From 86b2c6e9a6d944f83b71673ff655cbc1a70e5ae0 Mon Sep 17 00:00:00 2001 From: Ishika RAY Date: Thu, 14 Nov 2024 15:00:34 +0530 Subject: [PATCH] modified xc/tfvars and infra/tfvars --- .gitignore | 2 +- azure/azure-infra/terraform.tfvars | 14 ++++++ xc/terraform.tfvars | 78 ++++++++++++++++++++++++++++++ 3 files changed, 93 insertions(+), 1 deletion(-) create mode 100644 azure/azure-infra/terraform.tfvars create mode 100644 xc/terraform.tfvars diff --git a/.gitignore b/.gitignore index 4d833c676..ec5792b2a 100644 --- a/.gitignore +++ b/.gitignore @@ -13,7 +13,7 @@ crash.log # version control. # # example.tfvars -*.tfvars +# *.tfvars # Ignore override files as they are usually used to override resources locally and so # are not checked in override.tf diff --git a/azure/azure-infra/terraform.tfvars b/azure/azure-infra/terraform.tfvars new file mode 100644 index 000000000..0ec395efd --- /dev/null +++ b/azure/azure-infra/terraform.tfvars @@ -0,0 +1,14 @@ +#Global +project_prefix = "waf-re" + +#Azure INFRA +azure_region = "southeastasia" + +#Assets +nic = false +nap = false +bigip = false +bigip-cis = false +aks-cluster = false +azure-vm = true +vm_public_ip = true \ No newline at end of file diff --git a/xc/terraform.tfvars b/xc/terraform.tfvars new file mode 100644 index 000000000..db6e815d0 --- /dev/null +++ b/xc/terraform.tfvars @@ -0,0 +1,78 @@ +#Global +#Only set to true if infrastructure is vk8s in XC +vk8s = false +xc_project_prefix = "demo" + +#XC Global +api_url = "https://.console.ves.volterra.io/api" +xc_tenant = "treino-ufahspac" +xc_namespace = "default" + +#XC LB +app_domain = "xc-waf-re.f5-hyd-xcdemo.com" + +#XC WAF +xc_waf_blocking = true +xc_data_guard = "false" + +#XC Azure CE site creation +az_ce_site = "false" + +#XC Service Discovery +xc_service_discovery = "false" + +# pool and LB inputs +k8s_pool = "false" +serviceName = "" +serviceport = "" +advertise_sites = "false" +http_only = "false" +xc_delegation = "false" +ip_address_on_site_pool = "false" +eks_ce_site = "false" +user_site = "false" + +#XC AI/ML Settings for MUD, APIP - NOTE: Only set if using AI/ML settings from the shared namespace +xc_app_type = [] +xc_multi_lb = false + +#XC API Protection and Discovery +xc_api_disc = false +xc_api_pro = false +xc_api_spec = [] +#Enable API schema validation +xc_api_val = false +#Enable API schema validation on all endpoints +xc_api_val_all = false +#Validation properties for request and response validation +xc_api_val_properties = [] #Example ["PROPERTY_QUERY_PARAMETERS", "PROPERTY_PATH_PARAMETERS", "PROPERTY_CONTENT_TYPE", "PROPERTY_COOKIE_PARAMETERS", "PROPERTY_HTTP_HEADERS", "PROPERTY_HTTP_BODY"] +xc_resp_val_properties = [] #Example ["PROPERTY_HTTP_HEADERS", "PROPERTY_CONTENT_TYPE", "PROPERTY_HTTP_BODY", "PROPERTY_RESPONSE_CODE"] +#Validation Mode active for requests and responses (false = skip) +xc_api_val_active = false +xc_resp_val_active = false +#Validation Enforment Type (only one of these should be set to true) +enforcement_block = false +enforcement_report = false +#Allow access to unprotected endpoints +fall_through_mode_allow = false +#Enable API Validation custom rules +xc_api_val_custom = false + +#XC Bot Defense +xc_bot_def = false + +#XC DDoS +xc_ddos_pro = false + +#XC Malicious User Detection +xc_mud = false + +# CE configs +gcp_ce_site = "false" +aws_ce_site = "false" +site_name = "" + +# infra (Needed values: aws-infra, azure-infra, gcp-infra) +aws = "" +azure = "" +gcp = ""