github.com/candidpartners/terraform@v0.9.5-0.20171005231213-29f5f88820f6/examples/aws-elb/main.tf (about)

     1  # Specify the provider and access details
     2  provider "aws" {
     3    region = "${var.aws_region}"
     4  }
     5  
     6  resource "aws_vpc" "default" {
     7    cidr_block           = "10.0.0.0/16"
     8    enable_dns_hostnames = true
     9  
    10    tags {
    11      Name = "tf_test"
    12    }
    13  }
    14  
    15  resource "aws_subnet" "tf_test_subnet" {
    16    vpc_id                  = "${aws_vpc.default.id}"
    17    cidr_block              = "10.0.0.0/24"
    18    map_public_ip_on_launch = true
    19  
    20    tags {
    21      Name = "tf_test_subnet"
    22    }
    23  }
    24  
    25  resource "aws_internet_gateway" "gw" {
    26    vpc_id = "${aws_vpc.default.id}"
    27  
    28    tags {
    29      Name = "tf_test_ig"
    30    }
    31  }
    32  
    33  resource "aws_route_table" "r" {
    34    vpc_id = "${aws_vpc.default.id}"
    35  
    36    route {
    37      cidr_block = "0.0.0.0/0"
    38      gateway_id = "${aws_internet_gateway.gw.id}"
    39    }
    40  
    41    tags {
    42      Name = "aws_route_table"
    43    }
    44  }
    45  
    46  resource "aws_route_table_association" "a" {
    47    subnet_id      = "${aws_subnet.tf_test_subnet.id}"
    48    route_table_id = "${aws_route_table.r.id}"
    49  }
    50  
    51  # Our default security group to access
    52  # the instances over SSH and HTTP
    53  resource "aws_security_group" "default" {
    54    name        = "instance_sg"
    55    description = "Used in the terraform"
    56    vpc_id      = "${aws_vpc.default.id}"
    57  
    58    # SSH access from anywhere
    59    ingress {
    60      from_port   = 22
    61      to_port     = 22
    62      protocol    = "tcp"
    63      cidr_blocks = ["0.0.0.0/0"]
    64    }
    65  
    66    # HTTP access from anywhere
    67    ingress {
    68      from_port   = 80
    69      to_port     = 80
    70      protocol    = "tcp"
    71      cidr_blocks = ["0.0.0.0/0"]
    72    }
    73  
    74    # outbound internet access
    75    egress {
    76      from_port   = 0
    77      to_port     = 0
    78      protocol    = "-1"
    79      cidr_blocks = ["0.0.0.0/0"]
    80    }
    81  }
    82  
    83  # Our elb security group to access
    84  # the ELB over HTTP
    85  resource "aws_security_group" "elb" {
    86    name        = "elb_sg"
    87    description = "Used in the terraform"
    88  
    89    vpc_id = "${aws_vpc.default.id}"
    90  
    91    # HTTP access from anywhere
    92    ingress {
    93      from_port   = 80
    94      to_port     = 80
    95      protocol    = "tcp"
    96      cidr_blocks = ["0.0.0.0/0"]
    97    }
    98  
    99    # outbound internet access
   100    egress {
   101      from_port   = 0
   102      to_port     = 0
   103      protocol    = "-1"
   104      cidr_blocks = ["0.0.0.0/0"]
   105    }
   106  
   107    # ensure the VPC has an Internet gateway or this step will fail
   108    depends_on = ["aws_internet_gateway.gw"]
   109  }
   110  
   111  resource "aws_elb" "web" {
   112    name = "example-elb"
   113  
   114    # The same availability zone as our instance
   115    subnets = ["${aws_subnet.tf_test_subnet.id}"]
   116  
   117    security_groups = ["${aws_security_group.elb.id}"]
   118  
   119    listener {
   120      instance_port     = 80
   121      instance_protocol = "http"
   122      lb_port           = 80
   123      lb_protocol       = "http"
   124    }
   125  
   126    health_check {
   127      healthy_threshold   = 2
   128      unhealthy_threshold = 2
   129      timeout             = 3
   130      target              = "HTTP:80/"
   131      interval            = 30
   132    }
   133  
   134    # The instance is registered automatically
   135  
   136    instances                   = ["${aws_instance.web.id}"]
   137    cross_zone_load_balancing   = true
   138    idle_timeout                = 400
   139    connection_draining         = true
   140    connection_draining_timeout = 400
   141  }
   142  
   143  resource "aws_lb_cookie_stickiness_policy" "default" {
   144    name                     = "lbpolicy"
   145    load_balancer            = "${aws_elb.web.id}"
   146    lb_port                  = 80
   147    cookie_expiration_period = 600
   148  }
   149  
   150  resource "aws_instance" "web" {
   151    instance_type = "t2.micro"
   152  
   153    # Lookup the correct AMI based on the region
   154    # we specified
   155    ami = "${lookup(var.aws_amis, var.aws_region)}"
   156  
   157    # The name of our SSH keypair you've created and downloaded
   158    # from the AWS console.
   159    #
   160    # https://console.aws.amazon.com/ec2/v2/home?region=us-west-2#KeyPairs:
   161    #
   162    key_name = "${var.key_name}"
   163  
   164    # Our Security group to allow HTTP and SSH access
   165    vpc_security_group_ids = ["${aws_security_group.default.id}"]
   166    subnet_id              = "${aws_subnet.tf_test_subnet.id}"
   167    user_data              = "${file("userdata.sh")}"
   168  
   169    #Instance tags
   170  
   171    tags {
   172      Name = "elb-example"
   173    }
   174  }