forked from bpamos/terraform-redis-enterprise-cluster-aws
-
Notifications
You must be signed in to change notification settings - Fork 0
/
security.tf
90 lines (88 loc) · 1.75 KB
/
security.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
# Security Group
# Security Group is for the EC2s.
# TODO: Lock it down!
resource "aws_security_group" "re_sg" {
name = format("%s-re-sg1", var.base_name)
description = "Redis Enterprise Security Group"
vpc_id = aws_vpc.redis_cluster_vpc.id
ingress {
protocol = "tcp"
from_port = 36379
to_port = 36379
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 36380
to_port = 36380
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 8080
to_port = 8080
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "-1"
from_port = 0
to_port = 0
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 3333
to_port = 3337
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 22
to_port = 22
# cidr_block ["0.0.0.0/0"] This means all ip address are allowed to ssh
# do not do in production.
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 9443
to_port = 9443
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 10000
to_port = 19999
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 8080
to_port = 8080
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "udp"
from_port = 53
to_port = 53
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "udp"
from_port = 5353
to_port = 5353
cidr_blocks = [ "0.0.0.0/0" ]
}
ingress {
protocol = "tcp"
from_port = 20000
to_port = 29999
cidr_blocks = [ "0.0.0.0/0" ]
}
egress {
protocol = "-1"
from_port = 0
to_port = 0
cidr_blocks = [ "0.0.0.0/0" ]
}
}