#2 Terraform configuration for given assignment

クローズ
aashish-fiftyfive aashish-fiftyfive/terraform から LiveLike/main への 7 コミットのマージを希望しています
aashish-fiftyfive1 年間 前 にコメントしました

Code structure is mentioned in the file name code_structure.txt

Explanation -

  • Module approach is used to work on this assignment to package the resources into two different directories names ec2 and vpc present in modules directory and they are explained below -

    • ec2 - Security group for LoadBalancer and EC2, LoadBalancer with its listener and target group, Launch template with Autoscaling group.
    • vpc - VPC configuration with public and private subnets, InternetGateway and NATGateway with Route tables and its routes.
  • terraform.tfvars has all the configuration for the module variables.

  • terraform.tf has module block to call modules ec2 and vpc.

  • Use of count and for_each functions while creating multiple subnets or multiple ingress / egress security group rules.

  • Note -

    • In terraform.tfvars their is commented block of listeners from L76-L93 due to certificate_arn argument which is required for HTTPS listener, if given correct value for the arn then redirect HTTP_301 will work absolutely fine
Code structure is mentioned in the file name `code_structure.txt` Explanation - * Module approach is used to work on this assignment to package the resources into two different directories names `ec2` and `vpc` present in `modules` directory and they are explained below - * `ec2` - Security group for LoadBalancer and EC2, LoadBalancer with its listener and target group, Launch template with Autoscaling group. * `vpc` - VPC configuration with public and private subnets, InternetGateway and NATGateway with Route tables and its routes. * `terraform.tfvars` has all the configuration for the module variables. * `terraform.tf` has module block to call modules `ec2` and `vpc`. * Use of `count` and `for_each` functions while creating multiple subnets or multiple ingress / egress security group rules. * Note - * In `terraform.tfvars` their is commented block of listeners from L76-L93 due to `certificate_arn` argument which is required for HTTPS listener, if given correct value for the arn then redirect HTTP_301 will work absolutely fine
benw 1 年間 前 に閉じられました
マージ操作を実行するには、このプルリクエストを再び開いてください。
会話に参加するには サインイン してください。
ラベルなし
マイルストーンなし
担当者なし
1 参加者
読み込み中…
キャンセル
保存
まだコンテンツがありません