SSH Bastion Provisioning

Star 0
Version 1.1.0
SSH Bastion Provisioning
Maintainers
support[at]europeanweather.cloud
License
Support level
EWC
Category
Remote Access & Desktop Compute
Technology
Ansible Playbook Terraform Module

SSH Bastion Provisioning

The SSH proxy or bastion server is a barrier between your internal machines (without public or floating IPs) and the public internet. With the SSH proxy, you'll have an extra layer of security on top of your instances. It's equipped with Fail2ban, intrusion prevention software designed to prevent brute-force attacks.

This is a configuration template (i.e. an Ansible Playbook) to customize your environment in the European Weather Cloud (EWC).

The template is designed to:

  • Provision an instance via Terraform, with your specified Linux distribution and desired flavor (a.k.a VM plan):

    • If a terraform.tfstate state file is not found under the user-defined directory, attempts to create the instance from scratch

    OR

    • if terraform.tfstate file is found, leverages Terraform's out-of-the-box functionality to update the instance referenced on it
  • Configure the existing or newly provisioned RockyLinux virtual machines (with public IP address), as entrypoint for users who wish to reach private EWC networks from the public internet via SSH.

After successful provisioning, you can take advantage of Terraform built-in functionality to safely modify or delete the instance. You'll find the definition of your instance in main.tf, and its current state in terraform.tfstate, under the user-defined tf_project_path directory.

To learn the basics about managing infrastructure with Terraform, checkout the official documentation examples.

Prerequisites

💡 Versions listed correspond to minimal prerequisites.

To successfully run this playbook, the following packages should be available in your work environment:

Name Version License Home URL
git 2.0 GPLv2 https://git-scm.com/downloads
python 3.9 PSF https://www.python.org/downloads
ansible 2.15 GPLv3+ https://pypi.org/project/ansible
terraform 0.14 BSL https://developer.hashicorp.com/terraform/install

Usage

1. Download Ansible dependencies

💡 By default, Ansible Roles are installed under the ~/.ansible/roles directory within your working environment.

Download the correct version of the Ansible dependencies, if you haven't done so already:

ansible-galaxy role install -r requirements.yml

2. Configure and apply the template

2.1. Interactive Mode

By running the following command, you can trigger an interactive session that prompts you for the necessary user inputs, and then applies changes to your target EWC environment:

ansible-playbook ssh-bastion-provisioning.yml

2.2. Non-Interactive Mode

💡 To learn more about defining variables at runtime, checkout the official Ansible documentation.

You can also run in non-interactive mode by passing the --extra-vars or -e flag, followed by a map of key-value pairs; one for each and every available input (see inputs section below). For example:

ansible-playbook \
  -e '{
        "ewc_provider": "eumetsat",
        "tf_project_path": "~/iac/ssh-bastion-1",
        "app_name": "ssh",
        "instance_name":"bastion",
        "instance_index": 1,
        "flavor_name": "eo2.medium",
        "image_name": "Rocky-8.10-20250204105303",
        "public_keypair_name": "john-claudy-publickey",
        "private_keypair_path": "~/.ssh/id_rsa",
        "private_network_name": "private",
        "security_group_name": "ssh"
    }' \
  ssh-bastion-provisioning.yml

Inputs

Name Description Type Default Required
ewc_provider your target EWC provider. Must match that the provider of your OpenStack application credentials. Valid input values are ecmwf or eumetsat. string n/a yes
tf_project_path path to terraform working directory. Example: ~/iac/ssh-bastion-1 string n/a yes
app_name application name, used as prefix in the full instance name. Example: ssh-bastion string n/a yes
instance_name name of the instance, used in the full instance name. Example: server string n/a yes
instance_index index or identifier for the instance, used as suffix in the full instance name. Example: 1 number n/a yes
flavor_name name the flavor to use for the instance. To learn about available options, checkout the official EWC VM plans documentation. 💡 A VM plan with at least 4GB of RAM is recommended for successful setup and stable operation. string n/a yes
image_name name of the image to use for the instance. For complete information on available options, see the official EWC Images documentation. ⚠️ Only RockyLinux 9.5 and RockyLinux 8.10 instances are currently supported due to constrains imposed by the required ewc-ansible-role-ssh-bastion Ansible Role. Example: Rocky-9.5-20250204105310 string n/a yes
public_keypair_name name of public keypair (stored in OpenStack) to be copied into the instance for remote SSH access string n/a yes
private_keypair_name path to the local private keypair to use for SSH access to the instance. Example: ~/.ssh/id_rsa string n/a yes
private_network_name private network name to attach the instance to. Example: private string n/a yes
security_group_name security group name to apply to the instance. Example: ssh string n/a yes
whitelisted_ip_ranges IPv4 ranges (in CIDR format) to be whitelisted in Fail2ban configuration. Example: ['10.0.0.0/24','192.168.1.0/24'] list(string) n/a no

Dependencies

⚠️ Only RockyLinux 9.5 and RockyLinux 8.10 instances are currently supported due to constrains imposed by the required ewc-ansible-role-ssh-bastion Ansible Role.

💡 A VM plan with at least 4GB of RAM is recommended for successful setup and stable operation.

Name Version License Home URL
ewc-tf-module-openstack-compute 1.4 MIT https://github.com/ewcloud/ewc-tf-module-openstack-compute
ewc-ansible-role-ssh-bastion 1.3 MIT https://github.com/ewcloud/ewc-ansible-role-ssh-bastion
Other
Deployable