security-group-indexers.tf 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. ## Indexer Security Group
  2. #
  3. # Summary:
  4. # Ingress:
  5. # x tcp/8000 - Splunk Web - (local.access_cidrs) vpc-access, legacy openvpn, legacy bastion
  6. # x tcp/8088 - Splunk HEC - (local.data_sources) Entire VPC + var.additional_source + var.splunk_legacy_cidr
  7. # x tcp/8088 - MOOSE ONLY - 10.0.0.0/8
  8. # x tcp/8089 - Splunk API - (local.access_cidrs) vpc-access, legacy openvpn, legacy bastion, legacy infra (vpc-private-services) VPC for monitoring console
  9. # x tcp/8089 - Splunk API + IDX Discovery - (local.splunk_vpc_cidrs) Entire VPC + var.splunk_legacy_cidr
  10. # x tcp/8089 - MOOSE ONLY - 10.0.0.0/8
  11. # x tcp/9887 - IDX Replication - (local.splunk_vpc_cidrs) Entire VPC + var.splunk_legacy_cidr
  12. # x tcp/9997-9998 - Splunk Data - (local.data_sources) Entire VPC + var.additional_source + var.splunk_legacy_cidr
  13. # x tcp/9997-9998 - MOOSE ONLY - 10.0.0.0/8
  14. # Egress:
  15. # tcp/9887 - IDX Replication - (local.splunk_vpc_cidrs) Entire VPC + var.splunk_legacy_cidr
  16. # tcp/8089 - Splunk API + IDX Discovery - (local.splunk_vpc_cidrs) Entire VPC + var.splunk_legacy_cidr
  17. locals {
  18. splunk_vpc_cidrs = toset(concat(var.splunk_legacy_cidr, [var.vpc_cidr], var.cidr_map["vpc-private-services"]))
  19. access_cidrs = var.cidr_map["vpc-access"]
  20. data_sources = toset(concat(tolist(local.splunk_vpc_cidrs), var.splunk_data_sources))
  21. }
  22. resource "aws_security_group" "indexer_security_group" {
  23. name = "indexer_security_group"
  24. description = "Security Group for Splunk Indexers"
  25. vpc_id = var.vpc_id
  26. tags = merge(var.standard_tags, var.tags, { "Name" = "indexer_security_group" })
  27. }
  28. ## Ingress
  29. resource "aws_security_group_rule" "splunk-web-in" {
  30. description = "Web access from bastions and vpn"
  31. type = "ingress"
  32. from_port = 8000
  33. to_port = 8000
  34. protocol = "tcp"
  35. cidr_blocks = local.access_cidrs
  36. security_group_id = aws_security_group.indexer_security_group.id
  37. }
  38. resource "aws_security_group_rule" "splunk-hec-in" {
  39. description = "Splunk HEC access"
  40. type = "ingress"
  41. from_port = 8088
  42. to_port = 8088
  43. protocol = "tcp"
  44. cidr_blocks = local.data_sources
  45. security_group_id = aws_security_group.indexer_security_group.id
  46. }
  47. resource "aws_security_group_rule" "splunk-hec-in-moose" {
  48. count = local.is_moose ? 1 : 0
  49. description = "Splunk HEC access"
  50. type = "ingress"
  51. from_port = 8088
  52. to_port = 8088
  53. protocol = "tcp"
  54. cidr_blocks = ["10.0.0.0/8"]
  55. security_group_id = aws_security_group.indexer_security_group.id
  56. }
  57. resource "aws_security_group_rule" "splunk-api-in-access" {
  58. description = "Splunk API + Indexer Discovery"
  59. type = "ingress"
  60. from_port = 8089
  61. to_port = 8089
  62. protocol = "tcp"
  63. # need to concat here, since legacy subnet is already in the rule
  64. cidr_blocks = toset(concat(tolist(local.access_cidrs), tolist(local.splunk_vpc_cidrs), var.cidr_map["vpc-splunk"]))
  65. security_group_id = aws_security_group.indexer_security_group.id
  66. }
  67. resource "aws_security_group_rule" "splunk-api-in-moose" {
  68. count = local.is_moose ? 1 : 0
  69. description = "Splunk API + Indexer Discovery - 10/8 for MOOSE ONLY"
  70. type = "ingress"
  71. from_port = 8089
  72. to_port = 8089
  73. protocol = "tcp"
  74. # Internal source _do_ use indexer discovery, so moose needs 10/8 open to the entirety.
  75. cidr_blocks = ["10.0.0.0/8"]
  76. security_group_id = aws_security_group.indexer_security_group.id
  77. }
  78. resource "aws_security_group_rule" "splunk-idx-replication" {
  79. description = "Splunk Indexer Replication"
  80. type = "ingress"
  81. from_port = 9887
  82. to_port = 9887
  83. protocol = "tcp"
  84. cidr_blocks = local.splunk_vpc_cidrs
  85. security_group_id = aws_security_group.indexer_security_group.id
  86. }
  87. resource "aws_security_group_rule" "splunk-data-in" {
  88. description = "Splunk Data In"
  89. type = "ingress"
  90. from_port = 9997
  91. to_port = 9998
  92. protocol = "tcp"
  93. cidr_blocks = local.data_sources
  94. security_group_id = aws_security_group.indexer_security_group.id
  95. }
  96. resource "aws_security_group_rule" "splunk-data-in-moose" {
  97. count = local.is_moose ? 1 : 0
  98. description = "Splunk Data In for Moose"
  99. type = "ingress"
  100. from_port = 9997
  101. to_port = 9998
  102. protocol = "tcp"
  103. cidr_blocks = ["10.0.0.0/8"]
  104. security_group_id = aws_security_group.indexer_security_group.id
  105. }
  106. ## Egress
  107. resource "aws_security_group_rule" "splunk-idx-replication-out" {
  108. description = "Splunk Indexer Replication"
  109. type = "egress"
  110. from_port = 9887
  111. to_port = 9887
  112. protocol = "tcp"
  113. cidr_blocks = local.splunk_vpc_cidrs
  114. security_group_id = aws_security_group.indexer_security_group.id
  115. }
  116. resource "aws_security_group_rule" "splunk-api-out" {
  117. description = "Splunk API Outbound to talk to indexers"
  118. type = "egress"
  119. from_port = 8089
  120. to_port = 8089
  121. protocol = "tcp"
  122. cidr_blocks = local.splunk_vpc_cidrs
  123. security_group_id = aws_security_group.indexer_security_group.id
  124. }