1
0
forked from pierront/but3-iac
Files
but3-iac-dick/terraform/modules/network/main.tf

102 lines
2.6 KiB
Terraform
Raw Normal View History

2025-12-03 16:33:17 +01:00
resource "google_compute_network" "vpc" {
name = "${var.project_name}-vpc"
auto_create_subnetworks = false
}
2025-12-03 16:53:20 +01:00
resource "google_compute_subnetwork" "frontend_network" {
name = "${var.project_name}-frontend-subnet"
2025-12-03 16:33:17 +01:00
network = google_compute_network.vpc.id
2025-12-03 16:53:20 +01:00
ip_cidr_range = var.frontend_cidr
2025-12-03 16:33:17 +01:00
region = var.region
}
2025-12-03 16:53:20 +01:00
resource "google_compute_subnetwork" "backend_network" {
name = "${var.project_name}-backend-subnet"
2025-12-03 16:33:17 +01:00
network = google_compute_network.vpc.id
2025-12-03 16:53:20 +01:00
ip_cidr_range = var.backend_cidr
2025-12-03 16:33:17 +01:00
region = var.region
}
2025-12-03 16:53:20 +01:00
resource "google_compute_subnetwork" "database_network" {
name = "${var.project_name}-database-subnet"
2025-12-03 16:33:17 +01:00
network = google_compute_network.vpc.id
2025-12-03 16:53:20 +01:00
ip_cidr_range = var.database_cidr
2025-12-03 16:33:17 +01:00
region = var.region
}
resource "google_compute_firewall" "ssh_firewall" {
2025-12-04 10:46:51 +01:00
name = "${var.project_name}-ssh"
network = google_compute_network.vpc.name
direction = "INGRESS"
priority = 1000
target_tags = ["ssh"]
2025-12-03 16:53:20 +01:00
source_ranges = [var.ssh_source_ranges]
2025-12-03 16:33:17 +01:00
2025-12-03 16:53:20 +01:00
allow {
2025-12-03 16:33:17 +01:00
protocol = "tcp"
ports = ["22"]
}
}
resource "google_compute_firewall" "frontend_firewall" {
2025-12-04 10:46:51 +01:00
name = "${var.project_name}-frontend-http-https"
network = google_compute_network.vpc.name
direction = "INGRESS"
priority = 1000
target_tags = ["frontend"]
2025-12-03 16:53:20 +01:00
source_ranges = ["0.0.0.0/0"]
2025-12-03 16:33:17 +01:00
2025-12-03 16:53:20 +01:00
allow {
2025-12-03 16:33:17 +01:00
protocol = "tcp"
ports = ["80", "443"]
}
}
resource "google_compute_firewall" "backend_firewall" {
2025-12-03 16:53:20 +01:00
name = "${var.project_name}-frontend-to-backend-8000"
network = google_compute_network.vpc.name
direction = "INGRESS"
priority = 1000
target_tags = ["backend"]
source_tags = ["frontend"]
2025-12-03 16:33:17 +01:00
2025-12-03 16:53:20 +01:00
allow {
2025-12-03 16:33:17 +01:00
protocol = "tcp"
ports = ["8000"]
}
}
resource "google_compute_firewall" "database_firewall" {
2025-12-03 16:53:20 +01:00
name = "${var.project_name}-backend-to-database-3306"
network = google_compute_network.vpc.name
direction = "INGRESS"
priority = 1000
target_tags = ["database"]
source_tags = ["backend"]
2025-12-03 16:33:17 +01:00
2025-12-03 16:53:20 +01:00
allow {
2025-12-03 16:33:17 +01:00
protocol = "tcp"
ports = ["3306"]
}
}
2025-12-04 11:03:27 +01:00
resource "google_compute_router" "nat_router" {
name = "${var.project_name}-nat-router"
region = var.region
network = google_compute_network.vpc.id
}
resource "google_compute_router_nat" "nat_config" {
name = "${var.project_name}-cloud-nat"
router = google_compute_router.nat_router.name
region = var.region
nat_ip_allocate_option = "AUTO_ONLY"
source_subnetwork_ip_ranges_to_nat = "ALL_SUBNETWORKS_ALL_IP_RANGES"
log_config {
enable = true
filter = "ALL"
}
}