From 7bb79b594ed55beafba77e43b661d3d62103e8a3 Mon Sep 17 00:00:00 2001 From: Mrugesh Mohapatra Date: Fri, 19 Apr 2024 13:27:11 +0530 Subject: [PATCH] chore: delete o11y cluster --- .../ops-cluster-o11y/.terraform.lock.hcl | 103 ------ terraform/ops-cluster-o11y/backend.tf | 10 - .../cloud-init--userdata.yml.tftpl | 31 -- terraform/ops-cluster-o11y/main.tf | 346 ------------------ terraform/ops-cluster-o11y/outputs.tf | 0 terraform/ops-cluster-o11y/providers.tf | 12 - .../ops-cluster-o11y/terraform.tfvars.sample | 9 - terraform/ops-cluster-o11y/variables.tf | 73 ---- terraform/ops-cluster-o11y/versions.tf | 19 - 9 files changed, 603 deletions(-) delete mode 100644 terraform/ops-cluster-o11y/.terraform.lock.hcl delete mode 100644 terraform/ops-cluster-o11y/backend.tf delete mode 100644 terraform/ops-cluster-o11y/cloud-init--userdata.yml.tftpl delete mode 100644 terraform/ops-cluster-o11y/main.tf delete mode 100644 terraform/ops-cluster-o11y/outputs.tf delete mode 100644 terraform/ops-cluster-o11y/providers.tf delete mode 100644 terraform/ops-cluster-o11y/terraform.tfvars.sample delete mode 100644 terraform/ops-cluster-o11y/variables.tf delete mode 100644 terraform/ops-cluster-o11y/versions.tf diff --git a/terraform/ops-cluster-o11y/.terraform.lock.hcl b/terraform/ops-cluster-o11y/.terraform.lock.hcl deleted file mode 100644 index 2379ef57..00000000 --- a/terraform/ops-cluster-o11y/.terraform.lock.hcl +++ /dev/null @@ -1,103 +0,0 @@ -# This file is maintained automatically by "terraform init". -# Manual edits may be lost in future updates. - -provider "registry.terraform.io/cloudflare/cloudflare" { - version = "4.30.0" - constraints = "4.30.0" - hashes = [ - "h1:+sw3nDmN439jp/wRUnxhYvmvy7lxAmaE/PxxruCpcAs=", - "h1:05UXM990Xso5MGGhB75CbiZnCs4pGNF+ov6vMXoKuDw=", - "h1:9f36r9vcStap6J2MBA1Sbn/HtIojcc++rFKEqr6ygVM=", - "h1:FhhTF09/BBk37akGLFx9/uWkGUGwSNRub8vP80TaF7Q=", - "h1:Fzjj14EChfjqCXwZwEHxn4S3W3AJie34Z1uiKl8pvtc=", - "h1:HMxD7OEehCSAr78ZwIPoOpdAGiAixLx15v7/JBmxgt8=", - "h1:HydbKJyE9yCIXqCuD6d+TxiPKsDc6UCj+5KKEQ+3DqI=", - "h1:Ne1ArJAaV45W0eOEYY1m/G8ILJ6MST1J1YsBX41iEtk=", - "h1:PwWXnsZymnpXIBxe1ZSGeaRJsIDuhxnL8Wouho4U6CE=", - "h1:RCa0TYsEy445PJKu3VfIWi4VtRPR5imc5/JLpeSXKkg=", - "h1:W/q4chfazm9sEz6PVB7K2Uow+RXjLGwZ5F+jTRPfu/k=", - "h1:b5YZo6YJ35sKxhGrGSt+LaVhFGHsfhYfLK11gcWvWh0=", - "h1:hfnb9phsW/dOrprh9D5qZDkFh0wLVWSkrwGtT8Xp2Ng=", - "h1:ktPiwC8grfTg7Tx+ZtuKk5ztrCvsVIwGZig1a3xHbWE=", - "zh:218d1948b59e3d2e3af082724a0d057bcca5a5643c5e7c3b85eefc02430edd6b", - "zh:24eb677bc1b205565efb5c0d1c464f63d1e240aac61f5b2ef15165fe842cb7e2", - "zh:27896ed2a4f05f6a46ef25e674e445e89bd4bfba8cddbe95940109c6dc3179cc", - "zh:38b3b8297a9650b0ed09d57e0d802f5d851062bdadf72825652232c9a67346ac", - "zh:58d49ec9f414d0ff71e94cc991e1e3e33a13502ce0fea1393edd1297d0877bab", - "zh:5ed92c556e72cc4ea7fdf6db9e0dd7b093d179e26f2d2989b21a004a6402f2ae", - "zh:71f5c64702a7b2102f6d5edfd767953cd5b1248093c05983b909de06cf0c40cc", - "zh:788a023967db63b8eda9c0415851a743daf4073bab66b0bd1204bccbb54c9f8f", - "zh:7b9cd30355b4f63941284998167c3f3e5d208685e5176928275436de012f62d2", - "zh:890df766e9b839623b1f0437355032a3c006226a6c200cd911e15ee1a9014e9f", - "zh:923ec04258fde407f0fce80488268f4277ffac68fb7240eee4f4373a344c5469", - "zh:97473bdb848a7f77832fde6d0e68877bdcc17bf47ae3639fb09e1aeff4a92a01", - "zh:9b8754d8f7c15878ecb8897a6ffc4e9ec95f4e5f0560f4129af82a8200e602ea", - "zh:b890723ed524d34e7fbee6c119714be23e1783b82441ce4c18871c9d54f10cbd", - "zh:c75e0e5f406653c9b4928d97a38410ad7bb20d48e260c17ae3125a77b0457bf5", - ] -} - -provider "registry.terraform.io/hashicorp/hcp" { - version = "0.83.0" - constraints = "0.83.0" - hashes = [ - "h1:0LKZpM3r7MaAT88I9+3JYZ/sYFPBRW6c2z+m30lMm8Y=", - "h1:3RDKNUHAHzNr0tlN3O/NnV5VoGbGsDtKwNam21Zx5Bk=", - "h1:DAz9uVlV06DiivonRZUgbfGPP49GvOoawx69WLtwJ1w=", - "h1:LyoZTPRTTZjbqDoinAWI45DbBDcE0KF7KvMHDwEavFw=", - "h1:N8ob1EiZKSLypGfZzBBS4r+c/nQUCEFp46I8uXG/ks0=", - "h1:Px9leK37qW1L9DU59TvyvNC4eOxFaREyyyfNY4qcwhY=", - "h1:U/hBtjo6AVtpm8q/rMXkPT6O1r7C6nBhnLL5SQ7sESU=", - "h1:WRyaY3QAT7oIejhFzpISUz3QVeTrR+8C/3GF0tgpyQ8=", - "h1:bsyMY92Pebqeydl4P1d/xAjDDSvwoWMgGy0U0GESr60=", - "h1:d3e6WiGldP/GWaJvrY8+F7coIyOzXgmLBskZNB5STnU=", - "h1:zd3Mb5mqY8gxnIevVFyRyvr0LJuBJI4C0kcfLyQDTj4=", - "zh:00eeeaf14b79a8e8cffa824750e65d0c60df5e3c2fa35a675558caa9fe62f4a7", - "zh:14ba2de074cdad78a9c81f3281ab8d7b9f5ff0a58dd23929a8a5e4ac70084f12", - "zh:298df81b0b10db46d0a89c8f526fa5d783740c33fbe311283497b65abc23e60a", - "zh:3bbd2a3b0c680ade0c91a9ba058cb9716af3df233bd1dee8227327357ddf91b8", - "zh:3d1e6b52639be1e7af6adfb12094139a5d1e335ce79fbb233e69d6c7730eecdc", - "zh:40102707cd40932004e2aad0b42fbaa9b69c834d578ed5670ba20db4208fc5c1", - "zh:4aa153f90dac73d2ab5f9b751f19073e01fc8c0c0ac9cf586afc863348bef329", - "zh:4cd28f0f4d36fbbf8271b70bad628272a18773e25eff1ee134dd6435fbdb54b3", - "zh:541d4532c875b2ee7ecb98da9a1461e76788893b623b0adf7c634d9fff7770e3", - "zh:8b56f92907f0ea8c2c6839fc97aebb9eab71cba3b60f37512c09e49d406eb690", - "zh:9462806b8fc47f853c9355e29523b68a5d08f71e6213b27c78977fe8beb3feaa", - "zh:c5252e7217e83f156f9741966733750ebdf8dd1b652be2b881aaea8b3623c75d", - ] -} - -provider "registry.terraform.io/linode/linode" { - version = "2.19.0" - constraints = "2.19.0" - hashes = [ - "h1:Aljt7dhW1XwtxDaGyc2gZ46eLAbjix7E1qYXxYqgbbU=", - "h1:BN3Dom+rZ8Xy/rQsjut3Oa4ug7uKAT+0OHKls8902OU=", - "h1:EQ7FeEVWKswJ3/ATDk0azs9jJ5Jm9Zgch/qmGPuOUMU=", - "h1:Ffm15Iu1XjVFUVc3NpdIE0YjoZISVNOJPUKbOlYdSB8=", - "h1:H3eY00bUbfpEJD3WSqtpJ7hCD+hmiXIo2wWenhxNW6o=", - "h1:HpYbpJzogDdK8is1dsZvd0MxpRDaDqTzheKsT7GeEiI=", - "h1:KKadsEER+BVuTGwh/BM1Kmy0jDOxiNQmYlJbTFsxtGU=", - "h1:MFV2JG/DHGO0IdRIMi6e7RkLEJ4laaUD24QrUOKaMLk=", - "h1:UJ+/KyZX5xKU+GOUslbIpQLih9vkEjIMjcElw19Hnqg=", - "h1:UyWZ+cA6vcA7Uj2KM6AGOAjKYMlBXFVAtHitheHL6mY=", - "h1:kRBXisxnnpMUMFEQrXHy3bL3lu7GvMJf32RgoYJg4C8=", - "h1:m8CL3NIDWcuxiJTVFMkKWoOCV70gbRgKkjNv9AAhm6E=", - "h1:qnj2eGbSlmsyLNti6Ya/I2Myy7Uy0/LLvkmNO8sSnDc=", - "h1:vff9zjH2m2uRYiK5FAnAAWuESm99YGw7QOWsdSqAHIE=", - "zh:0902b129119d4b2b5ad8b40