|
@@ -58,22 +58,6 @@ data "aws_security_group" "typical-host" {
|
|
|
vpc_id = var.vpc_id
|
|
|
}
|
|
|
|
|
|
-resource "aws_security_group" "portal_lambda_sg" {
|
|
|
- vpc_id = var.vpc_id
|
|
|
- name = "portal-data-sync-lambda-sg"
|
|
|
- description = "Allow Lambda access to Portal"
|
|
|
-}
|
|
|
-
|
|
|
-resource "aws_security_group_rule" "portal_lambda_https" {
|
|
|
- type = "egress"
|
|
|
- from_port = 443
|
|
|
- to_port = 443
|
|
|
- protocol = "tcp"
|
|
|
- cidr_blocks = ["0.0.0.0/0"]
|
|
|
- description = "Access to Portal"
|
|
|
- security_group_id = aws_security_group.portal_lambda_sg.id
|
|
|
-}
|
|
|
-
|
|
|
resource "aws_security_group" "portal_lambda_splunk_sg" {
|
|
|
vpc_id = var.vpc_id
|
|
|
name = "portal-data-sync-lambda-splunk-sg"
|
|
@@ -112,7 +96,7 @@ resource "aws_lambda_function" "portal_data_sync" {
|
|
|
timeout = "315"
|
|
|
vpc_config {
|
|
|
subnet_ids = var.subnets
|
|
|
- security_group_ids = [ aws_security_group.portal_lambda_sg.id, aws_security_group.portal_lambda_splunk_sg.id ]
|
|
|
+ security_group_ids = [ data.aws_security_group.typical-host.id, aws_security_group.portal_lambda_splunk_sg.id ]
|
|
|
}
|
|
|
environment {
|
|
|
variables = {
|
|
@@ -130,6 +114,7 @@ resource "aws_lambda_function" "portal_data_sync" {
|
|
|
"VAULT_PATH" = "portal/data/lambda_sync_env"
|
|
|
}
|
|
|
}
|
|
|
+ tags = merge(var.standard_tags, var.tags)
|
|
|
|
|
|
lifecycle {
|
|
|
# Ignoring changes to the code of the function so that we won't
|