Files
but3-iac/terraform_show.txt

550 lines
25 KiB
Plaintext
Raw Normal View History

2025-12-04 10:38:18 +00:00
# module.compute.google_compute_instance.vm_backend:
resource "google_compute_instance" "vm_backend" {
can_ip_forward = false
cpu_platform = "Intel Broadwell"
creation_timestamp = "2025-12-04T00:51:44.344-08:00"
current_status = "RUNNING"
deletion_protection = false
description = null
effective_labels = {
"goog-terraform-provisioned" = "true"
}
enable_display = false
hostname = null
id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-backend"
instance_id = "6004704392758752624"
key_revocation_action_type = null
label_fingerprint = "vezUS-42LLM="
labels = {}
machine_type = "e2-small"
metadata = {
"enable-oslogin" = "TRUE"
}
metadata_fingerprint = "roG64gAEwnQ="
min_cpu_platform = null
name = "vm-backend"
project = "iutsf-478713"
resource_policies = []
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-backend"
tags = [
"backend",
"ssh",
]
tags_fingerprint = "N2bbCLFli_k="
terraform_labels = {
"goog-terraform-provisioned" = "true"
}
zone = "europe-west1-b"
boot_disk {
auto_delete = true
device_name = "persistent-disk-0"
disk_encryption_key_raw = (sensitive value)
disk_encryption_key_sha256 = null
interface = null
kms_key_self_link = null
mode = "READ_WRITE"
source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-backend"
initialize_params {
enable_confidential_compute = false
image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111"
labels = {}
provisioned_iops = 0
provisioned_throughput = 0
resource_manager_tags = {}
resource_policies = []
size = 10
storage_pool = null
type = "pd-standard"
}
}
network_interface {
internal_ipv6_prefix_length = 0
ipv6_access_type = null
ipv6_address = null
name = "nic0"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
network_ip = "10.0.2.2"
nic_type = null
queue_count = 0
stack_type = "IPV4_ONLY"
subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet"
subnetwork_project = "iutsf-478713"
}
scheduling {
automatic_restart = true
instance_termination_action = null
min_node_cpus = 0
on_host_maintenance = "MIGRATE"
preemptible = false
provisioning_model = "STANDARD"
}
shielded_instance_config {
enable_integrity_monitoring = true
enable_secure_boot = false
enable_vtpm = true
}
}
# module.compute.google_compute_instance.vm_database:
resource "google_compute_instance" "vm_database" {
can_ip_forward = false
cpu_platform = "Intel Broadwell"
creation_timestamp = "2025-12-04T00:51:44.427-08:00"
current_status = "RUNNING"
deletion_protection = false
description = null
effective_labels = {
"goog-terraform-provisioned" = "true"
}
enable_display = false
hostname = null
id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-database"
instance_id = "6512542133291644272"
key_revocation_action_type = null
label_fingerprint = "vezUS-42LLM="
labels = {}
machine_type = "e2-small"
metadata = {
"enable-oslogin" = "TRUE"
}
metadata_fingerprint = "roG64gAEwnQ="
min_cpu_platform = null
name = "vm-database"
project = "iutsf-478713"
resource_policies = []
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-database"
tags = [
"database",
"ssh",
]
tags_fingerprint = "22sTRfPQYj4="
terraform_labels = {
"goog-terraform-provisioned" = "true"
}
zone = "europe-west1-b"
boot_disk {
auto_delete = true
device_name = "persistent-disk-0"
disk_encryption_key_raw = (sensitive value)
disk_encryption_key_sha256 = null
interface = null
kms_key_self_link = null
mode = "READ_WRITE"
source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-database"
initialize_params {
enable_confidential_compute = false
image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111"
labels = {}
provisioned_iops = 0
provisioned_throughput = 0
resource_manager_tags = {}
resource_policies = []
size = 20
storage_pool = null
type = "pd-standard"
}
}
network_interface {
internal_ipv6_prefix_length = 0
ipv6_access_type = null
ipv6_address = null
name = "nic0"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
network_ip = "10.0.3.2"
nic_type = null
queue_count = 0
stack_type = "IPV4_ONLY"
subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet"
subnetwork_project = "iutsf-478713"
}
scheduling {
automatic_restart = true
instance_termination_action = null
min_node_cpus = 0
on_host_maintenance = "MIGRATE"
preemptible = false
provisioning_model = "STANDARD"
}
shielded_instance_config {
enable_integrity_monitoring = true
enable_secure_boot = false
enable_vtpm = true
}
}
# module.compute.google_compute_instance.vm_frontend:
resource "google_compute_instance" "vm_frontend" {
can_ip_forward = false
cpu_platform = "Intel Broadwell"
creation_timestamp = "2025-12-04T00:51:44.102-08:00"
current_status = "RUNNING"
deletion_protection = false
description = null
effective_labels = {
"goog-terraform-provisioned" = "true"
}
enable_display = false
hostname = null
id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-frontend"