796c73453efa4250af9c83ab110988b2786ddf077", - "zh:2b953ecdf1dfeb66e5dbb420a6c16f944be37e8436062546d714928fd6c137da", - "zh:336d750c34875ed04e30cd3e0b4ddfefbc3c4eec66ee81849d4becd6680c1b78", - "zh:3403e1d1da78ef55e73c473d53d90af3025fbdf826ac30786b3082a8a96cde0d", - "zh:3923876d57838f115f770e29ddc6113c634ecb5a0ef6745ecfdef265d606e48f", - "zh:47f7e0bb0e01bc6e6dfd13a371dfab2df5d545fc37148d655fd2bb394b1102c6", - "zh:59726409d8877d3336705fcd0fafc67b5d34de318340694c5f5546cc6c15e7c8", - "zh:6711e4b6b5a6895a0429b7d91ac8a20c439bafa486782f5724ed30c696c81d99", - "zh:728e75d6637e52f371ea316a9fc2c2e16b5cf154af58d5cddb656da3b8b87a9c", - "zh:7be53e746828bbcc2533f418e33efa6cf4bad749f20c412d23222b52c77d7779", - "zh:8647837eb549dec604399659b3fc5508749157b1b8cc3f98e09654279be7cd87", - "zh:abc9cf0879b0318baa8bec61c0225235af0b7a8d4eb3dce0d82fcbbc75dcfc98", - "zh:c6665a13be6231acf78dcbdbddad6e0cc27f4ec28716ca8946c15847568eeb4a", - "zh:cf033cc78046bdf2a12873c53d5e4d7b6f0275b2d5e50cf17b3be8e5103bfe2e", - ] -} diff --git a/terraform/ops-cluster-o11y/backend.tf b/terraform/ops-cluster-o11y/backend.tf deleted file mode 100644 index 019702b5..00000000 --- a/terraform/ops-cluster-o11y/backend.tf +++ /dev/null @@ -1,10 +0,0 @@ -terraform { - backend "remote" { - hostname = "app.terraform.io" - organization = "freecodecamp" - - workspaces { - name = "tfws-ops-o11y" - } - } -} diff --git a/terraform/ops-cluster-o11y/cloud-init--userdata.yml.tftpl b/terraform/ops-cluster-o11y/cloud-init--userdata.yml.tftpl deleted file mode 100644 index 3166bd77..00000000 --- a/terraform/ops-cluster-o11y/cloud-init--userdata.yml.tftpl +++ /dev/null @@ -1,31 +0,0 @@ -#cloud-config -users: - - name: freecodecamp - groups: sudo - shell: /bin/bash - sudo: ['ALL=(ALL) NOPASSWD:ALL'] - ssh_import_id: - - gh:camperbot - - raisedadead -runcmd: - - usermod -aG docker freecodecamp - # Configure sshd - - | - sed -i -e '/^PermitRootLogin/s/^.*$/PermitRootLogin no/' /etc/ssh/sshd_config - sed -i -e '/^PasswordAuthentication/s/^.*$/PasswordAuthentication no/' /etc/ssh/sshd_config - sed -i -e '/^PubkeyAuthentication/s/^.*$/PubkeyAuthentication yes/' /etc/ssh/sshd_config - sed -i -e '$aAllowUsers freecodecamp' /etc/ssh/sshd_config - # Configure hostname - - | - sed -i '/preserve_hostname: false/c\preserve_hostname: true' /etc/cloud/cloud.cfg - hostnamectl set-hostname ${tf_hostname} - echo \"${tf_hostname}\" > /etc/hostname - # - # :-----------------------: WARNING :-----------------------: - # - # This next line should be the last command in the list, - # because it involves restarting the ssh service. - # - # :-----------------------: WARNING :-----------------------: - - systemctl restart sshd -final_message: 'Setup complete' diff --git a/terraform/ops-cluster-o11y/main.tf b/terraform/ops-cluster-o11y/main.tf deleted file mode 100644 index 52cd8b2d..00000000 --- a/terraform/ops-cluster-o11y/main.tf +++ /dev/null @@ -1,346 +0,0 @@ -locals { - zone = "freecodecamp.net" -} - -# This data source depends