forked from pierront/but3-iac
network
This commit is contained in:
28
terraform/environments/dev/main.tf
Normal file
28
terraform/environments/dev/main.tf
Normal file
@@ -0,0 +1,28 @@
|
||||
# À vous de :
|
||||
# 1. Configurer le provider google
|
||||
# 2. Appeler les trois modules avec les bonnes variables
|
||||
# 3. Créer le fichier de configuration Ansible (template)
|
||||
|
||||
terraform {
|
||||
required_providers {
|
||||
google = {
|
||||
source = "hashicorp/google"
|
||||
version = "~> 6.12.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
provider "google" {
|
||||
project = var.project_id
|
||||
region = var.region
|
||||
}
|
||||
|
||||
module "network" {
|
||||
source = "../../modules/network"
|
||||
project_name = var.project_name
|
||||
region = var.region
|
||||
frontend_cidr = var.frontend_cidr
|
||||
backend_cidr = var.backend_cidr
|
||||
database_cidr = var.database_cidr
|
||||
ssh_source_ranges = var.ssh_source_ranges
|
||||
}
|
||||
0
terraform/environments/dev/outputs.tf
Normal file
0
terraform/environments/dev/outputs.tf
Normal file
41
terraform/environments/dev/variables.tf
Normal file
41
terraform/environments/dev/variables.tf
Normal file
@@ -0,0 +1,41 @@
|
||||
variable "project_name" {
|
||||
description = "La blase du projet"
|
||||
type = string
|
||||
default = "BUT3 Automatisation et Virtua"
|
||||
}
|
||||
|
||||
variable "region" {
|
||||
description = "La région du projet"
|
||||
type = string
|
||||
default = "europe-west9-b"
|
||||
}
|
||||
|
||||
variable "frontend_cidr" {
|
||||
description = "CIDR for frontend subnet"
|
||||
type = string
|
||||
default = "10.0.1.0/24"
|
||||
}
|
||||
|
||||
variable "backend_cidr" {
|
||||
description = "CIDR for backend subnet"
|
||||
type = string
|
||||
default = "10.0.2.0/24"
|
||||
}
|
||||
|
||||
variable "database_cidr" {
|
||||
description = "CIDR for database subnet"
|
||||
type = string
|
||||
default = "10.0.3.0/24"
|
||||
}
|
||||
|
||||
variable "ssh_source_ranges" {
|
||||
description = "Qui peut y accéder"
|
||||
type = string
|
||||
default = "0.0.0/0"
|
||||
}
|
||||
|
||||
variable "project_id" {
|
||||
description = "Id du projet"
|
||||
type = string
|
||||
default = "silicon-monitor-478713-j5"
|
||||
}
|
||||
22
terraform/modules/compute/main.tf
Normal file
22
terraform/modules/compute/main.tf
Normal file
@@ -0,0 +1,22 @@
|
||||
# À vous de créer :
|
||||
|
||||
# 1. Instance frontend :
|
||||
# - Image : debian-11
|
||||
# - Disque : 10GB
|
||||
# - IP publique
|
||||
# - Tags : frontend, ssh
|
||||
# - OS Login enabled
|
||||
|
||||
# 2. Instance backend :
|
||||
# - Image : debian-11
|
||||
# - Disque : 10GB
|
||||
# - Pas d'IP publique (interne seulement)
|
||||
# - Tags : backend, ssh
|
||||
# - OS Login enabled
|
||||
|
||||
# 3. Instance database :
|
||||
# - Image : debian-11
|
||||
# - Disque : 20GB
|
||||
# - Pas d'IP publique
|
||||
# - Tags : database, ssh
|
||||
# - OS Login enabled
|
||||
4
terraform/modules/compute/outputs.tf
Normal file
4
terraform/modules/compute/outputs.tf
Normal file
@@ -0,0 +1,4 @@
|
||||
# À vous d'exposer :
|
||||
# 1. Les IPs internes de toutes les instances
|
||||
# 2. L'IP publique du frontend
|
||||
# 3. Les noms des instances
|
||||
6
terraform/modules/compute/variables.tf
Normal file
6
terraform/modules/compute/variables.tf
Normal file
@@ -0,0 +1,6 @@
|
||||
# À vous de définir les variables pour :
|
||||
# - instance_type
|
||||
# - zone
|
||||
# - frontend_subnet_id
|
||||
# - backend_subnet_id
|
||||
# - database_subnet_id
|
||||
5
terraform/modules/iam/main.tf
Normal file
5
terraform/modules/iam/main.tf
Normal file
@@ -0,0 +1,5 @@
|
||||
# À vous de créer :
|
||||
# 1. Un compte de service pour Terraform
|
||||
# 2. Une clé pour ce compte de service
|
||||
# 3. Les rôles IAM nécessaires
|
||||
# 4. La configuration OS Login avec votre clé SSH
|
||||
3
terraform/modules/iam/outputs.tf
Normal file
3
terraform/modules/iam/outputs.tf
Normal file
@@ -0,0 +1,3 @@
|
||||
# À vous d'exposer :
|
||||
# 1. L'email du compte de service
|
||||
# 2. La clé du compte de service (sensitive = true)
|
||||
2
terraform/modules/iam/variables.tf
Normal file
2
terraform/modules/iam/variables.tf
Normal file
@@ -0,0 +1,2 @@
|
||||
# À vous de définir :
|
