概要 GCE と AWS 間を VPN 接続する際に作成した terraform のコードメモ 環境 terraform v0.6.14 作成内容 AWS VPC (172.31.0.0/16) subnet (172.31.1.0/24) Internet Gateway Customer Gateway Virtual Private Gateway VPN Connection Route Table GCE 静的アドレス取得 VPN 接続 Route ファイアウォール variable "aws_vpc_cidr_block" { default = "172.31.0.0/16" } variable "aws_zones" { default = { zone0 = "ap-northeast-1a" zone1 = "ap-northeast-1c" } } variable
![Terraform で GCE と AWS VPC を VPN で接続する - Qiita](https://cdn-ak-scissors.b.st-hatena.com/image/square/18991f9d49dce954ffb46505c7e5de855f28a8b8/height=288;version=1;width=512/https%3A%2F%2Fqiita-user-contents.imgix.net%2Fhttps%253A%252F%252Fcdn.qiita.com%252Fassets%252Fpublic%252Farticle-ogp-background-412672c5f0600ab9a64263b751f1bc81.png%3Fixlib%3Drb-4.0.0%26w%3D1200%26mark64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZ3PTk3MiZoPTM3OCZ0eHQ9VGVycmFmb3JtJTIwJUUzJTgxJUE3JTIwR0NFJTIwJUUzJTgxJUE4JTIwQVdTJTIwVlBDJTIwJUUzJTgyJTkyJTIwVlBOJTIwJUUzJTgxJUE3JUU2JThFJUE1JUU3JUI2JTlBJUUzJTgxJTk5JUUzJTgyJThCJnR4dC1hbGlnbj1sZWZ0JTJDdG9wJnR4dC1jb2xvcj0lMjMyMTIxMjEmdHh0LWZvbnQ9SGlyYWdpbm8lMjBTYW5zJTIwVzYmdHh0LXNpemU9NTYmcz0xNmNkYzlmY2MzNGE1ZDc1ZjY0ZDNhZmQ0OTk3NTEwMA%26mark-x%3D142%26mark-y%3D57%26blend64%3DaHR0cHM6Ly9xaWl0YS11c2VyLWNvbnRlbnRzLmltZ2l4Lm5ldC9-dGV4dD9peGxpYj1yYi00LjAuMCZoPTc2Jnc9NzcwJnR4dD0lNDBxdWlja2d1YXJkJnR4dC1jb2xvcj0lMjMyMTIxMjEmdHh0LWZvbnQ9SGlyYWdpbm8lMjBTYW5zJTIwVzYmdHh0LXNpemU9MzYmdHh0LWFsaWduPWxlZnQlMkN0b3Amcz1mMWUyZmQzZGY1ZWM0Y2I2Y2I5NjNlMmU5Yzg5MmVmZA%26blend-x%3D142%26blend-y%3D486%26blend-mode%3Dnormal%26s%3De1c8c35bb357ee825b112f4be187d671)