aws network firewall workflow for testing
This sets up a playground for working with aws-network-firewall for trying out various rules and configuration as it takes a solid good amoung of time to create firewall.
- Code creates a firewall and adds four stateful and one stateless rule with a firewall policy for starters and configures the logging.
- Creates an instance with a public IP in a application subnet with a basic lamp setup installed via
userdata. Instance has a securtit group attached withsshandhttpport open to0.0.0.0/0. - I hooked(code not added for this) the
CloudWatchLog group with a lambda for generating various alerts or and processing them offline for some internal purpose.
- Creates an instance with a public IP in a application subnet with a basic lamp setup installed via
-
There is a bug in terraform aws provider[1] where certain params for
aws_networkfirewall_rule_groupare not configurable properly. That's why in theaws_networkfirewall_rule_groupI created in the example here , has provided all the options , instead of providingANYwhich are supported actually[2] -
AWS Network Firewall is available in US East (N. Virginia), US West (Oregon), and Europe (Ireland) Regions.
[1]. hashicorp/terraform-provider-aws#16470
[3]. https://aws.amazon.com/de/blogs/aws/aws-network-firewall-new-managed-firewall-service-in-vpc/