├── .editorconfig ├── .github └── workflows │ ├── lock.yml │ ├── pr-title.yml │ ├── pre-commit.yml │ ├── release.yml │ └── stale-actions.yaml ├── .gitignore ├── .pre-commit-config.yaml ├── .releaserc.json ├── CHANGELOG.md ├── LICENSE ├── README.md ├── examples ├── complete │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf ├── computed │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf ├── disabled │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf ├── dynamic │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf ├── http │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf └── rules-only │ ├── README.md │ ├── main.tf │ ├── outputs.tf │ └── versions.tf ├── main.tf ├── modules ├── README.md ├── _templates │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── activemq │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── alertmanager │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── carbon-relay-ng │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── cassandra │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── consul │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── dax-cluster │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── docker-swarm │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── elasticsearch │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── etcd │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── grafana │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── graphite-statsd │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── http-80 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── http-8080 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── https-443 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── https-8443 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ipsec-4500 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ipsec-500 │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── kafka │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── kibana │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── kubernetes-api │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ldap │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ldaps │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── logstash │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── loki │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── memcached │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── minio │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── mongodb │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── mssql │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── mysql │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── nfs │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── nomad │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ntp │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── openvpn │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── oracle-db │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── postgresql │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── prometheus │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── promtail │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── puppet │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── rabbitmq │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── rdp │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── redis │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── redshift │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── smtp-submission │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── smtp │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── smtps │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── solr │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── splunk │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── squid │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── ssh │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── storm │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── vault │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── wazuh │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── web │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── winrm │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── zabbix │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── zipkin │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf └── zookeeper │ ├── README.md │ ├── auto_values.tf │ ├── main.tf │ ├── outputs.tf │ ├── variables.tf │ └── versions.tf ├── outputs.tf ├── rules.tf ├── update_groups.sh ├── variables.tf ├── versions.tf └── wrappers ├── README.md ├── _templates ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── activemq ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── alertmanager ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── carbon-relay-ng ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── cassandra ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── consul ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── dax-cluster ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── docker-swarm ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── elasticsearch ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── etcd ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── grafana ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── graphite-statsd ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── http-80 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── http-8080 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── https-443 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── https-8443 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ipsec-4500 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ipsec-500 ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── kafka ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── kibana ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── kubernetes-api ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ldap ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ldaps ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── logstash ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── loki ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── main.tf ├── memcached ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── minio ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── mongodb ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── mssql ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── mysql ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── nfs ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── nomad ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ntp ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── openvpn ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── oracle-db ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── outputs.tf ├── postgresql ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── prometheus ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── promtail ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── puppet ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── rabbitmq ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── rdp ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── redis ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── redshift ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── smtp-submission ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── smtp ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── smtps ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── solr ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── splunk ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── squid ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── ssh ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── storm ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── variables.tf ├── vault ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── versions.tf ├── wazuh ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── web ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── winrm ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── zabbix ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf ├── zipkin ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf └── zookeeper ├── README.md ├── main.tf ├── outputs.tf ├── variables.tf └── versions.tf /.editorconfig: -------------------------------------------------------------------------------- 1 | # EditorConfig is awesome: http://EditorConfig.org 2 | # Uses editorconfig to maintain consistent coding styles 3 | 4 | # top-most EditorConfig file 5 | root = true 6 | 7 | # Unix-style newlines with a newline ending every file 8 | [*] 9 | charset = utf-8 10 | end_of_line = lf 11 | indent_size = 2 12 | indent_style = space 13 | insert_final_newline = true 14 | max_line_length = 80 15 | trim_trailing_whitespace = true 16 | 17 | [*.{tf,tfvars}] 18 | indent_size = 2 19 | indent_style = space 20 | 21 | [*.md] 22 | max_line_length = 0 23 | trim_trailing_whitespace = false 24 | 25 | [Makefile] 26 | tab_width = 2 27 | indent_style = tab 28 | 29 | [COMMIT_EDITMSG] 30 | max_line_length = 0 31 | -------------------------------------------------------------------------------- /.github/workflows/lock.yml: -------------------------------------------------------------------------------- 1 | name: 'Lock Threads' 2 | 3 | on: 4 | schedule: 5 | - cron: '50 1 * * *' 6 | 7 | jobs: 8 | lock: 9 | runs-on: ubuntu-latest 10 | steps: 11 | - uses: dessant/lock-threads@v5 12 | with: 13 | github-token: ${{ secrets.GITHUB_TOKEN }} 14 | issue-comment: > 15 | I'm going to lock this issue because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues. 16 | If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. 17 | issue-inactive-days: '30' 18 | pr-comment: > 19 | I'm going to lock this pull request because it has been closed for _30 days_ ⏳. This helps our maintainers find and focus on the active issues. 20 | If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. 21 | pr-inactive-days: '30' 22 | -------------------------------------------------------------------------------- /.github/workflows/pr-title.yml: -------------------------------------------------------------------------------- 1 | name: 'Validate PR title' 2 | 3 | on: 4 | pull_request_target: 5 | types: 6 | - opened 7 | - edited 8 | - synchronize 9 | 10 | jobs: 11 | main: 12 | name: Validate PR title 13 | runs-on: ubuntu-latest 14 | steps: 15 | # Please look up the latest version from 16 | # https://github.com/amannn/action-semantic-pull-request/releases 17 | - uses: amannn/action-semantic-pull-request@v5.5.3 18 | env: 19 | GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} 20 | with: 21 | # Configure which types are allowed. 22 | # Default: https://github.com/commitizen/conventional-commit-types 23 | types: | 24 | fix 25 | feat 26 | docs 27 | ci 28 | chore 29 | # Configure that a scope must always be provided. 30 | requireScope: false 31 | # Configure additional validation for the subject based on a regex. 32 | # This example ensures the subject starts with an uppercase character. 33 | subjectPattern: ^[A-Z].+$ 34 | # If `subjectPattern` is configured, you can use this property to override 35 | # the default error message that is shown when the pattern doesn't match. 36 | # The variables `subject` and `title` can be used within the message. 37 | subjectPatternError: | 38 | The subject "{subject}" found in the pull request title "{title}" 39 | didn't match the configured pattern. Please ensure that the subject 40 | starts with an uppercase character. 41 | # For work-in-progress PRs you can typically use draft pull requests 42 | # from Github. However, private repositories on the free plan don't have 43 | # this option and therefore this action allows you to opt-in to using the 44 | # special "[WIP]" prefix to indicate this state. This will avoid the 45 | # validation of the PR title and the pull request checks remain pending. 46 | # Note that a second check will be reported if this is enabled. 47 | wip: true 48 | # When using "Squash and merge" on a PR with only one commit, GitHub 49 | # will suggest using that commit message instead of the PR title for the 50 | # merge commit, and it's easy to commit this by mistake. Enable this option 51 | # to also validate the commit message for one commit PRs. 52 | validateSingleCommit: false 53 | -------------------------------------------------------------------------------- /.github/workflows/release.yml: -------------------------------------------------------------------------------- 1 | name: Release 2 | 3 | on: 4 | workflow_dispatch: 5 | push: 6 | branches: 7 | - main 8 | - master 9 | paths: 10 | - '**/*.tpl' 11 | - '**/*.py' 12 | - '**/*.tf' 13 | - '.github/workflows/release.yml' 14 | 15 | jobs: 16 | release: 17 | name: Release 18 | runs-on: ubuntu-latest 19 | # Skip running release workflow on forks 20 | if: github.repository_owner == 'terraform-aws-modules' 21 | steps: 22 | - name: Checkout 23 | uses: actions/checkout@v4 24 | with: 25 | persist-credentials: false 26 | fetch-depth: 0 27 | 28 | - name: Release 29 | uses: cycjimmy/semantic-release-action@v4 30 | with: 31 | semantic_version: 23.0.2 32 | extra_plugins: | 33 | @semantic-release/changelog@6.0.3 34 | @semantic-release/git@10.0.1 35 | conventional-changelog-conventionalcommits@7.0.2 36 | env: 37 | GITHUB_TOKEN: ${{ secrets.SEMANTIC_RELEASE_TOKEN }} 38 | -------------------------------------------------------------------------------- /.github/workflows/stale-actions.yaml: -------------------------------------------------------------------------------- 1 | name: 'Mark or close stale issues and PRs' 2 | on: 3 | schedule: 4 | - cron: '0 0 * * *' 5 | 6 | jobs: 7 | stale: 8 | runs-on: ubuntu-latest 9 | steps: 10 | - uses: actions/stale@v9 11 | with: 12 | repo-token: ${{ secrets.GITHUB_TOKEN }} 13 | # Staling issues and PR's 14 | days-before-stale: 30 15 | stale-issue-label: stale 16 | stale-pr-label: stale 17 | stale-issue-message: | 18 | This issue has been automatically marked as stale because it has been open 30 days 19 | with no activity. Remove stale label or comment or this issue will be closed in 10 days 20 | stale-pr-message: | 21 | This PR has been automatically marked as stale because it has been open 30 days 22 | with no activity. Remove stale label or comment or this PR will be closed in 10 days 23 | # Not stale if have this labels or part of milestone 24 | exempt-issue-labels: bug,wip,on-hold 25 | exempt-pr-labels: bug,wip,on-hold 26 | exempt-all-milestones: true 27 | # Close issue operations 28 | # Label will be automatically removed if the issues are no longer closed nor locked. 