-
Notifications
You must be signed in to change notification settings - Fork 96
/
main_vpc.tf
112 lines (89 loc) · 3.29 KB
/
main_vpc.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
/*Add a new set of data.aws_iam_policy_document, aws_elasticsearch_domain, aws_elasticsearch_domain_policy. Because currently terraform/aws_elasticsearch_domain
does not handle properly null/empty "vpc_options" */
data "aws_iam_policy_document" "es_vpc_management_access" {
count = local.inside_vpc ? 1 : 0
statement {
actions = [
"es:*",
]
resources = [
aws_elasticsearch_domain.es_vpc[0].arn,
"${aws_elasticsearch_domain.es_vpc[0].arn}/*",
]
principals {
type = "AWS"
identifiers = distinct(compact(var.management_iam_roles))
}
}
}
resource "aws_iam_service_linked_role" "es" {
count = var.create_iam_service_linked_role ? 1 : 0
aws_service_name = "es.amazonaws.com"
}
resource "aws_elasticsearch_domain" "es_vpc" {
count = local.inside_vpc ? 1 : 0
depends_on = [aws_iam_service_linked_role.es]
domain_name = local.domain_name
elasticsearch_version = var.es_version
encrypt_at_rest {
enabled = var.encrypt_at_rest
kms_key_id = var.kms_key_id
}
domain_endpoint_options {
enforce_https = var.enforce_https
tls_security_policy = var.tls_security_policy
}
cluster_config {
instance_type = var.instance_type
instance_count = var.instance_count
dedicated_master_enabled = var.instance_count >= var.dedicated_master_threshold ? true : false
dedicated_master_count = var.instance_count >= var.dedicated_master_threshold ? 3 : 0
dedicated_master_type = var.instance_count >= var.dedicated_master_threshold ? var.dedicated_master_type != "false" ? var.dedicated_master_type : var.instance_type : ""
zone_awareness_enabled = var.es_zone_awareness
dynamic "zone_awareness_config" {
for_each = var.es_zone_awareness ? [var.es_zone_awareness_count] : []
content {
availability_zone_count = zone_awareness_config.value
}
}
}
advanced_options = var.advanced_options
dynamic "log_publishing_options" {
for_each = var.log_publishing_options
content {
# TF-UPGRADE-TODO: The automatic upgrade tool can't predict
# which keys might be set in maps assigned here, so it has
# produced a comprehensive set here. Consider simplifying
# this after confirming which keys can be set in practice.
cloudwatch_log_group_arn = log_publishing_options.value.cloudwatch_log_group_arn
enabled = lookup(log_publishing_options.value, "enabled", null)
log_type = log_publishing_options.value.log_type
}
}
node_to_node_encryption {
enabled = var.node_to_node_encryption_enabled
}
vpc_options {
subnet_ids = var.vpc_options["subnet_ids"]
security_group_ids = var.vpc_options["security_group_ids"]
}
ebs_options {
ebs_enabled = var.ebs_volume_size > 0 ? true : false
volume_size = var.ebs_volume_size
volume_type = var.ebs_volume_type
}
snapshot_options {
automated_snapshot_start_hour = var.snapshot_start_hour
}
tags = merge(
{
"Domain" = local.domain_name
},
var.tags,
)
}
resource "aws_elasticsearch_domain_policy" "es_vpc_management_access" {
count = local.inside_vpc ? 1 : 0
domain_name = local.domain_name
access_policies = data.aws_iam_policy_document.es_vpc_management_access[0].json
}