidr`
63+
- `vpc_cidr = ""`
6664
- `enable_public_subnet = true`
6765
- `enable_private_subnet = true`
6866

6967
- **complete-vpc-with-vpn:** To create a VPC with public, private, database and intra subnets along with an IGW and NAT gateway. Jump server/Bastion Host is also configured.
70-
- `vpc_cidr = local.vpc_cidr`
68+
- `vpc_cidr = ""`
7169
- `enable_public_subnet = true`
7270
- `enable_private_subnet = true`
7371
- `enable_database_subnet = true`
7472
- `enable_intra_subnet = true`
75-
- `one_nat_gateway_per_az = false`
73+
- `one_nat_gateway_per_az = true`
7674
- `vpn_server_enabled = true`
7775
- `vpn_server_instance_type = "t3a.small"`
7876
- `vpn_key_pair = ""`
@@ -82,12 +80,11 @@ This module supports three scenarios to create Network resource on AWS. Each wil
8280

8381

8482
# IAM Permissions
85-
The required IAM permissions to create resources from this module can be found [here](https://github.com/squareops/terraform-aws-network/blob/main/IAM.md)
83+
The required IAM permissions to create resources from this module can be found [here](https://github.com/squareops/terraform-aws-vpc/blob/main/IAM.md)
8684

8785

8886

8987
# VPN setup-
90-
9188
To configure Pritunl VPN:
9289

9390
1. Access the Pritunl UI over HTTPS using the public IP of EC2 instance in browser
@@ -96,27 +93,22 @@ To configure Pritunl VPN:
9693
4. After login, in the Initial setup window, add the record created in the 'Lets Encrypt Domain' field.
9794
5. Pritunl will automatically configure a signed SSL certificate from Lets Encrypt.
9895
6. Add organization and user to pritunl.
99-
7. Set server port as 10150 which is already allowed from security group while creating vpn.
96+
7. Add server and set port as 10150 which is already allowed from security group while creating instance for VPN server.
10097
8. Attach organization to the server and Start the server.
10198
9. Copy or download user profile link or file.
10299
10. Import the profile in Pritunl client.
103100

104101
NOTE: Port 80 should be open publicly in the vpn security group to verify and renewing the domain certificate.
105102

106-
# CIS COMPLIANCE
107-
108-
- Follows the VPC recommendations of CIS Amazon Web Services Foundations Benchmark v1.4.0
109103

110-
[ 5. NETWORKING ]
104+
## CIS COMPLIANCE [<img src=" https://prowler.pro/wp-content/themes/prowler-pro/assets/img/logo.svg" width="250" align="right" />](https://prowler.pro/)
111105

112-
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote
113-
server administration ports (Automated)
106+
Security scanning is graciously provided by Prowler. Prowler is the leading fully hosted, cloud-native solution providing continuous cluster security and compliance.
114107

115-
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote
116-
server administration ports (Automated)
117-
118-
5.3 Ensure the default security group of every VPC restricts all traffic
119-
(Automated)
108+
| Benchmark | Description |
109+
|--------|---------------|
110+
| Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 | No Security Groups open to 0.0.0.0/0 |
111+
| Ensure the default security group of every VPC restricts all traffic | No Default Security Groups open to 0.0.0.0/0 |
120112

