These Terraform modules manage an Amazon Web Services (AWS) or Google Cloud Platform (GCP) bastion and its Auto Scaling Group, Identity and Access Management (IAM) resources, remote logging, SSH users and firewall access. The Auto Scaling Group will recreate the bastion if there is an issue with the compute instance or the availability zone where it is running.
The configuration scripts assume the Ubuntu operating system, which is configured as follows:
- Packages are updated, and the bastion is rebooted if required.
- If SSH hostkeys are present in the configurable object-storage bucket and path, they are copied to the bastion to retain its previous SSH identity. If there are no host keys in the storage bucket, the current keys are copied there.
- A logging agent is installed and configured to ship logs from these files to cloud log storage:
/var/log/syslog
/var/log/auth.log
- A host record, named using the
bastion_name
module input, is added to a configurable Route53 or Google DNS zone for the current public IP address of the bastion. This happens via a script configured to run each time the bastion boots. - Automatic updates are configured, using a configurable time to reboot, and the email address to receive errors.
- By default sudo access is removed from the ubuntu user unless the
remove_root_access
input is set to "false." - An additional one-time script can be executed, for one-off configuration not included in this module.
- Additional SSH users can be created and populated with their own
authorized_keys
file.
Each module has individual development and releases. For additional detail, please see the ReadMe for each module:
We are happy to share this internal module with the community. We appreciate suggestions for improvement, and recommend starting by opening an issue. Please see contributing.md for details.
The goal of the Fairwinds Community is to exchange ideas, influence the open source roadmap, and network with fellow Kubernetes users. Chat with us on Slack join the user group to get involved!
Enjoying terraform-bastion? Check out some of our other projects:
- Polaris - Audit, enforce, and build policies for Kubernetes resources, including over 20 built-in checks for best practices
- Goldilocks - Right-size your Kubernetes Deployments by compare your memory and CPU settings against actual usage
- Pluto - Detect Kubernetes resources that have been deprecated or removed in future versions
- Nova - Check to see if any of your Helm charts have updates available
- rbac-manager - Simplify the management of RBAC in your Kubernetes clusters