You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### [SquareOps Technologies](https://squareops.com/)Provide end to end solution for all your DevOps needs
8
+
### [SquareOps Technologies](https://squareops.com/)Your DevOps Partner for Accelerating cloud journey.
9
9
10
10
<br>
11
-
12
11
Terraform module to create Networking resources for workload deployment on AWS Cloud.
13
12
14
13
## Usage Example
@@ -28,7 +27,6 @@ module "vpc" {
28
27
29
28
environment = "production"
30
29
name = "skaf"
31
-
region = "us-east-1"
32
30
vpc_cidr = "10.0.0.0/16"
33
31
azs = ["us-east-1a", "us-east-1b"]
34
32
enable_public_subnet = true
@@ -45,12 +43,12 @@ module "vpc" {
45
43
46
44
}
47
45
```
48
-
Refer [examples](examples) for all examples.
46
+
Refer [examples](https://github.com/squareops/terraform-aws-vpc/tree/main/examples) for all examples.
49
47
50
48
## Important Note
51
49
To prevent destruction interruptions, any resources that have been created outside of Terraform and attached to the resources provisioned by Terraform must be deleted before the module is destroyed.
52
50
53
-
The private key generated by Keypair module will be stored in AWS Systems Manager Parameter Store. FOr more details refer [this](https://registry.terraform.io/modules/squareops/keypair/aws)
51
+
The private key generated by Keypair module will be stored in AWS Systems Manager Parameter Store. For more details refer [this](https://registry.terraform.io/modules/squareops/keypair/aws)
54
52
55
53
## Network Scenarios
56
54
@@ -62,17 +60,17 @@ This module supports three scenarios to create Network resource on AWS. Each wil
62
60
-`vpc_cidr = ""`
63
61
-`enable_public_subnet = true`
64
62
-**vpc-with-private-sub:** To create a VPC with public subnets, private subnets, IGW gateway and NAT gateway.
65
-
-`vpc_cidr = local.vpc_cidr`
63
+
-`vpc_cidr = ""`
66
64
-`enable_public_subnet = true`
67
65
-`enable_private_subnet = true`
68
66
69
67
-**complete-vpc-with-vpn:** To create a VPC with public, private, database and intra subnets along with an IGW and NAT gateway. Jump server/Bastion Host is also configured.
70
-
-`vpc_cidr = local.vpc_cidr`
68
+
-`vpc_cidr = ""`
71
69
-`enable_public_subnet = true`
72
70
-`enable_private_subnet = true`
73
71
-`enable_database_subnet = true`
74
72
-`enable_intra_subnet = true`
75
-
-`one_nat_gateway_per_az = false`
73
+
-`one_nat_gateway_per_az = true`
76
74
-`vpn_server_enabled = true`
77
75
-`vpn_server_instance_type = "t3a.small"`
78
76
-`vpn_key_pair = ""`
@@ -82,12 +80,11 @@ This module supports three scenarios to create Network resource on AWS. Each wil
82
80
83
81
84
82
# IAM Permissions
85
-
The required IAM permissions to create resources from this module can be found [here](https://github.com/squareops/terraform-aws-network/blob/main/IAM.md)
83
+
The required IAM permissions to create resources from this module can be found [here](https://github.com/squareops/terraform-aws-vpc/blob/main/IAM.md)
86
84
87
85
88
86
89
87
# VPN setup-
90
-
91
88
To configure Pritunl VPN:
92
89
93
90
1. Access the Pritunl UI over HTTPS using the public IP of EC2 instance in browser
@@ -96,27 +93,22 @@ To configure Pritunl VPN:
96
93
4. After login, in the Initial setup window, add the record created in the 'Lets Encrypt Domain' field.
97
94
5. Pritunl will automatically configure a signed SSL certificate from Lets Encrypt.
98
95
6. Add organization and user to pritunl.
99
-
7. Set server port as 10150 which is already allowed from security group while creating vpn.
96
+
7. Add server and set port as 10150 which is already allowed from security group while creating instance for VPN server.
100
97
8. Attach organization to the server and Start the server.
101
98
9. Copy or download user profile link or file.
102
99
10. Import the profile in Pritunl client.
103
100
104
101
NOTE: Port 80 should be open publicly in the vpn security group to verify and renewing the domain certificate.
