Skip to content

clouddrove/terraform-gcp-firewall

Terraform gcp firewall

This terraform module is used to create firewall on GCP.

Terraform Licence tfsec static-checks


We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems. Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure.

This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining the whole infrastructure code yourself.

We have fifty plus terraform modules. A few of them are comepleted and are available for open source usage while a few others are in progress.

Prerequisites

This module has a few dependencies:

Examples

IMPORTANT: Since the master branch used in source varies based on new modifications, we suggest that you use the release versions here.

Here are some examples of how you can use this module in your inventory structure:

Default subnet

module "firewall" {

source = "clouddrove/firewall/google"
version     = "1.0.0"

name                            = "test-firewall"
module_enabled                  = true
google_compute_firewall_enabled = true
project_id                      = var.gcp_project_id
network                         = module.vpc.vpc_id
description                     = "Creates firewall rule targeting tagged instances."
protocol                        = "TCP"
ports                           = ["80", "4440", "443", "22"]
source_ranges                   = ["0.0.0.0/0"]

}

Inputs

Name Description Type Default Required
allow (Optional) The list of ALLOW rules specified by this firewall. Each rule specifies a protocol and port-range tuple that describes a permitted connection. list(any) [] no
description Creates Firewall rule targetting tagged instances string "Managed by clouddrove" no
environment Environment (e.g. prod, dev, staging). string "" no
google_compute_firewall_enabled n/a bool true no
label_order Label order, e.g. sequence of application name and environment name,environment,'attribute' [webserver,qa,devops,public,] . list(any) [] no
module_enabled n/a bool true no
name Name of the resource. Provided by the client when the resource is created. string "" no
network The name or self_link of the network to attach this firewall to. string "" no
ports n/a list(number) [] no
project_id The project in which the resource belongs. If it is not provided, the provider project is used. string "" no
protocol The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. string "" no
source_ranges IP que será liberado para acessar list(string)
[
"0.0.0.0/0"
]
no
source_tags Nomes de tags que serão utilizadas para utilizar com esta regra de firewall list(string) [] no

Outputs

Name Description
id Name of the resource. Provided by the client when the resource is created.
name an identifier for the resource with format
self_link The URI of the created resource.

Testing

In this module testing is performed with terratest and it creates a small piece of infrastructure, matches the output like ARN, ID and Tags name etc and destroy infrastructure in your AWS account. This testing is written in GO, so you need a GO environment in your system.

You need to run the following command in the testing folder:

  go test -run Test

Feedback

If you come accross a bug or have any feedback, please log it in our issue tracker, or feel free to drop us an email at hello@clouddrove.com.

If you have found it worth your time, go ahead and give us a ★ on our GitHub!

About us

At CloudDrove, we offer expert guidance, implementation support and services to help organisations accelerate their journey to the cloud. Our services include docker and container orchestration, cloud migration and adoption, infrastructure automation, application modernisation and remediation, and performance engineering.

We are The Cloud Experts!


We ❤️ Open Source and you can check out our other modules to get help with your new Cloud ideas.