Skip to content
This repository was archived by the owner on Jun 3, 2024. It is now read-only.

This module allow to manage bastions for the cloud-platform team

License

Notifications You must be signed in to change notification settings

ministryofjustice/cloud-platform-terraform-bastion

Repository files navigation

cloud-platform-terraform-bastion

Terraform module that will create the bastion inside a VPC that will grant access to internal subnets to the members of the team. It also created a route53 within the route53 hostzone given as a input/parameter.

Usage

module "bastion" {
  source = "github.com/ministryofjustice/cloud-platform-terraform-bastion?ref=0.0.2"

  vpc_id       = "vpc-1234567890"
  key_name     = "cp-mogaal"
  route53_zone = "${local.cluster_name}.cloud-platform.service.justice.gov.uk"
}

Requirements

Name Version
terraform >= 0.13

Providers

Name Version
aws n/a
template n/a
tls n/a

Resources

Name
aws_ami
aws_autoscaling_group
aws_caller_identity
aws_eip
aws_iam_instance_profile
aws_iam_policy_document
aws_iam_role
aws_iam_role_policy
aws_key_pair
aws_launch_configuration
aws_region
aws_route53_record
aws_route53_zone
aws_security_group
aws_subnet_ids
aws_vpc
template_cloudinit_config
template_file
tls_private_key

Inputs

Name Description Type Default Required
cluster_domain_name Domain name is used to generate key_pair name to be used in the bastion instance string n/a yes
route53_zone The DNS hostzone where bastion is going to be created, usually is going to be something like bastion.$clusterName.cloud-platform.service.justice.gov.uk. string n/a yes
vpc_name The vpc_name where the security groups and bastions are going to be created string n/a yes

Outputs

Name Description
authorized_keys_for_kops authorized_keys rendered template used by kops