mirror of
https://github.com/rocky-linux/infrastructure
synced 2024-11-24 22:21:26 +00:00
78 lines
3.0 KiB
HCL
78 lines
3.0 KiB
HCL
module "vpc" {
|
|
source = "terraform-aws-modules/vpc/aws"
|
|
version = "2.64.0"
|
|
|
|
# Fail safe for now, flip to true or delete the following line to deploy this configuration.
|
|
create_vpc = false
|
|
|
|
name = "rocky-dev-us-east-1"
|
|
cidr = "10.16.224.0/20"
|
|
|
|
# IPv6, set to true and Amazon will provision a /56 for this VPC
|
|
enable_ipv6 = false
|
|
|
|
azs = ["us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d"]
|
|
|
|
# Subnets
|
|
## A private subnet includes a route to get to the internet via a NAT Gateway, an intra subnet does not.
|
|
## More info: https://registry.terraform.io/modules/terraform-aws-modules/vpc/aws/latest#private-versus-intra-subnets
|
|
public_subnets = ["10.16.224.0/24", "10.16.225.0/24", "10.16.226.0/24", "10.16.227.0/24"]
|
|
private_subnets = ["10.16.228.0/24", "10.16.229.0/24", "10.16.230.0/24", "10.16.231.0/24"]
|
|
intra_subnets = ["10.16.232.0/24", "10.16.233.0/24", "10.16.234.0/24", "10.16.235.0/24"]
|
|
|
|
## We might want these, we might not. If not, I would make the private subnets /23s instead and fill the space that way.
|
|
database_subnets = ["10.16.236.0/26", "10.16.236.64/26", "10.16.236.128/26", "10.16.236.192/26"]
|
|
elasticache_subnets = ["10.16.237.0/26", "10.16.237.64/26", "10.16.237.128/26", "10.16.237.192/26"]
|
|
redshift_subnets = ["10.16.238.0/26", "10.16.238.64/26", "10.16.238.128/26", "10.16.238.192/26"]
|
|
|
|
## There is one /24 remaining at 10.16.239.0/24 for any other usage we might need.
|
|
|
|
# VPC Options
|
|
enable_dns_hostnames = true
|
|
enable_dns_support = true
|
|
|
|
# VPC Flow Logs (Cloudwatch log group and IAM role will be created)
|
|
enable_flow_log = true
|
|
create_flow_log_cloudwatch_log_group = true
|
|
create_flow_log_cloudwatch_iam_role = true
|
|
|
|
# NAT Gateway: 1 per AZ
|
|
enable_nat_gateway = true
|
|
single_nat_gateway = false
|
|
one_nat_gateway_per_az = true
|
|
|
|
# NAT Gateway: 1 per subnet
|
|
# enable_nat_gateway = true
|
|
# single_nat_gateway = false
|
|
# one_nat_gateway_per_az = false
|
|
|
|
# NAT Gateway: 1 per VPC
|
|
# enable_nat_gateway = true
|
|
# single_nat_gateway = true
|
|
# one_nat_gateway_per_az = false
|
|
|
|
# DHCP
|
|
enable_dhcp_options = true
|
|
dhcp_options_domain_name = "dev.us-east-1.aws.rockylinux.org"
|
|
dhcp_options_domain_name_servers = ["10.16.244.6", "10.16.245.6", "10.16.246.6", "10.16.247.6"]
|
|
|
|
# Default security group - ingress/egress rules cleared to deny all
|
|
manage_default_security_group = true
|
|
default_security_group_ingress = [{}]
|
|
default_security_group_egress = [{}]
|
|
|
|
# Product-specific configs:
|
|
## Database, flip these 3 vars to true to make RDS instances available publicly.
|
|
create_database_subnet_group = false
|
|
create_database_subnet_route_table = false
|
|
create_database_internet_gateway_route = false
|
|
|
|
## Elasticache, flip these to true to have AWS manage the subnet and routing for EC
|
|
create_elasticache_subnet_group = false
|
|
create_elasticache_subnet_route_table = false
|
|
|
|
## Redshift, flip these to true to have AWS manage the subnet and routing for Redshift
|
|
create_redshift_subnet_group = false
|
|
create_redshift_subnet_route_table = false
|
|
}
|