29 | days-before-close: 10 30 | delete-branch: true 31 | close-issue-message: This issue was automatically closed because of stale in 10 days 32 | close-pr-message: This PR was automatically closed because of stale in 10 days 33 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | # Local .terraform directories 2 | **/.terraform/* 3 | 4 | # Terraform lockfile 5 | .terraform.lock.hcl 6 | 7 | # .tfstate files 8 | *.tfstate 9 | *.tfstate.* 10 | 11 | # Crash log files 12 | crash.log 13 | 14 | # Exclude all .tfvars files, which are likely to contain sentitive data, such as 15 | # password, private keys, and other secrets. These should not be part of version 16 | # control as they are data points which are potentially sensitive and subject 17 | # to change depending on the environment. 18 | *.tfvars 19 | 20 | # Ignore override files as they are usually used to override resources locally and so 21 | # are not checked in 22 | override.tf 23 | override.tf.json 24 | *_override.tf 25 | *_override.tf.json 26 | 27 | # Ignore CLI configuration files 28 | .terraformrc 29 | terraform.rc 30 | -------------------------------------------------------------------------------- /.pre-commit-config.yaml: -------------------------------------------------------------------------------- 1 | repos: 2 | - repo: https://github.com/antonbabenko/pre-commit-terraform 3 | rev: v1.96.1 4 | hooks: 5 | - id: terraform_fmt 6 | - id: terraform_wrapper_module_for_each 7 | - id: terraform_docs 8 | args: 9 | - '--args=--lockfile=false' 10 | - id: terraform_validate 11 | exclude: '^modules/_templates/[^/]+$|^wrappers/.+$' 12 | - repo: https://github.com/pre-commit/pre-commit-hooks 13 | rev: v5.0.0 14 | hooks: 15 | - id: check-merge-conflict 16 | - id: end-of-file-fixer 17 | - id: trailing-whitespace 18 | - id: mixed-line-ending 19 | args: [--fix=lf] 20 | -------------------------------------------------------------------------------- /.releaserc.json: -------------------------------------------------------------------------------- 1 | { 2 | "branches": [ 3 | "main", 4 | "master" 5 | ], 6 | "ci": false, 7 | "plugins": [ 8 | [ 9 | "@semantic-release/commit-analyzer", 10 | { 11 | "preset": "conventionalcommits" 12 | } 13 | ], 14 | [ 15 | "@semantic-release/release-notes-generator", 16 | { 17 | "preset": "conventionalcommits" 18 | } 19 | ], 20 | [ 21 | "@semantic-release/github", 22 | { 23 | "successComment": "This ${issue.pull_request ? 'PR is included' : 'issue has been resolved'} in version ${nextRelease.version} :tada:", 24 | "labels": false, 25 | "releasedLabels": false 26 | } 27 | ], 28 | [ 29 | "@semantic-release/changelog", 30 | { 31 | "changelogFile": "CHANGELOG.md", 32 | "changelogTitle": "# Changelog\n\nAll notable changes to this project will be documented in this file." 33 | } 34 | ], 35 | [ 36 | "@semantic-release/git", 37 | { 38 | "assets": [ 39 | "CHANGELOG.md" 40 | ], 41 | "message": "chore(release): version ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}" 42 | } 43 | ] 44 | ] 45 | } 46 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Licensed under the Apache License, Version 2.0 (the "License"); 2 | you may not use this file except in compliance with the License. 3 | You may obtain a copy of the License at 4 | 5 | http://www.apache.org/licenses/LICENSE-2.0 6 | 7 | Unless required by applicable law or agreed to in writing, software 8 | distributed under the License is distributed on an "AS IS" BASIS, 9 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 10 | See the License for the specific language governing permissions and 11 | limitations under the License. 12 | -------------------------------------------------------------------------------- /examples/complete/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.complete_sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.complete_sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.complete_sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.complete_sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.complete_sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.complete_sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /examples/complete/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /examples/computed/README.md: -------------------------------------------------------------------------------- 1 | # Computed Security Group rules example 2 | 3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination. 4 | 5 | ## Usage 6 | 7 | To run this example you need to execute: 8 | 9 | ```bash 10 | $ terraform init 11 | $ terraform plan 12 | $ terraform apply 13 | ``` 14 | 15 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources. 16 | 17 | 18 | ## Requirements 19 | 20 | | Name | Version | 21 | |------|---------| 22 | | [terraform](#requirement\_terraform) | >= 1.0 | 23 | | [aws](#requirement\_aws) | >= 3.29 | 24 | 25 | ## Providers 26 | 27 | | Name | Version | 28 | |------|---------| 29 | | [aws](#provider\_aws) | >= 3.29 | 30 | 31 | ## Modules 32 | 33 | | Name | Source | Version | 34 | |------|--------|---------| 35 | | [http\_sg](#module\_http\_sg) | ../../modules/https-443 | n/a | 36 | | [mysql\_sg](#module\_mysql\_sg) | ../../modules/mysql | n/a | 37 | 38 | ## Resources 39 | 40 | | Name | Type | 41 | |------|------| 42 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source | 43 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source | 44 | 45 | ## Inputs 46 | 47 | No inputs. 48 | 49 | ## Outputs 50 | 51 | | Name | Description | 52 | |------|-------------| 53 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group | 54 | | [security\_group\_description](#output\_security\_group\_description) | The description of the security group | 55 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group | 56 | | [security\_group\_name](#output\_security\_group\_name) | The name of the security group | 57 | | [security\_group\_owner\_id](#output\_security\_group\_owner\_id) | The owner ID | 58 | | [security\_group\_vpc\_id](#output\_security\_group\_vpc\_id) | The VPC ID | 59 | 60 | -------------------------------------------------------------------------------- /examples/computed/main.tf: -------------------------------------------------------------------------------- 1 | provider "aws" { 2 | region = "eu-west-1" 3 | } 4 | 5 | ############################################################# 6 | # Data sources to get VPC and default security group details 7 | ############################################################# 8 | data "aws_vpc" "default" { 9 | default = true 10 | } 11 | 12 | data "aws_security_group" "default" { 13 | name = "default" 14 | vpc_id = data.aws_vpc.default.id 15 | } 16 | 17 | ########################### 18 | # Security groups examples 19 | ########################### 20 | module "http_sg" { 21 | source = "../../modules/https-443" 22 | 23 | name = "computed-http-sg" 24 | description = "Security group with HTTP port open for everyone, and HTTPS open just for the default security group" 25 | vpc_id = data.aws_vpc.default.id 26 | 27 | ingress_cidr_blocks = ["0.0.0.0/0"] 28 | 29 | ingress_with_source_security_group_id = [ 30 | { 31 | rule = "https-443-tcp" 32 | source_security_group_id = data.aws_security_group.default.id 33 | }, 34 | ] 35 | } 36 | 37 | module "mysql_sg" { 38 | source = "../../modules/mysql" 39 | 40 | name = "computed-mysql-sg" 41 | description = "Security group with MySQL/Aurora port open for HTTP security group created above (computed)" 42 | vpc_id = data.aws_vpc.default.id 43 | 44 | ingress_cidr_blocks = ["0.0.0.0/0"] 45 | 46 | computed_ingress_with_source_security_group_id = [ 47 | { 48 | rule = "mysql-tcp" 49 | source_security_group_id = module.http_sg.security_group_id 50 | }, 51 | ] 52 | 53 | number_of_computed_ingress_with_source_security_group_id = 1 54 | } 55 | -------------------------------------------------------------------------------- /examples/computed/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.mysql_sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.mysql_sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.mysql_sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.mysql_sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.mysql_sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.mysql_sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /examples/computed/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /examples/disabled/README.md: -------------------------------------------------------------------------------- 1 | # HTTP Security Group example 2 | 3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination. 