Terraform module that will create the bastion inside a VPC that will grant access to internal subnets to the members of the team. It also created a route53 within the route53 hostzone given as a input/parameter.
module "bastion" {
source = "github.com/ministryofjustice/cloud-platform-terraform-bastion?ref=0.0.2"
vpc_id = "vpc-1234567890"
key_name = "cp-mogaal"
route53_zone = "${local.cluster_name}.cloud-platform.service.justice.gov.uk"
}
Name | Version |
---|---|
terraform | >= 0.13 |
Name | Version |
---|---|
aws | n/a |
template | n/a |
tls | n/a |
Name | Description | Type | Default | Required |
---|---|---|---|---|
cluster_domain_name | Domain name is used to generate key_pair name to be used in the bastion instance | string |
n/a | yes |
route53_zone | The DNS hostzone where bastion is going to be created, usually is going to be something like bastion.$clusterName.cloud-platform.service.justice.gov.uk. | string |
n/a | yes |
vpc_name | The vpc_name where the security groups and bastions are going to be created | string |
n/a | yes |
Name | Description |
---|---|
authorized_keys_for_kops | authorized_keys rendered template used by kops |