105
102
106
-
# CIS COMPLIANCE
107
-
108
-
- Follows the VPC recommendations of CIS Amazon Web Services Foundations Benchmark v1.4.0
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote
113
-
server administration ports (Automated)
106
+
Security scanning is graciously provided by Prowler. Prowler is the leading fully hosted, cloud-native solution providing continuous cluster security and compliance.
114
107
115
-
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote
116
-
server administration ports (Automated)
117
-
118
-
5.3 Ensure the default security group of every VPC restricts all traffic
119
-
(Automated)
108
+
| Benchmark | Description |
109
+
|--------|---------------|
110
+
| Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 | No Security Groups open to 0.0.0.0/0 |
111
+
| Ensure the default security group of every VPC restricts all traffic | No Default Security Groups open to 0.0.0.0/0 |
120
112
121
113
122
114
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
@@ -184,3 +176,42 @@ server administration ports (Automated)
184
176
| <aname="output_vpn_host_public_ip"></a> [vpn\_host\_public\_ip](#output\_vpn\_host\_public\_ip)| IP Address of VPN Server |
185
177
| <aname="output_vpn_security_group"></a> [vpn\_security\_group](#output\_vpn\_security\_group)| Security Group ID of VPN Server |
186
178
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
179
+
180
+
## Contribute & Issue Report
181
+
182
+
To report an issue with a project:
183
+
184
+
1. Check the repository's [issue tracker](https://github.com/squareops/terraform-aws-vpc/issues) on GitHub
185
+
2. Search to check if the issue has already been reported
186
+
3. If you can't find an answer to your question in the documentation or issue tracker, you can ask a question by creating a new issue. Make sure to provide enough context and details.
187
+
188
+
## License
189
+
190
+
Apache License, Version 2.0, January 2004 (https://www.apache.org/licenses/LICENSE-2.0)
191
+
192
+
## Support Us
193
+
194
+
To support our GitHub project by liking it, you can follow these steps:
195
+
196
+
1. Visit the repository: Navigate to the [GitHub repository](https://github.com/squareops/terraform-aws-vpc)
197
+
198
+
2. Click the "Star" button: On the repository page, you'll see a "Star" button in the upper right corner. Clicking on it will star the repository, indicating your support for the project.
199
+
200
+
3. Optionally, you can also leave a comment on the repository or open an issue to give feedback or suggest changes.
201
+
202
+
Staring a repository on GitHub is a simple way to show your support and appreciation for the project. It also helps to increase the visibility of the project and make it more discoverable to others.
203
+
204
+
## Who we are
205
+
206
+
We believe that the key to success in the digital age is the ability to deliver value quickly and reliably. That’s why we offer a comprehensive range of DevOps & Cloud services designed to help your organization optimize its systems & Processes for speed and agility.
207
+
208
+
1. We are an AWS Advanced consulting partner which reflects our deep expertise in AWS Cloud and helping 100+ clients over the last 5 years.
209
+
2. Expertise in Kubernetes and overall container solution helps companies expedite their journey by 10X.
210
+
3. Infrastructure Automation is a key component to the success of our Clients and our Expertise helps deliver the same in the shortest time.
211
+
4. DevSecOps as a service to implement security within the overall DevOps process and helping companies deploy securely and at speed.
212
+
5. Platform engineering which supports scalable,Cost efficient infrastructure that supports rapid development, testing, and deployment.
213
+
6. 24*7 SRE service to help you Monitor the state of your infrastructure and eradicate any issue within the SLA.
214
+
215
+
We provide [support](https://squareops.com/contact-us/) on all of our projects, no matter how small or large they may be.
216
+
217
+
To find more information about our company, visit [squareops.com](https://squareops.com/), follow us on [Linkedin](https://www.linkedin.com/company/squareops-technologies-pvt-ltd/), or fill out a [job application](https://squareops.com/careers/). If you have any questions or would like assistance with your cloud strategy and implementation, please don't hesitate to [contact us](https://squareops.com/contact-us/).
0 commit comments