# module.compute.google_compute_instance.vm_backend: resource "google_compute_instance" "vm_backend" { can_ip_forward = false cpu_platform = "Intel Broadwell" creation_timestamp = "2025-12-04T00:51:44.344-08:00" current_status = "RUNNING" deletion_protection = false description = null effective_labels = { "goog-terraform-provisioned" = "true" } enable_display = false hostname = null id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-backend" instance_id = "6004704392758752624" key_revocation_action_type = null label_fingerprint = "vezUS-42LLM=" labels = {} machine_type = "e2-small" metadata = { "enable-oslogin" = "TRUE" } metadata_fingerprint = "roG64gAEwnQ=" min_cpu_platform = null name = "vm-backend" project = "iutsf-478713" resource_policies = [] self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-backend" tags = [ "backend", "ssh", ] tags_fingerprint = "N2bbCLFli_k=" terraform_labels = { "goog-terraform-provisioned" = "true" } zone = "europe-west1-b" boot_disk { auto_delete = true device_name = "persistent-disk-0" disk_encryption_key_raw = (sensitive value) disk_encryption_key_sha256 = null interface = null kms_key_self_link = null mode = "READ_WRITE" source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-backend" initialize_params { enable_confidential_compute = false image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111" labels = {} provisioned_iops = 0 provisioned_throughput = 0 resource_manager_tags = {} resource_policies = [] size = 10 storage_pool = null type = "pd-standard" } } network_interface { internal_ipv6_prefix_length = 0 ipv6_access_type = null ipv6_address = null name = "nic0" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" network_ip = "10.0.2.2" nic_type = null queue_count = 0 stack_type = "IPV4_ONLY" subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet" subnetwork_project = "iutsf-478713" } scheduling { automatic_restart = true instance_termination_action = null min_node_cpus = 0 on_host_maintenance = "MIGRATE" preemptible = false provisioning_model = "STANDARD" } shielded_instance_config { enable_integrity_monitoring = true enable_secure_boot = false enable_vtpm = true } } # module.compute.google_compute_instance.vm_database: resource "google_compute_instance" "vm_database" { can_ip_forward = false cpu_platform = "Intel Broadwell" creation_timestamp = "2025-12-04T00:51:44.427-08:00" current_status = "RUNNING" deletion_protection = false description = null effective_labels = { "goog-terraform-provisioned" = "true" } enable_display = false hostname = null id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-database" instance_id = "6512542133291644272" key_revocation_action_type = null label_fingerprint = "vezUS-42LLM=" labels = {} machine_type = "e2-small" metadata = { "enable-oslogin" = "TRUE" } metadata_fingerprint = "roG64gAEwnQ=" min_cpu_platform = null name = "vm-database" project = "iutsf-478713" resource_policies = [] self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-database" tags = [ "database", "ssh", ] tags_fingerprint = "22sTRfPQYj4=" terraform_labels = { "goog-terraform-provisioned" = "true" } zone = "europe-west1-b" boot_disk { auto_delete = true device_name = "persistent-disk-0" disk_encryption_key_raw = (sensitive value) disk_encryption_key_sha256 = null interface = null kms_key_self_link = null mode = "READ_WRITE" source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-database" initialize_params { enable_confidential_compute = false image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111" labels = {} provisioned_iops = 0 provisioned_throughput = 0 resource_manager_tags = {} resource_policies = [] size = 20 storage_pool = null type = "pd-standard" } } network_interface { internal_ipv6_prefix_length = 0 ipv6_access_type = null ipv6_address = null name = "nic0" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" network_ip = "10.0.3.2" nic_type = null queue_count = 0 stack_type = "IPV4_ONLY" subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet" subnetwork_project = "iutsf-478713" } scheduling { automatic_restart = true instance_termination_action = null min_node_cpus = 0 on_host_maintenance = "MIGRATE" preemptible = false provisioning_model = "STANDARD" } shielded_instance_config { enable_integrity_monitoring = true enable_secure_boot = false enable_vtpm = true } } # module.compute.google_compute_instance.vm_frontend: resource "google_compute_instance" "vm_frontend" { can_ip_forward = false cpu_platform = "Intel Broadwell" creation_timestamp = "2025-12-04T00:51:44.102-08:00" current_status = "RUNNING" deletion_protection = false description = null effective_labels = { "goog-terraform-provisioned" = "true" } enable_display = false hostname = null id = "projects/iutsf-478713/zones/europe-west1-b/instances/vm-frontend" instance_id = "2127744316395550064" key_revocation_action_type = null label_fingerprint = "vezUS-42LLM=" labels = {} machine_type = "e2-small" metadata = { "enable-oslogin" = "TRUE" } metadata_fingerprint = "roG64gAEwnQ=" min_cpu_platform = null name = "vm-frontend" project = "iutsf-478713" resource_policies = [] self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/instances/vm-frontend" tags = [ "frontend", "ssh", ] tags_fingerprint = "sermMtqzdso=" terraform_labels = { "goog-terraform-provisioned" = "true" } zone = "europe-west1-b" boot_disk { auto_delete = true device_name = "persistent-disk-0" disk_encryption_key_raw = (sensitive value) disk_encryption_key_sha256 = null interface = null kms_key_self_link = null mode = "READ_WRITE" source = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/zones/europe-west1-b/disks/vm-frontend" initialize_params { enable_confidential_compute = false image = "https://www.googleapis.com/compute/v1/projects/debian-cloud/global/images/debian-11-bullseye-v20251111" labels = {} provisioned_iops = 0 provisioned_throughput = 0 resource_manager_tags = {} resource_policies = [] size = 10 storage_pool = null type = "pd-standard" } } network_interface { internal_ipv6_prefix_length = 0 ipv6_access_type = null ipv6_address = null name = "nic0" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" network_ip = "10.0.1.2" nic_type = null queue_count = 0 stack_type = "IPV4_ONLY" subnetwork = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet" subnetwork_project = "iutsf-478713" access_config { nat_ip = "34.76.13.197" network_tier = "PREMIUM" public_ptr_domain_name = null } } scheduling { automatic_restart = true instance_termination_action = null min_node_cpus = 0 on_host_maintenance = "MIGRATE" preemptible = false provisioning_model = "STANDARD" } shielded_instance_config { enable_integrity_monitoring = true enable_secure_boot = false enable_vtpm = true } } # module.iam.google_project_iam_member.compute_admin: resource "google_project_iam_member" "compute_admin" { etag = "BwZFHNUmS9o=" id = "iutsf-478713/roles/compute.admin/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" project = "iutsf-478713" role = "roles/compute.admin" } # module.iam.google_project_iam_member.editor: resource "google_project_iam_member" "editor" { etag = "BwZFHNUmS9o=" id = "iutsf-478713/roles/editor/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" project = "iutsf-478713" role = "roles/editor" } # module.iam.google_project_iam_member.network_admin: resource "google_project_iam_member" "network_admin" { etag = "BwZFHNUmS9o=" id = "iutsf-478713/roles/compute.networkAdmin/serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" project = "iutsf-478713" role = "roles/compute.networkAdmin" } # module.iam.google_service_account.terraform: resource "google_service_account" "terraform" { account_id = "terraform" description = null disabled = false display_name = "Terraform Service Account" email = "terraform@iutsf-478713.iam.gserviceaccount.com" id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com" member = "serviceAccount:terraform@iutsf-478713.iam.gserviceaccount.com" name = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com" project = "iutsf-478713" unique_id = "108746033464743928037" } # module.iam.google_service_account_key.terraform_key: resource "google_service_account_key" "terraform_key" { id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com/keys/b16f9c32834211c49918d9c27441e205bcf1de9d" key_algorithm = "KEY_ALG_RSA_2048" name = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com/keys/b16f9c32834211c49918d9c27441e205bcf1de9d" private_key = (sensitive value) private_key_type = "TYPE_GOOGLE_CREDENTIALS_FILE" public_key = "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" public_key_type = "TYPE_X509_PEM_FILE" service_account_id = "projects/iutsf-478713/serviceAccounts/terraform@iutsf-478713.iam.gserviceaccount.com" valid_after = "2025-12-04T09:19:53Z" valid_before = "9999-12-31T23:59:59Z" } # module.network.google_compute_firewall.backend_to_database_3306: resource "google_compute_firewall" "backend_to_database_3306" { creation_timestamp = "2025-12-04T00:51:11.558-08:00" description = "Autorise le trafic TCP 3306 des instances backend vers database" destination_ranges = [] direction = "INGRESS" disabled = false id = "projects/iutsf-478713/global/firewalls/iutsf-fw-backend-database-3306" name = "iutsf-fw-backend-database-3306" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" priority = 1000 project = "iutsf-478713" self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-backend-database-3306" source_ranges = [] source_service_accounts = [] source_tags = [ "backend", ] target_service_accounts = [] target_tags = [ "database", ] allow { ports = [ "3306", ] protocol = "tcp" } } # module.network.google_compute_firewall.frontend_http_https: resource "google_compute_firewall" "frontend_http_https" { creation_timestamp = "2025-12-04T00:51:11.479-08:00" description = "Autorise HTTP/HTTPS vers les instances frontend" destination_ranges = [] direction = "INGRESS" disabled = false id = "projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-http-https" name = "iutsf-fw-frontend-http-https" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" priority = 1000 project = "iutsf-478713" self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-http-https" source_ranges = [ "0.0.0.0/0", ] source_service_accounts = [] source_tags = [] target_service_accounts = [] target_tags = [ "frontend", ] allow { ports = [ "80", "443", ] protocol = "tcp" } } # module.network.google_compute_firewall.frontend_to_backend_8000: resource "google_compute_firewall" "frontend_to_backend_8000" { creation_timestamp = "2025-12-04T00:51:11.719-08:00" description = "Autorise le trafic TCP 8000 des instances frontend vers backend" destination_ranges = [] direction = "INGRESS" disabled = false id = "projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-backend-8000" name = "iutsf-fw-frontend-backend-8000" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" priority = 1000 project = "iutsf-478713" self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-fw-frontend-backend-8000" source_ranges = [] source_service_accounts = [] source_tags = [ "frontend", ] target_service_accounts = [] target_tags = [ "backend", ] allow { ports = [ "8000", ] protocol = "tcp" } } # module.network.google_compute_firewall.ssh_all: resource "google_compute_firewall" "ssh_all" { creation_timestamp = "2025-12-03T07:30:58.943-08:00" description = "Autorise SSH vers toutes les instances du VPC" destination_ranges = [] direction = "INGRESS" disabled = false id = "projects/iutsf-478713/global/firewalls/iutsf-478713-fw-ssh-all" name = "iutsf-478713-fw-ssh-all" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" priority = 1000 project = "iutsf-478713" self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/firewalls/iutsf-478713-fw-ssh-all" source_ranges = [ "35.195.166.234/32", ] source_service_accounts = [] source_tags = [] target_service_accounts = [] target_tags = [] allow { ports = [ "22", ] protocol = "tcp" } } # module.network.google_compute_network.vpc: resource "google_compute_network" "vpc" { auto_create_subnetworks = false delete_default_routes_on_create = false description = null enable_ula_internal_ipv6 = false gateway_ipv4 = null id = "projects/iutsf-478713/global/networks/iutsf-vpc" internal_ipv6_range = null mtu = 0 name = "iutsf-vpc" network_firewall_policy_enforcement_order = "AFTER_CLASSIC_FIREWALL" numeric_id = "4334340711686927771" project = "iutsf-478713" routing_mode = "REGIONAL" self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" } # module.network.google_compute_subnetwork.backend: resource "google_compute_subnetwork" "backend" { creation_timestamp = "2025-12-04T00:51:12.096-08:00" description = null external_ipv6_prefix = null gateway_address = "10.0.2.1" id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet" internal_ipv6_prefix = null ip_cidr_range = "10.0.2.0/24" ipv6_access_type = null ipv6_cidr_range = null name = "iutsf-backend-subnet" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" private_ip_google_access = false private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS" project = "iutsf-478713" purpose = "PRIVATE" region = "europe-west1" reserved_internal_range = null role = null self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-backend-subnet" stack_type = "IPV4_ONLY" } # module.network.google_compute_subnetwork.database: resource "google_compute_subnetwork" "database" { creation_timestamp = "2025-12-04T00:51:12.182-08:00" description = null external_ipv6_prefix = null gateway_address = "10.0.3.1" id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet" internal_ipv6_prefix = null ip_cidr_range = "10.0.3.0/24" ipv6_access_type = null ipv6_cidr_range = null name = "iutsf-database-subnet" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" private_ip_google_access = false private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS" project = "iutsf-478713" purpose = "PRIVATE" region = "europe-west1" reserved_internal_range = null role = null self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-database-subnet" stack_type = "IPV4_ONLY" } # module.network.google_compute_subnetwork.frontend: resource "google_compute_subnetwork" "frontend" { creation_timestamp = "2025-12-04T00:51:11.758-08:00" description = null external_ipv6_prefix = null gateway_address = "10.0.1.1" id = "projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet" internal_ipv6_prefix = null ip_cidr_range = "10.0.1.0/24" ipv6_access_type = null ipv6_cidr_range = null name = "iutsf-frontend-subnet" network = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/global/networks/iutsf-vpc" private_ip_google_access = false private_ipv6_google_access = "DISABLE_GOOGLE_ACCESS" project = "iutsf-478713" purpose = "PRIVATE" region = "europe-west1" reserved_internal_range = null role = null self_link = "https://www.googleapis.com/compute/v1/projects/iutsf-478713/regions/europe-west1/subnetworks/iutsf-frontend-subnet" stack_type = "IPV4_ONLY" }