2014-10-12 00:09:51 +00:00
|
|
|
resource "aws_instance" "server" {
|
2016-08-04 13:12:56 +00:00
|
|
|
ami = "${lookup(var.ami, "${var.region}-${var.platform}")}"
|
2015-06-02 19:54:08 +00:00
|
|
|
instance_type = "${var.instance_type}"
|
2014-10-12 00:09:51 +00:00
|
|
|
key_name = "${var.key_name}"
|
|
|
|
count = "${var.servers}"
|
|
|
|
security_groups = ["${aws_security_group.consul.name}"]
|
|
|
|
|
|
|
|
connection {
|
2015-06-01 05:26:50 +00:00
|
|
|
user = "${lookup(var.user, var.platform)}"
|
2016-09-24 21:36:04 +00:00
|
|
|
private_key = "${file("${var.key_path}")}"
|
2014-10-12 00:09:51 +00:00
|
|
|
}
|
|
|
|
|
2015-05-21 00:38:42 +00:00
|
|
|
#Instance tags
|
|
|
|
tags {
|
|
|
|
Name = "${var.tagName}-${count.index}"
|
2016-11-01 18:45:42 +00:00
|
|
|
ConsulRole = "Server"
|
2015-05-21 00:38:42 +00:00
|
|
|
}
|
|
|
|
|
2014-10-12 00:09:51 +00:00
|
|
|
provisioner "file" {
|
2016-03-15 17:01:56 +00:00
|
|
|
source = "${path.module}/../shared/scripts/${lookup(var.service_conf, var.platform)}"
|
2016-01-19 01:12:48 +00:00
|
|
|
destination = "/tmp/${lookup(var.service_conf_dest, var.platform)}"
|
2014-10-12 00:09:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
provisioner "remote-exec" {
|
|
|
|
inline = [
|
|
|
|
"echo ${var.servers} > /tmp/consul-server-count",
|
|
|
|
"echo ${aws_instance.server.0.private_dns} > /tmp/consul-server-addr",
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
provisioner "remote-exec" {
|
|
|
|
scripts = [
|
2016-03-15 17:01:56 +00:00
|
|
|
"${path.module}/../shared/scripts/install.sh",
|
|
|
|
"${path.module}/../shared/scripts/service.sh",
|
|
|
|
"${path.module}/../shared/scripts/ip_tables.sh",
|
2014-10-12 00:09:51 +00:00
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_security_group" "consul" {
|
2016-01-19 01:12:48 +00:00
|
|
|
name = "consul_${var.platform}"
|
2014-10-12 00:09:51 +00:00
|
|
|
description = "Consul internal traffic + maintenance."
|
|
|
|
|
|
|
|
// These are for internal traffic
|
|
|
|
ingress {
|
|
|
|
from_port = 0
|
|
|
|
to_port = 65535
|
|
|
|
protocol = "tcp"
|
|
|
|
self = true
|
|
|
|
}
|
|
|
|
|
|
|
|
ingress {
|
|
|
|
from_port = 0
|
|
|
|
to_port = 65535
|
|
|
|
protocol = "udp"
|
|
|
|
self = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// These are for maintenance
|
|
|
|
ingress {
|
|
|
|
from_port = 22
|
|
|
|
to_port = 22
|
|
|
|
protocol = "tcp"
|
|
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
}
|
2015-05-21 00:38:42 +00:00
|
|
|
|
|
|
|
// This is for outbound internet access
|
|
|
|
egress {
|
|
|
|
from_port = 0
|
|
|
|
to_port = 0
|
|
|
|
protocol = "-1"
|
|
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
}
|
2014-10-12 00:09:51 +00:00
|
|
|
}
|