-
Notifications
You must be signed in to change notification settings - Fork 17
/
Copy pathvpc.tf
124 lines (108 loc) · 3.03 KB
/
vpc.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
#========================== TEST VPC =============================
# Declare the data source
data "aws_availability_zones" "available" {}
# Define a vpc
resource "aws_vpc" "film_ratings_vpc" {
cidr_block = "${var.film_ratings_network_cidr}"
tags = {
Name = "${var.film_ratings_vpc}"
}
enable_dns_support = "true"
enable_dns_hostnames = "true"
}
# Internet gateway for the public subnet
resource "aws_internet_gateway" "film_ratings_ig" {
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
tags = {
Name = "film_ratings_ig"
}
}
# Public subnet 1
resource "aws_subnet" "film_ratings_public_sn_01" {
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
cidr_block = "${var.film_ratings_public_01_cidr}"
availability_zone = "${data.aws_availability_zones.available.names[0]}"
tags = {
Name = "film_ratings_public_sn_01"
}
}
# Public subnet 2
resource "aws_subnet" "film_ratings_public_sn_02" {
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
cidr_block = "${var.film_ratings_public_02_cidr}"
availability_zone = "${data.aws_availability_zones.available.names[1]}"
tags = {
Name = "film_ratings_public_sn_02"
}
}
# Routing table for public subnet 1
resource "aws_route_table" "film_ratings_public_sn_rt_01" {
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
route {
cidr_block = "0.0.0.0/0"
gateway_id = "${aws_internet_gateway.film_ratings_ig.id}"
}
tags = {
Name = "film_ratings_public_sn_rt_01"
}
}
# Associate the routing table to public subnet 1
resource "aws_route_table_association" "film_ratings_public_sn_rt_01_assn" {
subnet_id = "${aws_subnet.film_ratings_public_sn_01.id}"
route_table_id = "${aws_route_table.film_ratings_public_sn_rt_01.id}"
}
# Routing table for public subnet 2
resource "aws_route_table" "film_ratings_public_sn_rt_02" {
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
route {
cidr_block = "0.0.0.0/0"
gateway_id = "${aws_internet_gateway.film_ratings_ig.id}"
}
tags = {
Name = "film_ratings_public_sn_rt_02"
}
}
# Associate the routing table to public subnet 2
resource "aws_route_table_association" "film_ratings_public_sn_rt_assn_02" {
subnet_id = "${aws_subnet.film_ratings_public_sn_02.id}"
route_table_id = "${aws_route_table.film_ratings_public_sn_rt_02.id}"
}
# ECS Instance Security group
resource "aws_security_group" "film_ratings_public_sg" {
name = "film_ratings_public_sg"
description = "Test public access security group"
vpc_id = "${aws_vpc.film_ratings_vpc.id}"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = [
"0.0.0.0/0"]
}
ingress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = [
"${var.film_ratings_public_01_cidr}",
"${var.film_ratings_public_02_cidr}"]
}
egress {
# allow all traffic to private SN
from_port = "0"
to_port = "0"
protocol = "-1"
cidr_blocks = [
"0.0.0.0/0"]
}
tags = {
Name = "film_ratings_public_sg"
}
}