Added plan for Authorization in production

This commit is contained in:
Giancarlo Panichi 2024-02-19 14:32:53 +01:00
parent 675b8aebad
commit c01ab61bf7
3 changed files with 95 additions and 1 deletions

View File

@ -37,7 +37,7 @@ module "instance_without_data_volume" {
server_groups_ids = [], server_groups_ids = [],
image_ref = module.common_variables.ubuntu_1804 image_ref = module.common_variables.ubuntu_1804
image_volume_size = 20 image_volume_size = 20
}, }
} }
} }

View File

@ -0,0 +1,91 @@
# Define required providers
terraform {
required_version = ">= 0.14.0"
required_providers {
openstack = {
source = "terraform-provider-openstack/openstack"
version = "~> 1.53.0"
}
}
}
data "terraform_remote_state" "privnet_dns_router" {
backend = "local"
config = {
path = "../project-setup/terraform.tfstate"
}
}
#
# Uses common_variables as module
#
module "common_variables" {
source = "../../modules/common_variables"
}
module "instance_without_data_volume" {
source = "../../modules/instance_without_data_volume"
instances_without_data_volume_map = {
auth1 = {
name = "auth1",
description = "This instance is a Authorization service",
flavor = module.common_variables.flavor_list.m1_medium,
networks = [data.terraform_remote_state.privnet_dns_router.outputs.main_private_network.name, module.common_variables.networks_list.shared_postgresql],
security_groups = [data.terraform_remote_state.privnet_dns_router.outputs.default_security_group_name, data.terraform_remote_state.privnet_dns_router.outputs.security_group_list.http_and_https_from_the_load_balancers],
server_groups_ids = [],
image_ref = module.common_variables.ubuntu_1804
image_volume_size = 20
},
auth2 = {
name = "auth2",
description = "This instance is a Authorization service",
flavor = module.common_variables.flavor_list.m1_medium,
networks = [data.terraform_remote_state.privnet_dns_router.outputs.main_private_network.name, module.common_variables.networks_list.shared_postgresql],
security_groups = [data.terraform_remote_state.privnet_dns_router.outputs.default_security_group_name, data.terraform_remote_state.privnet_dns_router.outputs.security_group_list.http_and_https_from_the_load_balancers],
server_groups_ids = [],
image_ref = module.common_variables.ubuntu_1804
image_volume_size = 20
}
}
}
locals {
cname_target = "main-lb.${data.terraform_remote_state.privnet_dns_router.outputs.dns_zone.zone_name}"
}
#
# Add DNS record/s
#
module "dns_records_create" {
source = "../../modules/dns_resources"
dns_resources_map = {
auth1 = {
zone_id = data.terraform_remote_state.privnet_dns_router.outputs.dns_zone_id
name = join(".", ["auth1", data.terraform_remote_state.privnet_dns_router.outputs.dns_zone.zone_name])
description = "Authorization auth1"
ttl = 8600
type = "CNAME"
records = [local.cname_target]
},
auth2 = {
zone_id = data.terraform_remote_state.privnet_dns_router.outputs.dns_zone_id
name = join(".", ["auth2", data.terraform_remote_state.privnet_dns_router.outputs.dns_zone.zone_name])
description = "Authorization auth2"
ttl = 8600
type = "CNAME"
records = [local.cname_target]
},
authorization = {
zone_id = data.terraform_remote_state.privnet_dns_router.outputs.dns_zone_id
name = join(".", ["authorization", data.terraform_remote_state.privnet_dns_router.outputs.dns_zone.zone_name])
description = "Authorization load balancer"
ttl = 8600
type = "CNAME"
records = [local.cname_target]
}
}
}

View File

@ -0,0 +1,3 @@
provider "openstack" {
cloud = "d4s-production"
}