consul/terraform/aws/consul.tf

75 lines
1.8 KiB
Terraform
Raw Normal View History

2014-10-12 00:09:51 +00:00
resource "aws_instance" "server" {
ami = "${lookup(var.ami, concat(var.region, "-", var.platform))}"
instance_type = "${var.instance_type}"
2014-10-12 00:09:51 +00:00
key_name = "${var.key_name}"
count = "${var.servers}"
security_groups = ["${aws_security_group.consul.name}"]
connection {
user = "${lookup(var.user, var.platform)}"
2014-10-12 00:09:51 +00:00
key_file = "${var.key_path}"
}
2015-05-21 00:38:42 +00:00
#Instance tags
tags {
Name = "${var.tagName}-${count.index}"
}
2014-10-12 00:09:51 +00:00
provisioner "file" {
source = "${path.module}/scripts/${lookup(var.service_conf, var.platform)}"
destination = "/tmp/${lookup(var.service_conf_dest, var.platform)}"
2014-10-12 00:09:51 +00:00
}
provisioner "remote-exec" {
inline = [
"echo ${var.servers} > /tmp/consul-server-count",
"echo ${aws_instance.server.0.private_dns} > /tmp/consul-server-addr",
]
}
provisioner "remote-exec" {
scripts = [
"${path.module}/scripts/install.sh",
"${path.module}/scripts/service.sh",
"${path.module}/scripts/ip_tables.sh",
2014-10-12 00:09:51 +00:00
]
}
}
resource "aws_security_group" "consul" {
name = "consul_${var.platform}"
2014-10-12 00:09:51 +00:00
description = "Consul internal traffic + maintenance."
// These are for internal traffic
ingress {
from_port = 0
to_port = 65535
protocol = "tcp"
self = true
}
ingress {
from_port = 0
to_port = 65535
protocol = "udp"
self = true
}
// These are for maintenance
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
2015-05-21 00:38:42 +00:00
// This is for outbound internet access
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
2014-10-12 00:09:51 +00:00
}