1 Commits

Author SHA1 Message Date
Max
24a1931c47 feat: stuff 2025-12-22 10:14:31 -05:00
4 changed files with 16 additions and 5 deletions

View File

@@ -52,7 +52,7 @@
state: started state: started
recreate: true recreate: true
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 425m memory: 300m
memory_swap: 900m memory_swap: 900m
ports: [80:80, 2222:2222, 443:443, "22:22"] ports: [80:80, 2222:2222, 443:443, "22:22"]
env: env:

View File

@@ -82,7 +82,7 @@
state: started state: started
recreate: true recreate: true
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 425m memory: 300m
memory_swap: 900m memory_swap: 900m
ports: [80:80, 2222:2222, 443:443, "22:22"] ports: [80:80, 2222:2222, 443:443, "22:22"]
env: env:

View File

@@ -18,7 +18,7 @@ resource "aws_instance" "this" {
subnet_id = module.vpc.public_subnets[0] subnet_id = module.vpc.public_subnets[0]
user_data = file("install.sh") user_data = file("install.sh")
user_data_replace_on_change = true user_data_replace_on_change = false
iam_instance_profile = aws_iam_instance_profile.ssm.name iam_instance_profile = aws_iam_instance_profile.ssm.name
vpc_security_group_ids = [aws_security_group.public_access.id] vpc_security_group_ids = [aws_security_group.public_access.id]

View File

@@ -32,8 +32,8 @@ resource "aws_security_group" "public_access" {
tags = { GroupOf = "Main", GroupType = "Public" } tags = { GroupOf = "Main", GroupType = "Public" }
} }
resource "aws_vpc_security_group_ingress_rule" "ingress" { resource "aws_vpc_security_group_ingress_rule" "tcp" {
for_each = toset(["80", "443", "22", "2222", "81", "8080", "4321", "1234"]) for_each = toset(["80", "443", "22", "51821"])
security_group_id = aws_security_group.public_access.id security_group_id = aws_security_group.public_access.id
@@ -43,6 +43,17 @@ resource "aws_vpc_security_group_ingress_rule" "ingress" {
cidr_ipv4 = "0.0.0.0/0" cidr_ipv4 = "0.0.0.0/0"
} }
resource "aws_vpc_security_group_ingress_rule" "udp" {
for_each = toset(["51820", "53"])
security_group_id = aws_security_group.public_access.id
from_port = each.value
to_port = each.value
ip_protocol = "udp"
cidr_ipv4 = "0.0.0.0/0"
}
resource "aws_vpc_security_group_egress_rule" "egress" { resource "aws_vpc_security_group_egress_rule" "egress" {
for_each = toset(["-1"]) for_each = toset(["-1"])