-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
refactor: add generic ec2 instance config
- Loading branch information
Showing
7 changed files
with
227 additions
and
67 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,111 @@ | ||
data "aws_ssm_parameter" "ubuntu_22_ami" { | ||
name = "/aws/service/canonical/ubuntu/server/22.04/stable/current/amd64/hvm/ebs-gp2/ami-id" | ||
} | ||
|
||
# Important note about security groups: | ||
# https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#recreating-a-security-group | ||
resource "aws_security_group" "ec2_sg" { | ||
description = "security group for ec2" | ||
name_prefix = var.sg_prefix | ||
|
||
vpc_id = var.vpc_id | ||
|
||
lifecycle { | ||
create_before_destroy = true | ||
} | ||
|
||
tags = var.tags | ||
} | ||
|
||
resource "aws_security_group_rule" "ec2_sg_ingress" { | ||
count = length(var.ingress_rules) | ||
|
||
type = "ingress" | ||
from_port = var.ingress_rules[count.index].from_port | ||
to_port = var.ingress_rules[count.index].to_port | ||
protocol = var.ingress_rules[count.index].protocol | ||
cidr_blocks = var.ingress_rules[count.index].cidr_blocks | ||
ipv6_cidr_blocks = var.ingress_rules[count.index].ipv6_cidr_blocks | ||
security_group_id = aws_security_group.ec2_sg.id | ||
} | ||
|
||
resource "aws_security_group_rule" "ec2_sg_egress" { | ||
count = length(var.egress_rules) | ||
|
||
type = "egress" | ||
from_port = var.egress_rules[count.index].from_port | ||
to_port = var.egress_rules[count.index].to_port | ||
protocol = var.egress_rules[count.index].protocol | ||
cidr_blocks = var.egress_rules[count.index].cidr_blocks | ||
ipv6_cidr_blocks = var.egress_rules[count.index].ipv6_cidr_blocks | ||
security_group_id = aws_security_group.ec2_sg.id | ||
} | ||
|
||
data "cloudinit_config" "ooni_ec2" { | ||
base64_encode = true | ||
|
||
part { | ||
filename = "init.cfg" | ||
content_type = "text/cloud-config" | ||
content = templatefile("${path.module}/templates/cloud-init.yml", {}) | ||
} | ||
|
||
} | ||
|
||
resource "aws_launch_template" "ooni_ec2" { | ||
name_prefix = "${var.name}-tmpl-" | ||
image_id = data.aws_ssm_parameter.ubuntu_22_ami.value | ||
instance_type = var.instance_type | ||
key_name = var.key_name | ||
|
||
user_data = data.cloudinit_config.ooni_ec2.rendered | ||
|
||
lifecycle { | ||
create_before_destroy = true | ||
} | ||
|
||
network_interfaces { | ||
delete_on_termination = true | ||
associate_public_ip_address = true | ||
subnet_id = var.subnet_id | ||
security_groups = [ | ||
aws_security_group.ec2_sg.id, | ||
] | ||
} | ||
|
||
tag_specifications { | ||
resource_type = "instance" | ||
tags = var.tags | ||
} | ||
} | ||
|
||
resource "aws_instance" "ooni_ec2" { | ||
launch_template { | ||
id = aws_launch_template.ooni_ec2.id | ||
version = "$Latest" | ||
} | ||
|
||
lifecycle { | ||
create_before_destroy = true | ||
} | ||
|
||
tags = var.tags | ||
} | ||
|
||
resource "aws_alb_target_group" "ooni_ec2" { | ||
name_prefix = "oo${var.tg_prefix}" | ||
port = 80 | ||
protocol = "HTTP" | ||
vpc_id = var.vpc_id | ||
|
||
lifecycle { | ||
create_before_destroy = true | ||
} | ||
|
||
tags = var.tags | ||
} | ||
|
||
resource "aws_lb_target_group_attachment" "oonibackend_proxy" { | ||
target_id = aws_instance.ooni_ec2.id | ||
target_group_arn = aws_alb_target_group.ooni_ec2.arn | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
output "aws_instance_id" { | ||
value = aws_instance.ooni_ec2.id | ||
} | ||
|
||
output "aws_instance_public_dns" { | ||
value = aws_instance.ooni_ec2.public_dns | ||
} |
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
variable "vpc_id" { | ||
description = "the id of the VPC to deploy the instance into" | ||
} | ||
|
||
variable "subnet_id" { | ||
description = "the ids of the subnet to deploy the instance into" | ||
} | ||
|
||
variable "private_subnet_cidr" { | ||
description = "the cidr block of the private subnet to allow traffic from for the clickhouse proxy" | ||
} | ||
|
||
variable "tags" { | ||
description = "tags to apply to the resources" | ||
default = {} | ||
type = map(string) | ||
} | ||
|
||
variable "key_name" { | ||
description = "Name of AWS key pair" | ||
} | ||
|
||
variable "name" { | ||
description = "Name of the resources" | ||
} | ||
|
||
variable "instance_type" { | ||
default = "t2.micro" | ||
} | ||
|
||
variable "stage" { | ||
default = "one of dev, stage, test, prod" | ||
} | ||
|
||
variable "dns_zone_ooni_io" { | ||
description = "id of the DNS zone for ooni_io" | ||
} | ||
|
||
variable "sg_prefix" { | ||
description = "security group prefix" | ||
} | ||
|
||
variable "ingress_rules" { | ||
type = list(object({ | ||
from_port = number | ||
to_port = number | ||
protocol = string | ||
cidr_blocks = list(string) | ||
ipv6_cidr_blocks = optional(list(string)) | ||
})) | ||
} | ||
|
||
variable "egress_rules" { | ||
type = list(object({ | ||
from_port = number | ||
to_port = number | ||
protocol = string | ||
cidr_blocks = optional(list(string)) | ||
ipv6_cidr_blocks = optional(list(string)) | ||
})) | ||
} | ||
|
||
variable "tg_prefix" { | ||
description = "target group prefix. Will be prefixed with `oo`, example: bkprx -> oobkprx" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,58 +0,0 @@ | ||
package_update: true | ||
|
||
packages: | ||
- nginx | ||
- libnginx-mod-stream | ||
|
||
write_files: | ||
- path: /etc/nginx/sites-available/default | ||
content: | | ||
server { | ||
listen 80; | ||
server_name _; | ||
location / { | ||
proxy_pass ${backend_url}; | ||
proxy_http_version 1.1; | ||
proxy_set_header Host \$host; | ||
} | ||
error_log /var/log/nginx/error.log; | ||
} | ||
%{ if length(wcth_addresses) > 0 } | ||
upstream wcths { | ||
%{ for address in wcth_addresses } | ||
server ${ address }; | ||
%{ endfor } | ||
} | ||
server { | ||
server_name *.${ wcth_domain_suffix }; | ||
listen 80; | ||
location / { | ||
proxy_pass http://wcths; | ||
proxy_http_version 1.1; | ||
proxy_set_header Host \$host; | ||
} | ||
} | ||
%{ endif } | ||
- path: /etc/nginx/modules-enabled/99-stream.conf | ||
content: | | ||
stream { | ||
upstream clickhouse_backend { | ||
server ${clickhouse_url}:${clickhouse_port}; | ||
} | ||
server { | ||
listen 9000; | ||
proxy_pass clickhouse_backend; | ||
} | ||
error_log /var/log/nginx/error.log; | ||
} | ||
runcmd: | ||
- service nginx restart | ||