on the stackscript resource -# which is created in terraform/ops-stackscripts/main.tf -data "linode_stackscripts" "cloudinit_scripts" { - filter { - name = "label" - values = ["CloudInitfreeCodeCamp"] - } - filter { - name = "is_public" - values = ["false"] - } -} - -data "hcp_packer_image" "linode_ubuntu" { - bucket_name = "linode-ubuntu" - channel = "golden" - cloud_provider = "linode" - region = "us-east" -} - -data "cloudflare_zone" "cf_zone" { - name = local.zone -} - -resource "linode_instance" "ops_o11y_leaders" { - count = var.leader_node_count - label = "ops-vm-o11y-ldr-${count.index + 1}" - group = "o11y_leader" # Value should use '_' as sepratator for compatibility with Ansible Dynamic Inventory - region = var.region - type = "g6-standard-2" - - private_ip = true - watchdog_enabled = true - - tags = ["ops", "o11y", "o11y_leader"] # Value should use '_' as sepratator for compatibility with Ansible Dynamic Inventory - - lifecycle { - ignore_changes = [ - migration_type - ] - } -} - -resource "linode_instance_disk" "ops_o11y_leaders_disk__boot" { - count = var.leader_node_count - label = "ops-vm-o11y-ldr-${count.index + 1}-boot" - linode_id = linode_instance.ops_o11y_leaders[count.index].id - size = linode_instance.ops_o11y_leaders[count.index].specs.0.disk - - image = data.hcp_packer_image.linode_ubuntu.cloud_image_id - root_pass = var.password - - stackscript_id = data.linode_stackscripts.cloudinit_scripts.stackscripts.0.id - stackscript_data = { - userdata = base64encode( - templatefile("${path.root}/cloud-init--userdata.yml.tftpl", { - tf_hostname = "ldr-${count.index + 1}.o11y" - }) - ) - } -} - -resource "linode_instance_config" "ops_o11y_leaders_config" { - count = var.leader_node_count - label = "ops-vm-o11y-ldr-config" - linode_id = linode_instance.ops_o11y_leaders[count.index].id - - device { - device_name = "sda" - disk_id = linode_instance_disk.ops_o11y_leaders_disk__boot[count.index].id - } - - # eth0 is the public interface. - interface { - purpose = "public" - } - - # eth1 is the private interface. - interface { - purpose = "vlan" - label = "o11y-vlan" - # Request the host IP for the machine - ipam_address = "${cidrhost("10.0.0.0/8", 10 + count.index + 1)}/24" - } - - connection { - type = "ssh" - user = "root" - password = var.password - host = linode_instance.ops_o11y_leaders[count.index].ip_address - } - - # All of the provisioning should be done via cloud-init. - # This is just to setup the reboot. - provisioner "remote-exec" { - inline = [ - # Wait for cloud-init to finish. - "while [ ! -f /var/lib/cloud/instance/boot-finished ]; do echo 'Waiting for cloud-init...'; sleep 1; done", - "echo Current hostname...; hostname", - "shutdown -r +1 'Terraform: Rebooting to apply hostname change in 1 min.'" - ] - } - - # This run is a hack to trigger the reboot, - # which may fail otherwise in the previous step. - provisioner "remote-exec" { - inline = [ - "uptime" - ] - } - - helpers { - updatedb_disabled = true - } - - kernel = "linode/grub2" - booted = true - - lifecycle { - ignore_changes = [ - booted - ] - } -} - -resource "cloudflare_record" "ops_o11y_leaders_dnsrecord__vlan" { - count = var.leader_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "ldr-${count.index + 1}.o11y" - value = trimsuffix(linode_instance_config.ops_o11y_leaders_config[count.index].interface[1].ipam_address, "/24") -} - -resource "cloudflare_record" "ops_o11y_leaders_dnsrecord__public" { - count = var.leader_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "pub.ldr-${count.index + 1}.o11y.${var.network_subdomain}" - value = linode_instance.ops_o11y_leaders[count.index].ip_address -} - -resource "cloudflare_record" "ops_o11y_leaders_dnsrecord__private" { - count = var.leader_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "prv.ldr-${count.index + 1}.o11y" - value = linode_instance.ops_o11y_leaders[count.index].private_ip_address -} - -resource "linode_instance" "ops_o11y_workers" { - count = var.worker_node_count - label = "ops-vm-o11y-wkr-${count.index + 1}" - group = "o11y_worker" # Value should use '_' as sepratator for compatibility with Ansible Dynamic Inventory - region = var.region - type = "g6-standard-2" - - private_ip = true - watchdog_enabled = true - - tags = ["ops", "o11y", "o11y_worker"] # Value should use '_' as sepratator for compatibility with Ansible Dynamic Inventory - - lifecycle { - ignore_changes = [ - migration_type - ] - } -} - -resource "linode_instance_disk" "ops_o11y_workers_disk__boot" { - count = var.worker_node_count - label = "ops-vm-o11y-wkr-${count.index + 1}-boot" - linode_id = linode_instance.ops_o11y_workers[count.index].id - size = linode_instance.ops_o11y_workers[count.index].specs.0.disk - - image = data.hcp_packer_image.linode_ubuntu.cloud_image_id - root_pass = var.password - - stackscript_id = data.linode_stackscripts.cloudinit_scripts.stackscripts.0.id - stackscript_data = { - userdata = base64encode( - templatefile("${path.root}/cloud-init--userdata.yml.tftpl", { - tf_hostname = "wkr-${count.index + 1}.o11y" - }) - ) - } -} - -resource "linode_instance_config" "ops_o11y_workers_config" { - count = var.worker_node_count - label = "ops-vm-o11y-wkr-config" - linode_id = linode_instance.ops_o11y_workers[count.index].id - - device { - device_name = "sda" - disk_id = linode_instance_disk.ops_o11y_workers_disk__boot[count.index].id - } - - # eth0 is the public interface. - interface { - purpose = "public" - } - - # eth1 is the private interface. - interface { - purpose = "vlan" - label = "o11y-vlan" - # This results in IPAM address like 10.0.0.21/24, 10.0.0.22/24, etc. - ipam_address = "${cidrhost("10.0.0.0/8", 20 + count.index + 1)}/24" - } - - connection { - type = "ssh" - user = "root" - password = var.password - host = linode_instance.ops_o11y_workers[count.index].ip_address - } - - # All of the provisioning should be done via cloud-init. - # This is just to setup the reboot. - provisioner "remote-exec" { - inline = [ - # Wait for cloud-init to finish. - "while [ ! -f /var/lib/cloud/instance/boot-finished ]; do echo 'Waiting for cloud-init...'; sleep 1; done", - "echo Current hostname...; hostname", - "shutdown -r +1 'Terraform: Rebooting to apply hostname change in 1 min.'" - ] - } - - # This run is a hack to trigger the reboot, - # which may fail otherwise in the previous step. - provisioner "remote-exec" { - inline = [ - "uptime" - ] - } - - helpers { - updatedb_disabled = true - } - - kernel = "linode/grub2" - booted = true - - lifecycle { - ignore_changes = [ - booted - ] - } -} - -resource "cloudflare_record" "ops_o11y_workers_dnsrecord__vlan" { - count = var.worker_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "wkr-${count.index + 1}.o11y" - value = trimsuffix(linode_instance_config.ops_o11y_workers_config[count.index].interface[1].ipam_address, "/24") -} - -resource "cloudflare_record" "ops_o11y_workers_dnsrecord__public" { - count = var.worker_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "pub.wkr-${count.index + 1}.o11y.${var.network_subdomain}" - value = linode_instance.ops_o11y_workers[count.index].ip_address -} - -resource "cloudflare_record" "ops_o11y_workers_dnsrecord__private" { - count = var.worker_node_count - - zone_id = data.cloudflare_zone.cf_zone.id - type = "A" - proxied = false - ttl = 120 - - name = "prv.wkr-${count.index + 1}.o11y" - value = linode_instance.ops_o11y_workers[count.index].private_ip_address -} - -resource "linode_firewall" "ops_o11y_firewall" { - label = "ops-fw-o11y" - - inbound { - label = "allow-ssh_from-anywhere" - ports = "22" - protocol = "TCP" - action = "ACCEPT" - ipv4 = ["0.0.0.0/0"] - ipv6 = ["::/0"] - } - - inbound { - label = "allow-tcp_within-cluster" - ports = "1-65535" - protocol = "TCP" - action = "ACCEPT" - ipv4 = flatten([ - [for i in linode_instance.ops_o11y_leaders : "${i.private_ip_address}/32"], - [for i in linode_instance.ops_o11y_workers : "${i.private_ip_address}/32"] - ]) - } - - inbound { - label = "allow-udp_within-cluster" - ports = "1-65535" - protocol = "UDP" - action = "ACCEPT" - ipv4 = flatten([ - [for i in linode_instance.ops_o11y_leaders : "${i.private_ip_address}/32"], - [for i in linode_instance.ops_o11y_workers : "${i.private_ip_address}/32"] - ]) - } - - # outbound { } - - inbound_policy = "DROP" - outbound_policy = "ACCEPT" - - linodes = flatten([ - [for i in linode_instance.ops_o11y_leaders : i.id], - [for i in linode_instance.ops_o11y_workers : i.id], - ]) -} diff --git a/terraform/ops-cluster-o11y/outputs.tf b/terraform/ops-cluster-o11y/outputs.tf deleted file mode 100644 index e69de29b..00000000 diff --git a/terraform/ops-cluster-o11y/providers.tf b/terraform/ops-cluster-o11y/providers.tf deleted file mode 100644 index 0fc21a0b..00000000 --- a/terraform/ops-cluster-o11y/providers.tf +++ /dev/null @@ -1,12 +0,0 @@ -provider "linode" { - token = var.linode_token -} - -provider "hcp" { - client_id = var.hcp_client_id - client_secret = var.hcp_client_secret -} - -provider "cloudflare" { - api_token = var.cloudflare_api_token -} diff --git a/terraform/ops-cluster-o11y/terraform.tfvars.sample b/terraform/ops-cluster-o11y/terraform.tfvars.sample deleted file mode 100644 index 833fdc34..00000000 --- a/terraform/ops-cluster-o11y/terraform.tfvars.sample +++ /dev/null @@ -1,9 +0,0 @@ -linode_token = "" -password = "" - -hcp_client_id = "" -hcp_client_secret = "" - -cloudflare_api_token = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" -cloudflare_account_id = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" -# Override any more variables from the variables.tf file here diff --git a/terraform/ops-cluster-o11y/variables.tf b/terraform/ops-cluster-o11y/variables.tf deleted file mode 100644 index 7ffadb1b..00000000 --- a/terraform/ops-cluster-o11y/variables.tf +++ /dev/null @@ -1,73 +0,0 @@ -variable "linode_token" { - description = "The Linode API Personal Access Token." - type = string - sensitive = true -} - -variable "password" { - description = "The root password for the Linode instances." - type = string - sensitive = true -} - -variable "worker_node_count" { - description = "The number of worker instances to create." - default = 3 - type = number - - validation { - condition = var.worker_node_count > 0 - error_message = "The number of worker instances must atleast 1." - } -} - -variable "leader_node_count" { - description = "The number of leader instances to create." - default = 1 - type = number - - validation { - condition = var.leader_node_count > 0 && var.leader_node_count <= 3 - error_message = "The number of leader instances must be between 1-3." - } -} - -variable "region" { - description = "The name of the region in which to deploy instances." - default = "us-east" - type = string -} - -variable "network_subdomain" { - description = "The subdomain for the network." - type = string - sensitive = true -} - -# variable "image_id" { -# description = "The ID for the Linode image to be used in provisioning the instances" -# default = "private/20789403" -# type = string -# } - -variable "hcp_client_id" { - description = "The client ID for the HCP API." - type = string - sensitive = true -} - -variable "hcp_client_secret" { - description = "The client secret for the HCP API." - type = string - sensitive = true -} - -variable "cloudflare_api_token" { - type = string - description = "Cloudflare API Token" -} - -variable "cloudflare_account_id" { - type = string - description = "Cloudflare Account ID" -} diff --git a/terraform/ops-cluster-o11y/versions.tf b/terraform/ops-cluster-o11y/versions.tf deleted file mode 100644 index 225d7b53..00000000 --- a/terraform/ops-cluster-o11y/versions.tf +++ /dev/null @@ -1,19 +0,0 @@ -terraform { - required_providers { - linode = { - source = "linode/linode" - version = "2.19.0" - } - - hcp = { - source = "hashicorp/hcp" - version = "0.83.0" - } - - cloudflare = { - source = "cloudflare/cloudflare" - version = "4.30.0" - } - } - required_version = ">= 1" -}