compute-firewall
dcos-terraform/compute-firewall/gcp
Create an ELB to be used for DC/OS for GCP
 DC/OS Network Firewall Rules The firewall module creates four different policies to be used by provisioning DC/OS Infrastructure EXAMPLE ``hcl module "dcos-compute-firewall" { source = "dcos-terraform/compute-firewall/gcp" version = "~> 0.2.0" network = "network_self_link" internal_subnets = "172.12.0.0/16" admin_ips = ["1.2.3.4/32"] } ` Inputs | Name | Description | Type | Default | Required | |------|-------------|:----:|:-----:|:-----:| | admin\_ips | List of CIDR admin IPs | list | n/a | yes | | cluster\_name | Name of the DC/OS cluster | string | n/a | yes | | internal\_subnets | List of internal subnets to allow traffic between the
| Name | Type | Description | Default |
|---|---|---|---|
| admin_ips | list(string) | List of CIDR admin IPs | required |
| cluster_name | string | Name of the DC/OS cluster | required |
| network | string | Network Name | required |
| internal_subnets | list(string) | List of internal subnets to allow traffic between them | required |
| public_agents_ips | list(string) | List of ips allowed access to public agents. admin_ips are joined to this list | [
"0.0.0.0/0"
] |
| public_agents_additional_ports | list(string) | List of additional ports allowed for public access on public agents (80 and 443 | [] |
| name_prefix | string | Name Prefix | "" |
cluster_name — Name of the DC/OS clusternetwork — Network Name