4 | 5 | Data sources are used to discover existing VPC resources (VPC and default security group). 6 | 7 | ## Usage 8 | 9 | To run this example you need to execute: 10 | 11 | ```bash 12 | $ terraform init 13 | $ terraform plan 14 | $ terraform apply 15 | ``` 16 | 17 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources. 18 | 19 | 20 | ## Requirements 21 | 22 | | Name | Version | 23 | |------|---------| 24 | | [terraform](#requirement\_terraform) | >= 1.0 | 25 | | [aws](#requirement\_aws) | >= 3.29 | 26 | 27 | ## Providers 28 | 29 | | Name | Version | 30 | |------|---------| 31 | | [aws](#provider\_aws) | >= 3.29 | 32 | 33 | ## Modules 34 | 35 | | Name | Source | Version | 36 | |------|--------|---------| 37 | | [complete\_sg\_disabled](#module\_complete\_sg\_disabled) | ../../ | n/a | 38 | | [http\_sg\_disabled](#module\_http\_sg\_disabled) | ../../modules/http-80 | n/a | 39 | 40 | ## Resources 41 | 42 | | Name | Type | 43 | |------|------| 44 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source | 45 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source | 46 | 47 | ## Inputs 48 | 49 | No inputs. 50 | 51 | ## Outputs 52 | 53 | | Name | Description | 54 | |------|-------------| 55 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group | 56 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group | 57 | 58 | -------------------------------------------------------------------------------- /examples/disabled/main.tf: -------------------------------------------------------------------------------- 1 | provider "aws" { 2 | region = "eu-west-1" 3 | } 4 | 5 | ############################################################# 6 | # Data sources to get VPC and default security group details 7 | ############################################################# 8 | data "aws_vpc" "default" { 9 | default = true 10 | } 11 | 12 | data "aws_security_group" "default" { 13 | name = "default" 14 | vpc_id = data.aws_vpc.default.id 15 | } 16 | 17 | ######################################################## 18 | # Security groups WILL NOT be created by these examples 19 | ######################################################## 20 | module "complete_sg_disabled" { 21 | source = "../../" 22 | 23 | create = false 24 | name = "complete-sg" 25 | description = "Security group with all available arguments set (this is just an example)" 26 | vpc_id = data.aws_vpc.default.id 27 | 28 | ingress_cidr_blocks = ["0.0.0.0/0"] 29 | } 30 | 31 | module "http_sg_disabled" { 32 | source = "../../modules/http-80" 33 | 34 | create = false 35 | name = "http-sg" 36 | description = "Security group with HTTP ports open for everybody (IPv4 CIDR), egress ports are all world open" 37 | vpc_id = data.aws_vpc.default.id 38 | 39 | ingress_cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | -------------------------------------------------------------------------------- /examples/disabled/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.complete_sg_disabled.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.complete_sg_disabled.security_group_id 9 | } 10 | -------------------------------------------------------------------------------- /examples/disabled/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /examples/dynamic/README.md: -------------------------------------------------------------------------------- 1 | # Dynamic Security Group rules example 2 | 3 | Configuration in this directory creates set of Security Group and Security Group Rules resources in various combination. 4 | 5 | Data sources are used to discover existing VPC resources (VPC and default security group). 6 | 7 | ## Usage 8 | 9 | To run this example you need to execute: 10 | 11 | ```bash 12 | $ terraform init 13 | $ terraform plan 14 | $ terraform apply 15 | ``` 16 | 17 | Note that this example may create resources which cost money. Run `terraform destroy` when you don't need these resources. 18 | 19 | 20 | ## Requirements 21 | 22 | | Name | Version | 23 | |------|---------| 24 | | [terraform](#requirement\_terraform) | >= 1.0 | 25 | | [aws](#requirement\_aws) | >= 3.29 | 26 | 27 | ## Providers 28 | 29 | | Name | Version | 30 | |------|---------| 31 | | [aws](#provider\_aws) | >= 3.29 | 32 | 33 | ## Modules 34 | 35 | | Name | Source | Version | 36 | |------|--------|---------| 37 | | [http\_sg](#module\_http\_sg) | ../../modules/http-80 | n/a | 38 | 39 | ## Resources 40 | 41 | | Name | Type | 42 | |------|------| 43 | | [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source | 44 | | [aws_vpc.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc) | data source | 45 | 46 | ## Inputs 47 | 48 | No inputs. 49 | 50 | ## Outputs 51 | 52 | | Name | Description | 53 | |------|-------------| 54 | | [security\_group\_arn](#output\_security\_group\_arn) | The ARN of the security group | 55 | | [security\_group\_description](#output\_security\_group\_description) | The description of the security group | 56 | | [security\_group\_id](#output\_security\_group\_id) | The ID of the security group | 57 | | [security\_group\_name](#output\_security\_group\_name) | The name of the security group | 58 | | [security\_group\_owner\_id](#output\_security\_group\_owner\_id) | The owner ID | 59 | | [security\_group\_vpc\_id](#output\_security\_group\_vpc\_id) | The VPC ID | 60 | 61 | -------------------------------------------------------------------------------- /examples/dynamic/main.tf: -------------------------------------------------------------------------------- 1 | provider "aws" { 2 | region = "eu-west-1" 3 | } 4 | 5 | ############################################################# 6 | # Data sources to get VPC and default security group details 7 | ############################################################# 8 | data "aws_vpc" "default" { 9 | default = true 10 | } 11 | 12 | data "aws_security_group" "default" { 13 | name = "default" 14 | vpc_id = data.aws_vpc.default.id 15 | } 16 | 17 | ########################### 18 | # Security groups examples 19 | ########################### 20 | 21 | ####### 22 | # HTTP 23 | ####### 24 | module "http_sg" { 25 | source = "../../modules/http-80" 26 | 27 | name = "dynamic-http-sg" 28 | description = "Security group with HTTP port open for everyone, and HTTPS open just for the default security group" 29 | vpc_id = data.aws_vpc.default.id 30 | 31 | ingress_cidr_blocks = ["0.0.0.0/0"] 32 | 33 | ingress_with_source_security_group_id = [ 34 | { 35 | rule = "https-443-tcp" 36 | source_security_group_id = data.aws_security_group.default.id 37 | }, 38 | ] 39 | } 40 | -------------------------------------------------------------------------------- /examples/dynamic/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.http_sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.http_sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.http_sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.http_sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.http_sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.http_sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /examples/dynamic/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /examples/http/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.http_sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.http_sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.http_sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.http_sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.http_sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.http_sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /examples/http/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /examples/rules-only/main.tf: -------------------------------------------------------------------------------- 1 | provider "aws" { 2 | region = "eu-west-1" 3 | } 4 | 5 | ############################################################# 6 | # Data sources to get VPC and default security group details 7 | ############################################################# 8 | data "aws_vpc" "default" { 9 | default = true 10 | } 11 | 12 | data "aws_security_group" "default" { 13 | name = "default" 14 | vpc_id = data.aws_vpc.default.id 15 | } 16 | 17 | ######################################################## 18 | # Create SGs 19 | ######################################################## 20 | 21 | resource "aws_security_group" "service_one" { 22 | name = "service_one" 23 | description = "Allow access from service two" 24 | } 25 | 26 | resource "aws_security_group" "service_two" { 27 | name = "service_two" 28 | description = "Allow access from service one" 29 | } 30 | 31 | ######################################################## 32 | # Add SG rules 33 | ######################################################## 34 | 35 | module "rules_one" { 36 | source = "../../" 37 | 38 | create_sg = false 39 | security_group_id = aws_security_group.service_one.id 40 | ingress_with_source_security_group_id = [ 41 | { 42 | description = "http from service two" 43 | rule = "http-80-tcp" 44 | source_security_group_id = aws_security_group.service_two.id 45 | }, 46 | ] 47 | } 48 | 49 | module "rules_two" { 50 | source = "../../" 51 | 52 | create_sg = false 53 | security_group_id = aws_security_group.service_two.id 54 | ingress_with_source_security_group_id = [ 55 | { 56 | description = "http from service one" 57 | rule = "http-80-tcp" 58 | source_security_group_id = aws_security_group.service_one.id 59 | }, 60 | ] 61 | } 62 | -------------------------------------------------------------------------------- /examples/rules-only/outputs.tf: -------------------------------------------------------------------------------- 1 | output "service_one_security_group_arn" { 2 | description = "The ARN of the security group for service one" 3 | value = aws_security_group.service_one.arn 4 | } 5 | 6 | output "service_one_security_group_id" { 7 | description = "The ID of the security group for service one" 8 | value = aws_security_group.service_one.id 9 | } 10 | 11 | output "service_tow_security_group_arn" { 12 | description = "The ARN of the security group for service two" 13 | value = aws_security_group.service_two.arn 14 | } 15 | 16 | output "service_two_security_group_id" { 17 | description = "The ID of the security group for service two" 18 | value = aws_security_group.service_two.id 19 | } 20 | -------------------------------------------------------------------------------- /examples/rules-only/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/_templates/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/_templates/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/activemq/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/activemq/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/alertmanager/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/alertmanager/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/carbon-relay-ng/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/carbon-relay-ng/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/cassandra/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/cassandra/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/consul/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/consul/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/dax-cluster/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/dax-cluster/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/docker-swarm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/docker-swarm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/elasticsearch/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/elasticsearch/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/etcd/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/etcd/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/grafana/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["grafana-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/grafana/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/grafana/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/graphite-statsd/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/graphite-statsd/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/http-80/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["http-80-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/http-80/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/http-80/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/http-8080/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["http-8080-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/http-8080/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/http-8080/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/https-443/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["https-443-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/https-443/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/https-443/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/https-8443/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/https-8443/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ipsec-4500/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ipsec-4500/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ipsec-500/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ipsec-500/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/kafka/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/kafka/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/kibana/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["kibana-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/kibana/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/kibana/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/kubernetes-api/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/kubernetes-api/