File tree Expand file tree Collapse file tree 17 files changed +414
-16
lines changed
region_security_policy_basic
region_security_policy_rule_basic
region_security_policy_rule_default_rule
region_security_policy_rule_multiple_rules
region_security_policy_rule_with_preconfigured_waf_config
region_security_policy_with_ddos_protection_config
region_security_policy_with_rules
region_security_policy_with_user_defined_fields Expand file tree Collapse file tree 17 files changed +414
-16
lines changed Original file line number Diff line number Diff line change 11resource "google_compute_region_security_policy" "region-sec-policy-basic" {
2- provider = google- beta
3-
42 name = " my-sec-policy-basic-${ local . name_suffix } "
53 description = " basic region security policy"
64 type = " CLOUD_ARMOR"
Original file line number Diff line number Diff line change 11resource "google_compute_region_security_policy" "default" {
2- provider = google- beta
3-
42 region = " us-west2"
53 name = " policyruletest-${ local . name_suffix } "
64 description = " basic region security policy"
75 type = " CLOUD_ARMOR"
86}
97
108resource "google_compute_region_security_policy_rule" "policy_rule" {
11- provider = google- beta
12-
139 region = " us-west2"
1410 security_policy = google_compute_region_security_policy. default . name
1511 description = " new rule"
Original file line number Diff line number Diff line change 1+ # This file has some scaffolding to make sure that names are unique and that
2+ # a region and zone are selected when you try to create your Terraform resources.
3+
4+ locals {
5+ name_suffix = " ${ random_pet . suffix . id } "
6+ }
7+
8+ resource "random_pet" "suffix" {
9+ length = 2
10+ }
11+
12+ provider "google" {
13+ region = " us-central1"
14+ zone = " us-central1-c"
15+ }
Original file line number Diff line number Diff line change 1+ resource "google_compute_region_security_policy" "default" {
2+ region = " us-west2"
3+ name = " policywithdefaultrule-${ local . name_suffix } "
4+ description = " basic region security policy"
5+ type = " CLOUD_ARMOR"
6+ }
7+
8+ resource "google_compute_region_security_policy_rule" "default_rule" {
9+ region = " us-west2"
10+ security_policy = google_compute_region_security_policy. default . name
11+ description = " new rule"
12+ action = " deny"
13+ priority = " 2147483647"
14+ match {
15+ versioned_expr = " SRC_IPS_V1"
16+ config {
17+ src_ip_ranges = [" *" ]
18+ }
19+ }
20+ }
21+
22+ resource "google_compute_region_security_policy_rule" "policy_rule" {
23+ region = " us-west2"
24+ security_policy = google_compute_region_security_policy. default . name
25+ description = " new rule"
26+ priority = 100
27+ match {
28+ versioned_expr = " SRC_IPS_V1"
29+ config {
30+ src_ip_ranges = [" 10.10.0.0/16" ]
31+ }
32+ }
33+ action = " allow"
34+ preview = true
35+ }
Original file line number Diff line number Diff line change 1+ ===
2+
3+ These examples use real resources that will be billed to the
4+ Google Cloud Platform project you use - so make sure that you
5+ run "terraform destroy" before quitting!
6+
7+ ===
Original file line number Diff line number Diff line change 1+ # Region Security Policy Rule Default Rule - Terraform
2+
3+ ## Setup
4+
5+ <
walkthrough-author name =
" [email protected] " analyticsId =
" UA-125550242-1 " tutorialName =
" region_security_policy_rule_default_rule " repositoryUrl =
" https://github.com/terraform-google-modules/docs-examples " ></
walkthrough-author >
6+
7+ Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform.
8+
9+ <walkthrough-project-billing-setup ></walkthrough-project-billing-setup >
10+
11+ Terraform provisions real GCP resources, so anything you create in this session will be billed against this project.
12+
13+ ## Terraforming!
14+
15+ Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command
16+ to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up
17+ the project name from the environment variable.
18+
19+ ``` bash
20+ export GOOGLE_CLOUD_PROJECT={{project-id}}
21+ ```
22+
23+ After that, let's get Terraform started. Run the following to pull in the providers.
24+
25+ ``` bash
26+ terraform init
27+ ```
28+
29+ With the providers downloaded and a project set, you're ready to use Terraform. Go ahead!
