Kibana Security Group Rules Module
This folder contains a Terraform module that defines the Security Group rules used by a Kibana cluster to control the traffic that is allowed to go in and out of the cluster. These rules are defined in a separate module so that you can add them to any existing Security Group.
Quick start
Let's say you want to deploy Kibana using the kibana-cluster module:
module "kibana_cluster" {
# TODO: replace <VERSION> with the latest version from the releases page: https://github.com/gruntwork-io/terraform-aws-elk/releases
source = "github.com/gruntwork-io/terraform-aws-elk//modules/kibana-cluster?ref=<VERSION>"
# ... (other params omitted) ...
}
You can attach the Security Group rules to this cluster as follows:
module "security_group_rules" {
# TODO: replace <VERSION> with the latest version from the releases page: https://github.com/gruntwork-io/terraform-aws-elk/releases
source = "github.com/gruntwork-io/terraform-aws-elk//modules/kibana-security-group-rules?ref=<VERSION>"
security_group_id = module.kibana_cluster.security_group_id
kibana_ui_port = 5601
allow_ui_from_cidr_blocks = ["0.0.0.0/0"]
allow_ui_from_security_group_ids = ["sg-abcd1234"]
# ... (other params omitted) ...
}
Note the following parameters:
source
: Use this parameter to specify the URL of this module. The double slash (//
) is intentional and required. Terraform uses it to specify subfolders within a Git repo (see module sources). Theref
parameter specifies a specific Git tag in this repo. That way, instead of using the latest version of this module from themaster
branch, which will change every time you run Terraform, you're using a fixed version of the repo.security_group_id
: Use this parameter to specify the ID of the security group to which the rules in this module should be added.
You can find the other parameters in variables.tf.
Check out the examples folder for working sample code.