security-groups.tf 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. # Rather than pass in the aws security group, we just look it up. This will
  2. # probably be useful other places, as well.
  3. data "aws_security_group" "typical-host" {
  4. name = "typical-host"
  5. vpc_id = var.vpc_id
  6. }
  7. data "aws_security_group" "aws_endpoints" {
  8. name = "aws_endpoints"
  9. vpc_id = var.vpc_id
  10. }
  11. # ajp port: 8009
  12. # http: 8080
  13. # https: 8443
  14. # mgmt-http: 9990
  15. # mgmt-https: 9993
  16. # txn-recovery-environment: 4712
  17. # txn-status-manager: 4713
  18. resource "aws_security_group" "instance" {
  19. name = "Keycloak"
  20. description = "Keycloak Instances"
  21. vpc_id = var.vpc_id
  22. tags = merge(var.standard_tags, var.tags)
  23. }
  24. resource "aws_security_group_rule" "cluster-connectivity-ingress" {
  25. description = "Receive any from other cluster members"
  26. type = "ingress"
  27. from_port = -1
  28. to_port = -1
  29. protocol = -1
  30. security_group_id = aws_security_group.instance.id
  31. source_security_group_id = aws_security_group.instance.id
  32. }
  33. resource "aws_security_group_rule" "cluster-connectivity-egress" {
  34. description = "send any to other cluster members"
  35. type = "egress"
  36. from_port = -1
  37. to_port = -1
  38. protocol = -1
  39. security_group_id = aws_security_group.instance.id
  40. source_security_group_id = aws_security_group.instance.id
  41. }
  42. #resource "aws_security_group_rule" "instance-http-in" {
  43. # description = ""
  44. # type = "ingress"
  45. # from_port = "80"
  46. # to_port = "80"
  47. # protocol = "tcp"
  48. # cidr_blocks = [ "0.0.0.0/0" ]
  49. # security_group_id = aws_security_group.instance.id
  50. #}
  51. #
  52. #resource "aws_security_group_rule" "instance-https-in" {
  53. # description = ""
  54. # type = "ingress"
  55. # from_port = "443"
  56. # to_port = "443"
  57. # protocol = "tcp"
  58. # cidr_blocks = [ "0.0.0.0/0" ]
  59. # security_group_id = aws_security_group.instance.id
  60. #}
  61. #
  62. #resource "aws_security_group_rule" "instance-ajp-in" {
  63. # description = ""
  64. # type = "ingress"
  65. # from_port = "8009"
  66. # to_port = "8009"
  67. # protocol = "tcp"
  68. # cidr_blocks = [ "0.0.0.0/0" ]
  69. # security_group_id = aws_security_group.instance.id
  70. #}
  71. resource "aws_security_group_rule" "instance-alt-http-in-from-access" {
  72. description = "Alt HTTP from access"
  73. type = "ingress"
  74. from_port = "8080"
  75. to_port = "8080"
  76. protocol = "tcp"
  77. cidr_blocks = var.cidr_map["vpc-access"]
  78. security_group_id = aws_security_group.instance.id
  79. }
  80. #resource "aws_security_group_rule" "instance-alt-http-in-from-elb" {
  81. # description = "Alt HTTP from ELB"
  82. # type = "ingress"
  83. # from_port = "8080"
  84. # to_port = "8080"
  85. # protocol = "tcp"
  86. # security_group_id = aws_security_group.instance.id
  87. # source_security_group_id = aws_security_group.elb_external.id
  88. #}
  89. resource "aws_security_group_rule" "instance-alt-https-in-from-access" {
  90. description = "Alt HTTPS from Access"
  91. type = "ingress"
  92. from_port = "8443"
  93. to_port = "8443"
  94. protocol = "tcp"
  95. cidr_blocks = var.cidr_map["vpc-access"]
  96. security_group_id = aws_security_group.instance.id
  97. }
  98. resource "aws_security_group_rule" "instance-alt-https-in-from-nlb" {
  99. description = "Alt HTTPS from Internet"
  100. type = "ingress"
  101. from_port = "8443"
  102. to_port = "8443"
  103. protocol = "tcp"
  104. cidr_blocks = [ "0.0.0.0/0" ]
  105. security_group_id = aws_security_group.instance.id
  106. }
  107. resource "aws_security_group_rule" "instance-mgmt-in-from-access" {
  108. description = "Management HTTPS from Access"
  109. type = "ingress"
  110. from_port = "9990"
  111. to_port = "9990"
  112. protocol = "tcp"
  113. cidr_blocks = var.cidr_map["vpc-access"]
  114. security_group_id = aws_security_group.instance.id
  115. }
  116. resource "aws_security_group_rule" "instance-db-outbound" {
  117. description = "Postgres Outbound"
  118. type = "egress"
  119. from_port = "5432"
  120. to_port = "5432"
  121. protocol = "tcp"
  122. security_group_id = aws_security_group.instance.id
  123. source_security_group_id = aws_security_group.keycloak_rds_sg.id
  124. }
  125. #resource "aws_security_group_rule" "instance-mgmt-http-in" {
  126. # description = ""
  127. # type = "ingress"
  128. # from_port = "9990"
  129. # to_port = "9990"
  130. # protocol = "tcp"
  131. # cidr_blocks = [ "0.0.0.0/0" ]
  132. # security_group_id = aws_security_group.instance.id
  133. #}
  134. #
  135. #resource "aws_security_group_rule" "instance-mgmt-https-in" {
  136. # description = ""
  137. # type = "ingress"
  138. # from_port = "9993"
  139. # to_port = "9993"
  140. # protocol = "tcp"
  141. # cidr_blocks = [ "0.0.0.0/0" ]
  142. # security_group_id = aws_security_group.instance.id
  143. #}
  144. #
  145. #resource "aws_security_group_rule" "instance-txn-in" {
  146. # description = ""
  147. # type = "ingress"
  148. # from_port = "4712"
  149. # to_port = "4713"
  150. # protocol = "tcp"
  151. # cidr_blocks = [ "0.0.0.0/0" ]
  152. # security_group_id = aws_security_group.instance.id
  153. #}
  154. #
  155. ## lock down before production, but I couldn't get letsencrypt to work with the proxy
  156. #resource "aws_security_group_rule" "instance-all-out" {
  157. # description = ""
  158. # type = "egress"
  159. # from_port = "-1"
  160. # to_port = "-1"
  161. # protocol = "-1"
  162. # cidr_blocks = [ "0.0.0.0/0" ]
  163. # security_group_id = aws_security_group.instance.id
  164. #}