File tree Expand file tree Collapse file tree 17 files changed +414
-16
lines changed
region_security_policy_basic
region_security_policy_rule_basic
region_security_policy_rule_default_rule
region_security_policy_rule_multiple_rules
region_security_policy_rule_with_preconfigured_waf_config
region_security_policy_with_ddos_protection_config
region_security_policy_with_rules
region_security_policy_with_user_defined_fields Expand file tree Collapse file tree 17 files changed +414
-16
lines changed Original file line number Diff line number Diff line change 1
1
resource "google_compute_region_security_policy" "region-sec-policy-basic" {
2
- provider = google- beta
3
-
4
2
name = " my-sec-policy-basic-${ local . name_suffix } "
5
3
description = " basic region security policy"
6
4
type = " CLOUD_ARMOR"
Original file line number Diff line number Diff line change 1
1
resource "google_compute_region_security_policy" "default" {
2
- provider = google- beta
3
-
4
2
region = " us-west2"
5
3
name = " policyruletest-${ local . name_suffix } "
6
4
description = " basic region security policy"
7
5
type = " CLOUD_ARMOR"
8
6
}
9
7
10
8
resource "google_compute_region_security_policy_rule" "policy_rule" {
11
- provider = google- beta
12
-
13
9
region = " us-west2"
14
10
security_policy = google_compute_region_security_policy. default . name
15
11
description = " new rule"
Original file line number Diff line number Diff line change
1
+ # This file has some scaffolding to make sure that names are unique and that
2
+ # a region and zone are selected when you try to create your Terraform resources.
3
+
4
+ locals {
5
+ name_suffix = " ${ random_pet . suffix . id } "
6
+ }
7
+
8
+ resource "random_pet" "suffix" {
9
+ length = 2
10
+ }
11
+
12
+ provider "google" {
13
+ region = " us-central1"
14
+ zone = " us-central1-c"
15
+ }
Original file line number Diff line number Diff line change
1
+ resource "google_compute_region_security_policy" "default" {
2
+ region = " us-west2"
3
+ name = " policywithdefaultrule-${ local . name_suffix } "
4
+ description = " basic region security policy"
5
+ type = " CLOUD_ARMOR"
6
+ }
7
+
8
+ resource "google_compute_region_security_policy_rule" "default_rule" {
9
+ region = " us-west2"
10
+ security_policy = google_compute_region_security_policy. default . name
11
+ description = " new rule"
12
+ action = " deny"
13
+ priority = " 2147483647"
14
+ match {
15
+ versioned_expr = " SRC_IPS_V1"
16
+ config {
17
+ src_ip_ranges = [" *" ]
18
+ }
19
+ }
20
+ }
21
+
22
+ resource "google_compute_region_security_policy_rule" "policy_rule" {
23
+ region = " us-west2"
24
+ security_policy = google_compute_region_security_policy. default . name
25
+ description = " new rule"
26
+ priority = 100
27
+ match {
28
+ versioned_expr = " SRC_IPS_V1"
29
+ config {
30
+ src_ip_ranges = [" 10.10.0.0/16" ]
31
+ }
32
+ }
33
+ action = " allow"
34
+ preview = true
35
+ }
Original file line number Diff line number Diff line change
1
+ ===
2
+
3
+ These examples use real resources that will be billed to the
4
+ Google Cloud Platform project you use - so make sure that you
5
+ run "terraform destroy" before quitting!
6
+
7
+ ===
Original file line number Diff line number Diff line change
1
+ # Region Security Policy Rule Default Rule - Terraform
2
+
3
+ ## Setup
4
+
5
+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" region_security_policy_rule_default_rule " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6
+
7
+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8
+
9
+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10
+
11
+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12
+
13
+ ## Terraforming!
14
+
15
+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16
+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17
+ the project name from the environment variable.
18
+
19
+ ``` bash
20
+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21
+ ```
22
+
23
+ After that, let's get Terraform started. Run the following to pull in the providers.
24
+
25
+ ``` bash
26
+ terraform init
27
+ ```
28
+
29
+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30
+
31
+ ``` bash
32
+ terraform apply
33
+ ```
34
+
35
+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36
+
37
+ ``` bash
38
+ yes
39
+ ```
40
+
41
+
42
+ ## Post-Apply
43
+
44
+ ### Editing your config
45
+
46
+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47
+
48
+ ``` bash
49
+ terraform plan
50
+ ```
51
+
52
+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53
+ run a 'plan' again.