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ldap/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["ldap-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/ldap/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ldap/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ldaps/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["ldaps-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/ldaps/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ldaps/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/logstash/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/logstash/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/loki/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/loki/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/memcached/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/memcached/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/minio/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["minio-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/minio/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/minio/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/mongodb/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/mongodb/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/mssql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/mssql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/mysql/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["mysql-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/mysql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/mysql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/nfs/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["nfs-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/nfs/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/nfs/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/nomad/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/nomad/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ntp/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["ntp-udp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/ntp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ntp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/openvpn/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/openvpn/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/oracle-db/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/oracle-db/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/postgresql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/postgresql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/prometheus/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/prometheus/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/promtail/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/promtail/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/puppet/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/puppet/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/rabbitmq/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/rabbitmq/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/rdp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/rdp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/redis/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["redis-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/redis/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/redis/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/redshift/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/redshift/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/smtp-submission/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/smtp-submission/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/smtp/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["smtp-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/smtp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/smtp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/smtps/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/smtps/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/solr/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["solr-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/solr/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/solr/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/splunk/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/splunk/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/squid/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/squid/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/ssh/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["ssh-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/ssh/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/ssh/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/storm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/storm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/vault/auto_values.tf: -------------------------------------------------------------------------------- 1 | # This file was generated from values defined in rules.tf using update_groups.sh. 2 | ################################### 3 | # DO NOT CHANGE THIS FILE MANUALLY 4 | ################################### 5 | 6 | variable "auto_ingress_rules" { 7 | description = "List of ingress rules to add automatically" 8 | type = list(string) 9 | default = ["vault-tcp"] 10 | } 11 | 12 | variable "auto_ingress_with_self" { 13 | description = "List of maps defining ingress rules with self to add automatically" 14 | type = list(map(string)) 15 | default = [{ "rule" = "all-all" }] 16 | } 17 | 18 | variable "auto_egress_rules" { 19 | description = "List of egress rules to add automatically" 20 | type = list(string) 21 | default = ["all-all"] 22 | } 23 | 24 | variable "auto_egress_with_self" { 25 | description = "List of maps defining egress rules with self to add automatically" 26 | type = list(map(string)) 27 | default = [] 28 | } 29 | 30 | # Computed 31 | variable "auto_computed_ingress_rules" { 32 | description = "List of ingress rules to add automatically" 33 | type = list(string) 34 | default = [] 35 | } 36 | 37 | variable "auto_computed_ingress_with_self" { 38 | description = "List of maps defining computed ingress rules with self to add automatically" 39 | type = list(map(string)) 40 | default = [] 41 | } 42 | 43 | variable "auto_computed_egress_rules" { 44 | description = "List of computed egress rules to add automatically" 45 | type = list(string) 46 | default = [] 47 | } 48 | 49 | variable "auto_computed_egress_with_self" { 50 | description = "List of maps defining computed egress rules with self to add automatically" 51 | type = list(map(string)) 52 | default = [] 53 | } 54 | 55 | # Number of computed rules 56 | variable "auto_number_of_computed_ingress_rules" { 57 | description = "Number of computed ingress rules to create by name" 58 | type = number 59 | default = 0 60 | } 61 | 62 | variable "auto_number_of_computed_ingress_with_self" { 63 | description = "Number of computed ingress rules to create where 'self' is defined" 64 | type = number 65 | default = 0 66 | } 67 | 68 | variable "auto_number_of_computed_egress_rules" { 69 | description = "Number of computed egress rules to create by name" 70 | type = number 71 | default = 0 72 | } 73 | 74 | variable "auto_number_of_computed_egress_with_self" { 75 | description = "Number of computed egress rules to create where 'self' is defined" 76 | type = number 77 | default = 0 78 | } 79 | -------------------------------------------------------------------------------- /modules/vault/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/vault/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/wazuh/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/wazuh/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/web/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/web/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/winrm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/winrm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/zabbix/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/zabbix/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/zipkin/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/zipkin/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /modules/zookeeper/outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = module.sg.security_group_arn 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = module.sg.security_group_id 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = module.sg.security_group_vpc_id 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = module.sg.security_group_owner_id 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = module.sg.security_group_name 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = module.sg.security_group_description 29 | } 30 | -------------------------------------------------------------------------------- /modules/zookeeper/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /outputs.tf: -------------------------------------------------------------------------------- 1 | output "security_group_arn" { 2 | description = "The ARN of the security group" 3 | value = try(aws_security_group.this[0].arn, aws_security_group.this_name_prefix[0].arn, "") 4 | } 5 | 6 | output "security_group_id" { 7 | description = "The ID of the security group" 8 | value = try(aws_security_group.this[0].id, aws_security_group.this_name_prefix[0].id, "") 9 | } 10 | 11 | output "security_group_vpc_id" { 12 | description = "The VPC ID" 13 | value = try(aws_security_group.this[0].vpc_id, aws_security_group.this_name_prefix[0].vpc_id, "") 14 | } 15 | 16 | output "security_group_owner_id" { 17 | description = "The owner ID" 18 | value = try(aws_security_group.this[0].owner_id, aws_security_group.this_name_prefix[0].owner_id, "") 19 | } 20 | 21 | output "security_group_name" { 22 | description = "The name of the security group" 23 | value = try(aws_security_group.this[0].name, aws_security_group.this_name_prefix[0].name, "") 24 | } 25 | 26 | output "security_group_description" { 27 | description = "The description of the security group" 28 | value = try(aws_security_group.this[0].description, aws_security_group.this_name_prefix[0].description, "") 29 | } 30 | -------------------------------------------------------------------------------- /versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/_templates/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/_templates/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/_templates/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/activemq/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/activemq/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/activemq/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/alertmanager/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/alertmanager/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/alertmanager/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/carbon-relay-ng/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/carbon-relay-ng/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/carbon-relay-ng/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/cassandra/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/cassandra/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/cassandra/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/consul/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/consul/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/consul/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/dax-cluster/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/dax-cluster/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/dax-cluster/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/docker-swarm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/docker-swarm/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/docker-swarm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/elasticsearch/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/elasticsearch/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/elasticsearch/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/etcd/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/etcd/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/etcd/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/grafana/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/grafana/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/grafana/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/graphite-statsd/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/graphite-statsd/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/graphite-statsd/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/http-80/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/http-80/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/http-80/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/http-8080/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/http-8080/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/http-8080/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/https-443/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/https-443/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/https-443/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/https-8443/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/https-8443/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/https-8443/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ipsec-4500/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ipsec-4500/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ipsec-4500/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ipsec-500/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ipsec-500/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ipsec-500/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/kafka/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/kafka/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/kafka/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/kibana/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/kibana/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/kibana/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/kubernetes-api/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/kubernetes-api/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/kubernetes-api/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ldap/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ldap/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ldap/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ldaps/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ldaps/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ldaps/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/logstash/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/logstash/