Skip to content

Latest commit

 

History

History

hub-spoke-with-hub-vcn-bastion-jump-host

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Core Landing Zone with Hub & Spoke Topology, Including Jump Host with Bastion Service Template

This template shows how to deploy a CIS compliant landing zone using OCI Core Landing Zone configured with a Hub & Spoke networking topology including a Jump Host with Bastion service enabled. It deploys a Jump Host with Oracle Linux 8 in the Jump Host subnet of the Hub VCN, a Bastion service in the Jump Host, a Three Tier VCN, and an Exadata VCN which are peered through the DRG. The DRG is configured to route traffic across all VCNs.

Please see other templates available for CIS compliant landing zones with custom configurations.

Default Values

This template has the following parameters set:

Variable Name Description Value
service_label A unique identifier to prefix the resources ocibastion
define_net Check to define networking resources. By default, the Landing Zone does NOT deploy any networks. true
hub_deployment_option The hub deployment option. In this case, a DRG is deployed to act as the hub in the Hub/Spoke topology. "VCN or on-premises connectivity routing through DMZ VCN with Network Virtual Appliance (DRG and DMZ VCN will be created)"
hub_vcn_cidrs Hub VCN list of CIDR Blocks ["192.168.0.0/24"]
deploy_bastion_jump_host The option to deploy the bastion jump host. true
deploy_bastion_service The option to deploy the bastion service. true
bastion_service_allowed_cidrs List of the bastion service allowed cidrs. ["x.x.x.x"]
add_tt_vcn1 When true, deploys three-tier VCN 1, with three subnets: web (public by default), application (private) and database (private). An optional subnet (private by default) for bastion deployment is also available true
tt_vcn1_cidrs Three-tier VCN 1 CIDR blocks. ["10.0.0.0/20"]
tt_vcn1_attach_to_drg When true, attaches three-tier VCN 1 to the DRG true
add_exa_vcn1 VCN configured for Exadata Cloud Service deployment. true
exa_vcn1_cidrs Exa VCN 1 CIDR blocks. ["172.16.0.0/20"]
exa_vcn1_attach_to_drg When true, the VCN is attached to a DRG, enabling cross-vcn traffic routing true
network_admin_email_endpoints List of email addresses that receive notifications for networking related events. ["[email protected]"]
security_admin_email_endpoints List of email addresses that receive notifications for security related events. ["[email protected]"]
enable_cloud_guard When true, OCI Cloud Guard Service is enabled. Set to false if it's been already enabled through other means. false

For a detailed description of all variables that can be used, see the Variables documentation.

This template can be deployed using OCI Resource Manager Service (RMS) or Terraform CLI:

OCI RMS Deployment

By clicking the button below, you are redirected to an OCI RMS Stack with variables pre-assigned for deployment.

Deploy_To_OCI

You are required to review/adjust the following variable settings:

  • Make sure to pick an OCI region for deployment.
  • Provide real email addresses for Network Admin Email Endpoints and Security Admin Email Endpoints fields.
  • Provide real CIDR block(s) used to access the Bastion service for bastion_service_allowed_cidrs field.
  • Uncheck Enable Cloud Guard Service option in case it is already enabled in your tenancy.

With the stack created, perform a Plan, followed by an Apply using RMS UI.

Terraform CLI Deployment

  1. Rename file main.tf.template to main.tf.
  2. Provide/review the variable assignments in main.tf.
  3. In this folder, execute the typical Terraform workflow:
    • $ terraform init
    • $ terraform plan
    • $ terraform apply