waf
dwp/waf/aws
A Terraform module to create an AWS Classic Regional WAF with consistent features
DO NOT USE THIS REPO - MIGRATED TO GITLAB terraform-aws-waf A Terraform module to create an AWS Classic Regional WAF with consistent features Usage In its simplest form, this module will create a WAF with all default rules enabled and a Kinesis Firehose delivery stream to write logs to S3 and CloudWatch. ``$hcl module waf { source = "dwp/waf/aws" name = "example" s3_log_bucket = "example-bucket" whitelist_cidr_blocks = ["0.0.0.0/0"] tags = [] } ` All IPs not included in whitelist_cidr_blocks will be blocked by the WAF. The geo-match rule defaults to Country: GB, and can be overridden/extended using the geo_match_constraints variable. This WAF applies size constraints on incoming requests, which can be set with the max_size_constraints variable. The default values are (in bytes): | Componen
| Name | Type | Description | Default |
|---|---|---|---|
| whitelist_cidr_blocks | list(string) | List of CIDR blocks to be allowed through the WAF | required |
| tags | map(string) | tags to apply to aws resource | required |
| name | string | common name | required |
| s3_log_bucket | string | S3 Bucket to use for WAF logs | required |
| max_size_constraints | object({ body = nu | Constraints to apply on request size on a per component basis in bytes. | {
"body": 8192,
"cookie": 4092,
"q |
| custom_rules | list(object({ rule_id = st | Specify additional rules to be added to the WAF | [] |
| default_action | string | The default action for this WAF. Allowed values are ALLOW, BLOCK and COUNT. | "BLOCK" |
| geo_match_constraints | list(object({ type = stri | Geo match conditions to ALLOW through the WAF | [
{
"type": "Country",
"value" |
| enabled_rules | object({ xss | Specify which default rules are enabled. By default all rules are enabled. | {
"bad_auth_tokens": true,
"enforce_ |
| s3_log_prefix | string | Prefix to use for S3 WAF logs | "waf" |
wafregional_web_acl_id — The ID of the regional Web ACL.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,