121113

122114
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
@@ -184,3 +176,42 @@ server administration ports (Automated)
184176
| <a name="output_vpn_host_public_ip"></a> [vpn\_host\_public\_ip](#output\_vpn\_host\_public\_ip) | IP Address of VPN Server |
185177
| <a name="output_vpn_security_group"></a> [vpn\_security\_group](#output\_vpn\_security\_group) | Security Group ID of VPN Server |
186178
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
179+
180+
## Contribute & Issue Report
181+
182+
To report an issue with a project:
183+
184+
1. Check the repository's [issue tracker](https://github.com/squareops/terraform-aws-vpc/issues) on GitHub
185+
2. Search to check if the issue has already been reported
186+
3. If you can't find an answer to your question in the documentation or issue tracker, you can ask a question by creating a new issue. Make sure to provide enough context and details.
187+
188+
## License
189+
190+
Apache License, Version 2.0, January 2004 (https://www.apache.org/licenses/LICENSE-2.0)
191+
192+
## Support Us
193+
194+
To support our GitHub project by liking it, you can follow these steps:
195+
196+
1. Visit the repository: Navigate to the [GitHub repository](https://github.com/squareops/terraform-aws-vpc)
197+
198+
2. Click the "Star" button: On the repository page, you'll see a "Star" button in the upper right corner. Clicking on it will star the repository, indicating your support for the project.
199+
200+
3. Optionally, you can also leave a comment on the repository or open an issue to give feedback or suggest changes.
201+
202+
Staring a repository on GitHub is a simple way to show your support and appreciation for the project. It also helps to increase the visibility of the project and make it more discoverable to others.
203+
204+
## Who we are
205+
206+
We believe that the key to success in the digital age is the ability to deliver value quickly and reliably. That’s why we offer a comprehensive range of DevOps & Cloud services designed to help your organization optimize its systems & Processes for speed and agility.
207+
208+
1. We are an AWS Advanced consulting partner which reflects our deep expertise in AWS Cloud and helping 100+ clients over the last 5 years.
209+
2. Expertise in Kubernetes and overall container solution helps companies expedite their journey by 10X.
210+
3. Infrastructure Automation is a key component to the success of our Clients and our Expertise helps deliver the same in the shortest time.
211+
4. DevSecOps as a service to implement security within the overall DevOps process and helping companies deploy securely and at speed.
212+
5. Platform engineering which supports scalable,Cost efficient infrastructure that supports rapid development, testing, and deployment.
213+
6. 24*7 SRE service to help you Monitor the state of your infrastructure and eradicate any issue within the SLA.
214+
215+
We provide [support](https://squareops.com/contact-us/) on all of our projects, no matter how small or large they may be.
216+
217+
To find more information about our company, visit [squareops.com](https://squareops.com/), follow us on [Linkedin](https://www.linkedin.com/company/squareops-technologies-pvt-ltd/), or fill out a [job application](https://squareops.com/careers/). If you have any questions or would like assistance with your cloud strategy and implementation, please don't hesitate to [contact us](https://squareops.com/contact-us/).

examples/complete-vpc-with-vpn/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,4 @@ No inputs.
5959
| <a name="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id) | The ID of the VPC |
6060
| <a name="output_vpn_host_public_ip"></a> [vpn\_host\_public\_ip](#output\_vpn\_host\_public\_ip) | IP Adress of VPN Server |
6161
| <a name="output_vpn_security_group"></a> [vpn\_security\_group](#output\_vpn\_security\_group) | Security Group ID of VPN Server |
62-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
62+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

examples/complete-vpc-with-vpn/main.tf

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ locals {
1313
data "aws_availability_zones" "available" {}
1414

1515
module "key_pair_vpn" {
16-
source = "squareops/keypair/aws"
17-
# region = local.region
16+
source = "squareops/keypair/aws"
1817
environment = local.environment
1918
key_name = format("%s-%s-vpn", local.environment, local.name)
2019
ssm_parameter_path = format("%s-%s-vpn", local.environment, local.name)
@@ -25,7 +24,6 @@ module "vpc" {
2524

2625
environment = local.environment
2726
name = local.name
28-
region = local.region
2927
vpc_cidr = local.vpc_cidr
3028
azs = [for n in range(0, 2) : data.aws_availability_zones.available.names[n]]
3129
enable_public_subnet = true

examples/simple-vpc/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,4 +53,4 @@ No inputs.
5353
| <a name="output_region"></a> [region](#output\_region) | AWS Region |
5454
| <a name="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block) | AWS Region |
5555
| <a name="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id) | The ID of the VPC |
56-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
56+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

examples/simple-vpc/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ module "vpc" {
2121

2222
environment = local.environment
2323
name = local.name
24-
region = local.region
2524
vpc_cidr = local.vpc_cidr
2625
azs = [for n in range(0, 3) : data.aws_availability_zones.available.names[n]]
2726
enable_public_subnet = true

examples/vpc-with-private-sub/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,4 @@ No inputs.
5252
| <a name="output_region"></a> [region](#output\_region) | AWS Region |
5353
| <a name="output_vpc_cidr_block"></a> [vpc\_cidr\_block](#output\_vpc\_cidr\_block) | AWS Region |
5454
| <a name="output_vpc_id"></a> [vpc\_id](#output\_vpc\_id) | The ID of the VPC |
55-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
55+
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

examples/vpc-with-private-sub/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ module "vpc" {
1717

1818
environment = local.environment
1919
name = local.name
20-
region = local.region
2120
vpc_cidr = local.vpc_cidr
2221
azs = [for n in range(0, 3) : data.aws_availability_zones.available.names[n]]
2322
enable_public_subnet = true

0 commit comments

Comments
 (0)