|
@@ -5,6 +5,11 @@ data "aws_security_group" "typical-host" {
|
|
|
vpc_id = var.vpc_id
|
|
|
}
|
|
|
|
|
|
+data "aws_security_group" "aws_endpoints" {
|
|
|
+ name = "aws_endpoints"
|
|
|
+ vpc_id = var.vpc_id
|
|
|
+}
|
|
|
+
|
|
|
# For now, opening everything:
|
|
|
# ajp port: 8009
|
|
|
# http: 8080
|
|
@@ -23,6 +28,27 @@ resource "aws_security_group" "instance" {
|
|
|
tags = merge(var.standard_tags, var.tags)
|
|
|
}
|
|
|
|
|
|
+resource "aws_security_group_rule" "cluster-connectivity-ingress" {
|
|
|
+ description = "Receive any from other cluster members"
|
|
|
+ type = "ingress"
|
|
|
+ from_port = -1
|
|
|
+ to_port = -1
|
|
|
+ protocol = -1
|
|
|
+ security_group_id = aws_security_group.instance.id
|
|
|
+ source_security_group_id = aws_security_group.instance.id
|
|
|
+}
|
|
|
+
|
|
|
+resource "aws_security_group_rule" "cluster-connectivity-egress" {
|
|
|
+ description = "send any to other cluster members"
|
|
|
+ type = "egress"
|
|
|
+ from_port = -1
|
|
|
+ to_port = -1
|
|
|
+ protocol = -1
|
|
|
+ security_group_id = aws_security_group.instance.id
|
|
|
+ source_security_group_id = aws_security_group.instance.id
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
#resource "aws_security_group_rule" "instance-http-in" {
|
|
|
# description = ""
|
|
|
# type = "ingress"
|
|
@@ -93,6 +119,17 @@ resource "aws_security_group_rule" "instance-alt-https-in-from-elb" {
|
|
|
source_security_group_id = aws_security_group.elb_external.id
|
|
|
}
|
|
|
|
|
|
+resource "aws_security_group_rule" "instance-db-outbound" {
|
|
|
+ description = "Postgres Outbound"
|
|
|
+ type = "egress"
|
|
|
+ from_port = "5432"
|
|
|
+ to_port = "5432"
|
|
|
+ protocol = "tcp"
|
|
|
+ security_group_id = aws_security_group.instance.id
|
|
|
+ source_security_group_id = data.aws_security_group.aws_endpoints.id
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
#resource "aws_security_group_rule" "instance-mgmt-http-in" {
|
|
|
# description = ""
|
|
|
# type = "ingress"
|