Mirtov Alexey 33d0bd4365 add english 2 years ago
..
sa_and_key 9545267e2c add segmetn 3 years ago
README.md 33d0bd4365 add english 2 years ago
README_RU.md 33d0bd4365 add english 2 years ago
SG.tf 9545267e2c add segmetn 3 years ago
VM.tf 9545267e2c add segmetn 3 years ago
cloud-init-bastion.tpl.yaml 9545267e2c add segmetn 3 years ago
cloud-init.tpl.yaml 9545267e2c add segmetn 3 years ago
output.tf 9545267e2c add segmetn 3 years ago
provider.tf 9545267e2c add segmetn 3 years ago
terraform.tfvars_example 9545267e2c add segmetn 3 years ago
variables.tf 9545267e2c add segmetn 3 years ago
versions.tf 9545267e2c add segmetn 3 years ago
vpc.tf 9545267e2c add segmetn 3 years ago

README.md

Terraform and Security Groups Example 2

Mock dev/stage/prod environment with sample security groups to provide isolation

Detailed analysis in the video

image

Preliminary setup

  • Fill out the terraform.tfvars_example file and rename it to terraform.tfvars.
  • To the file, add your values of cloud_id, folder_id for all the four folders, and the token.
  • In the variables.tf file, replace the value of the bastion_whitelist_ip variable with your own list of public IP addresses from which it is allowed to connect to the network: each address in double quotes, separated by a comma, for example: default = ["1.1.1.1/32", "2.2.2.2/32"].
  • Run terraform init.
  • Run terraform apply.