Skip to content

Instantly share code, notes, and snippets.

@aletson
Created September 5, 2019 19:12
Show Gist options
  • Save aletson/960c00990df05c1a40328e4ab8844ebf to your computer and use it in GitHub Desktop.
Save aletson/960c00990df05c1a40328e4ab8844ebf to your computer and use it in GitHub Desktop.
terraform-sample.tf
provider "aws" {
access_key = var.aws_access_key
secret_key = var.aws_secret_key
region = var.primaryregion
version = "~> 2.16.0"
}
resource "aws_key_pair" "keypair" {
key_name = "ssh-keypair"
public_key = var.ssh_public_key
}
# Resources for Terraform to build out
resource "aws_acm_certificate" "cert" {
domain_name = var.domain
validation_method = "DNS"
subject_alternative_names = ["www.${var.domain}"]
lifecycle {
create_before_destroy = true
}
}
resource "aws_vpc" "vpc" {
cidr_block = "10.0.0.0/16"
enable_dns_hostnames = true
enable_dns_support = true
tags = {
Name = "${var.domain}-vpc"
}
}
resource "aws_internet_gateway" "gw" {
vpc_id = aws_vpc.vpc.id
}
resource "aws_default_route_table" "r" {
default_route_table_id = aws_vpc.vpc.default_route_table_id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.gw.id
}
}
resource "aws_subnet" "efs_subnet_a" {
cidr_block = cidrsubnet(aws_vpc.vpc.cidr_block, 8, 1) # 10.0.1.0/24
vpc_id = aws_vpc.vpc.id
availability_zone = "${var.primaryregion}a"
}
resource "aws_security_group" "efs_security_group" {
name = "efs-sg"
vpc_id = aws_vpc.vpc.id
}
resource "aws_security_group_rule" "ingress_ec2_to_efs" {
type = "ingress"
from_port = 2049
to_port = 2049
protocol = "tcp"
security_group_id = aws_security_group.efs_security_group.id
source_security_group_id = aws_security_group.ec2_lb_group.id
}
resource "aws_security_group_rule" "egress_efs_to_ec2" {
type = "egress"
from_port = 0
to_port = 0
protocol = "-1"
security_group_id = aws_security_group.efs_security_group.id
source_security_group_id = aws_security_group.ec2_lb_group.id
}
resource "aws_security_group" "ec2_lb_group" {
name = "ec2-instance-sg"
vpc_id = aws_vpc.vpc.id
}
resource "aws_efs_file_system" "fs" {
tags = {
Name = "${var.domain}-efs"
}
}
resource "aws_efs_mount_target" "fs_mount_a" {
file_system_id = aws_efs_file_system.fs.id
subnet_id = aws_subnet.efs_subnet_a.id
security_groups = [aws_security_group.efs_security_group.id]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment