Skip to content

Terraform module for handling VPN connections on AWS and attaching them to Transit Gateway

License

Notifications You must be signed in to change notification settings

Flaconi/terraform-aws-transit-gateway-vpn

Repository files navigation

Terraform AWS Transit Gateway VPN module

We are following the hub-spoke(s) (aka star network) network topology model.

This module joins our other two modules for handling the Transit Gateway "hub" and "satellite" nodes:

Specifically, we are attaching the VPN connection to the TGW by manipulating the VPN configuration directly, as there isn't a resource for explicitly doing so, like in the case of the VPC attachments. Sadly, this is a limitation on the AWS side.

The VPN related resources handled by this module are provisioned and configured in the "hub" node.

Check out some use cases in the examples.

Caveats

Routing: When the VPN is attached to the TGW, there can be no static routes configured as the routing needs to be added through the TGW API.

Assumptions

Credentials

The module starts from the assumption that your default aws profile allows the user to assume the necessary IAM roles, as required, to make the necessary changes. You can use profile of your need if you set AWS_PROFILE or AWS_DEFAULT_PROFILE, e.g.:

export AWS_DEFAULT_PROFILE=login

You can read more about how Terraform handles this here.

Obviously, all the supported authentication methods can also be used.

Requirements

Name Version
terraform >= 1.0
aws >= 5

Providers

Name Version
aws >= 5

Modules

No modules.

Resources

Name Type
aws_customer_gateway.this resource
aws_ec2_transit_gateway_route.this resource
aws_ec2_transit_gateway_route_table_association.this resource
aws_ec2_transit_gateway_route_table_propagation.this resource
aws_vpn_connection.this resource
aws_ec2_transit_gateway.this data source
aws_ec2_transit_gateway_route_table.this data source
aws_ram_resource_share.this data source

Inputs

Name Description Type Default Required
cgw_bgp_asn The gateway's Border Gateway Protocol (BGP) Autonomous System Number (ASN). string n/a yes
cgw_ip_address IP address of the client VPN endpoint string n/a yes
name Generic name to be given to the provisioned resources string n/a yes
transit_gateway_hub_account_id AWS account ID of Transit Gateway owner string n/a yes
transit_gateway_hub_name Name of the Transit Gateway to attach the VPN to string n/a yes
static_routes_destinations List of CIDRs to be routed into the VPN tunnel. list(string) [] no
static_routes_only Whether the VPN connection uses static routes exclusively. Static routes must be used for devices that don't support BGP bool false no
tags Map of custom tags for the provisioned resources map(string) {} no
tunnel1_inside_cidr A size /30 CIDR block from the 169.254.0.0/16 range string null no
tunnel1_preshared_key Will be stored in the state as plaintext. Must be between 8 & 64 chars and can't start with zero(0). Allowed characters are alphanumeric, periods(.) and underscores(_) string null no
tunnel2_inside_cidr A size /30 CIDR block from the 169.254.0.0/16 range string null no
tunnel2_preshared_key Will be stored in the state as plaintext. Must be between 8 & 64 chars and can't start with zero(0). Allowed characters are alphanumeric, periods(.) and underscores(_) string null no

Outputs

Name Description
customer_gateway_id ID of the Customer Gateway
vpn_connection VPN connection details

About

Terraform module for handling VPN connections on AWS and attaching them to Transit Gateway

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published