Apply CI-private Terraform config to remaining AWS regions
Categories
(Developer Services :: Mercurial: hg.mozilla.org, task, P1)
Tracking
(Not tracked)
People
(Reporter: sheehan, Assigned: sheehan)
References
Details
(Keywords: leave-open)
Attachments
(6 files)
|
47 bytes,
text/x-phabricator-request
|
Details | Review | |
|
47 bytes,
text/x-phabricator-request
|
Details | Review | |
|
47 bytes,
text/x-phabricator-request
|
Details | Review | |
|
47 bytes,
text/x-phabricator-request
|
Details | Review | |
|
47 bytes,
text/x-phabricator-request
|
Details | Review | |
|
47 bytes,
text/x-phabricator-request
|
Details | Review |
Now that all the required VPN/VPC connections have been created for the remaining AWS regions, we need to import the created resources into Terraform and apply the aws-vpc module to them. There will likely be a few Terraform changes required to get this working.
| Assignee | ||
Comment 1•6 years ago
|
||
Previously we searched for "to-mdc's". The new gateway only
links back to one of the datacentres, so keeping the name while
selecting the correct connection seems like the correct way to
handle this.
| Assignee | ||
Comment 2•6 years ago
|
||
Turns out, us-west-1 doesn't have an availability zone C. This
was mentioned to me during review, and I thought I checked each
region to ensure there was a third AZ for each, but apparently
the way I checked was wrong. Oops!
Considering we aren't using the subnet in that AZ at the moment
any way, this isn't a huge deal. So this commit removes the C
availability zone subnets (public and private).
| Assignee | ||
Comment 3•6 years ago
|
||
This rule was previously in place to allow our on-premises hosts
to send data to the test InfluxDB instance. Now that we have the
production service online, we can remove it.
| Assignee | ||
Comment 4•6 years ago
|
||
The Terraform variable name included "uw2", short for
"us-west-2". Now that we are deploying to more regions,
it should be changed.
| Assignee | ||
Comment 5•6 years ago
|
||
The previous plan was to create a single certificate that would
be shared across AWS regions, but we have since learned that
ACM certificates are per-region only. So this commit moves the
certificate resource definition from the main.tf file for the
entire Terraform config and into the aws-vpc modules for each
specific AWS region. We also remove helper variables from the
module.
| Assignee | ||
Comment 6•6 years ago
|
||
Now that our environment is reproducible in different AWS regions,
this commit creates a new instance of the aws-vpc modules for use
in us-west-1.
Pushed by cosheehan@mozilla.com:
https://hg.mozilla.org/hgcustom/version-control-tools/rev/f250d8415b45
terraform: add "to-mdc" search term in aws_vpn_gateway data source r=bstack
https://hg.mozilla.org/hgcustom/version-control-tools/rev/4172e809ba0e
terraform: remove subnets in availability zone C r=bstack
https://hg.mozilla.org/hgcustom/version-control-tools/rev/19a3a9e03887
terraform: remove security group rule allowing Telegraf traffic from MDC1 r=bstack
https://hg.mozilla.org/hgcustom/version-control-tools/rev/64e8e9a62933
terraform: rename Route53 record variable to be region agnostic r=bstack
https://hg.mozilla.org/hgcustom/version-control-tools/rev/c6ea6220b09d
terraform: create unique certificate per region r=bstack
https://hg.mozilla.org/hgcustom/version-control-tools/rev/0ac1bb96d120
terraform: stand up AWS VPC environment in us-west-1 r=bstack
| Assignee | ||
Updated•6 years ago
|
Comment 10•6 years ago
|
||
Comment 11•6 years ago
|
||
Comment 12•6 years ago
|
||
Comment 13•6 years ago
|
||
| Assignee | ||
Comment 14•6 years ago
|
||
All regions have the Terraform config applied and hosts have been bootstrapped.
Description
•