-
Notifications
You must be signed in to change notification settings - Fork 0
/
consul-policy.tf
32 lines (27 loc) · 1.42 KB
/
consul-policy.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
module "server_iam_policies" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-iam-policies?ref=v0.3.3"
iam_role_id = "${module.nomad_cluster_servers.iam_role_id}"
}
module "consul_server_security_group_rules" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-client-security-group-rules?ref=v0.3.3"
security_group_id = "${module.nomad_cluster_servers.security_group_id}"
allowed_inbound_cidr_blocks = ["${var.vpc_cidr}"]
}
module "client_iam_policies" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-iam-policies?ref=v0.3.3"
iam_role_id = "${module.nomad_cluster_clients.iam_role_id}"
}
module "consul_client_security_group_rules" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-client-security-group-rules?ref=v0.3.3"
security_group_id = "${module.nomad_cluster_clients.security_group_id}"
allowed_inbound_cidr_blocks = ["${var.vpc_cidr}"]
}
module "vault_iam_policies" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-iam-policies?ref=v0.3.3"
iam_role_id = "${module.vault_cluster.iam_role_id}"
}
module "consul_vault_security_group_rules" {
source = "git::[email protected]:hashicorp/terraform-aws-consul//modules/consul-security-group-rules?ref=v0.3.3"
security_group_id = "${module.vault_cluster.security_group_id}"
allowed_inbound_cidr_blocks = ["${var.vpc_cidr}"]
}