1 <<<<<<< HEAD (dae934 Infra: Remove Consul TLS on clients (Nomad conflict))
3 # For convenience in simple configurations, a child module automatically
4 # inherits default (un-aliased) provider configurations from its parent.
5 # This means that explicit provider blocks appear only in the root module,
6 # and downstream modules can simply declare resources for that provider
7 # and have them automatically associated with the root provider
9 module "alertmanager" {
10 source = "./alertmanager"
16 nomad_datacenters = [ "yul1" ]
19 alertmanager_job_name = "prod-alertmanager"
20 alertmanager_use_canary = true
21 alertmanager_group_count = 1
22 alertmanager_vault_secret = {
23 use_vault_provider = false,
24 vault_kv_policy_name = "kv-secret",
25 vault_kv_path = "secret/data/prometheus",
26 vault_kv_field_access_key = "access_key",
27 vault_kv_field_secret_key = "secret_key"
29 alertmanager_version = "0.21.0"
30 alertmanager_cpu = 1000
31 alertmanager_mem = 1024
32 alertmanager_port = 9093
33 alertmanager_slack_api_url = "https://hooks.slack.com/services/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"
34 alertmanager_slack_channel = "fdio-infra-monitoring"
44 nomad_datacenters = [ "yul1" ]
47 exporter_job_name = "prod-exporter"
48 exporter_use_canary = false
51 node_version = "1.0.1"
55 blackbox_version = "0.18.0"
59 cadvisor_image = "gcr.io/cadvisor/cadvisor:latest"
70 nomad_datacenters = [ "yul1" ]
73 grafana_job_name = "prod-grafana"
74 grafana_use_canary = true
75 grafana_group_count = 1
76 grafana_vault_secret = {
77 use_vault_provider = false,
78 vault_kv_policy_name = "kv-secret",
79 vault_kv_path = "secret/data/prometheus",
80 vault_kv_field_access_key = "access_key",
81 vault_kv_field_secret_key = "secret_key"
83 grafana_container_image = "grafana/grafana:7.3.7"
96 nomad_datacenters = [ "yul1" ]
97 nomad_host_volume = "prod-volume-data1-1"
100 minio_job_name = "prod-minio"
101 minio_group_count = 4
102 minio_service_name = "storage"
103 minio_host = "http://10.32.8.1{4...7}"
105 minio_container_image = "minio/minio:RELEASE.2020-12-03T05-49-24Z"
106 minio_vault_secret = {
107 use_vault_provider = false,
108 vault_kv_policy_name = "kv-secret",
109 vault_kv_path = "secret/data/minio",
110 vault_kv_field_access_key = "access_key",
111 vault_kv_field_secret_key = "secret_key"
113 minio_data_dir = "/data/"
114 minio_use_host_volume = true
115 minio_use_canary = true
116 minio_envs = [ "MINIO_BROWSER=\"off\"" ]
119 mc_job_name = "prod-mc"
120 mc_container_image = "minio/mc:RELEASE.2020-12-10T01-26-17Z"
121 mc_extra_commands = [
122 "mc policy set public LOCALMINIO/logs.fd.io",
123 "mc policy set public LOCALMINIO/docs.fd.io",
124 "mc ilm add --expiry-days '180' LOCALMINIO/logs.fd.io",
125 "mc admin user add LOCALMINIO storage Storage1234",
126 "mc admin policy set LOCALMINIO writeonly user=storage"
128 minio_buckets = [ "logs.fd.io", "docs.fd.io" ]
138 nomad_datacenters = [ "yul1" ]
141 nginx_job_name = "prod-nginx"
144 module "prometheus" {
145 source = "./prometheus"
151 nomad_datacenters = [ "yul1" ]
152 nomad_host_volume = "prod-volume-data1-1"
155 prometheus_job_name = "prod-prometheus"
156 prometheus_use_canary = true
157 prometheus_group_count = 4
158 prometheus_vault_secret = {
159 use_vault_provider = false,
160 vault_kv_policy_name = "kv-secret",
161 vault_kv_path = "secret/data/prometheus",
162 vault_kv_field_access_key = "access_key",
163 vault_kv_field_secret_key = "secret_key"
165 prometheus_data_dir = "/data/"
166 prometheus_use_host_volume = true
167 prometheus_version = "2.24.0"
168 prometheus_cpu = 2000
169 prometheus_mem = 8192
170 prometheus_port = 9090
173 module "vpp_device" {
174 source = "./vpp_device"
180 nomad_datacenters = [ "yul1" ]
183 csit_shim_job_name = "prod-device-csit-shim"
184 csit_shim_group_count = "1"
185 csit_shim_cpu = "1000"
186 csit_shim_mem = "5000"
188 >>>>>>> CHANGE (a44eef Infra: Monitoring capability)