From 55d48280379a71452b4c6a2c8a383127db89a3f4 Mon Sep 17 00:00:00 2001 From: havelight-ee Date: Tue, 9 May 2023 21:48:17 +0900 Subject: [PATCH] update --- terraform/aws_iam/.terraform.lock.hcl | 44 + terraform/aws_iam/main.tf | 10 + terraform/aws_iam/policy.tf | 81 ++ terraform/aws_iam/terraform.tfstate | 1162 +++++++++++++++++ terraform/aws_iam/terraform.tfstate.backup | 9 + terraform/aws_iam/variables.tf | 35 + .../terraform_grafana/.terraform.lock.hcl | 44 + .../00-old/terraform_grafana/ec2.tf | 60 + .../00-old/terraform_grafana/main.tf | 10 + .../terraform_grafana/terraform.tfstate | 220 ++++ .../00-old/terraform_grafana/variables.tf | 35 + .../aws_instance/grafana/.terraform.lock.hcl | 44 + terraform/aws_instance/grafana/ec2.tf | 60 + terraform/aws_instance/grafana/main.tf | 10 + .../aws_instance/grafana/terraform.tfstate | 220 ++++ .../grafana/terraform.tfstate.backup | 98 ++ terraform/aws_instance/grafana/variables.tf | 35 + .../monitoring/.terraform.lock.hcl | 44 + terraform/aws_instance/monitoring/ec2.tf | 41 + terraform/aws_instance/monitoring/main.tf | 10 + terraform/aws_instance/monitoring/route53.tf | 8 + .../aws_instance/monitoring/security_group.tf | 41 + .../aws_instance/monitoring/terraform.tfstate | 9 + .../monitoring/terraform.tfstate.backup | 370 ++++++ .../aws_instance/monitoring/variables.tf | 39 + 25 files changed, 2739 insertions(+) create mode 100644 terraform/aws_iam/.terraform.lock.hcl create mode 100644 terraform/aws_iam/main.tf create mode 100644 terraform/aws_iam/policy.tf create mode 100644 terraform/aws_iam/terraform.tfstate create mode 100644 terraform/aws_iam/terraform.tfstate.backup create mode 100644 terraform/aws_iam/variables.tf create mode 100644 terraform/aws_instance/00-old/terraform_grafana/.terraform.lock.hcl create mode 100644 terraform/aws_instance/00-old/terraform_grafana/ec2.tf create mode 100644 terraform/aws_instance/00-old/terraform_grafana/main.tf create mode 100644 terraform/aws_instance/00-old/terraform_grafana/terraform.tfstate create mode 100644 terraform/aws_instance/00-old/terraform_grafana/variables.tf create mode 100644 terraform/aws_instance/grafana/.terraform.lock.hcl create mode 100644 terraform/aws_instance/grafana/ec2.tf create mode 100644 terraform/aws_instance/grafana/main.tf create mode 100644 terraform/aws_instance/grafana/terraform.tfstate create mode 100644 terraform/aws_instance/grafana/terraform.tfstate.backup create mode 100644 terraform/aws_instance/grafana/variables.tf create mode 100644 terraform/aws_instance/monitoring/.terraform.lock.hcl create mode 100644 terraform/aws_instance/monitoring/ec2.tf create mode 100644 terraform/aws_instance/monitoring/main.tf create mode 100644 terraform/aws_instance/monitoring/route53.tf create mode 100644 terraform/aws_instance/monitoring/security_group.tf create mode 100644 terraform/aws_instance/monitoring/terraform.tfstate create mode 100644 terraform/aws_instance/monitoring/terraform.tfstate.backup create mode 100644 terraform/aws_instance/monitoring/variables.tf diff --git a/terraform/aws_iam/.terraform.lock.hcl b/terraform/aws_iam/.terraform.lock.hcl new file mode 100644 index 0000000..760e713 --- /dev/null +++ b/terraform/aws_iam/.terraform.lock.hcl @@ -0,0 +1,44 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/archive" { + version = "1.3.0" + constraints = "~> 1.3" + hashes = [ + "h1:T3DszgOa/75SiiONgEDRujpN5rSqIw9TvFZXHjpqMB4=", + "zh:115aa6bc7825402a8d4e2e954378a9f48e4fdbeabe081ffd04e0a2f6786159bb", + "zh:21f731ffac20a67615c64a7a8a96949c971ee28ffd5807d8c299faba73b5e273", + "zh:2e81b58e141b175cbf801ade5e87c5db4cb28933216b0547ef32c95500385904", + "zh:3acbb96fd142b4d193dc18861340281249301368029169e346d15410d0572492", + "zh:4346edee0dfe97154b6f28d9ef0fa762131db92b78bbd1b3207945201cb59818", + "zh:93916a84cc6ff6778456dd170a657326c4dd3a86b4434e424a66a87c2535b888", + "zh:ade675c3ac8b9ec91131bac5881fbd4efad46a3683f2fea2efb9493a2c1b9ffb", + "zh:b0a0cb13fc850903aa7a057ae7e06366939b8f347926dce1137cd47b9123ad93", + "zh:d6d838cceffb7f3ff27fb9b51d78fccdef15bd32408f33a726556bfe66315bd3", + "zh:ddc4ac6aea6537f8096ffeb8ff3bca355f0972793184e0f6df120aa6460b4446", + "zh:e0d1213625d40d124bd9570f0d92907416f8d61bc8c389c776e72c0a97020cce", + "zh:eb707b69f9093b97d98e2dece9822852a27849dd1627d35302e8d6b9801407ef", + ] +} + +provider "registry.terraform.io/hashicorp/aws" { + version = "4.66.1" + hashes = [ + "h1:D/qzK7fE3pgdg25W1u5GqI+VILy8UmhzXruz6c8rJ7g=", + "zh:001c707174b7d6bf89a96cf806f925bb852d1a285fb80b81222cbeb4743bcb79", + "zh:19bc6ac0a7fd1c564fd56c536f1743f71a5e7ca724e21ea51a6a79218939733d", + "zh:3dac5c27f40b511239e9fe6f97dc0b6c95f630ba328001820ddc764e766a5ca2", + "zh:49092c92e2565db4cd4c98ec6878386e6957525d3392b63f0d5df4c48a7c1913", + "zh:4f9e2e1d0c5365a4e6689096cc91ba88ca9c0dc7c633377ba674c1dd856b6a9f", + "zh:57e32bb454f2dc17d5631a9559e36188761d8ae95a452478f81f41bb568a3a42", + "zh:678b78ba629dd833f0705ac90630969f514a54013ab9713ce7ceda55fc5ea138", + "zh:8aab1d76348cf2a685f72382cb838a910b77353179e81ab5794b9c45c8fb36a3", + "zh:8b6791bf0948aa8b49258863992a8ad7e7332dcae1a889e86da0e5ab778dc3b6", + "zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425", + "zh:a36f2777452c2cebdaa8a27378416d512ead367acc078a671bb12276dd4bc9dd", + "zh:c492e6f685882fad6481f4793e696d9e1b01aaae419225c2db0a484b632d1cac", + "zh:d4418e0d1d18e321db364a91d7a768e274bb0fb46df9f3cb5b9debb2bb6917b9", + "zh:d5b4310ef2b2ec22ae14cf909deb1231b56bdd79dc2b51e5db4e46a05e0110c4", + "zh:dedfb01e26b34fb61a52b7e953b8bf5d7a69971187e91697b67221298bbed377", + ] +} diff --git a/terraform/aws_iam/main.tf b/terraform/aws_iam/main.tf new file mode 100644 index 0000000..dd4bd35 --- /dev/null +++ b/terraform/aws_iam/main.tf @@ -0,0 +1,10 @@ +provider "aws" { + region = "ap-northeast-2" +} + +terraform { + required_providers { + archive = "~> 1.3" + } +} + diff --git a/terraform/aws_iam/policy.tf b/terraform/aws_iam/policy.tf new file mode 100644 index 0000000..4531ad8 --- /dev/null +++ b/terraform/aws_iam/policy.tf @@ -0,0 +1,81 @@ +locals { + services = { + "S3" : "s3", + "EFS" : "elasticfilesystem", + "EC2" : "ec2", + "Autoscaling" : "autoscaling", + "ELB" : "elasticloadbalancing", + "VPC" : "ec2", + "Route53" : "route53", + "Lambda" : "lambda", + "CloudWatch" : "cloudwatch", + "CloudTrail" : "cloudtrail", + "KMS" : "kms", + "CloudFormation" : "cloudformation" + } +} + +resource "aws_iam_policy" "read_only" { + for_each = local.services + + name = "${each.key}_ReadOnly_Access" + policy = jsonencode({ + Version = "2012-10-17" + Statement = [ + { + Action = [ + "${each.value}:List*", + "${each.value}:Get*", + "${each.value}:Describe*" + ], + Effect = "Allow", + Resource = "*" + } + ] + }) +} + +resource "aws_iam_policy" "full_access" { + for_each = local.services + + name = "${each.key}_Full_Access" + policy = jsonencode({ + Version = "2012-10-17" + Statement = [ + { + Action = [ + "${each.value}:*" + ], + Effect = "Allow", + Resource = "*" + } + ] + }) +} + +resource "aws_iam_group" "read_only" { + for_each = local.services + + name = "${each.key}_ReadOnly_Access_Group" +} + +resource "aws_iam_group_policy_attachment" "read_only" { + for_each = aws_iam_group.read_only + + group = each.value.name + policy_arn = aws_iam_policy.read_only[each.key].arn +} + +resource "aws_iam_group" "full_access" { + for_each = local.services + + name = "${each.key}_Full_Access_Group" +} + +resource "aws_iam_group_policy_attachment" "full_access" { + for_each = aws_iam_group.full_access + + group = each.value.name + policy_arn = aws_iam_policy.full_access[each.key].arn +} + diff --git a/terraform/aws_iam/terraform.tfstate b/terraform/aws_iam/terraform.tfstate new file mode 100644 index 0000000..902308e --- /dev/null +++ b/terraform/aws_iam/terraform.tfstate @@ -0,0 +1,1162 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 653, + "lineage": "757d2b20-88b9-4a16-2150-6bd77f71aa53", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_iam_group", + "name": "full_access", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Autoscaling_Full_Access_Group", + "id": "Autoscaling_Full_Access_Group", + "name": "Autoscaling_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA3SVH6LTUV" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudFormation_Full_Access_Group", + "id": "CloudFormation_Full_Access_Group", + "name": "CloudFormation_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA25HBMJHAQ" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudTrail_Full_Access_Group", + "id": "CloudTrail_Full_Access_Group", + "name": "CloudTrail_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TARHMCHENK6" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudWatch_Full_Access_Group", + "id": "CloudWatch_Full_Access_Group", + "name": "CloudWatch_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TATSL6XWSWS" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/EC2_Full_Access_Group", + "id": "EC2_Full_Access_Group", + "name": "EC2_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAWVRAXFSZN" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/EFS_Full_Access_Group", + "id": "EFS_Full_Access_Group", + "name": "EFS_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA3NHH2LSWE" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/ELB_Full_Access_Group", + "id": "ELB_Full_Access_Group", + "name": "ELB_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA6B2FKDWYR" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/KMS_Full_Access_Group", + "id": "KMS_Full_Access_Group", + "name": "KMS_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAQTVTQWDXY" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Lambda_Full_Access_Group", + "id": "Lambda_Full_Access_Group", + "name": "Lambda_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA4447WTA7O" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Route53_Full_Access_Group", + "id": "Route53_Full_Access_Group", + "name": "Route53_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAU6Q75T4KR" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/S3_Full_Access_Group", + "id": "S3_Full_Access_Group", + "name": "S3_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAVOEQDWJTF" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/VPC_Full_Access_Group", + "id": "VPC_Full_Access_Group", + "name": "VPC_Full_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAQKUQQLFSW" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_group", + "name": "read_only", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Autoscaling_ReadOnly_Access_Group", + "id": "Autoscaling_ReadOnly_Access_Group", + "name": "Autoscaling_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TASSBPFKVFL" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudFormation_ReadOnly_Access_Group", + "id": "CloudFormation_ReadOnly_Access_Group", + "name": "CloudFormation_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA64PGJPDJV" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudTrail_ReadOnly_Access_Group", + "id": "CloudTrail_ReadOnly_Access_Group", + "name": "CloudTrail_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TATE2W2ZRGY" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/CloudWatch_ReadOnly_Access_Group", + "id": "CloudWatch_ReadOnly_Access_Group", + "name": "CloudWatch_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAVOIAFAJWP" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/EC2_ReadOnly_Access_Group", + "id": "EC2_ReadOnly_Access_Group", + "name": "EC2_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA6SQQKP3FI" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/EFS_ReadOnly_Access_Group", + "id": "EFS_ReadOnly_Access_Group", + "name": "EFS_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAUX2TUR77F" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/ELB_ReadOnly_Access_Group", + "id": "ELB_ReadOnly_Access_Group", + "name": "ELB_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAY6MWGCFBS" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/KMS_ReadOnly_Access_Group", + "id": "KMS_ReadOnly_Access_Group", + "name": "KMS_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAZ4T5NAQCA" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Lambda_ReadOnly_Access_Group", + "id": "Lambda_ReadOnly_Access_Group", + "name": "Lambda_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA37JEABZXM" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/Route53_ReadOnly_Access_Group", + "id": "Route53_ReadOnly_Access_Group", + "name": "Route53_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TAZ7YWIQMAB" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/S3_ReadOnly_Access_Group", + "id": "S3_ReadOnly_Access_Group", + "name": "S3_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA2U5VN542E" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:group/VPC_ReadOnly_Access_Group", + "id": "VPC_ReadOnly_Access_Group", + "name": "VPC_ReadOnly_Access_Group", + "path": "/", + "unique_id": "AGPAXMVVF3TA3ZWDPAGSQ" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_group_policy_attachment", + "name": "full_access", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "group": "Autoscaling_Full_Access_Group", + "id": "Autoscaling_Full_Access_Group-2023050912453056740000000d", + "policy_arn": "arn:aws:iam::508259851457:policy/Autoscaling_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "group": "CloudFormation_Full_Access_Group", + "id": "CloudFormation_Full_Access_Group-2023050912453053770000000c", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudFormation_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "group": "CloudTrail_Full_Access_Group", + "id": "CloudTrail_Full_Access_Group-20230509124530613200000012", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudTrail_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "group": "CloudWatch_Full_Access_Group", + "id": "CloudWatch_Full_Access_Group-20230509124531008500000016", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudWatch_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "group": "EC2_Full_Access_Group", + "id": "EC2_Full_Access_Group-2023050912453057880000000e", + "policy_arn": "arn:aws:iam::508259851457:policy/EC2_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "group": "EFS_Full_Access_Group", + "id": "EFS_Full_Access_Group-20230509124530993200000015", + "policy_arn": "arn:aws:iam::508259851457:policy/EFS_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "group": "ELB_Full_Access_Group", + "id": "ELB_Full_Access_Group-20230509124530617900000013", + "policy_arn": "arn:aws:iam::508259851457:policy/ELB_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "group": "KMS_Full_Access_Group", + "id": "KMS_Full_Access_Group-20230509124529984200000004", + "policy_arn": "arn:aws:iam::508259851457:policy/KMS_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "group": "Lambda_Full_Access_Group", + "id": "Lambda_Full_Access_Group-20230509124531068800000017", + "policy_arn": "arn:aws:iam::508259851457:policy/Lambda_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "group": "Route53_Full_Access_Group", + "id": "Route53_Full_Access_Group-20230509124530592000000010", + "policy_arn": "arn:aws:iam::508259851457:policy/Route53_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "group": "S3_Full_Access_Group", + "id": "S3_Full_Access_Group-20230509124530601100000011", + "policy_arn": "arn:aws:iam::508259851457:policy/S3_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "group": "VPC_Full_Access_Group", + "id": "VPC_Full_Access_Group-20230509124530640300000014", + "policy_arn": "arn:aws:iam::508259851457:policy/VPC_Full_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.full_access", + "aws_iam_policy.full_access" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_group_policy_attachment", + "name": "read_only", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "group": "Autoscaling_ReadOnly_Access_Group", + "id": "Autoscaling_ReadOnly_Access_Group-20230509124529984800000005", + "policy_arn": "arn:aws:iam::508259851457:policy/Autoscaling_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "group": "CloudFormation_ReadOnly_Access_Group", + "id": "CloudFormation_ReadOnly_Access_Group-20230509124529979600000003", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudFormation_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "group": "CloudTrail_ReadOnly_Access_Group", + "id": "CloudTrail_ReadOnly_Access_Group-2023050912453057910000000f", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudTrail_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "group": "CloudWatch_ReadOnly_Access_Group", + "id": "CloudWatch_ReadOnly_Access_Group-20230509124531128500000018", + "policy_arn": "arn:aws:iam::508259851457:policy/CloudWatch_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "group": "EC2_ReadOnly_Access_Group", + "id": "EC2_ReadOnly_Access_Group-20230509124529978000000001", + "policy_arn": "arn:aws:iam::508259851457:policy/EC2_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "group": "EFS_ReadOnly_Access_Group", + "id": "EFS_ReadOnly_Access_Group-2023050912453052350000000b", + "policy_arn": "arn:aws:iam::508259851457:policy/EFS_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "group": "ELB_ReadOnly_Access_Group", + "id": "ELB_ReadOnly_Access_Group-20230509124530029700000008", + "policy_arn": "arn:aws:iam::508259851457:policy/ELB_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "group": "KMS_ReadOnly_Access_Group", + "id": "KMS_ReadOnly_Access_Group-20230509124530032500000009", + "policy_arn": "arn:aws:iam::508259851457:policy/KMS_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "group": "Lambda_ReadOnly_Access_Group", + "id": "Lambda_ReadOnly_Access_Group-20230509124529989800000006", + "policy_arn": "arn:aws:iam::508259851457:policy/Lambda_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "group": "Route53_ReadOnly_Access_Group", + "id": "Route53_ReadOnly_Access_Group-20230509124529978100000002", + "policy_arn": "arn:aws:iam::508259851457:policy/Route53_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "group": "S3_ReadOnly_Access_Group", + "id": "S3_ReadOnly_Access_Group-20230509124530027000000007", + "policy_arn": "arn:aws:iam::508259851457:policy/S3_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "group": "VPC_ReadOnly_Access_Group", + "id": "VPC_ReadOnly_Access_Group-2023050912453003510000000a", + "policy_arn": "arn:aws:iam::508259851457:policy/VPC_ReadOnly_Access" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_group.read_only", + "aws_iam_policy.read_only" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_policy", + "name": "full_access", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Autoscaling_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Autoscaling_Full_Access", + "name": "Autoscaling_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"autoscaling:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAQOK2KB5W5", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudFormation_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudFormation_Full_Access", + "name": "CloudFormation_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudformation:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAVO7B3AP3U", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudTrail_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudTrail_Full_Access", + "name": "CloudTrail_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudtrail:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAY6EEPOU6Q", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudWatch_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudWatch_Full_Access", + "name": "CloudWatch_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudwatch:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA7KKD3MTAA", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/EC2_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/EC2_Full_Access", + "name": "EC2_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"ec2:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAU3A63OC6I", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/EFS_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/EFS_Full_Access", + "name": "EFS_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"elasticfilesystem:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAW6RESROQ5", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/ELB_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/ELB_Full_Access", + "name": "ELB_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"elasticloadbalancing:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TATDG3VPSQF", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/KMS_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/KMS_Full_Access", + "name": "KMS_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"kms:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAQJNGKOMD2", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Lambda_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Lambda_Full_Access", + "name": "Lambda_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"lambda:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAUFHETI3HL", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Route53_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Route53_Full_Access", + "name": "Route53_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"route53:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAQTWENY6ZH", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/S3_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/S3_Full_Access", + "name": "S3_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"s3:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA5AKVY6OPF", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/VPC_Full_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/VPC_Full_Access", + "name": "VPC_Full_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"ec2:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA5CFNV4PQ4", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + }, + { + "mode": "managed", + "type": "aws_iam_policy", + "name": "read_only", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": "Autoscaling", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Autoscaling_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Autoscaling_ReadOnly_Access", + "name": "Autoscaling_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"autoscaling:List*\",\"autoscaling:Get*\",\"autoscaling:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA2CZZY6CGN", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudFormation", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudFormation_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudFormation_ReadOnly_Access", + "name": "CloudFormation_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudformation:List*\",\"cloudformation:Get*\",\"cloudformation:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAQEDPLFLXM", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudTrail", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudTrail_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudTrail_ReadOnly_Access", + "name": "CloudTrail_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudtrail:List*\",\"cloudtrail:Get*\",\"cloudtrail:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAYJXM7PDLF", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "CloudWatch", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/CloudWatch_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/CloudWatch_ReadOnly_Access", + "name": "CloudWatch_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"cloudwatch:List*\",\"cloudwatch:Get*\",\"cloudwatch:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAYQGJHTBAW", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EC2", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/EC2_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/EC2_ReadOnly_Access", + "name": "EC2_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"ec2:List*\",\"ec2:Get*\",\"ec2:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAUN6BACP2Y", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "EFS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/EFS_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/EFS_ReadOnly_Access", + "name": "EFS_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"elasticfilesystem:List*\",\"elasticfilesystem:Get*\",\"elasticfilesystem:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAVXRQVNLS5", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "ELB", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/ELB_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/ELB_ReadOnly_Access", + "name": "ELB_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"elasticloadbalancing:List*\",\"elasticloadbalancing:Get*\",\"elasticloadbalancing:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA5OFDHMT2Q", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "KMS", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/KMS_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/KMS_ReadOnly_Access", + "name": "KMS_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"kms:List*\",\"kms:Get*\",\"kms:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAYFVGRPRKJ", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Lambda", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Lambda_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Lambda_ReadOnly_Access", + "name": "Lambda_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"lambda:List*\",\"lambda:Get*\",\"lambda:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TATA6PKAWKB", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "Route53", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/Route53_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/Route53_ReadOnly_Access", + "name": "Route53_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"route53:List*\",\"route53:Get*\",\"route53:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TARCWD3MFPD", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "S3", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/S3_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/S3_ReadOnly_Access", + "name": "S3_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"s3:List*\",\"s3:Get*\",\"s3:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TAYU3FSMCE7", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + }, + { + "index_key": "VPC", + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:policy/VPC_ReadOnly_Access", + "description": "", + "id": "arn:aws:iam::508259851457:policy/VPC_ReadOnly_Access", + "name": "VPC_ReadOnly_Access", + "name_prefix": "", + "path": "/", + "policy": "{\"Statement\":[{\"Action\":[\"ec2:List*\",\"ec2:Get*\",\"ec2:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", + "policy_id": "ANPAXMVVF3TA7TCI2TASQ", + "tags": null, + "tags_all": {} + }, + "sensitive_attributes": [], + "private": "bnVsbA==" + } + ] + } + ], + "check_results": null +} diff --git a/terraform/aws_iam/terraform.tfstate.backup b/terraform/aws_iam/terraform.tfstate.backup new file mode 100644 index 0000000..ed57285 --- /dev/null +++ b/terraform/aws_iam/terraform.tfstate.backup @@ -0,0 +1,9 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 580, + "lineage": "757d2b20-88b9-4a16-2150-6bd77f71aa53", + "outputs": {}, + "resources": [], + "check_results": null +} diff --git a/terraform/aws_iam/variables.tf b/terraform/aws_iam/variables.tf new file mode 100644 index 0000000..a6a7336 --- /dev/null +++ b/terraform/aws_iam/variables.tf @@ -0,0 +1,35 @@ +#---------------------------------------------------------------# +# Network ID + +variable "VPC_ID" { + default = "vpc-00ba2b0e9ad59f0ed" +} + +variable "Network_CIDR" { + default = "172.24.0.0/19" +} + +variable "Private_Subnet_ID_1" { + default = "subnet-024f0deda82039fa4" +} + +variable "Private_Subnet_ID_2" { + default = "subnet-050d942fa1c46540a" +} + +variable "Private_Subnet_ID_3" { + default = "subnet-0946eb806af7377be" +} + +variable "Public_Subnet_ID_1" { + default = "subnet-00c363356f133411d" +} + +variable "Public_Subnet_ID_2" { + default = "subnet-07aa5e879a262014d" +} + +variable "Public_Subnet_ID_3" { + default = "subnet-0073a61bc56a68a3e" +} + diff --git a/terraform/aws_instance/00-old/terraform_grafana/.terraform.lock.hcl b/terraform/aws_instance/00-old/terraform_grafana/.terraform.lock.hcl new file mode 100644 index 0000000..95a1bb5 --- /dev/null +++ b/terraform/aws_instance/00-old/terraform_grafana/.terraform.lock.hcl @@ -0,0 +1,44 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/archive" { + version = "1.3.0" + constraints = "~> 1.3" + hashes = [ + "h1:T3DszgOa/75SiiONgEDRujpN5rSqIw9TvFZXHjpqMB4=", + "zh:115aa6bc7825402a8d4e2e954378a9f48e4fdbeabe081ffd04e0a2f6786159bb", + "zh:21f731ffac20a67615c64a7a8a96949c971ee28ffd5807d8c299faba73b5e273", + "zh:2e81b58e141b175cbf801ade5e87c5db4cb28933216b0547ef32c95500385904", + "zh:3acbb96fd142b4d193dc18861340281249301368029169e346d15410d0572492", + "zh:4346edee0dfe97154b6f28d9ef0fa762131db92b78bbd1b3207945201cb59818", + "zh:93916a84cc6ff6778456dd170a657326c4dd3a86b4434e424a66a87c2535b888", + "zh:ade675c3ac8b9ec91131bac5881fbd4efad46a3683f2fea2efb9493a2c1b9ffb", + "zh:b0a0cb13fc850903aa7a057ae7e06366939b8f347926dce1137cd47b9123ad93", + "zh:d6d838cceffb7f3ff27fb9b51d78fccdef15bd32408f33a726556bfe66315bd3", + "zh:ddc4ac6aea6537f8096ffeb8ff3bca355f0972793184e0f6df120aa6460b4446", + "zh:e0d1213625d40d124bd9570f0d92907416f8d61bc8c389c776e72c0a97020cce", + "zh:eb707b69f9093b97d98e2dece9822852a27849dd1627d35302e8d6b9801407ef", + ] +} + +provider "registry.terraform.io/hashicorp/aws" { + version = "4.52.0" + hashes = [ + "h1:Ofm8syFCBU8MFOiU+zg+vnTWkSdozpmvaA9xukNvcBg=", + "zh:00c865de3a0e7643f4e2e5c8d4ba91eee94a46d41090eb134baca6b58c107172", + "zh:1430682e26eba25d8ace19fa780361187f474153e455545235b4fe30637fdcc2", + "zh:1b9a4e5c889bd2022bd59fb924dc78e189f1b7a4fd718fcacda0f0a4cb74d6eb", + "zh:2485260141608f1d386d0f68934092bbf68a27d96f0d83c73222d0382aee02f5", + "zh:2fe67ee94e2df7dabee7e474356f8e907e7c8011533f9d71df8702d59f9060b2", + "zh:37babd1b7ff96ff1f42aa56d7575cacabda6f9f460ff651d70662bfd90076341", + "zh:54aa8d39f22ecab6613169f49d37d2ccfaf417e59dd7a8c8fc6bf92600c3384f", + "zh:5bf4a84b962a8d2da8f4ccf2a7de56fb6c7a1f566e8393b563977fc7872a8740", + "zh:8cb4a51f209a3cc497e53f09188c15c6675697587fe2ea14a6c7fff10c8c8476", + "zh:91f6bdcbb1e36471140982e9048b7ced437d3290b2cc21079e5429cc84fed2fd", + "zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425", + "zh:9f8c01c3f677bc64ddefa41e59c6fc98860c11875d7f148af55969d3e3847f77", + "zh:b6b4fc0bd6f3c0adcd9531da3ccf8c25787ccd6ccc568f13ebbff1336d71a9e1", + "zh:d52a428bd92cc319088685ecac63b9f7d12d4cd6725604edb20d0c4f37a9936e", + "zh:e20252a851a0d38548a3c01a006bfc59ee1fc84217bf9eb95b22724769601b2b", + ] +} diff --git a/terraform/aws_instance/00-old/terraform_grafana/ec2.tf b/terraform/aws_instance/00-old/terraform_grafana/ec2.tf new file mode 100644 index 0000000..78c8a72 --- /dev/null +++ b/terraform/aws_instance/00-old/terraform_grafana/ec2.tf @@ -0,0 +1,60 @@ +resource "aws_security_group" "grafana-allow-security" { + name = "grafana-allow-security" + description = "Allow inbound traffic" + vpc_id = var.VPC_ID + + ingress { + description = "SSH" + from_port = 22 + to_port = 22 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "TLS from grafana" + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "http fron grafana" + from_port = 80 + to_port = 80 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + egress { + from_port = 0 + to_port = 0 + protocol = "-1" + cidr_blocks = ["0.0.0.0/0"] + ipv6_cidr_blocks = ["::/0"] + } + + tags = { + Name = "grafana-allow-security" + } +} + +resource "aws_instance" "grafana" { + ami = "ami-0409b7ddbc59e3222" + instance_type = "t3.small" + key_name = "kp-jay-bastion-datasaker" + vpc_security_group_ids = [aws_security_group.grafana-allow-security.id] + availability_zone = "ap-northeast-2a" + subnet_id = var.Public_Subnet_ID_1 + + root_block_device { + delete_on_termination = true + volume_size = 30 + } + + tags = { + Name = "grafana" + } +} + diff --git a/terraform/aws_instance/00-old/terraform_grafana/main.tf b/terraform/aws_instance/00-old/terraform_grafana/main.tf new file mode 100644 index 0000000..dd4bd35 --- /dev/null +++ b/terraform/aws_instance/00-old/terraform_grafana/main.tf @@ -0,0 +1,10 @@ +provider "aws" { + region = "ap-northeast-2" +} + +terraform { + required_providers { + archive = "~> 1.3" + } +} + diff --git a/terraform/aws_instance/00-old/terraform_grafana/terraform.tfstate b/terraform/aws_instance/00-old/terraform_grafana/terraform.tfstate new file mode 100644 index 0000000..cc3d74b --- /dev/null +++ b/terraform/aws_instance/00-old/terraform_grafana/terraform.tfstate @@ -0,0 +1,220 @@ +{ + "version": 4, + "terraform_version": "1.3.1", + "serial": 3, + "lineage": "946bb105-337f-c3fc-6b8b-e09f72b8b293", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_instance", + "name": "grafana", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "ami": "ami-0409b7ddbc59e3222", + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:instance/i-09c4bc87fd369504e", + "associate_public_ip_address": false, + "availability_zone": "ap-northeast-2a", + "capacity_reservation_specification": [ + { + "capacity_reservation_preference": "open", + "capacity_reservation_target": [] + } + ], + "cpu_core_count": 1, + "cpu_threads_per_core": 2, + "credit_specification": [ + { + "cpu_credits": "unlimited" + } + ], + "disable_api_stop": false, + "disable_api_termination": false, + "ebs_block_device": [], + "ebs_optimized": false, + "enclave_options": [ + { + "enabled": false + } + ], + "ephemeral_block_device": [], + "get_password_data": false, + "hibernation": false, + "host_id": "", + "host_resource_group_arn": null, + "iam_instance_profile": "", + "id": "i-09c4bc87fd369504e", + "instance_initiated_shutdown_behavior": "stop", + "instance_state": "running", + "instance_type": "t3.small", + "ipv6_address_count": 0, + "ipv6_addresses": [], + "key_name": "kp-jay-bastion-datasaker", + "launch_template": [], + "maintenance_options": [ + { + "auto_recovery": "default" + } + ], + "metadata_options": [ + { + "http_endpoint": "enabled", + "http_put_response_hop_limit": 1, + "http_tokens": "optional", + "instance_metadata_tags": "disabled" + } + ], + "monitoring": false, + "network_interface": [], + "outpost_arn": "", + "password_data": "", + "placement_group": "", + "placement_partition_number": 0, + "primary_network_interface_id": "eni-0b48b92d69735da43", + "private_dns": "i-09c4bc87fd369504e.ap-northeast-2.compute.internal", + "private_dns_name_options": [ + { + "enable_resource_name_dns_a_record": true, + "enable_resource_name_dns_aaaa_record": false, + "hostname_type": "resource-name" + } + ], + "private_ip": "172.24.0.88", + "public_dns": "", + "public_ip": "", + "root_block_device": [ + { + "delete_on_termination": true, + "device_name": "/dev/sda1", + "encrypted": false, + "iops": 100, + "kms_key_id": "", + "tags": null, + "throughput": 0, + "volume_id": "vol-0f45b5aae9c328a33", + "volume_size": 30, + "volume_type": "gp2" + } + ], + "secondary_private_ips": [], + "security_groups": [], + "source_dest_check": true, + "subnet_id": "subnet-00c363356f133411d", + "tags": { + "Name": "grafana" + }, + "tags_all": { + "Name": "grafana" + }, + "tenancy": "default", + "timeouts": null, + "user_data": null, + "user_data_base64": null, + "user_data_replace_on_change": false, + "volume_tags": null, + "vpc_security_group_ids": [ + "sg-014638e423c769405" + ] + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "dependencies": [ + "aws_security_group.grafana-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_security_group", + "name": "grafana-allow-security", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:security-group/sg-014638e423c769405", + "description": "Allow inbound traffic", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-014638e423c769405", + "ingress": [ + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "SSH", + "from_port": 22, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 22 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "TLS from grafana", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "http fron grafana", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + } + ], + "name": "grafana-allow-security", + "name_prefix": "", + "owner_id": "508259851457", + "revoke_rules_on_delete": false, + "tags": { + "Name": "grafana-allow-security" + }, + "tags_all": { + "Name": "grafana-allow-security" + }, + "timeouts": null, + "vpc_id": "vpc-00ba2b0e9ad59f0ed" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=" + } + ] + } + ], + "check_results": [] +} diff --git a/terraform/aws_instance/00-old/terraform_grafana/variables.tf b/terraform/aws_instance/00-old/terraform_grafana/variables.tf new file mode 100644 index 0000000..a6a7336 --- /dev/null +++ b/terraform/aws_instance/00-old/terraform_grafana/variables.tf @@ -0,0 +1,35 @@ +#---------------------------------------------------------------# +# Network ID + +variable "VPC_ID" { + default = "vpc-00ba2b0e9ad59f0ed" +} + +variable "Network_CIDR" { + default = "172.24.0.0/19" +} + +variable "Private_Subnet_ID_1" { + default = "subnet-024f0deda82039fa4" +} + +variable "Private_Subnet_ID_2" { + default = "subnet-050d942fa1c46540a" +} + +variable "Private_Subnet_ID_3" { + default = "subnet-0946eb806af7377be" +} + +variable "Public_Subnet_ID_1" { + default = "subnet-00c363356f133411d" +} + +variable "Public_Subnet_ID_2" { + default = "subnet-07aa5e879a262014d" +} + +variable "Public_Subnet_ID_3" { + default = "subnet-0073a61bc56a68a3e" +} + diff --git a/terraform/aws_instance/grafana/.terraform.lock.hcl b/terraform/aws_instance/grafana/.terraform.lock.hcl new file mode 100644 index 0000000..3f4f43d --- /dev/null +++ b/terraform/aws_instance/grafana/.terraform.lock.hcl @@ -0,0 +1,44 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/archive" { + version = "1.3.0" + constraints = "~> 1.3" + hashes = [ + "h1:T3DszgOa/75SiiONgEDRujpN5rSqIw9TvFZXHjpqMB4=", + "zh:115aa6bc7825402a8d4e2e954378a9f48e4fdbeabe081ffd04e0a2f6786159bb", + "zh:21f731ffac20a67615c64a7a8a96949c971ee28ffd5807d8c299faba73b5e273", + "zh:2e81b58e141b175cbf801ade5e87c5db4cb28933216b0547ef32c95500385904", + "zh:3acbb96fd142b4d193dc18861340281249301368029169e346d15410d0572492", + "zh:4346edee0dfe97154b6f28d9ef0fa762131db92b78bbd1b3207945201cb59818", + "zh:93916a84cc6ff6778456dd170a657326c4dd3a86b4434e424a66a87c2535b888", + "zh:ade675c3ac8b9ec91131bac5881fbd4efad46a3683f2fea2efb9493a2c1b9ffb", + "zh:b0a0cb13fc850903aa7a057ae7e06366939b8f347926dce1137cd47b9123ad93", + "zh:d6d838cceffb7f3ff27fb9b51d78fccdef15bd32408f33a726556bfe66315bd3", + "zh:ddc4ac6aea6537f8096ffeb8ff3bca355f0972793184e0f6df120aa6460b4446", + "zh:e0d1213625d40d124bd9570f0d92907416f8d61bc8c389c776e72c0a97020cce", + "zh:eb707b69f9093b97d98e2dece9822852a27849dd1627d35302e8d6b9801407ef", + ] +} + +provider "registry.terraform.io/hashicorp/aws" { + version = "4.65.0" + hashes = [ + "h1:fbSgoS5GLuwKAZlovFvGoYl4B0Bi5T7+MmFiVZL0uOo=", + "zh:0461b8dfc14e94971bfd12783cbd5a5574b9fcfc3694b6afaa8836f90b61c1f9", + "zh:24a27e7b1f6eb33e9da6f2ffaaa6bc48e933a24224c6572d6e588994e5c7130b", + "zh:2ca189d04573414bef4876c17ccb2b76f6e721e0450f6ab3700d94d7c04bec64", + "zh:3fb0654a527677231dab2140e9a55df3b90dba478b3db50001e21a045437a47a", + "zh:4918173d9c7d2735908622c17efd01746a046f0a571690afa7dd0866f22045f7", + "zh:491d259b15166f751076d2bdc443928ca63f6c0a83b02ea75fff8b4224662207", + "zh:4ff8e178f0656f04f88558c295a1d246b1bdcf5ad81d8b3b9ccceaeca2eb7fa8", + "zh:5e4eaf2855a740124f4bbe34ac4bd22c7f320aa3e91d9cef64396ad0a1571544", + "zh:65762c60c4bac2e0d55ed8c2877e455e84465cb12f0c885363a1b561cd4f5f07", + "zh:7c5e4f85eb5f70e6da2d64701dd5551f2bc334dbb9add76bfc6a2bea6acf4483", + "zh:90d32b238113528319d7a5fade97bd8ac9a8b654482fc9056478a43d2e297886", + "zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425", + "zh:e6ed3299516a8fb2292af7e7e123d09817dfd8e039aaf35ad5a276f739668e88", + "zh:eb84fa96c63d836b3b4689835cb7c4487808dfd1ba7ddacf4d8c4c6ff65cdbef", + "zh:ff97d1498193c99c9c35afd9bfcdce011abf460ec041721727d6e542f7a3bedd", + ] +} diff --git a/terraform/aws_instance/grafana/ec2.tf b/terraform/aws_instance/grafana/ec2.tf new file mode 100644 index 0000000..056db6e --- /dev/null +++ b/terraform/aws_instance/grafana/ec2.tf @@ -0,0 +1,60 @@ +resource "aws_security_group" "grafana-allow-security" { + name = "grafana-allow-security-new" + description = "Allow inbound traffic" + vpc_id = var.VPC_ID + + ingress { + description = "SSH" + from_port = 22 + to_port = 22 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "TLS from grafana" + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "http fron grafana" + from_port = 80 + to_port = 80 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + egress { + from_port = 0 + to_port = 0 + protocol = "-1" + cidr_blocks = ["0.0.0.0/0"] + ipv6_cidr_blocks = ["::/0"] + } + + tags = { + Name = "grafana-allow-security" + } +} + +resource "aws_instance" "grafana" { + ami = "ami-0409b7ddbc59e3222" + instance_type = "t3.small" + key_name = "kp-jay-bastion-datasaker" + vpc_security_group_ids = [aws_security_group.grafana-allow-security.id] + availability_zone = "ap-northeast-2c" + subnet_id = var.Public_Subnet_ID_3 + + root_block_device { + delete_on_termination = true + volume_size = 30 + } + + tags = { + Name = "grafana" + } +} + diff --git a/terraform/aws_instance/grafana/main.tf b/terraform/aws_instance/grafana/main.tf new file mode 100644 index 0000000..dd4bd35 --- /dev/null +++ b/terraform/aws_instance/grafana/main.tf @@ -0,0 +1,10 @@ +provider "aws" { + region = "ap-northeast-2" +} + +terraform { + required_providers { + archive = "~> 1.3" + } +} + diff --git a/terraform/aws_instance/grafana/terraform.tfstate b/terraform/aws_instance/grafana/terraform.tfstate new file mode 100644 index 0000000..f591daa --- /dev/null +++ b/terraform/aws_instance/grafana/terraform.tfstate @@ -0,0 +1,220 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 6, + "lineage": "816258a5-69eb-6967-f105-8709f7e2588d", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_instance", + "name": "grafana", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "ami": "ami-0409b7ddbc59e3222", + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:instance/i-08af287265bd05022", + "associate_public_ip_address": false, + "availability_zone": "ap-northeast-2c", + "capacity_reservation_specification": [ + { + "capacity_reservation_preference": "open", + "capacity_reservation_target": [] + } + ], + "cpu_core_count": 1, + "cpu_threads_per_core": 2, + "credit_specification": [ + { + "cpu_credits": "unlimited" + } + ], + "disable_api_stop": false, + "disable_api_termination": false, + "ebs_block_device": [], + "ebs_optimized": false, + "enclave_options": [ + { + "enabled": false + } + ], + "ephemeral_block_device": [], + "get_password_data": false, + "hibernation": false, + "host_id": "", + "host_resource_group_arn": null, + "iam_instance_profile": "", + "id": "i-08af287265bd05022", + "instance_initiated_shutdown_behavior": "stop", + "instance_state": "running", + "instance_type": "t3.small", + "ipv6_address_count": 0, + "ipv6_addresses": [], + "key_name": "kp-jay-bastion-datasaker", + "launch_template": [], + "maintenance_options": [ + { + "auto_recovery": "default" + } + ], + "metadata_options": [ + { + "http_endpoint": "enabled", + "http_put_response_hop_limit": 1, + "http_tokens": "optional", + "instance_metadata_tags": "disabled" + } + ], + "monitoring": false, + "network_interface": [], + "outpost_arn": "", + "password_data": "", + "placement_group": "", + "placement_partition_number": 0, + "primary_network_interface_id": "eni-073cf0ad9107c09ab", + "private_dns": "i-08af287265bd05022.ap-northeast-2.compute.internal", + "private_dns_name_options": [ + { + "enable_resource_name_dns_a_record": true, + "enable_resource_name_dns_aaaa_record": false, + "hostname_type": "resource-name" + } + ], + "private_ip": "172.24.2.212", + "public_dns": "", + "public_ip": "", + "root_block_device": [ + { + "delete_on_termination": true, + "device_name": "/dev/sda1", + "encrypted": false, + "iops": 100, + "kms_key_id": "", + "tags": null, + "throughput": 0, + "volume_id": "vol-0153e1bed3b29f8b2", + "volume_size": 30, + "volume_type": "gp2" + } + ], + "secondary_private_ips": [], + "security_groups": [], + "source_dest_check": true, + "subnet_id": "subnet-0073a61bc56a68a3e", + "tags": { + "Name": "grafana" + }, + "tags_all": { + "Name": "grafana" + }, + "tenancy": "default", + "timeouts": null, + "user_data": null, + "user_data_base64": null, + "user_data_replace_on_change": false, + "volume_tags": null, + "vpc_security_group_ids": [ + "sg-0aa579ce45269425a" + ] + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "dependencies": [ + "aws_security_group.grafana-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_security_group", + "name": "grafana-allow-security", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:security-group/sg-0aa579ce45269425a", + "description": "Allow inbound traffic", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-0aa579ce45269425a", + "ingress": [ + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "SSH", + "from_port": 22, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 22 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "TLS from grafana", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "http fron grafana", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + } + ], + "name": "grafana-allow-security-new", + "name_prefix": "", + "owner_id": "508259851457", + "revoke_rules_on_delete": false, + "tags": { + "Name": "grafana-allow-security" + }, + "tags_all": { + "Name": "grafana-allow-security" + }, + "timeouts": null, + "vpc_id": "vpc-00ba2b0e9ad59f0ed" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=" + } + ] + } + ], + "check_results": null +} diff --git a/terraform/aws_instance/grafana/terraform.tfstate.backup b/terraform/aws_instance/grafana/terraform.tfstate.backup new file mode 100644 index 0000000..835d514 --- /dev/null +++ b/terraform/aws_instance/grafana/terraform.tfstate.backup @@ -0,0 +1,98 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 4, + "lineage": "816258a5-69eb-6967-f105-8709f7e2588d", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_security_group", + "name": "grafana-allow-security", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:security-group/sg-0aa579ce45269425a", + "description": "Allow inbound traffic", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-0aa579ce45269425a", + "ingress": [ + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "SSH", + "from_port": 22, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 22 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "TLS from grafana", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "http fron grafana", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + } + ], + "name": "grafana-allow-security-new", + "name_prefix": "", + "owner_id": "508259851457", + "revoke_rules_on_delete": false, + "tags": { + "Name": "grafana-allow-security" + }, + "tags_all": { + "Name": "grafana-allow-security" + }, + "timeouts": null, + "vpc_id": "vpc-00ba2b0e9ad59f0ed" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=" + } + ] + } + ], + "check_results": null +} diff --git a/terraform/aws_instance/grafana/variables.tf b/terraform/aws_instance/grafana/variables.tf new file mode 100644 index 0000000..a6a7336 --- /dev/null +++ b/terraform/aws_instance/grafana/variables.tf @@ -0,0 +1,35 @@ +#---------------------------------------------------------------# +# Network ID + +variable "VPC_ID" { + default = "vpc-00ba2b0e9ad59f0ed" +} + +variable "Network_CIDR" { + default = "172.24.0.0/19" +} + +variable "Private_Subnet_ID_1" { + default = "subnet-024f0deda82039fa4" +} + +variable "Private_Subnet_ID_2" { + default = "subnet-050d942fa1c46540a" +} + +variable "Private_Subnet_ID_3" { + default = "subnet-0946eb806af7377be" +} + +variable "Public_Subnet_ID_1" { + default = "subnet-00c363356f133411d" +} + +variable "Public_Subnet_ID_2" { + default = "subnet-07aa5e879a262014d" +} + +variable "Public_Subnet_ID_3" { + default = "subnet-0073a61bc56a68a3e" +} + diff --git a/terraform/aws_instance/monitoring/.terraform.lock.hcl b/terraform/aws_instance/monitoring/.terraform.lock.hcl new file mode 100644 index 0000000..3f4f43d --- /dev/null +++ b/terraform/aws_instance/monitoring/.terraform.lock.hcl @@ -0,0 +1,44 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/archive" { + version = "1.3.0" + constraints = "~> 1.3" + hashes = [ + "h1:T3DszgOa/75SiiONgEDRujpN5rSqIw9TvFZXHjpqMB4=", + "zh:115aa6bc7825402a8d4e2e954378a9f48e4fdbeabe081ffd04e0a2f6786159bb", + "zh:21f731ffac20a67615c64a7a8a96949c971ee28ffd5807d8c299faba73b5e273", + "zh:2e81b58e141b175cbf801ade5e87c5db4cb28933216b0547ef32c95500385904", + "zh:3acbb96fd142b4d193dc18861340281249301368029169e346d15410d0572492", + "zh:4346edee0dfe97154b6f28d9ef0fa762131db92b78bbd1b3207945201cb59818", + "zh:93916a84cc6ff6778456dd170a657326c4dd3a86b4434e424a66a87c2535b888", + "zh:ade675c3ac8b9ec91131bac5881fbd4efad46a3683f2fea2efb9493a2c1b9ffb", + "zh:b0a0cb13fc850903aa7a057ae7e06366939b8f347926dce1137cd47b9123ad93", + "zh:d6d838cceffb7f3ff27fb9b51d78fccdef15bd32408f33a726556bfe66315bd3", + "zh:ddc4ac6aea6537f8096ffeb8ff3bca355f0972793184e0f6df120aa6460b4446", + "zh:e0d1213625d40d124bd9570f0d92907416f8d61bc8c389c776e72c0a97020cce", + "zh:eb707b69f9093b97d98e2dece9822852a27849dd1627d35302e8d6b9801407ef", + ] +} + +provider "registry.terraform.io/hashicorp/aws" { + version = "4.65.0" + hashes = [ + "h1:fbSgoS5GLuwKAZlovFvGoYl4B0Bi5T7+MmFiVZL0uOo=", + "zh:0461b8dfc14e94971bfd12783cbd5a5574b9fcfc3694b6afaa8836f90b61c1f9", + "zh:24a27e7b1f6eb33e9da6f2ffaaa6bc48e933a24224c6572d6e588994e5c7130b", + "zh:2ca189d04573414bef4876c17ccb2b76f6e721e0450f6ab3700d94d7c04bec64", + "zh:3fb0654a527677231dab2140e9a55df3b90dba478b3db50001e21a045437a47a", + "zh:4918173d9c7d2735908622c17efd01746a046f0a571690afa7dd0866f22045f7", + "zh:491d259b15166f751076d2bdc443928ca63f6c0a83b02ea75fff8b4224662207", + "zh:4ff8e178f0656f04f88558c295a1d246b1bdcf5ad81d8b3b9ccceaeca2eb7fa8", + "zh:5e4eaf2855a740124f4bbe34ac4bd22c7f320aa3e91d9cef64396ad0a1571544", + "zh:65762c60c4bac2e0d55ed8c2877e455e84465cb12f0c885363a1b561cd4f5f07", + "zh:7c5e4f85eb5f70e6da2d64701dd5551f2bc334dbb9add76bfc6a2bea6acf4483", + "zh:90d32b238113528319d7a5fade97bd8ac9a8b654482fc9056478a43d2e297886", + "zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425", + "zh:e6ed3299516a8fb2292af7e7e123d09817dfd8e039aaf35ad5a276f739668e88", + "zh:eb84fa96c63d836b3b4689835cb7c4487808dfd1ba7ddacf4d8c4c6ff65cdbef", + "zh:ff97d1498193c99c9c35afd9bfcdce011abf460ec041721727d6e542f7a3bedd", + ] +} diff --git a/terraform/aws_instance/monitoring/ec2.tf b/terraform/aws_instance/monitoring/ec2.tf new file mode 100644 index 0000000..c7147d0 --- /dev/null +++ b/terraform/aws_instance/monitoring/ec2.tf @@ -0,0 +1,41 @@ +resource "aws_instance" "monitoring" { + ami = "ami-0409b7ddbc59e3222" + instance_type = "t3.small" + key_name = "kp-jay-bastion-datasaker" + vpc_security_group_ids = [aws_security_group.monitoring-allow-security.id] + availability_zone = "ap-northeast-2c" + subnet_id = var.Public_Subnet_ID_3 + + root_block_device { + delete_on_termination = true + volume_size = 30 + } + + tags = { + Name = "monitoring" + } +} + +resource "aws_eip" "monitoring_eip" { + vpc = true + instance = aws_instance.monitoring.id + + tags = { + Name = "monitoring-eip" + } +} + +resource "aws_ebs_volume" "monitoring_ebs" { + availability_zone = aws_instance.monitoring.availability_zone + size = 100 + + tags = { + Name = "monitoring-ebs" + } +} + +resource "aws_volume_attachment" "monitoring_ebs_attach" { + device_name = "/dev/xvdf" + volume_id = aws_ebs_volume.monitoring_ebs.id + instance_id = aws_instance.monitoring.id +} diff --git a/terraform/aws_instance/monitoring/main.tf b/terraform/aws_instance/monitoring/main.tf new file mode 100644 index 0000000..dd4bd35 --- /dev/null +++ b/terraform/aws_instance/monitoring/main.tf @@ -0,0 +1,10 @@ +provider "aws" { + region = "ap-northeast-2" +} + +terraform { + required_providers { + archive = "~> 1.3" + } +} + diff --git a/terraform/aws_instance/monitoring/route53.tf b/terraform/aws_instance/monitoring/route53.tf new file mode 100644 index 0000000..cad9c10 --- /dev/null +++ b/terraform/aws_instance/monitoring/route53.tf @@ -0,0 +1,8 @@ +resource "aws_route53_record" "monitoring" { + zone_id = "${var.datasaker-io}" + name = "monitoring.kr.datasaker.io" + type = "A" + ttl = "300" + records = [aws_eip.monitoring_eip.public_ip] +} + diff --git a/terraform/aws_instance/monitoring/security_group.tf b/terraform/aws_instance/monitoring/security_group.tf new file mode 100644 index 0000000..956462d --- /dev/null +++ b/terraform/aws_instance/monitoring/security_group.tf @@ -0,0 +1,41 @@ +resource "aws_security_group" "monitoring-allow-security" { + name = "monitoring-allow-security-new" + description = "Allow inbound traffic" + vpc_id = var.VPC_ID + + ingress { + description = "SSH" + from_port = 22 + to_port = 22 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "TLS from monitoring" + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_blocks = ["118.223.123.161/32"] + } + + ingress { + description = "loki" + from_port = 31768 + to_port = 31768 + protocol = "tcp" + cidr_blocks = ["172.24.0.0/16"] + } + + egress { + from_port = 0 + to_port = 0 + protocol = "-1" + cidr_blocks = ["0.0.0.0/0"] + ipv6_cidr_blocks = ["::/0"] + } + + tags = { + Name = "monitoring-allow-security" + } +} diff --git a/terraform/aws_instance/monitoring/terraform.tfstate b/terraform/aws_instance/monitoring/terraform.tfstate new file mode 100644 index 0000000..bf02fea --- /dev/null +++ b/terraform/aws_instance/monitoring/terraform.tfstate @@ -0,0 +1,9 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 14, + "lineage": "b244d6e2-ddf9-06f1-7d1d-36ae5f9e2690", + "outputs": {}, + "resources": [], + "check_results": null +} diff --git a/terraform/aws_instance/monitoring/terraform.tfstate.backup b/terraform/aws_instance/monitoring/terraform.tfstate.backup new file mode 100644 index 0000000..d1374ed --- /dev/null +++ b/terraform/aws_instance/monitoring/terraform.tfstate.backup @@ -0,0 +1,370 @@ +{ + "version": 4, + "terraform_version": "1.3.7", + "serial": 7, + "lineage": "b244d6e2-ddf9-06f1-7d1d-36ae5f9e2690", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_ebs_volume", + "name": "monitoring_ebs", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:volume/vol-0a6f71b76b33ec00b", + "availability_zone": "ap-northeast-2c", + "encrypted": false, + "final_snapshot": false, + "id": "vol-0a6f71b76b33ec00b", + "iops": 300, + "kms_key_id": "", + "multi_attach_enabled": false, + "outpost_arn": "", + "size": 100, + "snapshot_id": "", + "tags": { + "Name": "monitoring-ebs" + }, + "tags_all": { + "Name": "monitoring-ebs" + }, + "throughput": 0, + "timeouts": null, + "type": "gp2" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjMwMDAwMDAwMDAwMH19", + "dependencies": [ + "aws_instance.monitoring", + "aws_security_group.monitoring-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_eip", + "name": "monitoring_eip", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "address": null, + "allocation_id": "eipalloc-09ba2d1ff002bc87b", + "associate_with_private_ip": null, + "association_id": "eipassoc-0f07cba160cf921d4", + "carrier_ip": "", + "customer_owned_ip": "", + "customer_owned_ipv4_pool": "", + "domain": "vpc", + "id": "eipalloc-09ba2d1ff002bc87b", + "instance": "i-084d54369608ba75d", + "network_border_group": "ap-northeast-2", + "network_interface": "eni-047d040d1d5152d9e", + "private_dns": "ip-172-24-2-44.ap-northeast-2.compute.internal", + "private_ip": "172.24.2.44", + "public_dns": "ec2-15-164-91-52.ap-northeast-2.compute.amazonaws.com", + "public_ip": "15.164.91.52", + "public_ipv4_pool": "amazon", + "tags": { + "Name": "monitoring-eip" + }, + "tags_all": { + "Name": "monitoring-eip" + }, + "timeouts": null, + "vpc": true + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ==", + "dependencies": [ + "aws_instance.monitoring", + "aws_security_group.monitoring-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_instance", + "name": "monitoring", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "ami": "ami-0409b7ddbc59e3222", + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:instance/i-084d54369608ba75d", + "associate_public_ip_address": false, + "availability_zone": "ap-northeast-2c", + "capacity_reservation_specification": [ + { + "capacity_reservation_preference": "open", + "capacity_reservation_target": [] + } + ], + "cpu_core_count": 1, + "cpu_threads_per_core": 2, + "credit_specification": [ + { + "cpu_credits": "unlimited" + } + ], + "disable_api_stop": false, + "disable_api_termination": false, + "ebs_block_device": [], + "ebs_optimized": false, + "enclave_options": [ + { + "enabled": false + } + ], + "ephemeral_block_device": [], + "get_password_data": false, + "hibernation": false, + "host_id": "", + "host_resource_group_arn": null, + "iam_instance_profile": "", + "id": "i-084d54369608ba75d", + "instance_initiated_shutdown_behavior": "stop", + "instance_state": "running", + "instance_type": "t3.small", + "ipv6_address_count": 0, + "ipv6_addresses": [], + "key_name": "kp-jay-bastion-datasaker", + "launch_template": [], + "maintenance_options": [ + { + "auto_recovery": "default" + } + ], + "metadata_options": [ + { + "http_endpoint": "enabled", + "http_put_response_hop_limit": 1, + "http_tokens": "optional", + "instance_metadata_tags": "disabled" + } + ], + "monitoring": false, + "network_interface": [], + "outpost_arn": "", + "password_data": "", + "placement_group": "", + "placement_partition_number": 0, + "primary_network_interface_id": "eni-047d040d1d5152d9e", + "private_dns": "i-084d54369608ba75d.ap-northeast-2.compute.internal", + "private_dns_name_options": [ + { + "enable_resource_name_dns_a_record": true, + "enable_resource_name_dns_aaaa_record": false, + "hostname_type": "resource-name" + } + ], + "private_ip": "172.24.2.44", + "public_dns": "", + "public_ip": "", + "root_block_device": [ + { + "delete_on_termination": true, + "device_name": "/dev/sda1", + "encrypted": false, + "iops": 100, + "kms_key_id": "", + "tags": null, + "throughput": 0, + "volume_id": "vol-0e2628f12cc09f442", + "volume_size": 30, + "volume_type": "gp2" + } + ], + "secondary_private_ips": [], + "security_groups": [], + "source_dest_check": true, + "subnet_id": "subnet-0073a61bc56a68a3e", + "tags": { + "Name": "monitoring" + }, + "tags_all": { + "Name": "monitoring" + }, + "tenancy": "default", + "timeouts": null, + "user_data": null, + "user_data_base64": null, + "user_data_replace_on_change": false, + "volume_tags": null, + "vpc_security_group_ids": [ + "sg-0cdf2dd6e68b0c3fe" + ] + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", + "dependencies": [ + "aws_security_group.monitoring-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_route53_record", + "name": "monitoring", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 2, + "attributes": { + "alias": [], + "allow_overwrite": null, + "cidr_routing_policy": [], + "failover_routing_policy": [], + "fqdn": "testmonitoring.kr.datasaker.io", + "geolocation_routing_policy": [], + "health_check_id": "", + "id": "Z072735718G25WNVKU834_testmonitoring.kr.datasaker.io_A", + "latency_routing_policy": [], + "multivalue_answer_routing_policy": false, + "name": "testmonitoring.kr.datasaker.io", + "records": [ + "15.164.91.52" + ], + "set_identifier": "", + "ttl": 300, + "type": "A", + "weighted_routing_policy": [], + "zone_id": "Z072735718G25WNVKU834" + }, + "sensitive_attributes": [], + "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", + "dependencies": [ + "aws_eip.monitoring_eip", + "aws_instance.monitoring", + "aws_security_group.monitoring-allow-security" + ] + } + ] + }, + { + "mode": "managed", + "type": "aws_security_group", + "name": "monitoring-allow-security", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:ap-northeast-2:508259851457:security-group/sg-0cdf2dd6e68b0c3fe", + "description": "Allow inbound traffic", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [ + "::/0" + ], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-0cdf2dd6e68b0c3fe", + "ingress": [ + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "SSH", + "from_port": 22, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 22 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "TLS from monitoring", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "http fron monitoring", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + } + ], + "name": "monitoring-allow-security-new", + "name_prefix": "", + "owner_id": "508259851457", + "revoke_rules_on_delete": false, + "tags": { + "Name": "monitoring-allow-security" + }, + "tags_all": { + "Name": "monitoring-allow-security" + }, + "timeouts": null, + "vpc_id": "vpc-00ba2b0e9ad59f0ed" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=" + } + ] + }, + { + "mode": "managed", + "type": "aws_volume_attachment", + "name": "monitoring_ebs_attach", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "device_name": "/dev/xvdf", + "force_detach": null, + "id": "vai-652215165", + "instance_id": "i-084d54369608ba75d", + "skip_destroy": null, + "stop_instance_before_detaching": null, + "timeouts": null, + "volume_id": "vol-0a6f71b76b33ec00b" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwfX0=", + "dependencies": [ + "aws_ebs_volume.monitoring_ebs", + "aws_instance.monitoring", + "aws_security_group.monitoring-allow-security" + ] + } + ] + } + ], + "check_results": null +} diff --git a/terraform/aws_instance/monitoring/variables.tf b/terraform/aws_instance/monitoring/variables.tf new file mode 100644 index 0000000..239037b --- /dev/null +++ b/terraform/aws_instance/monitoring/variables.tf @@ -0,0 +1,39 @@ +#---------------------------------------------------------------# +# Network ID + +variable "VPC_ID" { + default = "vpc-00ba2b0e9ad59f0ed" +} + +variable "Network_CIDR" { + default = "172.24.0.0/19" +} + +variable "Private_Subnet_ID_1" { + default = "subnet-024f0deda82039fa4" +} + +variable "Private_Subnet_ID_2" { + default = "subnet-050d942fa1c46540a" +} + +variable "Private_Subnet_ID_3" { + default = "subnet-0946eb806af7377be" +} + +variable "Public_Subnet_ID_1" { + default = "subnet-00c363356f133411d" +} + +variable "Public_Subnet_ID_2" { + default = "subnet-07aa5e879a262014d" +} + +variable "Public_Subnet_ID_3" { + default = "subnet-0073a61bc56a68a3e" +} + +variable "datasaker-io" { + default = "Z072735718G25WNVKU834" +} +