firewall-manager
cloudposse/firewall-manager/aws
Terraform module to configure AWS Firewall Manager
Terraform module to create and manage AWS Firewall Manager policies. > [!TIP] > #### 👽 Use Atmos with Terraform > Cloud Posse uses atmos to easily orchestrate multiple environments using Terraform. > Works with Github Actions, Atlantis, or Spacelift. > > > Watch demo of using Atmos with Terraform > > Example of running atmos to manage infrastructure from our Quick Start tutorial. > Usage For a complete example, see examples/complete. For automated tests of the complete example using bats and Terratest (which tests and deploys the example on AWS), see test. ```hcl module "label" { source = "cloudposse/label/null" # Cloud Posse recommends pinning every module to a specific version # version = "x.x.x" namespace = "eg" stage = "prod" name = "fms" delimiter = "-" tags = { "BusinessUnit" = "XYZ"
| Name | Type | Description | Default |
|---|---|---|---|
| security_groups_usage_audit_policies | list(any) | name: The friendly name of the AWS Firewall Manager Policy. delete_all_policy_ | required |
| namespace | string | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp' | null |
| tags | map(string) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`). Neither the tag keys nor the t | {} |
| waf_policies | list(any) | name: The friendly name of the AWS Firewall Manager Policy. delete_all_policy_ | [] |
| environment | string | ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'st | null |
| additional_tag_map | map(string) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not add | {} |
| regex_replace_chars | string | Terraform regular expression (regex) string. Characters matching the regex will | null |
| context | any | Single object for setting entire context at once. See description of individual | {
"additional_tag_map": {},
"attribu |
| name | string | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. Thi | null |
| id_length_limit | number | Limit `id` to this many characters (minimum 6). Set to `0` for unlimited length. | null |
| label_key_case | string | Controls the letter case of the `tags` keys (label names) for tags generated by | null |
| admin_account_enabled | bool | Resource for aws_fms_admin_account is enabled and will be created or destroyed | true |
| enabled | bool | Set to false to prevent the module from creating any resources | null |
| attributes | list(string) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`, | [] |
| label_value_case | string | Controls the letter case of ID elements (labels) as included in `id`, set as tag | null |
| security_groups_content_audit_policies | list(any) | name: The friendly name of the AWS Firewall Manager Policy. delete_all_policy_ | [] |
| tenant | string | ID element _(Rarely used, not included by default)_. A customer identifier, indi | null |
| label_order | list(string) | The order in which the labels (ID elements) appear in the `id`. Defaults to ["na | null |
| admin_account_id | string | The AWS account ID to associate to associate with AWS Firewall Manager as the AW | null |
| firehose_arn | string | Kinesis Firehose ARN used to create a Kinesis Firehose destination for WAF_V2 Ru | null |
| security_groups_common_policies | list(any) | name: The friendly name of the AWS Firewall Manager Policy. delete_all_policy_ | [] |
admin_account — AWS Account ID of the designated admin account.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,