30+
31+ ``` bash
32+ terraform apply
33+ ```
34+
35+ Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan.
36+
37+ ``` bash
38+ yes
39+ ```
40+
41+
42+ ## Post-Apply
43+
44+ ### Editing your config
45+
46+ Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed.
47+
48+ ``` bash
49+ terraform plan
50+ ```
51+
52+ So let's make a change! Try editing a number, or appending a value to the name in the editor. Then,
53+ run a 'plan' again.
54+
55+ ``` bash
56+ terraform plan
57+ ```
58+
59+ Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes
60+ at the 'yes' prompt.
61+
62+ ``` bash
63+ terraform apply
64+ ```
65+
66+ ``` bash
67+ yes
68+ ```
69+
70+ ## Cleanup
71+
72+ Run the following to remove the resources Terraform provisioned:
73+
74+ ``` bash
75+ terraform destroy
76+ ```
77+ ``` bash
78+ yes
79+ ```
Original file line number Diff line number Diff line change 11resource "google_compute_region_security_policy" "default" {
2- provider = google- beta
3-
42 region = " us-west2"
53 name = " policywithmultiplerules-${ local . name_suffix } "
64 description = " basic region security policy"
75 type = " CLOUD_ARMOR"
86}
97
108resource "google_compute_region_security_policy_rule" "policy_rule_one" {
11- provider = google- beta
12-
139 region = " us-west2"
1410 security_policy = google_compute_region_security_policy. default . name
1511 description = " new rule one"
@@ -25,8 +21,6 @@ resource "google_compute_region_security_policy_rule" "policy_rule_one" {
2521}
2622
2723resource "google_compute_region_security_policy_rule" "policy_rule_two" {
28- provider = google- beta
29-
3024 region = " us-west2"
3125 security_policy = google_compute_region_security_policy. default . name
3226 description = " new rule two"
Original file line number Diff line number Diff line change 1+ # This file has some scaffolding to make sure that names are unique and that
2+ # a region and zone are selected when you try to create your Terraform resources.
3+
4+ locals {
5+ name_suffix = " ${ random_pet . suffix . id } "
6+ }
7+
8+ resource "random_pet" "suffix" {
9+ length = 2
10+ }
11+
12+ provider "google" {
13+ region = " us-central1"
14+ zone = " us-central1-c"
15+ }
Original file line number Diff line number Diff line change 1+ resource "google_compute_region_security_policy" "default" {
2+ region = " asia-southeast1"
3+ name = " policyruletest-${ local . name_suffix } "
4+ description = " basic region security policy"
5+ type = " CLOUD_ARMOR"
6+ }
7+
8+ resource "google_compute_region_security_policy_rule" "policy_rule" {
9+ region = " asia-southeast1"
10+ security_policy = google_compute_region_security_policy. default . name
11+ description = " new rule"
12+ priority = 100
13+ match {
14+ versioned_expr = " SRC_IPS_V1"
15+ config {
16+ src_ip_ranges = [" 10.10.0.0/16" ]
17+ }
18+ }
19+ preconfigured_waf_config {
20+ exclusion {
21+ request_uri {
22+ operator = " STARTS_WITH"
23+ value = " /admin"
24+ }
25+ target_rule_set = " rce-stable"
26+ }
27+ exclusion {
28+ request_query_param {
29+ operator = " CONTAINS"
30+ value = " password"
31+ }
32+ request_query_param {
33+ operator = " STARTS_WITH"
34+ value = " freeform"
35+ }
36+ request_query_param {
37+ operator = " EQUALS"
38+ value = " description"
39+ }
40+ target_rule_set = " xss-stable"
41+ target_rule_ids = [
42+ " owasp-crs-v030001-id941330-xss" ,
43+ " owasp-crs-v030001-id941340-xss" ,
44+ ]
45+ }
46+ }
47+ action = " allow"
48+ preview = true
49+ }
Original file line number Diff line number Diff line change 1+ ===
2+
3+ These examples use real resources that will be billed to the
4+ Google Cloud Platform project you use - so make sure that you
5+ run "terraform destroy" before quitting!
6+
7+ ===
You can’t perform that action at this time.
0 commit comments