instance_id = "2127744316395550064"
key_revocation_action_type = null
label_fingerprint = "vezUS-42LLM="
labels = {}
machine_type = "e2-small"
metadata = {
"enable-oslogin" = "TRUE"
}
metadata_fingerprint = "roG64gAEwnQ="
min_cpu_platform = null
name = "vm-frontend"
project = "iutsf-478713"
resource_policies = []
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-frontend"
tags = [
"frontend",
"ssh",
]
tags_fingerprint = "sermMtqzdso="
terraform_labels = {
"goog-terraform-provisioned" = "true"
}
zone = "europe-west1-b"
boot_disk {
auto_delete = true
device_name = "persistent-disk-0"
disk_encryption_key_raw = (sensitive value)
disk_encryption_key_sha256 = null
interface = null
kms_key_self_link = null
mode = "READ_WRITE"
source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-frontend"
initialize_params {
enable_confidential_compute = false
image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111"
labels = {}
provisioned_iops = 0
provisioned_throughput = 0
resource_manager_tags = {}
resource_policies = []
size = 10
storage_pool = null
type = "pd-standard"
}
}
network_interface {
internal_ipv6_prefix_length = 0
ipv6_access_type = null
ipv6_address = null
name = "nic0"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
network_ip = "10.0.1.2"
nic_type = null
queue_count = 0
stack_type = "IPV4_ONLY"
subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet"
subnetwork_project = "iutsf-478713"
access_config {
nat_ip = "34.76.13.197"
network_tier = "PREMIUM"
public_ptr_domain_name = null
}
}
scheduling {
automatic_restart = true
instance_termination_action = null
min_node_cpus = 0
on_host_maintenance = "MIGRATE"
preemptible = false
provisioning_model = "STANDARD"
}
shielded_instance_config {
enable_integrity_monitoring = true
enable_secure_boot = false
enable_vtpm = true
}
}
# module.iam.google_project_iam_member.compute_admin:
resource "google_project_iam_member" "compute_admin" {
etag = "BwZFHNUmS9o="
id = "iutsf-478713/roles/compute.admin/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
project = "iutsf-478713"
role = "roles/compute.admin"
}
# module.iam.google_project_iam_member.editor:
resource "google_project_iam_member" "editor" {
etag = "BwZFHNUmS9o="
id = "iutsf-478713/roles/editor/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
project = "iutsf-478713"
role = "roles/editor"
}
# module.iam.google_project_iam_member.network_admin:
resource "google_project_iam_member" "network_admin" {
etag = "BwZFHNUmS9o="
id = "iutsf-478713/roles/compute.networkAdmin/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
project = "iutsf-478713"
role = "roles/compute.networkAdmin"
}
# module.iam.google_service_account.terraform:
resource "google_service_account" "terraform" {
account_id = "terraform"
description = null
disabled = false
display_name = "Terraform Service Account"
email = "terraform@iutsf-478713.iam.gserviceaccount.com"
id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com"
member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com"
name = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com"
project = "iutsf-478713"
unique_id = "108746033464743928037"
}
# module.iam.google_service_account_key.terraform_key:
resource "google_service_account_key" "terraform_key" {
id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com/keys/b16f9c32834211c49918d9c27441e205bcf1de9d"
key_algorithm = "KEY_ALG_RSA_2048"
name = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com/keys/b16f9c32834211c49918d9c27441e205bcf1de9d"
private_key = (sensitive value)
private_key_type = "TYPE_GOOGLE_CREDENTIALS_FILE"
public_key = "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"
public_key_type = "TYPE_X509_PEM_FILE"
service_account_id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com"
valid_after = "2025-12-04T09:19:53Z"
valid_before = "9999-12-31T23:59:59Z"
}
# module.network.google_compute_firewall.backend_to_database_3306:
resource "google_compute_firewall" "backend_to_database_3306" {
creation_timestamp = "2025-12-04T00:51:11.558-08:00"
description = "Autorise le trafic TCP 3306 des instances backend vers database"
destination_ranges = []
direction = "INGRESS"
disabled = false
id = "projects/iutsf-478713/global/firewalls/iutsf-fw-backend-database-3306"
name = "iutsf-fw-backend-database-3306"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
priority = 1000
project = "iutsf-478713"
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-backend-database-3306"
source_ranges = []
source_service_accounts = []
source_tags = [
"backend",
]
target_service_accounts = []
target_tags = [
"database",
]
allow {
ports = [
"3306",
]
protocol = "tcp"
}
}
# module.network.google_compute_firewall.frontend_http_https:
resource "google_compute_firewall" "frontend_http_https" {
creation_timestamp = "2025-12-04T00:51:11.479-08:00"
description = "Autorise HTTP/HTTPS vers les instances frontend"
destination_ranges = []
