This repository has been archived by the owner on Mar 9, 2022. It is now read-only.
forked from Quentin-M/etcd-cloud-operator
-
Notifications
You must be signed in to change notification settings - Fork 0
/
aws.tf
81 lines (69 loc) · 2.21 KB
/
aws.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
// Copyright 2017 Quentin Machu & eco authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
resource "aws_s3_bucket" "backups" {
bucket = "${var.name}"
acl = "private"
}
resource "aws_elb" "clients" {
name = "${replace(var.name, "/[^a-zA-Z0-9-]/", "-")}"
internal = "${var.load_balancer_internal}"
subnets = ["${var.subnets_ids}"]
security_groups = [
"${split(",", length(var.load_balancer_security_group_ids) > 0
? join(",", var.load_balancer_security_group_ids)
: aws_security_group.elb.id)}",
]
cross_zone_load_balancing = true
idle_timeout = 3600
listener {
instance_port = 2379
instance_protocol = "tcp"
lb_port = 2379
lb_protocol = "tcp"
}
health_check {
healthy_threshold = 6
unhealthy_threshold = 2
timeout = 3
target = "TCP:2379"
interval = 5
}
}
resource "aws_security_group" "elb" {
# ERR: aws_security_group.elb: value of 'count' cannot be computed
# REF: https://github.com/hashicorp/terraform/issues/4149
#
# count = "${length(var.load_balancer_security_group_ids) > 0 ? 0 : 1}"
name = "default.elb.${var.name}"
vpc_id = "${var.vpc_id}"
ingress {
from_port = 2379
to_port = 2379
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 2379
to_port = 2379
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
locals {
asg_provider = "aws"
snapshot_provider = "s3"
unhealthy_member_ttl = "3m"
snapshot_bucket = "${aws_s3_bucket.backups.bucket}"
advertise_address = "${var.route53_enabled == "true" ? join("", aws_route53_record.elb.*.name) : aws_elb.clients.dns_name}"
}