This module is used to deploy a connector to OpenVPN Cloud.
Name | Version |
---|---|
terraform | >= 0.13 |
local | ~> 1.2 |
Name | Version |
---|---|
aws | n/a |
No modules.
Name | Type |
---|---|
aws_iam_instance_profile.this | resource |
aws_iam_role.this | resource |
aws_iam_role_policy_attachment.this | resource |
aws_instance.this | resource |
aws_security_group.this | resource |
aws_ami.ubuntu_20_04 | data source |
aws_caller_identity.current | data source |
aws_iam_policy_document.this | data source |
aws_region.current | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
allowed_cidr_blocks | List of network subnets that are allowed. According to PCI-DSS, CIS AWS and SOC2 providing a default wide-open CIDR is not secure. | list(string) |
n/a | yes |
bastion_enabled | Gives ability to enable or disable Bastion functionality | bool |
true |
no |
ec2_key_pair_name | n/a | any |
n/a | yes |
env | n/a | any |
n/a | yes |
ext_security_groups | External security groups to add to bastion host | list(any) |
[] |
no |
instance_type | n/a | string |
"t3.nano" |
no |
openvpn_token | n/a | string |
"" |
no |
private_subnets | n/a | any |
n/a | yes |
ssh_forward_rules | Rules that will enable port forwarding. SSH Config syntax | list(string) |
[] |
no |
ssm_role_arn | n/a | string |
"arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM" |
no |
vpc_id | n/a | any |
n/a | yes |
vpn_enabled | Gives ability to enable or disable Cloud OpenVPN EC2 connector functionality | bool |
true |
no |
Name | Description |
---|---|
cmd | n/a |
instance_id | n/a |
security_group | n/a |
ssh_config | n/a |