-
Notifications
You must be signed in to change notification settings - Fork 0
/
self-ssl-vpc.yml
71 lines (71 loc) · 1.89 KB
/
self-ssl-vpc.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
# VPC, Subnets, Route Tables & Security Groups
AWSTemplateFormatVersion: 2010-09-09
Resources:
VPC:
Type: 'AWS::EC2::VPC'
Properties:
CidrBlock: 10.0.0.0/16
IGateway:
Type: 'AWS::EC2::InternetGateway'
IGatewayAttachment:
Type: 'AWS::EC2::VPCGatewayAttachment'
Properties:
VpcId: !Ref VPC
InternetGatewayId: !Ref IGateway
Subnet:
Type: 'AWS::EC2::Subnet'
Properties:
CidrBlock: 10.0.0.0/24
VpcId: !Ref VPC
RouteTable:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
SubnetRouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref RouteTable
SubnetId: !Ref Subnet
PublicRoute:
Type: 'AWS::EC2::Route'
Properties:
DestinationCidrBlock: 0.0.0.0/0
RouteTableId: !Ref RouteTable
GatewayId: !Ref IGateway
DependsOn: [IGatewayAttachment]
SecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Properties:
VpcId: !Ref VPC
GroupDescription: WebServerSG
SecurityGroupIngress:
- IpProtocol: tcp
FromPort: 443
ToPort: 443
CidrIp: 0.0.0.0/0
WebServerRole:
Type: 'AWS::IAM::Role'
Properties:
RoleName: WebServerRole
AssumeRolePolicyDocument:
Statement:
- Effect: Allow
Principal: { Service: ec2.amazonaws.com }
Action: 'sts:AssumeRole'
WebServerProfile:
Type: 'AWS::IAM::InstanceProfile'
Properties:
InstanceProfileName: WebServerProfile
Roles: [!Ref WebServerRole]
WebServer:
Type: 'AWS::EC2::Instance'
Properties:
ImageId: ami-0d141c54b944c67d7 # AL2 Apache Image
SubnetId: !Ref Subnet
InstanceType: t2.micro
SecurityGroupIds: [!Ref SecurityGroup]
IamInstanceProfile: !Ref WebServerProfile
ElasticIP:
Type: 'AWS::EC2::EIP'
Properties:
InstanceId: !Ref WebServer