mirror of
https://gitea.fenix-dev.com/fenix-gitea-admin/iac-opentofu-private.git
synced 2025-10-27 15:53:06 +00:00
Compare commits
26 Commits
8a5c2ce64c
...
fenix-admi
| Author | SHA1 | Date | |
|---|---|---|---|
| a4b33a570b | |||
| c7c1388112 | |||
| b875d6428b | |||
| e1b0d702c5 | |||
| a7f3b6d7e1 | |||
| fcc7c9814a | |||
| cc441d8ad8 | |||
| e71295794f | |||
| 7c46db0253 | |||
| 218ca3fc2f | |||
| 58d080dadd | |||
| f797aa6d8b | |||
| 8b16085acf | |||
| 47102e563d | |||
| d9f9620123 | |||
| 905b749a09 | |||
| 992a949b6d | |||
| 387702c3c3 | |||
| 1bf18d13a3 | |||
| de1ea64e04 | |||
| 9edc3fe55d | |||
| fd0763593f | |||
| fc5ae6402f | |||
| 5412e499f2 | |||
| fa25d7073b | |||
| 2e81ffcdb1 |
@ -1,5 +1,5 @@
|
||||
#!/usr/bin/env python3
|
||||
from ruamel.yaml import YAML
|
||||
from ruamel.yaml import YAML
|
||||
import sys
|
||||
import json
|
||||
from collections.abc import Mapping
|
||||
|
||||
@ -120,7 +120,7 @@ resource "proxmox_virtual_environment_vm" "proxmox-kubernetes-VM-template" {
|
||||
|
||||
# Configuração da interface de rede
|
||||
network_device {
|
||||
bridge = "vmbr0"
|
||||
bridge = "vmbr0" # rede de gestão para comunicação com Cluster A
|
||||
}
|
||||
|
||||
initialization {
|
||||
@ -132,6 +132,7 @@ initialization {
|
||||
address = "dhcp"
|
||||
}
|
||||
}
|
||||
|
||||
user_data_file_id = proxmox_virtual_environment_file.cloud_init_yaml.id
|
||||
}
|
||||
}
|
||||
|
||||
@ -40,6 +40,8 @@ variable "proxmox_k8s_vms" {
|
||||
vm_id = number
|
||||
node_name = string
|
||||
ip = string
|
||||
ip2 = string
|
||||
ip3 = string
|
||||
cores = optional(number)
|
||||
memory = optional(number)
|
||||
data_store = optional(string)
|
||||
|
||||
13
secrets-output/iac.ansible.hosts.ini
Normal file
13
secrets-output/iac.ansible.hosts.ini
Normal file
@ -0,0 +1,13 @@
|
||||
|
||||
[master]
|
||||
master1 ansible_host=192.168.1.99 ansible_user=user ansible_ssh_pass=pass ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
|
||||
[workers]
|
||||
|
||||
|
||||
worker-192-168-1-101 ansible_host=192.168.1.101 ansible_user=user ansible_ssh_pass=pass ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1
secrets/iac.proxmox.ssh.link
Normal file
1
secrets/iac.proxmox.ssh.link
Normal file
@ -0,0 +1 @@
|
||||
proxmox-ssh.example.com
|
||||
1
secrets/iac.vaultwarden-link
Normal file
1
secrets/iac.vaultwarden-link
Normal file
@ -0,0 +1 @@
|
||||
https://vaultwarden.example.com
|
||||
@ -1,6 +1,6 @@
|
||||
proxmox_server = "proxmox.example.com"
|
||||
PM_API_TOKEN_ID = "tokenid"
|
||||
PM_API_TOKEN_SECRET = "tokensecret"
|
||||
#proxmox_server = "proxmox.example.com"
|
||||
#PM_API_TOKEN_ID = "tokenid"
|
||||
#PM_API_TOKEN_SECRET = "tokensecret"
|
||||
# tokenid is read automatically from PM_API_TOKEN_ID
|
||||
# token is read automatically from PM_API_TOKEN_SECRET
|
||||
|
||||
@ -20,6 +20,7 @@ proxmox_k8s_vms = [
|
||||
vm_id = 3001
