main.tf
1.63 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
terraform {
  required_version = ">= 1.0"
  required_providers {
    aws = {
      source  = "hashicorp/aws"
      version = "~> 5.0"
    }
  }
  backend "s3" {
    bucket         = "terraformstatefile090909"
    key            = "elk-eks/acm.tfstate"
    region         = "us-east-1"
    dynamodb_table = "terraform-locks"
    encrypt        = true
  }
}
provider "aws" {
  region = var.aws_region
}
# Get Route53 zone data
data "aws_route53_zone" "main" {
  name         = var.domain_name
  private_zone = false
}
# ACM Certificate for Kibana
resource "aws_acm_certificate" "kibana" {
  domain_name       = var.kibana_domain
  validation_method = "DNS"
  subject_alternative_names = [
    "*.${var.domain_name}"
  ]
  tags = {
    Name        = "kibana-${var.kibana_domain}"
    Environment = var.environment
    Project     = "elk-stack"
  }
  lifecycle {
    create_before_destroy = true
  }
}
# DNS Validation Record
resource "aws_route53_record" "cert_validation" {
  for_each = {
    for dvo in aws_acm_certificate.kibana.domain_validation_options : dvo.domain_name => {
      name   = dvo.resource_record_name
      record = dvo.resource_record_value
      type   = dvo.resource_record_type
    }
  }
  allow_overwrite = true
  name            = each.value.name
  records         = [each.value.record]
  ttl             = 60
  type            = each.value.type
  zone_id         = data.aws_route53_zone.main.zone_id
}
# ACM Certificate Validation
resource "aws_acm_certificate_validation" "kibana" {
  certificate_arn         = aws_acm_certificate.kibana.arn
  validation_record_fqdns = [for record in aws_route53_record.cert_validation : record.fqdn]
}