1010 * the "security_group_id" to the security group you want to use. Both of these variables
1111 * can be found in the variables.tf file.
1212 *
13- * - If you wish to use the created Security Group, just be sure to set the cidr_block OR
13+ * - If you wish to use the created Security Group, just be sure to set the cidr_for_sg OR
1414 * source_security_group_id varaibles in the variables.tf file. Do not set both or the
1515 * creation of the security group will fail.
1616 */
@@ -33,7 +33,7 @@ resource "aws_vpc_security_group_ingress_rule" "all_icmp" {
3333resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
3434 security_group_id = aws_security_group. fsx_sg . id
3535 description = " Remote procedure call for NFS"
36- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
36+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
3737 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
3838 from_port = 111
3939 to_port = 111
@@ -43,7 +43,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
4343resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
4444 security_group_id = aws_security_group. fsx_sg . id
4545 description = " Remote procedure call for NFS"
46- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
46+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
4747 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
4848 from_port = 111
4949 to_port = 111
@@ -53,7 +53,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
5353resource "aws_vpc_security_group_ingress_rule" "cifs" {
5454 security_group_id = aws_security_group. fsx_sg . id
5555 description = " NetBIOS service session for CIFS"
56- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
56+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
5757 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
5858 from_port = 139
5959 to_port = 139
@@ -63,7 +63,7 @@ resource "aws_vpc_security_group_ingress_rule" "cifs" {
6363resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
6464 security_group_id = aws_security_group. fsx_sg . id
6565 description = " Simple network management protocol for log collection"
66- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
66+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
6767 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
6868 from_port = 161
6969 to_port = 162
@@ -73,7 +73,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
7373resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
7474 security_group_id = aws_security_group. fsx_sg . id
7575 description = " Simple network management protocol for log collection"
76- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
76+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
7777 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
7878 from_port = 161
7979 to_port = 162
@@ -83,7 +83,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
8383resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
8484 security_group_id = aws_security_group. fsx_sg . id
8585 description = " Microsoft SMB/CIFS over TCP with NetBIOS framing"
86- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
86+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
8787 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
8888 from_port = 445
8989 to_port = 445
@@ -93,7 +93,7 @@ resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
9393resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
9494 security_group_id = aws_security_group. fsx_sg . id
9595 description = " NFS mount"
96- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
96+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
9797 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
9898 from_port = 635
9999 to_port = 635
@@ -103,7 +103,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
103103resource "aws_vpc_security_group_ingress_rule" "kerberos" {
104104 security_group_id = aws_security_group. fsx_sg . id
105105 description = " Kerberos authentication"
106- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
106+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
107107 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
108108 from_port = 749
109109 to_port = 749
@@ -113,7 +113,7 @@ resource "aws_vpc_security_group_ingress_rule" "kerberos" {
113113resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
114114 security_group_id = aws_security_group. fsx_sg . id
115115 description = " NFS server daemon"
116- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
116+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
117117 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
118118 from_port = 2049
119119 to_port = 2049
@@ -123,7 +123,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
123123resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
124124 security_group_id = aws_security_group. fsx_sg . id
125125 description = " NFS server daemon"
126- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
126+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
127127 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
128128 from_port = 2049
129129 to_port = 2049
@@ -133,7 +133,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
133133resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
134134 security_group_id = aws_security_group. fsx_sg . id
135135 description = " NFS lock daemon"
136- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
136+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
137137 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
138138 from_port = 4045
139139 to_port = 4045
@@ -143,7 +143,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
143143resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
144144 security_group_id = aws_security_group. fsx_sg . id
145145 description = " NFS lock daemon"
146- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
146+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
147147 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
148148 from_port = 4045
149149 to_port = 4045
@@ -153,7 +153,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
153153resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
154154 security_group_id = aws_security_group. fsx_sg . id
155155 description = " Status monitor for NFS"
156- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
156+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
157157 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
158158 from_port = 4046
159159 to_port = 4046
@@ -163,7 +163,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
163163resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
164164 security_group_id = aws_security_group. fsx_sg . id
165165 description = " Status monitor for NFS"
166- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
166+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
167167 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
168168 from_port = 4046
169169 to_port = 4046
@@ -173,7 +173,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
173173resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
174174 security_group_id = aws_security_group. fsx_sg . id
175175 description = " Remote quota server for NFS"
176- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
176+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
177177 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
178178 from_port = 4049
179179 to_port = 4049
@@ -183,7 +183,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
183183resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
184184 security_group_id = aws_security_group. fsx_sg . id
185185 description = " iSCSI"
186- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
186+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
187187 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
188188 from_port = 3260
189189 to_port = 3260
@@ -193,7 +193,7 @@ resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
193193resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communication" {
194194 security_group_id = aws_security_group. fsx_sg . id
195195 description = " Snapmirror Intercluster communication"
196- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
196+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
197197 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
198198 from_port = 11104
199199 to_port = 11104
@@ -203,7 +203,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communic
203203resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
204204 security_group_id = aws_security_group. fsx_sg . id
205205 description = " Snapmirror data transfer"
206- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
206+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
207207 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
208208 from_port = 11105
209209 to_port = 11105
@@ -213,7 +213,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
213213resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
214214 security_group_id = aws_security_group. fsx_sg . id
215215 description = " NFS mount"
216- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
216+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
217217 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
218218 from_port = 635
219219 to_port = 635
@@ -223,7 +223,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
223223resource "aws_vpc_security_group_ingress_rule" "ssh" {
224224 security_group_id = aws_security_group. fsx_sg . id
225225 description = " ssh"
226- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
226+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
227227 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
228228 from_port = 22
229229 to_port = 22
@@ -233,7 +233,7 @@ resource "aws_vpc_security_group_ingress_rule" "ssh" {
233233resource "aws_vpc_security_group_ingress_rule" "s3_and_api" {
234234 security_group_id = aws_security_group. fsx_sg . id
235235 description = " Provice acccess to S3 and the ONTAP REST API"
236- cidr_ipv4 = (var. cidr_block != " " ? var. cidr_block : null )
236+ cidr_ipv4 = (var. cidr_for_sg != " " ? var. cidr_for_sg : null )
237237 referenced_security_group_id = (var. source_security_group_id != " " ? var. source_security_group_id : null )
238238 from_port = 443
239239 to_port = 443
0 commit comments