private_elb.tf 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127
  1. # lb ports
  2. locals {
  3. alb_listener_ports = {
  4. ui = "8000"
  5. api = "8080"
  6. agent = "8081"
  7. }
  8. }
  9. #----------------------------------------------------------------------------
  10. # INTERNAL LB
  11. #----------------------------------------------------------------------------
  12. resource "aws_alb" "sensu_internal" {
  13. name = "sensu-alb-internal-${var.environment}"
  14. security_groups = [aws_security_group.sensu_alb_server_internal.id]
  15. internal = true
  16. subnets = var.private_subnets
  17. load_balancer_type = "application"
  18. access_logs {
  19. bucket = "xdr-elb-${var.environment}"
  20. enabled = true
  21. }
  22. tags = merge(var.standard_tags, var.tags, { Name = "sensu-alb-internal-${var.environment}" })
  23. }
  24. resource "aws_alb_target_group" "sensu_internal" {
  25. for_each = local.alb_listener_ports
  26. name = "sensu-alb-targets-${each.key}"
  27. port = each.value
  28. protocol = "HTTPS"
  29. #deregistration_delay = "${local.lb_deregistration_delay}"
  30. vpc_id = var.vpc_id
  31. health_check {
  32. protocol = "HTTPS"
  33. port = "8080"
  34. path = "/health"
  35. matcher = "200"
  36. timeout = "4"
  37. interval = "5"
  38. }
  39. stickiness {
  40. type = "lb_cookie"
  41. enabled = false
  42. }
  43. tags = merge(var.standard_tags, var.tags)
  44. }
  45. resource "aws_lb_target_group_attachment" "sensu_internal" {
  46. for_each = local.alb_listener_ports
  47. target_group_arn = aws_alb_target_group.sensu_internal[each.key].arn
  48. target_id = aws_instance.instance.id
  49. port = each.value
  50. }
  51. # Create a new alb listener
  52. resource "aws_alb_listener" "sensu_internal" {
  53. for_each = local.alb_listener_ports
  54. load_balancer_arn = aws_alb.sensu_internal.arn
  55. port = each.value
  56. protocol = "HTTPS"
  57. ssl_policy = "ELBSecurityPolicy-FS-1-2-Res-2019-08" # PFS, TLS1.2, most "restrictive" policy (took awhile to find that)
  58. certificate_arn = aws_acm_certificate.cert.arn
  59. default_action {
  60. target_group_arn = aws_alb_target_group.sensu_internal[each.key].arn
  61. type = "forward"
  62. }
  63. }
  64. #DNS Alias for the LB ( the CNAME was required. an Alias did NOT work due to aws/bug. )
  65. resource "aws_route53_record" "sensu_internal" {
  66. zone_id = var.dns_info["private"]["zone_id"]
  67. name = var.instance_name
  68. type = "CNAME"
  69. records = [aws_alb.sensu_internal.dns_name]
  70. ttl = "60"
  71. provider = aws.c2
  72. }
  73. #----------------------------------------------------------------------------
  74. # ALB Security Group
  75. #----------------------------------------------------------------------------
  76. resource "aws_security_group" "sensu_alb_server_internal" {
  77. vpc_id = var.vpc_id
  78. name = "sensu-alb-sg-internal"
  79. description = "Sensu Internal LB SG"
  80. tags = merge(var.standard_tags, var.tags)
  81. }
  82. #----------------------------------------------------------------------------
  83. # INGRESS
  84. #----------------------------------------------------------------------------
  85. resource "aws_security_group_rule" "sensu_from_vpc" {
  86. for_each = local.alb_listener_ports
  87. type = "ingress"
  88. from_port = each.value
  89. to_port = each.value
  90. protocol = "tcp"
  91. cidr_blocks = ["10.0.0.0/8"]
  92. description = "Sensu ${each.key}"
  93. security_group_id = aws_security_group.sensu_alb_server_internal.id
  94. }
  95. #----------------------------------------------------------------------------
  96. # EGRESS
  97. #----------------------------------------------------------------------------
  98. resource "aws_security_group_rule" "sensu_from_alb" {
  99. for_each = local.alb_listener_ports
  100. type = "egress"
  101. from_port = each.value
  102. to_port = each.value
  103. protocol = "tcp"
  104. source_security_group_id = aws_security_group.instance_security_group.id
  105. description = "Sensu ${each.key}"
  106. security_group_id = aws_security_group.sensu_alb_server_internal.id
  107. }