File tree Expand file tree Collapse file tree 5 files changed +16
-11
lines changed
Expand file tree Collapse file tree 5 files changed +16
-11
lines changed Original file line number Diff line number Diff line change @@ -133,7 +133,7 @@ POLICY
133133}
134134
135135resource "aws_iam_service_linked_role" "elasticsearch" {
136- count = var. sandbox ? 0 : 1
136+ count = var. sandbox ? 0 : 1
137137 aws_service_name = " es.amazonaws.com"
138138}
139139
@@ -161,10 +161,10 @@ resource "aws_security_group_rule" "vpn_to_elasticsearch" {
161161 description = " Allow VPN hosts to communicate with ElasticSearch instances."
162162 protocol = " tcp"
163163 security_group_id = aws_security_group. elasticsearch . id
164- cidr_blocks = [data . terraform_remote_state . alm_remote_state . outputs . vpc_cidr_block ]
165- from_port = 443
166- to_port = 443
167- type = " ingress"
164+ cidr_blocks = [data . terraform_remote_state . alm_remote_state . outputs . vpc_cidr_block ]
165+ from_port = 443
166+ to_port = 443
167+ type = " ingress"
168168}
169169
170170resource "aws_security_group_rule" "elasticsearch_intra_cluster" {
Original file line number Diff line number Diff line change @@ -36,7 +36,7 @@ resource "aws_security_group_rule" "eks_workers_to_redis" {
3636}
3737
3838resource "aws_elasticache_subnet_group" "redis_cache_subnet" {
39- name = " redis-cache-subnet-${ terraform . workspace } "
39+ name = " redis-cache-subnet-${ terraform . workspace } "
4040 subnet_ids = module. vpc . private_subnets
4141}
4242
Original file line number Diff line number Diff line change @@ -61,7 +61,7 @@ resource "aws_s3_bucket_public_access_block" "os_hosted_datasets_s3_access" {
6161}
6262
6363resource "aws_s3_bucket_policy" "os_hosted_datasets_ssl_policy" {
64- depends_on = [ aws_s3_bucket_public_access_block . os_hosted_datasets_s3_access ]
64+ depends_on = [aws_s3_bucket_public_access_block . os_hosted_datasets_s3_access ]
6565
6666 bucket = aws_s3_bucket. os_hosted_datasets . id
6767
@@ -112,7 +112,7 @@ resource "aws_s3_bucket_public_access_block" "ckan_s3_access" {
112112}
113113
114114resource "aws_s3_bucket_policy" "ckan_ssl_policy" {
115- depends_on = [ aws_s3_bucket_public_access_block . ckan_s3_access ]
115+ depends_on = [aws_s3_bucket_public_access_block . ckan_s3_access ]
116116
117117 bucket = aws_s3_bucket. ckan . id
118118
@@ -178,7 +178,7 @@ resource "aws_s3_bucket_public_access_block" "andi_public_sample_datasets_access
178178}
179179
180180resource "aws_s3_bucket_policy" "andi_ssl_policy" {
181- depends_on = [ aws_s3_bucket_public_access_block . andi_public_sample_datasets_access ]
181+ depends_on = [aws_s3_bucket_public_access_block . andi_public_sample_datasets_access ]
182182
183183 bucket = aws_s3_bucket. andi_public_sample_datasets . id
184184
Original file line number Diff line number Diff line change @@ -47,6 +47,11 @@ module "vpc" {
4747 private_subnet_tags = {
4848 " kubernetes.io/role/internal-elb" = " "
4949 " kubernetes.io/role/alb-ingress" = " "
50+ " Visibility" = " private"
51+ }
52+
53+ public_subnet_tags = {
54+ " Visibility" = " public"
5055 }
5156
5257 tags = {
@@ -60,7 +65,7 @@ module "vpc" {
6065resource "aws_db_subnet_group" "default" {
6166 name = " environment db ${ terraform . workspace } subnet group"
6267 description = " DB Subnet Group"
63- subnet_ids = module. vpc . private_subnets
68+ subnet_ids = module. vpc . private_subnets
6469
6570 tags = {
6671 Name = " Subnet Group for Environment ${ terraform . workspace } VPC"
You can’t perform that action at this time.
0 commit comments