modules/app_mod_elastic/network.tf (105 lines of code) (raw):

/** * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ locals { network = ( var.create_network ? try(module.elastic_search_network.0.network.network, null) : try(data.google_compute_network.existing_network.0, null) ) subnet = ( var.create_network ? try(module.elastic_search_network.0.subnets["${var.region}/${var.subnet_name}"], null) : try(data.google_compute_subnetwork.existing_subnet.0, null) ) } data "google_compute_network" "existing_network" { count = var.create_network ? 0 : 1 project = local.project.project_id name = var.network_name } data "google_compute_subnetwork" "existing_subnet" { count = var.create_network ? 0 : 1 project = local.project.project_id name = var.subnet_name region = var.region } module "elastic_search_network" { count = var.create_network ? 1 : 0 source = "terraform-google-modules/network/google" version = "~> 5.0" project_id = local.project.project_id network_name = var.network_name routing_mode = "GLOBAL" description = "VPC Network created via Terraform" subnets = [ { subnet_name = var.subnet_name subnet_ip = var.network_cidr_block subnet_region = var.region description = "Subnetwork inside ${var.network_name} VPC network, created via Terraform" subnet_private_access = true } ] secondary_ranges = { "${var.subnet_name}" = [{ # Do not remove quotes, Terraform doesn't like variable references as map-keys without them range_name = var.pod_ip_range_name ip_cidr_range = var.pod_cidr_block }, { range_name = var.service_ip_range_name ip_cidr_range = var.service_cidr_block }] } depends_on = [ module.elastic_search_project, google_project_service.enabled_services, time_sleep.wait_120_seconds ] } // External access resource "google_compute_router" "router" { count = var.enable_internet_egress_traffic ? 1 : 0 project = local.project.project_id name = "es-access-router" network = local.network.name region = var.region bgp { asn = 64514 } } resource "google_compute_router_nat" "nat" { count = var.enable_internet_egress_traffic ? 1 : 0 project = local.project.project_id name = "es-proxy-ext-access-nat" router = google_compute_router.router[0].name region = var.region nat_ip_allocate_option = "AUTO_ONLY" source_subnetwork_ip_ranges_to_nat = "ALL_SUBNETWORKS_ALL_IP_RANGES" log_config { enable = true filter = "ERRORS_ONLY" } depends_on = [ google_project_service.enabled_services ] } resource "google_compute_route" "external_access" { count = var.enable_internet_egress_traffic ? 1 : 0 project = local.project.project_id dest_range = "0.0.0.0/0" name = "proxy-external-access" network = local.network.name next_hop_gateway = "default-internet-gateway" }