aws network firewall workflow for testing
This sets up a playground for working with aws-network-firewall
for trying out various rules and configuration as it takes a solid good amoung of time to create firewall.
- Code creates a firewall and adds four stateful and one stateless rule with a firewall policy for starters and configures the logging.
- Creates an instance with a public IP in a application subnet with a basic lamp setup installed via
userdata
. Instance has a securtit group attached withssh
andhttp
port open to0.0.0.0/0
. - I hooked(code not added for this) the
CloudWatch
Log group with a lambda for generating various alerts or and processing them offline for some internal purpose.
- Creates an instance with a public IP in a application subnet with a basic lamp setup installed via
-
There is a bug in terraform aws provider[1] where certain params for
aws_networkfirewall_rule_group
are not configurable properly. That's why in theaws_networkfirewall_rule_group
I created in the example here , has provided all the options , instead of providingANY
which are supported actually[2] -
AWS Network Firewall is available in US East (N. Virginia), US West (Oregon), and Europe (Ireland) Regions.
[1]. hashicorp/terraform-provider-aws#16470
[3]. https://aws.amazon.com/de/blogs/aws/aws-network-firewall-new-managed-firewall-service-in-vpc/