54
+
55
+ ``` bash
56
+ terraform plan
57
+ ```
58
+
59
+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60
+ at the 'yes' prompt.
61
+
62
+ ``` bash
63
+ terraform apply
64
+ ```
65
+
66
+ ``` bash
67
+ yes
68
+ ```
69
+
70
+ ## Cleanup
71
+
72
+ Run the following to remove the resources Terraform provisioned:
73
+
74
+ ``` bash
75
+ terraform destroy
76
+ ```
77
+ ``` bash
78
+ yes
79
+ ```
Original file line number Diff line number Diff line change 1
1
resource "google_compute_region_security_policy" "default" {
2
- provider = google- beta
3
-
4
2
region = " us-west2"
5
3
name = " policywithmultiplerules-${ local . name_suffix } "
6
4
description = " basic region security policy"
7
5
type = " CLOUD_ARMOR"
8
6
}
9
7
10
8
resource "google_compute_region_security_policy_rule" "policy_rule_one" {
11
- provider = google- beta
12
-
13
9
region = " us-west2"
14
10
security_policy = google_compute_region_security_policy. default . name
15
11
description = " new rule one"
@@ -25,8 +21,6 @@ resource "google_compute_region_security_policy_rule" "policy_rule_one" {
25
21
}
26
22
27
23
resource "google_compute_region_security_policy_rule" "policy_rule_two" {
28
- provider = google- beta
29
-
30
24
region = " us-west2"
31
25
security_policy = google_compute_region_security_policy. default . name
32
26
description = " new rule two"
Original file line number Diff line number Diff line change
1
+ # This file has some scaffolding to make sure that names are unique and that
2
+ # a region and zone are selected when you try to create your Terraform resources.
3
+
4
+ locals {
5
+ name_suffix = " ${ random_pet . suffix . id } "
6
+ }
7
+
8
+ resource "random_pet" "suffix" {
9
+ length = 2
10
+ }
11
+
12
+ provider "google" {
13
+ region = " us-central1"
14
+ zone = " us-central1-c"
15
+ }
Original file line number Diff line number Diff line change
1
+ resource "google_compute_region_security_policy" "default" {
2
+ region = " asia-southeast1"
3
+ name = " policyruletest-${ local . name_suffix } "
4
+ description = " basic region security policy"
5
+ type = " CLOUD_ARMOR"
6
+ }
7
+
8
+ resource "google_compute_region_security_policy_rule" "policy_rule" {
9
+ region = " asia-southeast1"
10
+ security_policy = google_compute_region_security_policy. default . name
11
+ description = " new rule"
12
+ priority = 100
13
+ match {
14
+ versioned_expr = " SRC_IPS_V1"
15
+ config {
16
+ src_ip_ranges = [" 10.10.0.0/16" ]
17
+ }
18
+ }
19
+ preconfigured_waf_config {
20
+ exclusion {
21
+ request_uri {
22
+ operator = " STARTS_WITH"
23
+ value = " /admin"
24
+ }
25
+ target_rule_set = " rce-stable"
26
+ }
27
+ exclusion {
28
+ request_query_param {
29
+ operator = " CONTAINS"
30
+ value = " password"
31
+ }
32
+ request_query_param {
33
+ operator = " STARTS_WITH"
34
+ value = " freeform"
35
+ }
36
+ request_query_param {
37
+ operator = " EQUALS"
38
+ value = " description"
39
+ }
40
+ target_rule_set = " xss-stable"
41
+ target_rule_ids = [
42
+ " owasp-crs-v030001-id941330-xss" ,
43
+ " owasp-crs-v030001-id941340-xss" ,
44
+ ]
45
+ }
46
+ }
47
+ action = " allow"
48
+ preview = true
49
+ }
Original file line number Diff line number Diff line change
1
+ ===
2
+
3
+ These examples use real resources that will be billed to the
4
+ Google Cloud Platform project you use - so make sure that you
5
+ run "terraform destroy" before quitting!
6
+
7
+ ===
You can’t perform that action at this time.
0 commit comments