direction = "INGRESS"
disabled = false
id = "projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-http-https"
name = "iutsf-fw-frontend-http-https"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
priority = 1000
project = "iutsf-478713"
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-http-https"
source_ranges = [
"0.0.0.0/0",
]
source_service_accounts = []
source_tags = []
target_service_accounts = []
target_tags = [
"frontend",
]
allow {
ports = [
"80",
"443",
]
protocol = "tcp"
}
}
# module.network.google_compute_firewall.frontend_to_backend_8000:
resource "google_compute_firewall" "frontend_to_backend_8000" {
creation_timestamp = "2025-12-04T00:51:11.719-08:00"
description = "Autorise le trafic TCP 8000 des instances frontend vers backend"
destination_ranges = []
direction = "INGRESS"
disabled = false
id = "projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-backend-8000"
name = "iutsf-fw-frontend-backend-8000"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
priority = 1000
project = "iutsf-478713"
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-backend-8000"
source_ranges = []
source_service_accounts = []
source_tags = [
"frontend",
]
target_service_accounts = []
target_tags = [
"backend",
]
allow {
ports = [
"8000",
]
protocol = "tcp"
}
}
# module.network.google_compute_firewall.ssh_all:
resource "google_compute_firewall" "ssh_all" {
creation_timestamp = "2025-12-03T07:30:58.943-08:00"
description = "Autorise SSH vers toutes les instances du VPC"
destination_ranges = []
direction = "INGRESS"
disabled = false
id = "projects/iutsf-478713/global/firewalls/iutsf-478713-fw-ssh-all"
name = "iutsf-478713-fw-ssh-all"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
priority = 1000
project = "iutsf-478713"
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-478713-fw-ssh-all"
source_ranges = [
"35.195.166.234/32",
]
source_service_accounts = []
source_tags = []
target_service_accounts = []
target_tags = []
allow {
ports = [
"22",
]
protocol = "tcp"
}
}
# module.network.google_compute_network.vpc:
resource "google_compute_network" "vpc" {
auto_create_subnetworks = false
delete_default_routes_on_create = false
description = null
enable_ula_internal_ipv6 = false
gateway_ipv4 = null
id = "projects/iutsf-478713/global/networks/iutsf-vpc"
internal_ipv6_range = null
mtu = 0
name = "iutsf-vpc"
network_firewall_policy_enforcement_order = "AFTER_CLASSIC_FIREWALL"
numeric_id = "4334340711686927771"
project = "iutsf-478713"
routing_mode = "REGIONAL"
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
}
# module.network.google_compute_subnetwork.backend:
resource "google_compute_subnetwork" "backend" {
creation_timestamp = "2025-12-04T00:51:12.096-08:00"
description = null
external_ipv6_prefix = null
gateway_address = "10.0.2.1"
id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet"
internal_ipv6_prefix = null
ip_cidr_range = "10.0.2.0/24"
ipv6_access_type = null
ipv6_cidr_range = null
name = "iutsf-backend-subnet"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
private_ip_google_access = false
private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS"
project = "iutsf-478713"
purpose = "PRIVATE"
region = "europe-west1"
reserved_internal_range = null
role = null
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet"
stack_type = "IPV4_ONLY"
}
# module.network.google_compute_subnetwork.database:
resource "google_compute_subnetwork" "database" {
creation_timestamp = "2025-12-04T00:51:12.182-08:00"
description = null
external_ipv6_prefix = null
gateway_address = "10.0.3.1"
id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet"
internal_ipv6_prefix = null
ip_cidr_range = "10.0.3.0/24"
ipv6_access_type = null
ipv6_cidr_range = null
name = "iutsf-database-subnet"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
private_ip_google_access = false
private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS"
project = "iutsf-478713"
purpose = "PRIVATE"
region = "europe-west1"
reserved_internal_range = null
role = null
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet"
stack_type = "IPV4_ONLY"
}
# module.network.google_compute_subnetwork.frontend:
resource "google_compute_subnetwork" "frontend" {
creation_timestamp = "2025-12-04T00:51:11.758-08:00"
description = null
external_ipv6_prefix = null
gateway_address = "10.0.1.1"
id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet"
internal_ipv6_prefix = null
ip_cidr_range = "10.0.1.0/24"
ipv6_access_type = null
ipv6_cidr_range = null
name = "iutsf-frontend-subnet"
network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc"
private_ip_google_access = false
private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS"
project = "iutsf-478713"
purpose = "PRIVATE"
region = "europe-west1"
reserved_internal_range = null
role = null
self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet"
stack_type = "IPV4_ONLY"
}