-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathec2.tf
108 lines (93 loc) · 3.9 KB
/
ec2.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
resource "aws_key_pair" "titus_deployer" {
key_name = "titus_deployer"
public_key = "${file("${var.public_key}")}"
}
resource "aws_instance" "bastion" {
ami = "${data.aws_ami.ubuntu_xenial.id}"
instance_type = "t2.nano"
key_name = "${aws_key_pair.titus_deployer.key_name}"
vpc_security_group_ids = ["${aws_security_group.titusbastion.id}"]
subnet_id = "${aws_subnet.public_subnet_1.id}"
associate_public_ip_address = "true"
}
resource "aws_instance" "prereqs" {
ami = "${data.aws_ami.ubuntu_xenial.id}"
instance_type = "t2.large"
user_data = "${file("scripts/cloud-init-prereqs.sh")}"
key_name = "${aws_key_pair.titus_deployer.key_name}"
vpc_security_group_ids = ["${aws_security_group.titusmaster-mainvpc.id}"]
subnet_id = "${aws_subnet.private_subnet_1.id}"
}
resource "aws_iam_instance_profile" "titusmasterInstanceProfile" {
name = "titusmasterInstanceProfile"
role = "${aws_iam_role.titusmasterInstanceProfile.name}"
}
data "template_file" "master" {
template = "${file("${path.module}/scripts/cloud-init-master.sh.tpl")}"
vars {
prereqs_ip = "${aws_instance.prereqs.private_ip}"
default_sg_id = "${aws_security_group.titusapp.id}"
default_role_arn = "${aws_iam_role.titusappwiths3InstanceProfile.arn}"
}
}
resource "aws_instance" "master" {
ami = "${data.aws_ami.ubuntu_xenial.id}"
instance_type = "t2.micro"
key_name = "${aws_key_pair.titus_deployer.key_name}"
user_data = "${data.template_file.master.rendered}"
vpc_security_group_ids = ["${aws_security_group.titusmaster-mainvpc.id}"]
subnet_id = "${aws_subnet.private_subnet_1.id}"
iam_instance_profile = "${aws_iam_instance_profile.titusmasterInstanceProfile.id}"
}
data "template_file" "gateway" {
template = "${file("${path.module}/scripts/cloud-init-gateway.sh.tpl")}"
vars {
master_ip = "${aws_instance.master.private_ip}"
}
}
resource "aws_instance" "gateway" {
ami = "${data.aws_ami.ubuntu_xenial.id}"
instance_type = "t2.micro"
key_name = "${aws_key_pair.titus_deployer.key_name}"
user_data = "${data.template_file.gateway.rendered}"
vpc_security_group_ids = ["${aws_security_group.titusmaster-mainvpc.id}"]
subnet_id = "${aws_subnet.private_subnet_1.id}"
iam_instance_profile = "${aws_iam_instance_profile.titusmasterInstanceProfile.id}"
}
data "template_file" "titusagent" {
template = "${file("${path.module}/scripts/cloud-init-agent.yml.tpl")}"
vars {
titus_log_bucket = "${aws_s3_bucket.titus_log_bucket.bucket}"
agent_asg_name = "${var.agent_asg_name}"
prereqs_ip = "${aws_instance.prereqs.private_ip}"
}
}
resource "aws_launch_configuration" "titusagent" {
name_prefix = "${var.agent_asg_name}"
image_id = "${data.aws_ami.ubuntu_xenial.id}"
instance_type = "m4.large"
security_groups = ["${aws_security_group.titusmaster-mainvpc.id}"]
key_name = "${aws_key_pair.titus_deployer.key_name}"
user_data = "${data.template_file.titusagent.rendered}"
iam_instance_profile = "${aws_iam_instance_profile.titusmasterInstanceProfile.id}"
lifecycle {
create_before_destroy = true
}
root_block_device = [
{
volume_size = "30"
volume_type = "gp2"
},
]
}
resource "aws_autoscaling_group" "titusagent" {
name = "${var.agent_asg_name}"
max_size = 1
min_size = 1
desired_capacity = 1
health_check_grace_period = 60
health_check_type = "EC2"
force_delete = true
launch_configuration = "${aws_launch_configuration.titusagent.name}"
vpc_zone_identifier = ["${aws_subnet.private_subnet_1.id}"]
}