langflow/deploy/scripts/terraform/main.tf
Matheus Jacques 3fe30671d9 fix(terraform): update subnet_id in docker-swarm module to use swarm-public-subnet instead of swarm-subnet for improved clarity
feat(terraform): add aws_subnet resource for swarm-public-subnet to create a public subnet for the swarm cluster
feat(terraform): add aws_internet_gateway resource to create an internet gateway for the swarm VPC
feat(terraform): add aws_route_table resource to create a route table for the swarm VPC
feat(terraform): add aws_route_table_association resource to associate the swarm-public-subnet with the public route table
2023-08-24 17:06:23 +02:00

92 lines
2 KiB
HCL

provider "aws" {
region = "us-east-1" # Choose the region as needed
}
module "docker-swarm" {
source = "./modules/docker-swarm"
key_name = aws_key_pair.swarm-key.key_name
vpc_id = aws_vpc.swarm-vpc.id
subnet_id = aws_subnet.swarm-public-subnet.id
security_group = aws_security_group.swarm-sg.id
instance_type = "t2.micro" # Choose the instance type as needed
manager_count = 1
worker_count = 10 # This is the number of services in the docker-compose.yml file
}
resource "aws_key_pair" "swarm-key" {
key_name = "swarm-key"
public_key = file("~/.ssh/id_rsa.pub")
}
resource "aws_vpc" "swarm-vpc" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
}
resource "aws_subnet" "swarm-private-subnet" {
vpc_id = aws_vpc.swarm-vpc.id
cidr_block = "10.0.1.0/24"
}
resource "aws_subnet" "swarm-public-subnet" {
vpc_id = aws_vpc.swarm-vpc.id
cidr_block = "10.0.2.0/24"
}
resource "aws_internet_gateway" "igw" {
vpc_id = aws_vpc.swarm-vpc.id
}
resource "aws_route_table" "public_rt" {
vpc_id = aws_vpc.swarm-vpc.id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.igw.id
}
}
resource "aws_route_table_association" "public_subnet_asso" {
subnet_id = aws_subnet.swarm-public-subnet.id
route_table_id = aws_route_table.public_rt.id
}
resource "aws_security_group" "swarm-sg" {
vpc_id = aws_vpc.swarm-vpc.id
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 2376
to_port = 2377
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 7946
to_port = 7946
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 4789
to_port = 4789
protocol = "udp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
}