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/logstash/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/loki/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/loki/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/loki/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/memcached/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/memcached/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/memcached/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/minio/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/minio/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/minio/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/mongodb/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/mongodb/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/mongodb/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/mssql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/mssql/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/mssql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/mysql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/mysql/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/mysql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/nfs/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/nfs/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/nfs/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/nomad/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/nomad/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/nomad/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ntp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ntp/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ntp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/openvpn/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/openvpn/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/openvpn/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/oracle-db/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/oracle-db/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/oracle-db/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/postgresql/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/postgresql/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/postgresql/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/prometheus/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/prometheus/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/prometheus/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/promtail/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/promtail/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/promtail/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/puppet/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/puppet/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/puppet/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/rabbitmq/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/rabbitmq/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/rabbitmq/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/rdp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/rdp/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/rdp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/redis/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/redis/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/redis/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/redshift/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/redshift/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/redshift/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/smtp-submission/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/smtp-submission/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/smtp-submission/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/smtp/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/smtp/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/smtp/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/smtps/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/smtps/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/smtps/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/solr/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/solr/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/solr/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/splunk/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/splunk/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/splunk/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/squid/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/squid/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/squid/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/ssh/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/ssh/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/ssh/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/storm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/storm/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/storm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/vault/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/vault/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/vault/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/wazuh/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/wazuh/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/wazuh/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/web/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/web/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/web/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/winrm/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/winrm/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/winrm/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/zabbix/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/zabbix/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/zabbix/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/zipkin/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/zipkin/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/zipkin/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | -------------------------------------------------------------------------------- /wrappers/zookeeper/outputs.tf: -------------------------------------------------------------------------------- 1 | output "wrapper" { 2 | description = "Map of outputs of a wrapper." 3 | value = module.wrapper 4 | # sensitive = false # No sensitive module output found 5 | } 6 | -------------------------------------------------------------------------------- /wrappers/zookeeper/variables.tf: -------------------------------------------------------------------------------- 1 | variable "defaults" { 2 | description = "Map of default values which will be used for each item." 3 | type = any 4 | default = {} 5 | } 6 | 7 | variable "items" { 8 | description = "Maps of items to create a wrapper from. Values are passed through to the module." 9 | type = any 10 | default = {} 11 | } 12 | -------------------------------------------------------------------------------- /wrappers/zookeeper/versions.tf: -------------------------------------------------------------------------------- 1 | terraform { 2 | required_version = ">= 1.0" 3 | 4 | required_providers { 5 | aws = { 6 | source = "hashicorp/aws" 7 | version = ">= 3.29" 8 | } 9 | } 10 | } 11 | --------------------------------------------------------------------------------