Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Commit

Permalink
Add warning around default use of 0.0.0.0/0.
Browse files Browse the repository at this point in the history
  • Loading branch information
josh-padnick committed Sep 11, 2018
1 parent 242c061 commit 19399ef
Showing 1 changed file with 9 additions and 0 deletions.
9 changes: 9 additions & 0 deletions examples/root-example/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,3 +36,12 @@ To deploy a Consul Cluster:
print out the IP addresses of the Consul servers and some example commands you can run to interact with the cluster:
`../consul-examples-helper/consul-examples-helper.sh`.

### WARNING: This example exposes your cluster to the public Internet!

This example enables your Consul Client and Consul Server to be accessible from `0.0.0.0/0` (any IP address) by default.
This is not an acceptable security posture in a production setting! In a production setting, you should set the
`allowed_inbound_cidr_blocks_http_api` property of the [consul-cluster](
https://github.com/hashicorp/terraform-google-consul/tree/master/modules/consul-cluster) module to either an empty list
or a limited range of IP addresses.

Note that for access within GCP, using the `allowed_inbound_tags_http_api` module property is preferred.

0 comments on commit 19399ef

Please sign in to comment.