updated firewall rules for naemon
This commit is contained in:
parent
04a8104515
commit
954a2d70a8
1 changed files with 73 additions and 2 deletions
75
main.tf
75
main.tf
|
@ -13,6 +13,77 @@ required_version = ">= 0.14.0"
|
||||||
provider "openstack" {
|
provider "openstack" {
|
||||||
cloud = "sto4-rut"
|
cloud = "sto4-rut"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_secgroup_v2" "naemon" {
|
||||||
|
name = "naemon"
|
||||||
|
description = "Rule to allow naemon traffic"
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule1" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv4"
|
||||||
|
protocol = "tcp"
|
||||||
|
port_range_min = 4317
|
||||||
|
port_range_max = 4318
|
||||||
|
remote_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule2" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv6"
|
||||||
|
protocol = "tcp"
|
||||||
|
port_range_min = 4317
|
||||||
|
port_range_max = 4318
|
||||||
|
remote_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule3" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv4"
|
||||||
|
protocol = "icmp"
|
||||||
|
remote_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule4" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv6"
|
||||||
|
protocol = "icmp"
|
||||||
|
remote_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule5" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv4"
|
||||||
|
protocol = "tcp"
|
||||||
|
remote_ip_prefix = "109.105.111.111/32"
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule6" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv6"
|
||||||
|
protocol = "tcp"
|
||||||
|
remote_ip_prefix = "2001:948:4:6::111/128"
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule7" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv4"
|
||||||
|
protocol = "tcp"
|
||||||
|
port_range_min = 5666
|
||||||
|
port_range_max = 5666
|
||||||
|
remote_ip_prefix = "89.46.21.190/32"
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
|
resource "openstack_networking_secgroup_rule_v2" "naemon_rule8" {
|
||||||
|
direction = "ingress"
|
||||||
|
ethertype = "IPv6"
|
||||||
|
protocol = "tcp"
|
||||||
|
port_range_min = 5666
|
||||||
|
port_range_max = 5666
|
||||||
|
remote_ip_prefix = "2001:6b0:6c::37f/128"
|
||||||
|
security_group_id = openstack_networking_secgroup_v2.naemon.id
|
||||||
|
}
|
||||||
resource "openstack_networking_secgroup_v2" "https" {
|
resource "openstack_networking_secgroup_v2" "https" {
|
||||||
name = "https"
|
name = "https"
|
||||||
description = "Traffic to allow between microk8s hosts"
|
description = "Traffic to allow between microk8s hosts"
|
||||||
|
@ -97,7 +168,7 @@ resource "openstack_compute_instance_v2" "monitor-node" {
|
||||||
name = "internal-sto4-prod-monitor-1.${var.dns_suffix}"
|
name = "internal-sto4-prod-monitor-1.${var.dns_suffix}"
|
||||||
flavor_name = "${var.monitor_instance_type}"
|
flavor_name = "${var.monitor_instance_type}"
|
||||||
key_pair = "thorslund"
|
key_pair = "thorslund"
|
||||||
security_groups = ["https", "Allow SSH from SUNET jumphosts",]
|
security_groups = ["https", "Allow SSH from SUNET jumphosts", "naemon"]
|
||||||
|
|
||||||
|
|
||||||
block_device {
|
block_device {
|
||||||
|
@ -120,7 +191,7 @@ resource "openstack_compute_instance_v2" "satosa-node" {
|
||||||
name = "internal-sto4-prod-satosa-1.${var.dns_suffix}"
|
name = "internal-sto4-prod-satosa-1.${var.dns_suffix}"
|
||||||
flavor_name = "${var.monitor_instance_type}"
|
flavor_name = "${var.monitor_instance_type}"
|
||||||
key_pair = "thorslund"
|
key_pair = "thorslund"
|
||||||
security_groups = ["https", "Allow SSH from SUNET jumphosts",]
|
security_groups = ["https", "Allow SSH from SUNET jumphosts", "naemon"]
|
||||||
|
|
||||||
|
|
||||||
block_device {
|
block_device {
|
||||||
|
|
Loading…
Add table
Reference in a new issue