|
||||
node_name = "node"
|
||||
ip = "192.168.1.99/24"
|
||||
ip3 = "192.168.1.199/24"
|
||||
cores = 2
|
||||
memory = 2000
|
||||
disk_size = 32
|
||||
@ -33,13 +34,14 @@ proxmox_k8s_vms = [
|
||||
}
|
||||
]
|
||||
extra_packages = []
|
||||
extra_runcmd = []
|
||||
extra_runcmd = ["sudo ip addr add 192.168.1.199/24 dev eth0"]
|
||||
},
|
||||
{
|
||||
name = "k8s-worker-01"
|
||||
vm_id = 3002
|
||||
node_name = "node"
|
||||
ip = "192.168.1.101/24"
|
||||
ip3 = "192.168.1.201/24"
|
||||
cores = 1
|
||||
memory = 2000
|
||||
disk_size = 32
|
||||
@ -53,6 +55,6 @@ proxmox_k8s_vms = [
|
||||
}
|
||||
]
|
||||
extra_packages = []
|
||||
extra_runcmd = []
|
||||
extra_runcmd = ["sudo ip addr add 192.168.1.201/24 dev eth0"]
|
||||
},
|
||||
]
|
||||
@ -16,6 +16,13 @@ resource "vaultwarden_account_register" "vaultwarden-acount-fenix" {
|
||||
password = var.vaultwarden_master_password
|
||||
}
|
||||
|
||||
resource "bitwarden_item_login" "administrative-user" {
|
||||
name = "teste"
|
||||
username = "teste"
|
||||
password = "teste"
|
||||
collection_ids = [vaultwarden_organization_collection.vaultwarden-collection-iac.id]
|
||||
}
|
||||
|
||||
resource "vaultwarden_organization" "vaultwarden-organization-fenix-iac" {
|
||||
name = "fenix-iac"
|
||||
}
|
||||
@ -25,13 +32,6 @@ resource "vaultwarden_organization_collection" "vaultwarden-collection-iac" {
|
||||
name = "iac-collection"
|
||||
}
|
||||
|
||||
resource "bitwarden_item_login" "administrative-user" {
|
||||
name = "teste"
|
||||
username = "teste"
|
||||
password = "teste"
|
||||
collection_ids = [vaultwarden_organization_collection.vaultwarden-collection-iac.id]
|
||||
}
|
||||
|
||||
|
||||
resource "bitwarden_item_secure_note" "hosts-ini" {
|
||||
name = "iac.ansible.hosts.ini"
|
||||
@ -44,16 +44,15 @@ EOT
|
||||
}
|
||||
|
||||
locals{
|
||||
|
||||
hosts_ini = <<EOT
|
||||
|
||||
[master]
|
||||
master ansible_host=${var.proxmox_k8s_vms[0].ip} ansible_user=${var.proxmox_k8s_vms[0].extra_users[0].name} ansible_ssh_pass=${var.proxmox_k8s_vms[0].extra_users[0].password}
|
||||
master1 ansible_host=${split("/", var.proxmox_k8s_vms[0].ip)[0]} ansible_user=${var.proxmox_k8s_vms[0].extra_users[0].name} ansible_ssh_pass=${var.proxmox_k8s_vms[0].extra_users[0].password} ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
|
||||
[workers]
|
||||
%{ for i, vm in var.proxmox_k8s_vms ~}
|
||||
%{ if i != 0 }
|
||||
worker-${replace(vm.ip, ".", "-")} ansible_host=${vm.ip} ansible_user=${vm.extra_users[0].name} ansible_ssh_pass=${vm.extra_users[0].password}
|
||||
worker-${replace(split("/", vm.ip)[0], ".", "-")} ansible_host=${split("/", vm.ip)[0]} ansible_user=${vm.extra_users[0].name} ansible_ssh_pass=${vm.extra_users[0].password} ansible_ssh_common_args='-o StrictHostKeyChecking=no'
|
||||
%{ endif }
|
||||
%{ endfor }
|
||||
|
||||
|
||||
Reference in New Issue
Block a user