||||
# - project_id (string)
|
||||
96
terraform/modules/network/main.tf
Normal file
96
terraform/modules/network/main.tf
Normal file
@@ -0,0 +1,96 @@
|
||||
# À vous de créer :
|
||||
# 1. Un VPC personnalisé avec auto_create_subnetworks = false
|
||||
# 2. Trois sous-réseaux (frontend, backend, database)
|
||||
# 3. Règles de firewall :
|
||||
# - HTTP/HTTPS vers frontend
|
||||
# - SSH vers toutes les instances
|
||||
# - Port 8000 de frontend vers backend
|
||||
# - Port 3306 de backend vers database
|
||||
|
||||
# VPC
|
||||
resource "google_compute_network" "vpc_terraform" {
|
||||
name = "vpc_terraform"
|
||||
auto_create_subnetworks = false
|
||||
}
|
||||
|
||||
# Sous-réseau
|
||||
resource "google_compute_subnetwork" "subnet_frontend" {
|
||||
name = "frontend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = "10.0.1.0/24"
|
||||
region = "europe-west9-b"
|
||||
}
|
||||
|
||||
# Sous-réseau
|
||||
resource "google_compute_subnetwork" "subnet_backend" {
|
||||
name = "backend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = "10.0.2.0/24"
|
||||
region = "europe-west9-b"
|
||||
}
|
||||
|
||||
# Sous-réseau
|
||||
resource "google_compute_subnetwork" "subnet_database" {
|
||||
name = "database"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
ip_cidr_range = "10.0.3.0/24"
|
||||
|
||||
region = "europe-west9-b"
|
||||
}
|
||||
|
||||
|
||||
resource "google_compute_firewall" "allow_user_frontend" {
|
||||
name = "allow_user_frontend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
|
||||
protocol = "tcp"
|
||||
ports = ["80", "443"]
|
||||
}
|
||||
|
||||
source_tags = ["0.0.0.0/0"]
|
||||
target_tags = ["frontend"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_frontend_backend" {
|
||||
name = "allow_frontend_backend"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["8000"]
|
||||
}
|
||||
|
||||
source_tags = ["frontend"]
|
||||
target_tags = ["backend"]
|
||||
}
|
||||
|
||||
resource "google_compute_firewall" "allow_ssh_all" {
|
||||
name = "allow_ssh_all"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["22"]
|
||||
}
|
||||
|
||||
source_ranges = ["0.0.0.0/0"]
|
||||
target_tags = ["ssh"]
|
||||
}
|
||||
|
||||
|
||||
resource "google_compute_firewall" "allow_backend_database" {
|
||||
name = "allow_backend_database"
|
||||
network = google_compute_network.vpc_terraform.id
|
||||
|
||||
allow {
|
||||
protocol = "tcp"
|
||||
ports = ["3306"]
|
||||
}
|
||||
|
||||
source_tags = ["backend"]
|
||||
target_tags = ["database"]
|
||||
}
|
||||
|
||||
|
||||
15
terraform/modules/network/outputs.tf
Normal file
15
terraform/modules/network/outputs.tf
Normal file
@@ -0,0 +1,15 @@
|
||||
# À vous d'exposer :
|
||||
# 1. L'ID du VPC
|
||||
# 2. Les IDs des sous-réseaux sous forme de map
|
||||
|
||||
output "vpc_terraform_output" {
|
||||
value = google_compute_instance.vpc_terraform.id
|
||||
}
|
||||
|
||||
output "list_id" {
|
||||
value = {
|
||||
frontend = google_compute_subnetwork.subnet_frontend.id
|
||||
bakcend = google_compute_subnetwork.subnet_backend.id
|
||||
databse = google_compute_subnetwork.subnet_database.id
|
||||
}
|
||||
}
|
||||
38
terraform/modules/network/variables.tf
Normal file
38
terraform/modules/network/variables.tf
Normal file
@@ -0,0 +1,38 @@
|
||||
# À vous de définir les variables pour :
|
||||
# - project_name (string)
|
||||
# - region (string)
|
||||
# - frontend_cidr (string)
|
||||
# - backend_cidr (string)
|
||||
# - database_cidr (string)
|
||||
# - ssh_source_ranges (string)
|
||||
|
||||
|
||||
variable "project_name" {
|
||||
description = "La blase du projet"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "region" {
|
||||
description = "La région du projet"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "frontend_cidr" {
|
||||
description = "CIDR for frontend subnet"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "backend_cidr" {
|
||||
description = "CIDR for backend subnet"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "database_cidr" {
|
||||
description = "CIDR for database subnet"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "ssh_source_ranges" {
|
||||
description = "Qui peut y accéder"
|
||||
type = string
|
||||
}
|
||||
Reference in New Issue
Block a user