mirror of
https://github.com/phfroidmont/self-hosting.git
synced 2025-12-25 05:36:59 +01:00
Remove legacy configs
This commit is contained in:
parent
1f5e31b0e8
commit
59cb6ac9b9
116 changed files with 0 additions and 4552 deletions
|
|
@ -1,34 +0,0 @@
|
|||
Terraform Scaleaway
|
||||
===================
|
||||
|
||||
```
|
||||
export SCALEWAY_TOKEN=<your-access-key>
|
||||
export SCALEWAY_ORGANIZATION=<your-organization-key>
|
||||
# terraform init
|
||||
# terraform plan
|
||||
# terraform apply
|
||||
# terraform show
|
||||
data.scaleway_image.ubuntu:
|
||||
id =
|
||||
architecture = x86_64
|
||||
creation_date = 2017-01-05T10:01:28.406069+00:00
|
||||
name = Ubuntu Xenial (16.04 latest)
|
||||
organization =
|
||||
public = true
|
||||
scaleway_server.server1:
|
||||
id =
|
||||
enable_ipv6 = false
|
||||
image =
|
||||
name = server1
|
||||
private_ip =
|
||||
public_ip =
|
||||
state = stopped
|
||||
state_detail =
|
||||
tags.# = 0
|
||||
type = VC1S
|
||||
volume.# = 1
|
||||
volume.0.size_in_gb = 50
|
||||
volume.0.type = l_ssd
|
||||
volume.0.volume_id =
|
||||
```
|
||||
|
||||
|
|
@ -1,23 +0,0 @@
|
|||
locals {
|
||||
environment = terraform.workspace != "" ? terraform.workspace : "test"
|
||||
}
|
||||
|
||||
terraform {
|
||||
backend "s3" {
|
||||
bucket = "banditlair-k8s-tfstate"
|
||||
key = "banditlair.tfstate"
|
||||
region = "nl-ams"
|
||||
endpoint = "https://s3.nl-ams.scw.cloud"
|
||||
profile = "default"
|
||||
skip_credentials_validation = true
|
||||
skip_region_validation = true
|
||||
}
|
||||
}
|
||||
|
||||
provider "hcloud" {
|
||||
}
|
||||
|
||||
resource "hcloud_ssh_key" "desktop" {
|
||||
name = "Desktop"
|
||||
public_key = "${file("ssh_keys/desktop.pub")}"
|
||||
}
|
||||
|
|
@ -1,41 +0,0 @@
|
|||
resource "hcloud_server" "node" {
|
||||
count = var.node_server_count
|
||||
name = "node${count.index + 1}"
|
||||
image = "ubuntu-18.04"
|
||||
server_type = var.node_server_type
|
||||
ssh_keys = [hcloud_ssh_key.desktop.id]
|
||||
keep_disk = true
|
||||
|
||||
labels = {
|
||||
environment = local.environment
|
||||
type = "node"
|
||||
}
|
||||
}
|
||||
|
||||
resource "hcloud_server_network" "node_network" {
|
||||
count = var.node_server_count
|
||||
server_id = "${hcloud_server.node[count.index].id}"
|
||||
network_id = "${hcloud_network.private_network.id}"
|
||||
ip = "192.168.2.${count.index + 1}"
|
||||
}
|
||||
|
||||
resource "hcloud_server" "master" {
|
||||
count = var.master_server_count
|
||||
name = "master${count.index + 1}"
|
||||
image = "ubuntu-18.04"
|
||||
server_type = var.master_server_type
|
||||
ssh_keys = [hcloud_ssh_key.desktop.id]
|
||||
keep_disk = true
|
||||
|
||||
labels = {
|
||||
environment = local.environment
|
||||
type = "master"
|
||||
}
|
||||
}
|
||||
|
||||
resource "hcloud_server_network" "master_network" {
|
||||
count = var.master_server_count
|
||||
server_id = "${hcloud_server.master[count.index].id}"
|
||||
network_id = "${hcloud_network.private_network.id}"
|
||||
ip = "192.168.1.${count.index + 1}"
|
||||
}
|
