This commit is contained in:
James Boutaric
2025-12-04 10:15:36 +01:00
parent 540fb6c634
commit cfeee8df7f
13 changed files with 220 additions and 214 deletions

View File

@@ -1,87 +1,88 @@
resource "google_compute_network" "vpc" {
name = "mon-vpc"
# À vous de créer :
# 1. Un VPC personnalisé avec auto_create_subnetworks = false
# 2. Trois sous-réseaux (frontend, backend, database)
# 3. Règles de firewall :
# - HTTP/HTTPS vers frontend
# - SSH vers toutes les instances
# - Port 8000 de frontend vers backend
# - Port 3306 de backend vers database
# VPC
resource "google_compute_network" "vpc_terraform" {
name = "vpc-terraform-2"
auto_create_subnetworks = false
}
# Sous-réseau
resource "google_compute_subnetwork" "frontend_network" {
name = "mon-frontend"
network = google_compute_network.vpc.id
resource "google_compute_subnetwork" "subnet_frontend" {
name = "frontend-2"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.frontend_cidr
region = var.region
}
resource "google_compute_subnetwork" "backend_network" {
name = "mon-backend"
network = google_compute_network.vpc.id
resource "google_compute_subnetwork" "subnet_backend" {
name = "backend-2"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.backend_cidr
region = var.region
}
resource "google_compute_subnetwork" "database_network" {
name = "mon-database"
network = google_compute_network.vpc.id
resource "google_compute_subnetwork" "subnet_database" {
name = "database-2"
network = google_compute_network.vpc_terraform.id
ip_cidr_range = var.database_cidr
region = var.region
}
resource "google_compute_firewall" "ssh_firewall" {
name = "mon-ssh"
network = google_compute_network.vpc.id
resource "google_compute_firewall" "allow_user_frontend" {
name = "allow-user-frontend-2"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["ssh"]
}
resource "google_compute_firewall" "frontend_firewall" {
name = "frontend"
network = google_compute_network.vpc.id
allow {
allow {
protocol = "tcp"
ports = ["80", "443"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["frontend"]
target_tags = ["frontend"]
}
resource "google_compute_firewall" "backend_firewall" {
name = "backend"
network = google_compute_network.vpc.id
resource "google_compute_firewall" "allow_frontend_backend" {
name = "allow-frontend-backend-2"
network = google_compute_network.vpc_terraform.id
allow {
allow {
protocol = "tcp"
ports = ["8000"]
}
source_tags = ["frontend"]
target_tags = ["backend"]
target_tags = ["backend"]
}
resource "google_compute_firewall" "database_firewall" {
name = "database"
network = google_compute_network.vpc.id
resource "google_compute_firewall" "allow_ssh_all" {
name = "allow-ssh-all-2"
network = google_compute_network.vpc_terraform.id
allow {
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["ssh"]
}
resource "google_compute_firewall" "allow_backend_database" {
name = "allow-backend-database-2"
network = google_compute_network.vpc_terraform.id
allow {
protocol = "tcp"
ports = ["3306"]
}
source_tags = ["backend"]
target_tags = ["database"]
}
target_tags = ["database"]
}