compute-firewall

dcos-terraform/compute-firewall/gcp

Terraform Module HCL GCP

Create an ELB to be used for DC/OS for GCP

Install
module "compute-firewall" {
source = "dcos-terraform/compute-firewall/gcp"
version = "0.3.0"
}
plain text: /constructs/tfmod-dcos-terraform-compute-firewall-gcp/install.txt
⭐ Source on GitHub 📦 Registry page
README

![Build Status](https://jenkins-terraform.mesosphere.com/service/dcos-terraform-jenkins/job/dcos-terraform/job/terraform-gcp-compute-firewall/job/master/) DC/OS Network Firewall Rules The firewall module creates four different policies to be used by provisioning DC/OS Infrastructure EXAMPLE ``hcl module "dcos-compute-firewall" { source = "dcos-terraform/compute-firewall/gcp" version = "~> 0.2.0" network = "network_self_link" internal_subnets = "172.12.0.0/16" admin_ips = ["1.2.3.4/32"] } ` Inputs | Name | Description | Type | Default | Required | |------|-------------|:----:|:-----:|:-----:| | admin\_ips | List of CIDR admin IPs | list | n/a | yes | | cluster\_name | Name of the DC/OS cluster | string | n/a | yes | | internal\_subnets | List of internal subnets to allow traffic between the

Inputs (7)
NameTypeDescriptionDefault
admin_ipslist(string)List of CIDR admin IPs required
cluster_namestringName of the DC/OS cluster required
networkstringNetwork Name required
internal_subnetslist(string)List of internal subnets to allow traffic between them required
public_agents_ipslist(string)List of ips allowed access to public agents. admin_ips are joined to this list[ "0.0.0.0/0" ]
public_agents_additional_portslist(string)List of additional ports allowed for public access on public agents (80 and 443 []
name_prefixstringName Prefix""
Outputs (2)
cluster_name — Name of the DC/OS cluster
network — Network Name
Resources (1)
google_compute_firewall
Details
FrameworkTerraform Module
LanguageHCL
Version0.3.0
Cloud GCP
★ Stars0
Forks2
Total downloads9.9k
Inputs7
Outputs2
Resources1
LicenseApache-2.0
Namespacedcos-terraform
Updated