||||
|
|
@ -1,22 +0,0 @@
|
|||
resource "hcloud_network" "private_network" {
|
||||
name = "private_network"
|
||||
ip_range = "192.168.0.0/16"
|
||||
|
||||
labels = {
|
||||
environment = local.environment
|
||||
}
|
||||
}
|
||||
|
||||
resource "hcloud_network_subnet" "master_network" {
|
||||
network_id = "${hcloud_network.private_network.id}"
|
||||
type = "server"
|
||||
network_zone = "eu-central"
|
||||
ip_range = "192.168.1.0/24"
|
||||
}
|
||||
|
||||
resource "hcloud_network_subnet" "node_network" {
|
||||
network_id = "${hcloud_network.private_network.id}"
|
||||
type = "server"
|
||||
network_zone = "eu-central"
|
||||
ip_range = "192.168.2.0/24"
|
||||
}
|
||||
|
|
@ -1,8 +0,0 @@
|
|||
output "master_public_ips" {
|
||||
value = [hcloud_server.master.*.ipv4_address]
|
||||
}
|
||||
|
||||
output "node_public_ips" {
|
||||
value = [hcloud_server.node.*.ipv4_address]
|
||||
}
|
||||
|
||||
|
|
@ -1,39 +0,0 @@
|
|||
# resource "scaleway_security_group" "k8s-sg" {
|
||||
# name = "Kubernetes"
|
||||
# description = "Kubernetes cluster nodes security group"
|
||||
# enable_default_security = true
|
||||
# stateful = true
|
||||
# inbound_default_policy = "drop"
|
||||
# outbound_default_policy = "accept"
|
||||
# }
|
||||
|
||||
|
||||
# resource "scaleway_security_group_rule" "k8s-sg-rule-ssh" {
|
||||
# security_group = "${scaleway_security_group.k8s-sg.id}"
|
||||
|
||||
# action = "accept"
|
||||
# direction = "inbound"
|
||||
# ip_range = "0.0.0.0/0"
|
||||
# protocol = "TCP"
|
||||
# port = 22
|
||||
# }
|
||||
|
||||
# resource "scaleway_security_group_rule" "k8s-sg-rule-http" {
|
||||
# security_group = "${scaleway_security_group.k8s-sg.id}"
|
||||
|
||||
# action = "accept"
|
||||
# direction = "inbound"
|
||||
# ip_range = "0.0.0.0/0"
|
||||
# protocol = "TCP"
|
||||
# port = 80
|
||||
# }
|
||||
|
||||
# resource "scaleway_security_group_rule" "k8s-sg-rule-https" {
|
||||
# security_group = "${scaleway_security_group.k8s-sg.id}"
|
||||
|
||||
# action = "accept"
|
||||
# direction = "inbound"
|
||||
# ip_range = "0.0.0.0/0"
|
||||
# protocol = "TCP"
|
||||
# port = 443
|
||||
# }
|
||||
|
|
@ -1 +0,0 @@
|
|||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMPhCld0dsDzpdkMvPRdiwd6IX8HF8Mb2V6uQzBl8/syeny8FbZxlZR8gk39RGxNYcLaZ+nA50DS6mOIplXCGdtozfw0Vm+FdITN3apMufWIdobG7Igs1vxKBBbkAb5lwxkEFUCUMzPdCLFHd5zabVH0WE42Be8+hYPLd5W/ikPCOgxRaGwryHHroxRMdkD3PcNE8upSEMdGl51pzgXhO6Fcig8UokOYHxV92SiQ0KEsCbc+oe8e9Gkr7g78tz+6YcTYLY2p2ygR7Vrh/WyTaUVnrNNqL8NIqp+Lc2kVtnqGXHFBJ0Wggaly+AeKWygy+dnOMEGSirhQ6/dUcB/Phz phfroidmont@archdesktop-2017-07-31
|
||||
|
|
@ -1,20 +0,0 @@
|
|||
variable "region" {
|
||||
default = "ams1"
|
||||
}
|
||||
|
||||
variable "master_server_type" {
|
||||
default = "cx11"
|
||||
}
|
||||
|
||||
variable "master_server_count" {
|
||||
default = 1
|
||||
}
|
||||
|
||||
variable "node_server_type" {
|
||||
default = "cx21"
|
||||
}
|
||||
|
||||
variable "node_server_count" {
|
||||
default = 3
|
||||
}
|
||||
|
||||
Loading…
Add table
Add a link
Reference in a new issue