-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathterraform.tfvars.example
146 lines (133 loc) · 3.38 KB
/
terraform.tfvars.example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
# == CREDENTIALS ==
## AWS
aws_region = "us-east-1"
aws_access_key_id = ""
aws_secret_access_key = ""
aws_session_token = ""
## SCALEWAY
scaleway_access_key = ""
scaleway_secret_key = ""
scaleway_organization_id = ""
scaleway_region = ""
scaleway_project_id = ""
# == SETTINGS ==
scaleway_bucket_initial_name = "bucket-pa-esgi"
scaleway_bucket_name = "pa-esgi-2023-b1"
scaleway_num_buckets = 1
# SSH Keys allowed in EC2s. First one will be added by default to all EC2s, other ones are added manually in the authorized_keys file
ssh_public_keys = [
"ssh-rsa truc",
"ssh-rsa bidule",
]
#BUCKET + VPC
bucket_name = "pa-esgi-2023-b1"
mount_point = "/mnt/bucket"
vpc_cidr_block = "10.7.0.0/16"
vpc_subnet_cidr_block = "10.7.1.0/24"
vpc_instance_tenancy = "default"
#SNS TOPIC
sns_phone_number = "+33xxxxxxxxx"
sns_email_address = ""
#SNS TOPIC GuardDuty
sns_phone_number_guard = "+33xxxxxxxxx"
sns_email_address_guard = ""
## CLOUDFLARE
cloudflare_api_token = ""
cloudflare_zone_id = ""
## EC2 - Nextcloud
mysql_host = ""
mysql_database = "nextcloud"
mysql_user = "pa2023nextcloud"
mysql_password = ""
redis_host = "redis"
acme_email = ""
acme_storage = "/acme.json"
## EC2 - config.php
redis_password = ""
redis_port = "6379"
s3_bucket = "nextcloud-app-staging"
s3_key = ""
s3_secret = ""
s3_hostname = "s3.fr-par.scw.cloud"
s3_port = "443"
s3_region = "fr-par"
trusted_domain = "hosting.transexpress.ovh"
trusted_proxy = "172.19.0.254"
## INFORMATION
ec2-config = {
"vm-dolibarr" = {
ports = [
{
from = 443
to = 443
source="0.0.0.0/0"
},
{
from = 80
to = 80
source="0.0.0.0/0"
},
{
from = 22
to = 22
source="0.0.0.0/0"
}
],
ami_id = "ami-053b0d53c279acc90",
instance_type = "t2.large",
volume_size = 30,
volume_type = "gp2",
dns_name = "crm.transexpress.ovh",
},
"vm-nextcloud" = {
ports = [
{
from = 443
to = 443
source="0.0.0.0/0"
},
{
from = 80
to = 80
source="0.0.0.0/0"
},
{
from = 4733
to = 4733
source="0.0.0.0/0"
},
{
from = 22
to = 22
source="0.0.0.0/0"
}
],
ami_id = "ami-053b0d53c279acc90",
instance_type = "t2.large",
volume_size = 30,
volume_type = "gp2",
dns_name = "hosting.transexpress.ovh",
}
}
## EKS - VPC
project_eks = "TransexpressWebsite" // Name of EKS project
vpc_cidr_eks = "10.0.0.0/16"
subnet_cidr_bits_eks = 8
## EKS - Cluster config
scaling_config_desired_size = 3
scaling_config_max_size = 8
scaling_config_min_size = 3
ami_type_eks = "AL2_x86_64"
disk_size_eks_node = 20
instance_types_eks_node = "t2.small"
cloudflare_dns_entry_name = "eks"
## EKS - Github
github_token = "github_pat_xxxxxxxxxxx"
github_repo_name = "my_repo"
kubeconfig_secret_name = "KUBE_CONFIG"
aws_access_key_id_secret_name = "AWS_ACCESS_KEY_ID"
aws_region_secret_name = "AWS_REGION"
aws_secret_access_key_secret_name = "AWS_SECRET_ACCESS_KEY"
aws_session_token_secret_name = "AWS_SESSION_TOKEN"
## EKS - GuardDuty
aws_account_id = "0123456789"