terraform-openstack-landing.../tests/module
2024-09-30 19:33:36 +02:00
..
.terraform.lock.hcl feat: add tests to module 2024-09-09 20:45:03 +02:00
locals.tf feat: add tests to module 2024-09-09 20:45:03 +02:00
main.tf feat: add tests to module 2024-09-09 20:45:03 +02:00
README.md feat: add network_internal_domain_name variable to allow declaring internal dns resolution for networks 2024-09-30 19:33:36 +02:00
variables.tf feat: add network_internal_domain_name variable to allow declaring internal dns resolution for networks 2024-09-30 19:33:36 +02:00

module

Requirements

Name Version
terraform >= 1.0.0
openstack ~> 2.1.0

Providers

Name Version
openstack ~> 2.1.0
vault n/a

Modules

Name Source Version
landing_zone ../../ n/a

Resources

Name Type
openstack_networking_network_v2.ext_floating data source
vault_kv_secret_v2.openstack_provider_project_info data source
vault_kv_secret_v2.openstack_provider_project_user data source
vault_kv_secret_v2.openstack_provider_region data source

Inputs

Name Description Type Default Required
application_subnetpool_cidr_blocks The CIDR blocks for the application subnet pool list(string)
[
"192.168.0.0/21"
]
no
application_subnetpool_id The id of the subnetpool to create the public (first 2 tier) networks from.
Since this module can route private subnets to the backbone, it needs to make sure it's not creating overlapping subnets.
string null no
architecture_tiers The type of architecture.
Can be either 0, 1, 2 or 3.
Tier 0 will not create any subnets or networks.
Tier 1 will only create a single frontend subnet.
Tier 2 will create a frontend and backend subnet.
Tier 3 will create a frontend, backend and database subnet.
number 1 no
attach_to_external Whether to attach the router to an external network.
This will add a gateway interface to the router, and possibly consume a public IP address which might be billed by your cloud provider.
bool false no
backend_subnet_prefix_len The prefix length of the backend subnet. Must be between 20 and 32. number 24 no
create_application_subnetpool Whether the module should create an application subnet pool for this project, or use an existing one. bool true no
create_database_subnetpool Whether the module should create a database subnet pool for this project, or use an existing one. bool true no
create_default_secgroups Whether to create default security groups or not.
Depending on your choice of architecture tiering, will create security groups so that each tier can connect to the one below.
Security groups for the database tier will be created for mariadb, postgresql and redis.
A default security group allowing ssh connection will also be created.
bool false no
database_secgroup_strict Defines whether the security groups for the database network should be strict.
In strict mode, egress is only allowed to the backend network.
bool false no
database_subnet_prefix_len The prefix length of the database subnet. Must be between 24 and 32. number 24 no
database_subnetpool_cidr_blocks The CIDR blocks for the database subnet pool list(string)
[
"192.168.8.0/23"
]
no
database_subnetpool_id The id of the subnetpool to create the databse network from.
Since this module can route private subnets to the backbone, it needs to make sure it's not creating overlapping subnets.
string null no
frontend_subnet_prefix_len The prefix length of the frontend subnet. Must be between 20 and 32. number 24 no
network_internal_domain_name The domain name to use for dns resolution inside the private networks string null no
project_domain The domain where this project will be created string "default" no
project_tags The tags to append to this project list(string) [] no
public_nameservers A list of public DNS servers to upstreams requests to in your subnets.
This is not necessary if your openstack deployment already has configured default upstreams for neutron.
list(string) [] no

Outputs

No outputs.