Set of terraform modules for deploying Ops Manager, PAS and PKS infrastructure requirements like:
- Friendly DNS entries in Route53
- A RDS instance (optional)
- A Virtual Private Network (VPC), subnets, Security Groups
- Necessary s3 buckets
- A NAT Box
- Elastic Load Balancers (ELB)
- An IAM User with proper permissions
- Tagged resources
Note: This is not an exhaustive list of resources created, this will vary depending of your arguments and what you're deploying.
brew update
brew install terraform- AmazonEC2FullAccess
- AmazonRDSFullAccess
- AmazonRoute53FullAccess
- AmazonS3FullAccess
- AmazonVPCFullAccess
- IAMFullAccess
- AWSKeyManagementServicePowerUser
Depending if you're deploying PAS or PKS you need to perform the following steps:
cdinto the proper directory:- Create
terraform.tfvarsfile - Run terraform apply:
terraform init
terraform plan -out=plan
terraform apply planCopy the stub content below into a file called terraform.tfvars and put it in the root of this project.
These vars will be used when you run terraform apply.
You should fill in the stub values with the correct content.
env_name = "some-environment-name"
access_key = "access-key-id"
secret_key = "secret-access-key"
region = "us-west-1"
availability_zones = ["us-west-1a", "us-west-1c"]
ops_manager_ami = "ami-4f291f2f"
rds_instance_count = 1
dns_suffix = "example.com"
vpc_cidr = "10.0.0.0/16"
ssl_cert = <<EOF
-----BEGIN CERTIFICATE-----
some cert
-----END CERTIFICATE-----
EOF
ssl_private_key = <<EOF
-----BEGIN RSA PRIVATE KEY-----
some cert private key
-----END RSA PRIVATE KEY-----
EOF
tags = {
Team = "Dev"
Project = "WebApp3"
}- env_name: (required) An arbitrary unique name for namespacing resources
- access_key (required) Your Amazon access_key, used for deployment
- secret_key: (required) Your Amazon secret_key, also used for deployment
- region: (required) Region you want to deploy your resources to
- availability_zones: (required) List of AZs you want to deploy to
- dns_suffix: (required) Domain to add environment subdomain to
- hosted_zone: (optional) Parent domain already managed by Route53. If specified, the DNS records will be added to this Route53 zone instead of a new zone.
- ssl_cert: (optional) SSL certificate for HTTP load balancer configuration. Required unless
ssl_ca_certorssl_cert_arnis specified. - ssl_private_key: (optional) Private key for above SSL certificate. Required unless
ssl_ca_certorssl_cert_arnis specified. - ssl_ca_cert: (optional) SSL CA certificate used to generate self-signed HTTP load balancer certificate. Required unless
ssl_certorssl_cert_arnis specified. - ssl_ca_private_key: (optional) Private key for above SSL CA certificate. Required unless
ssl_certorssl_cert_arnis specified. - ssl_cert_arn: (optional) Existing SSL certificate in AWS for HTTP load balancer configuration. Required unless
ssl_certorssl_ca_certis specified. - tags: (optional) A map of AWS tags that are applied to the created resources. By default, the following tags are set: Application = Cloud Foundry, Environment = $env_name
- vpc_cidr: (default: 10.0.0.0/16) Internal CIDR block for the AWS VPC.
- ops_manager: (default: true) Set to false if you don't want an Ops Manager
- ops_manager_ami: (optional) Ops Manager AMI, get the right AMI according to your region from the AWS guide downloaded from Pivotal Network
- optional_ops_manager: (default: false) Set to true if you want an additional Ops Manager (useful for testing upgrades)
- optional_ops_manager_ami: (optional) Additional Ops Manager AMI, get the right AMI according to your region from the AWS guide downloaded from Pivotal Network
- ops_manager_instance_type: (default: m4.large) Ops Manager instance type
- ops_manager_private: (default: false) Set to true if you want Ops Manager deployed in a private subnet instead of a public subnet
- create_backup_pas_buckets: (default: false)
- create_versioned_pas_buckets: (default: false)
- rds_instance_count: (default: 0) Whether or not you would like an RDS for your deployment
- rds_instance_class: (default: db.m4.large) Size of the RDS to deploy
- rds_db_username: (default: admin) Username for RDS authentication
- create_isoseg_resources (deprecated) Set to 1 to create HTTP load-balancer across 3 zones for isolation segments. Inferred by the use of the certificates variables as described below.
- isoseg_ssl_cert: (optional) SSL certificate for Iso Seg HTTP load balancer configuration. Required unless
isoseg_ssl_ca_certis specified. - isoseg_ssl_private_key: (optional) Private key for above SSL certificate. Required unless
isoseg_ssl_ca_certis specified. - isoseg_ssl_ca_cert: (optional) SSL CA certificate used to generate self-signed Iso Seg HTTP load balancer certificate. Required unless
isoseg_ssl_certis specified. - isoseg_ssl_ca_private_key: (optional) Private key for above SSL CA certificate. Required unless
isoseg_ssl_certis specified.
You can choose whether you would like an RDS or not. By default we have
rds_instance_count set to 0 but setting it to 1 will deploy an RDS instance.
Note: RDS instances take a long time to deploy, keep that in mind. They're not required.
terraform destroyWe have have other terraform templates: