diff --git a/terraform/aws_instance/monitoring/ec2.tf b/terraform/aws_instance/monitoring/ec2.tf index 491e7e7..d101f67 100644 --- a/terraform/aws_instance/monitoring/ec2.tf +++ b/terraform/aws_instance/monitoring/ec2.tf @@ -24,7 +24,7 @@ resource "aws_security_group" "grafana-allow-security" { from_port = 443 to_port = 443 protocol = "tcp" - cidr_blocks = ["118.223.123.161/32"] + cidr_blocks = ["118.223.123.161/32", "39.115.183.138/32"] } # ingress { diff --git a/terraform/aws_instance/monitoring/terraform.tfstate b/terraform/aws_instance/monitoring/terraform.tfstate index 8e6a7fb..e4dfac1 100644 --- a/terraform/aws_instance/monitoring/terraform.tfstate +++ b/terraform/aws_instance/monitoring/terraform.tfstate @@ -1,7 +1,7 @@ { "version": 4, "terraform_version": "1.5.7", - "serial": 16, + "serial": 18, "lineage": "816258a5-69eb-6967-f105-8709f7e2588d", "outputs": {}, "resources": [ @@ -171,6 +171,20 @@ ], "id": "sg-0aa579ce45269425a", "ingress": [ + { + "cidr_blocks": [ + "118.223.123.161/32", + "39.115.183.138/32" + ], + "description": "Allow TLS traffic", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, { "cidr_blocks": [ "118.223.123.161/32" @@ -197,19 +211,6 @@ "self": false, "to_port": 22 }, - { - "cidr_blocks": [ - "118.223.123.161/32" - ], - "description": "Allow TLS traffic", - "from_port": 443, - "ipv6_cidr_blocks": [], - "prefix_list_ids": [], - "protocol": "tcp", - "security_groups": [], - "self": false, - "to_port": 443 - }, { "cidr_blocks": [ "172.31.0.0/16" diff --git a/terraform/aws_instance/monitoring/terraform.tfstate.backup b/terraform/aws_instance/monitoring/terraform.tfstate.backup index 3c864f6..8e6a7fb 100644 --- a/terraform/aws_instance/monitoring/terraform.tfstate.backup +++ b/terraform/aws_instance/monitoring/terraform.tfstate.backup @@ -1,7 +1,7 @@ { "version": 4, "terraform_version": "1.5.7", - "serial": 14, + "serial": 16, "lineage": "816258a5-69eb-6967-f105-8709f7e2588d", "outputs": {}, "resources": [ @@ -175,20 +175,7 @@ "cidr_blocks": [ "118.223.123.161/32" ], - "description": "", - "from_port": 443, - "ipv6_cidr_blocks": [], - "prefix_list_ids": [], - "protocol": "tcp", - "security_groups": [], - "self": false, - "to_port": 443 - }, - { - "cidr_blocks": [ - "118.223.123.161/32" - ], - "description": "", + "description": "Allow HTTP traffic", "from_port": 80, "ipv6_cidr_blocks": [], "prefix_list_ids": [], @@ -210,6 +197,19 @@ "self": false, "to_port": 22 }, + { + "cidr_blocks": [ + "118.223.123.161/32" + ], + "description": "Allow TLS traffic", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, { "cidr_blocks": [ "172.31.0.0/16"