Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save rqbanerjee/64baf8aa7e4076036accb6b23c4ef722 to your computer and use it in GitHub Desktop.
Save rqbanerjee/64baf8aa7e4076036accb6b23c4ef722 to your computer and use it in GitHub Desktop.
PiaSoft Flow Logs Viewer v1.11 Beta for SSO
{
"AWSTemplateFormatVersion": "2010-09-09",
"Description": "PiaSoft Flow Logs Viewer v1.11 SSO Beta Setup Template",
"Mappings": {
"RegionMap": {
"us-east-1": {
"AMI": "ami-0a5d147fcb0c91f2c"
},
"us-east-2": {
"AMI": ""
},
"us-west-1": {
"AMI": ""
},
"us-west-2": {
"AMI": ""
},
"ca-central-1": {
"AMI": ""
},
"eu-central-1": {
"AMI": ""
},
"eu-west-1": {
"AMI": ""
},
"eu-west-2": {
"AMI": ""
},
"eu-west-3": {
"AMI": ""
},
"ap-southeast-1": {
"AMI": ""
},
"ap-southeast-2": {
"AMI": ""
},
"ap-south-1": {
"AMI": ""
},
"ap-northeast-1": {
"AMI": ""
},
"ap-northeast-2": {
"AMI": ""
},
"sa-east-1": {
"AMI": ""
}
}
},
"Parameters": {
"inboundSGCIDR": {
"Description": "CIDR block for inbound security group ALLOW access to viewer. ex 192.168.1.1/32",
"Type": "String",
"AllowedPattern": "[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}/[0-9]{1,2}",
"ConstraintDescription": "Please specify a valid source IP range. Eg: 192.168.1.1/32"
},
"InstanceType": {
"Description": "EC2 Instance type",
"Type": "String",
"Default": "t2.micro",
"AllowedValues": [
"t2.nano",
"t2.micro",
"t2.small",
"t2.medium",
"t2.large",
"m3.medium",
"m3.large",
"m4.large",
"m5.large",
"c3.large",
"c4.large",
"c5.large",
"r3.large",
"r4.large"
],
"ConstraintDescription": "Must be a valid EC2 instance type."
},
"SSHKey": {
"Description": "SSH Key pair to be installed on instance",
"Type": "AWS::EC2::KeyPair::KeyName"
},
"VPCId": {
"Description": "VPC Id where Instance should be installed",
"Type": "AWS::EC2::VPC::Id"
},
"SubnetId": {
"Description": "VPC Subnet used for instance",
"Type": "AWS::EC2::Subnet::Id"
}
},
"Resources": {
"PiaSoftFlowLogs": {
"Type": "AWS::EC2::Instance",
"Properties": {
"InstanceInitiatedShutdownBehavior": "stop",
"ImageId": {
"Fn::FindInMap": [
"RegionMap",
{
"Ref": "AWS::Region"
},
"AMI"
]
},
"SubnetId": {
"Ref": "SubnetId"
},
"InstanceType": {
"Ref": "InstanceType"
},
"KeyName": {
"Ref": "SSHKey"
},
"Monitoring": "False",
"Tags": [{
"Key": "Name",
"Value": "PiaSoft Flow Logs Viewer"
}],
"SecurityGroupIds": [{
"Ref": "PiaSoftSecurityGroup"
}],
"IamInstanceProfile": {
"Ref": "PiaSoftInstanceProfile"
}
},
"DependsOn": [
"PiaSoftFlowLogsIAMRole"
]
},
"PiaSoftSecurityGroup": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"GroupDescription": "PiaSoft Flow Logs Viewer security group",
"VpcId": {
"Ref": "VPCId"
},
"SecurityGroupIngress": [{
"IpProtocol": "tcp",
"FromPort": "80",
"ToPort": "80",
"CidrIp": {
"Ref" : "inboundSGCIDR"
}
},
{
"IpProtocol": "tcp",
"FromPort": "443",
"ToPort": "443",
"CidrIp": {
"Ref" : "inboundSGCIDR"
}
},
{
"IpProtocol": "tcp",
"FromPort": "22",
"ToPort": "22",
"CidrIp": {
"Ref" : "inboundSGCIDR"
}
}
]
}
},
"PiaSoftFlowLogsIAMRole": {
"Type": "AWS::IAM::Role",
"Properties": {
"AssumeRolePolicyDocument": {
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Principal": {
"Service": [
"ec2.amazonaws.com"
]
},
"Action": [
"sts:AssumeRole"
]
}]
},
"Path": "/"
}
},
"PiaSoftFlowLogsPolicy": {
"Type": "AWS::IAM::Policy",
"Properties": {
"PolicyName": "PiaSoftFlowLogsPolicy",
"PolicyDocument": {
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"ec2:DescribeFlowLogs",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeRegions",
"ec2:DescribeSecurityGroups",
"ec2:DescribeInstances",
"ec2:DescribeVpcs",
"logs:DescribeLogGroups",
"logs:DescribeLogStreams",
"logs:GetLogEvents"
],
"Resource": "*"
}]
},
"Roles": [{
"Ref": "PiaSoftFlowLogsIAMRole"
}]
}
},
"PiaSoftInstanceProfile": {
"Type": "AWS::IAM::InstanceProfile",
"Properties": {
"Path": "/",
"Roles": [{
"Ref": "PiaSoftFlowLogsIAMRole"
}]
}
}
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment