From 34940790aca0a5bd880224c4377aa80073372352 Mon Sep 17 00:00:00 2001 From: geezo Date: Sun, 2 Mar 2025 23:39:02 +0000 Subject: [PATCH] checking in --- main.tf | 37 +++++++++-- terraform.tfstate | 130 +++++++++++++++++++++++++++++++-------- terraform.tfstate.backup | 105 +++++++++++++++++++++++++++++++ 3 files changed, 242 insertions(+), 30 deletions(-) create mode 100644 terraform.tfstate.backup diff --git a/main.tf b/main.tf index 01b99d2..90827a4 100644 --- a/main.tf +++ b/main.tf @@ -3,14 +3,35 @@ provider "aws" { } resource "aws_security_group" "ec2_sg" { - name = "pangolin-sg" + name = "aviary-sg" description = "Allow SSH inbound traffic" ingress { from_port = 22 to_port = 22 protocol = "tcp" - cidr_blocks = ["0.0.0.0/0"] # Open to all, restrict this for security + cidr_blocks = ["108.237.185.23/32"] + } + + ingress { + from_port = 80 + to_port = 80 + protocol = "tcp" + cidr_blocks = ["0.0.0.0/0"] + } + + ingress { + from_port = 443 + to_port = 443 + protocol = "tcp" + cidr_blocks = ["0.0.0.0/0"] + } + + ingress { + from_port = 51820 + to_port = 51820 + protocol = "udp" + cidr_blocks = ["0.0.0.0/0"] } egress { @@ -22,17 +43,21 @@ resource "aws_security_group" "ec2_sg" { } resource "aws_instance" "ec2_vm" { - ami = "ami-05b10e08d247fb927" # Replace with a valid AMI ID for your region + ami = "ami-02a53b0d62d37a757" # Replace with a valid AMI ID for your region instance_type = "t2.micro" # Free tier eligible instance type security_groups = [aws_security_group.ec2_sg.name] key_name = "theocorp" # Replace with your AWS key pair name tags = { - Name = "pangolin" + Name = "aviary" } } +resource "aws_eip" "ec2_eip" { + instance = aws_instance.ec2_vm.id +} + output "instance_public_ip" { description = "Public IP of the EC2 instance" - value = aws_instance.ec2_vm.public_ip -} + value = aws_eip.ec2_eip.public_ip +} \ No newline at end of file diff --git a/terraform.tfstate b/terraform.tfstate index 1b477c7..1feaad0 100644 --- a/terraform.tfstate +++ b/terraform.tfstate @@ -1,15 +1,58 @@ { "version": 4, "terraform_version": "1.10.5", - "serial": 3, + "serial": 35, "lineage": "1548454c-cf7f-9153-d2ca-6d37af1f5a24", "outputs": { "instance_public_ip": { - "value": "34.238.243.13", + "value": "44.210.184.15", "type": "string" } }, "resources": [ + { + "mode": "managed", + "type": "aws_eip", + "name": "ec2_eip", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "address": null, + "allocation_id": "eipalloc-0f33067513f18436b", + "arn": "arn:aws:ec2:us-east-1:874570603861:elastic-ip/eipalloc-0f33067513f18436b", + "associate_with_private_ip": null, + "association_id": "eipassoc-0c1dea378de308774", + "carrier_ip": "", + "customer_owned_ip": "", + "customer_owned_ipv4_pool": "", + "domain": "vpc", + "id": "eipalloc-0f33067513f18436b", + "instance": "i-0434f1dba567a3cd7", + "ipam_pool_id": null, + "network_border_group": "us-east-1", + "network_interface": "eni-0ac9da47e8ed218a9", + "private_dns": "ip-172-31-83-214.ec2.internal", + "private_ip": "172.31.83.214", + "ptr_record": "", + "public_dns": "ec2-44-210-184-15.compute-1.amazonaws.com", + "public_ip": "44.210.184.15", + "public_ipv4_pool": "amazon", + "tags": null, + "tags_all": {}, + "timeouts": null, + "vpc": true + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ==", + "dependencies": [ + "aws_instance.ec2_vm", + "aws_security_group.ec2_sg" + ] + } + ] + }, { "mode": "managed", "type": "aws_instance", @@ -19,8 +62,8 @@ { "schema_version": 1, "attributes": { - "ami": "ami-05b10e08d247fb927", - "arn": "arn:aws:ec2:us-east-1:874570603861:instance/i-0e29c8cbbf71c2ee0", + "ami": "ami-02a53b0d62d37a757", + "arn": "arn:aws:ec2:us-east-1:874570603861:instance/i-0434f1dba567a3cd7", "associate_public_ip_address": true, "availability_zone": "us-east-1a", "capacity_reservation_specification": [ @@ -59,7 +102,7 @@ "host_id": "", "host_resource_group_arn": null, "iam_instance_profile": "", - "id": "i-0e29c8cbbf71c2ee0", + "id": "i-0434f1dba567a3cd7", "instance_initiated_shutdown_behavior": "stop", "instance_lifecycle": "", "instance_market_options": [], @@ -78,8 +121,8 @@ { "http_endpoint": "enabled", "http_protocol_ipv6": "disabled", - "http_put_response_hop_limit": 2, - "http_tokens": "required", + "http_put_response_hop_limit": 1, + "http_tokens": "optional", "instance_metadata_tags": "disabled" } ], @@ -89,8 +132,8 @@ "password_data": "", "placement_group": "", "placement_partition_number": 0, - "primary_network_interface_id": "eni-001ca41a4fe48c860", - "private_dns": "ip-172-31-89-239.ec2.internal", + "primary_network_interface_id": "eni-0ac9da47e8ed218a9", + "private_dns": "ip-172-31-83-214.ec2.internal", "private_dns_name_options": [ { "enable_resource_name_dns_a_record": false, @@ -98,36 +141,36 @@ "hostname_type": "ip-name" } ], - "private_ip": "172.31.89.239", - "public_dns": "ec2-34-238-243-13.compute-1.amazonaws.com", - "public_ip": "34.238.243.13", + "private_ip": "172.31.83.214", + "public_dns": "ec2-44-204-11-42.compute-1.amazonaws.com", + "public_ip": "44.204.11.42", "root_block_device": [ { "delete_on_termination": true, "device_name": "/dev/xvda", "encrypted": false, - "iops": 3000, + "iops": 100, "kms_key_id": "", "tags": {}, "tags_all": {}, - "throughput": 125, - "volume_id": "vol-0e5fb766eb12bbde8", + "throughput": 0, + "volume_id": "vol-0d3cf7178ed164cb7", "volume_size": 8, - "volume_type": "gp3" + "volume_type": "gp2" } ], "secondary_private_ips": [], "security_groups": [ - "pangolin-sg" + "aviary-sg" ], "source_dest_check": true, "spot_instance_request_id": "", "subnet_id": "subnet-02a8be59a072d7d45", "tags": { - "Name": "pangolin" + "Name": "aviary" }, "tags_all": { - "Name": "pangolin" + "Name": "aviary" }, "tenancy": "default", "timeouts": null, @@ -136,7 +179,7 @@ "user_data_replace_on_change": false, "volume_tags": null, "vpc_security_group_ids": [ - "sg-0d82734bca1c8db50" + "sg-0b751004f80b5fe74" ] }, "sensitive_attributes": [], @@ -156,7 +199,7 @@ { "schema_version": 1, "attributes": { - "arn": "arn:aws:ec2:us-east-1:874570603861:security-group/sg-0d82734bca1c8db50", + "arn": "arn:aws:ec2:us-east-1:874570603861:security-group/sg-0b751004f80b5fe74", "description": "Allow SSH inbound traffic", "egress": [ { @@ -173,13 +216,52 @@ "to_port": 0 } ], - "id": "sg-0d82734bca1c8db50", + "id": "sg-0b751004f80b5fe74", "ingress": [ { "cidr_blocks": [ "0.0.0.0/0" ], "description": "", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 51820, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "udp", + "security_groups": [], + "self": false, + "to_port": 51820 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + }, + { + "cidr_blocks": [ + "108.237.185.23/32" + ], + "description": "", "from_port": 22, "ipv6_cidr_blocks": [], "prefix_list_ids": [], @@ -189,11 +271,11 @@ "to_port": 22 } ], - "name": "pangolin-sg", + "name": "aviary-sg", "name_prefix": "", "owner_id": "874570603861", "revoke_rules_on_delete": false, - "tags": null, + "tags": {}, "tags_all": {}, "timeouts": null, "vpc_id": "vpc-0ea47c82201349205" diff --git a/terraform.tfstate.backup b/terraform.tfstate.backup new file mode 100644 index 0000000..8437117 --- /dev/null +++ b/terraform.tfstate.backup @@ -0,0 +1,105 @@ +{ + "version": 4, + "terraform_version": "1.10.5", + "serial": 32, + "lineage": "1548454c-cf7f-9153-d2ca-6d37af1f5a24", + "outputs": {}, + "resources": [ + { + "mode": "managed", + "type": "aws_security_group", + "name": "ec2_sg", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-east-1:874570603861:security-group/sg-0b751004f80b5fe74", + "description": "Allow SSH inbound traffic", + "egress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 0, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "-1", + "security_groups": [], + "self": false, + "to_port": 0 + } + ], + "id": "sg-0b751004f80b5fe74", + "ingress": [ + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 443, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 443 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 51820, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "udp", + "security_groups": [], + "self": false, + "to_port": 51820 + }, + { + "cidr_blocks": [ + "0.0.0.0/0" + ], + "description": "", + "from_port": 80, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 80 + }, + { + "cidr_blocks": [ + "108.237.185.23/32" + ], + "description": "", + "from_port": 22, + "ipv6_cidr_blocks": [], + "prefix_list_ids": [], + "protocol": "tcp", + "security_groups": [], + "self": false, + "to_port": 22 + } + ], + "name": "aviary-sg", + "name_prefix": "", + "owner_id": "874570603861", + "revoke_rules_on_delete": false, + "tags": {}, + "tags_all": {}, + "timeouts": null, + "vpc_id": "vpc-0ea47c82201349205" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=" + } + ] + } + ], + "check_results": null +}