Skip to content

Instantly share code, notes, and snippets.

@JavierBmrg
Created July 14, 2019 05:32
Show Gist options
  • Save JavierBmrg/a8fa9d876a0d6632eb217d36c7a4cc46 to your computer and use it in GitHub Desktop.
Save JavierBmrg/a8fa9d876a0d6632eb217d36c7a4cc46 to your computer and use it in GitHub Desktop.
Example of terraform with chef provisioner
provider "aws" {
region = "${var.region}"
profile = "${var.profile}"
allowed_account_ids = ["${var.aws_account_id}"]
}
data "aws_availability_zones" "available" {}
data "aws_ami" "amazon_linux" {
most_recent = true
owners = ["amazon"]
filter {
name = "architecture"
values = ["x86_64"]
}
filter {
name = "root-device-type"
values = ["ebs"]
}
filter {
name = "name"
values = ["amzn-ami-hvm-*"]
}
filter {
name = "virtualization-type"
values = ["hvm"]
}
filter {
name = "block-device-mapping.volume-type"
values = ["gp2"]
}
}
## VPC
resource "aws_vpc" "main" {
cidr_block = "${var.vpc_cidr}"
instance_tenancy = "default"
enable_dns_support = true
enable_dns_hostnames = true
tags {
Name = "${var.name}-${var.environment}"
Environment = "${var.environment}"
}
}
## Internet GW
resource "aws_internet_gateway" "main" {
vpc_id = "${aws_vpc.main.id}"
tags {
Name = "${var.name}-${var.environment}"
Environment = "${var.environment}"
}
}
## Subnet
resource "aws_subnet" "external" {
count = 2
vpc_id = "${aws_vpc.main.id}"
cidr_block = "${cidrsubnet(var.vpc_cidr, 8, count.index)}"
availability_zone = "${data.aws_availability_zones.available.names[count.index]}"
map_public_ip_on_launch = true
tags {
Name = "${var.name}-${var.environment}-${format("external-%02d", count.index+1)}"
}
}
## Route Table
resource "aws_route_table" "external" {
count = 1
vpc_id = "${aws_vpc.main.id}"
tags {
Name = "${var.name}-${var.environment}-${format("external-%02d", count.index+1)}"
}
}
resource "aws_route" "external" {
route_table_id = "${aws_route_table.external.id}"
destination_cidr_block = "0.0.0.0/0"
gateway_id = "${aws_internet_gateway.main.id}"
}
resource "aws_route_table_association" "external" {
count = 2
subnet_id = "${element(aws_subnet.external.*.id, count.index)}"
route_table_id = "${aws_route_table.external.id}"
}
## Security Group
resource "aws_security_group" "external_ssh" {
name = "${format("%s-%s-external-ssh", var.name, var.environment)}"
description = "Allows SSH connections"
vpc_id = "${aws_vpc.main.id}"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = [
"${var.source_ips}",
]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
tags {
Name = "${format("%s external ssh", var.name)}"
Environment = "${var.environment}"
}
}
resource "aws_security_group" "web_server" {
name = "${format("%s-%s-web_server", var.name, var.environment)}"
description = "Allows HTTP connections to Web Server"
vpc_id = "${aws_vpc.main.id}"
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = [
"${var.source_ips}"
]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
tags {
Name = "${format("%s web_server", var.name)}"
Environment = "${var.environment}"
}
}
## IAM role
data "aws_iam_policy_document" "assume_role_ec2" {
statement {
effect = "Allow"
actions = ["sts:AssumeRole"]
principals = {
type = "Service"
identifiers = ["ec2.amazonaws.com"]
}
}
}
data "aws_iam_policy_document" "web_server" {
statement {
effect = "Allow"
actions = [
"autoscaling:Describe*",
"cloudwatch:*",
"logs:*",
"sns:*",
]
resources = [
"*",
]
}
}
resource "aws_iam_role" "web_server" {
name = "${var.name}-web_server-role-${var.environment}"
assume_role_policy = "${data.aws_iam_policy_document.assume_role_ec2.json}"
}
resource "aws_iam_role_policy" "web_server" {
name = "${var.name}-web_server-policy-${var.environment}"
role = "${aws_iam_role.web_server.id}"
policy = "${data.aws_iam_policy_document.web_server.json}"
}
resource "aws_iam_instance_profile" "web_server" {
name = "${var.name}-web_server-instance-profile-${var.environment}"
roles = ["${aws_iam_role.web_server.name}"]
}
## EC2 Instance
resource "aws_instance" "web_server" {
count = 1
ami = "${data.aws_ami.amazon_linux.id}"
instance_type = "t2.nano"
key_name = "${var.ssh_key_name}"
vpc_security_group_ids = [
"${aws_security_group.external_ssh.id}",
"${aws_security_group.web_server.id}",
]
subnet_id = "${element(aws_subnet.external.*.id, count.index)}"
associate_public_ip_address = true
root_block_device = {
volume_type = "gp2"
volume_size = "20"
}
iam_instance_profile = "${aws_iam_instance_profile.web_server.name}"
monitoring = false
disable_api_termination = false
tags {
Name = "${var.name}-${format("web_server-%02d", count.index+1)}"
Environment = "${var.environment}"
}
provisioner "chef" {
connection {
host = "${self.public_ip}"
type = "ssh"
user = "ec2-user"
private_key = "${file(var.ssh_key_file)}"
}
environment = "_default"
run_list = ["nginx::default"]
node_name = "${var.name}-${format("web_server-%02d", count.index+1)}"
server_url = "${var.chef_server_url}"
recreate_client = true
user_name = "${var.chef_server_user_name}"
user_key = "${file(var.chef_server_user_key)}"
fetch_chef_certificates = true
}
}
resource "aws_eip" "web_server" {
count = 1
vpc = true
}
resource "aws_eip_association" "web_server" {
count = 1
instance_id = "${element(aws_instance.web_server.*.id, count.index)}"
allocation_id = "${element(aws_eip.web_server.*.id, count.index)}"
}
variable "name" {}
variable "environment" {}
variable "ssh_key_name" {}
variable "ssh_key_file" {}
variable "region" {}
variable "aws_account_id" {}
variable "profile" {}
variable "vpc_cidr" {}
variable "source_ips" {
type = "list"
}
variable "chef_server_url" {}
variable "chef_server_user_key" {}
variable "chef_server_user_name" {}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment