discriminat-ilb
ChaserSystems/discriminat-ilb/google
DiscrimiNAT Firewall is a transparent, proxy-less solution to discover & filter egress traffic by FQDNs in a Shared VPC on Google Cloud. Architecture with internal TCP load balancers as next hops.
DiscrimiNAT, ILB architecture DiscrimiNAT Firewall is a transparent, proxy-less solution to discover & filter egress traffic by FQDNs in a Shared VPC on Google Cloud. Just specify the allowed destination hostnames in the respective applications' native Firewall Rules and DiscrimiNAT will take care of the rest. Watch our 3½ minute egress FQDN discovery video.  Architecture with internal TCP load balancers as next hops set as the default, and network tag based opt-out control. Pentest Ready DiscrimiNAT enforces the use of contemporary encryption standards such as TLS 1.2+ and SSH v2 with bidirectional in-band checks. Anything older or insecure will be denied connection automatically. Also conducts out-of-band checks, such as DNS, for rob
| Name | Type | Description | Default |
|---|---|---|---|
| subnetwork_name | string | The name of the subnetwork to deploy the DiscrimiNAT Firewall instances in. This | required |
| region | string | The region the specified subnetwork is to be found in. | required |
| project_id | string | The GCP Project ID for this deployment. For example: my-project-111222 | required |
| custom_service_account_email | string | Override with a specific, custom service account email in case support for archi | null |
| image_family | string | Reserved for use with Chaser support. Allows overriding the source image family | "discriminat" |
| zones_names | list(string) | Specific zones if you wish to override the default behaviour. If not overridden, | [] |
| custom_deployment_id | string | Override the randomly generated Deployment ID for this deployment. This is a uni | null |
| user_data_base64 | string | Strongly suggested to NOT run custom, startup scripts on the firewall instances. | null |
| image_auto_update | bool | Automatically look up and use the latest version of DiscrimiNAT image available | true |
| byol | string | If using the BYOL version from the marketplace, supply the licence key as suppli | null |
| ashr | bool | Automated System Health Reporting. See note in README to learn more. Set to `fal | true |
| machine_type | string | The default of `e2-small` should suffice for light to medium levels of usage. An | "e2-small" |
| mig_update_policy_type | string | OPPORTUNISTIC or PROACTIVE. Set to OPPORTUNISTIC to prevent a `terraform apply` | "PROACTIVE" |
| image_version | string | Reserved for use with Chaser support. Allows overriding the source image version | "2.20" |
| only_route_tags | list(string) | Restrict automatically created default route (to the Internet) to VMs with these | null |
| bypass_cidrs | map(map(string)) | Destination CIDRs that should be routed directly to the default internet gateway | {
"gcp-grpc-direct-conn": {
"descr |
| client_cidrs | list(string) | Additional CIDR blocks of clients which should be able to connect to, and hence | [
"10.0.0.0/8",
"172.16.0.0/12",
" |
| image_project | string | Reserved for use with Chaser support. Allows overriding the source image project | "chasersystems-public" |
| preferences | string | Default preferences. See docs at https://chasersystems.com/docs/discriminat/gcp/ | "{\n \"%default\": {\n \"wildcard_ex |
| labels | map(string) | Map of key-value label pairs to apply to resources created by this module. See e | {} |
| instances_per_zone | number | This can be set to a higher number if deployment is single-zone only, to achieve | 1 |
| mig_target_size | number | If left unset, automatically sets to the number of zones_names * instances_per_z | null |
| block-project-ssh-keys | bool | Strongly suggested to leave this to the default, that is to NOT allow project-wi | true |
opt_out_network_tag — The network tag for VMs needing to bypass DiscrimiNAT completely, such as bastion hosts. Such VMs shdeployment_id — The unique identifier, forming a part of various resource names, for this deployment.default_preferences — The default preferences supplied to DiscrimiNAT. See docs at https://chasersystems.com/docs/discrimiAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,