tp-cloud/terraform/modules/network/main.tf

82 lines
1.8 KiB
Terraform
Raw Normal View History

2024-12-04 16:30:49 +01:00
# VPC
2024-12-04 16:37:45 +01:00
resource "google_compute_network" "vpc" {
2024-12-04 16:30:49 +01:00
name = "tp7"
auto_create_subnetworks = false
}
# Sous-réseau frontend
resource "google_compute_subnetwork" "frontend" {
name = "frontend"
network = google_compute_network.vpc.id
ip_cidr_range = var.frontend_cidr
region = "europe-west4"
}
# Sous-réseau backend
resource "google_compute_subnetwork" "backend" {
name = "backend"
network = google_compute_network.vpc.id
ip_cidr_range = var.backend_cidr
region = "europe-west4"
}
# Sous-réseau database
resource "google_compute_subnetwork" "database" {
name = "database"
network = google_compute_network.vpc.id
ip_cidr_range = var.database_cidr
region = "europe-west4"
}
# Règle de pare-feu
resource "google_compute_firewall" "allow_ssh" {
name = "allow-ssh"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["ssh"]
}
resource "google_compute_firewall" "allow_http" {
name = "allow-http"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["80, 443"]
}
source_ranges = ["0.0.0.0/0"]
target_tags = ["web"]
}
resource "google_compute_firewall" "allow_front-to-back" {
name = "allow-front-to-back"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["8080"]
}
source_ranges = ["frontend"]
target_tags = ["backend"]
}
resource "google_compute_firewall" "allow_back-to-db" {
name = "allow-back-to-db"
network = google_compute_network.vpc.id
allow {
protocol = "tcp"
ports = ["3306"]
}
source_ranges = ["backend"]
target_tags = ["database"]
}