-
Notifications
You must be signed in to change notification settings - Fork 161
Add homework 05 #41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
sapr797
wants to merge
114
commits into
netology-code:main
Choose a base branch
from
sapr797:add-homework-05
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Add homework 05 #41
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Update main.tf
Update for_each-vm.tf
Задание 5.2
ЗАДАНИЕ 5.3
Задание 5.4
Задание 5.4 Проверочный скрипт. Проверка MySQL модулей (ТОЛЬКО ПЛАН)
Задание 5.4 проверочный скрипт для безопасного тестирования MySQL модулей с немедленным удалением ресурсов
terraform-04
- Remove all hardcoded secrets from providers.tf files - Fix TFLint warnings by removing unused variables - Pass Terraform validation - Pass Checkov security scan - Fix marketing_vm module security group configuration - Code quality improvements completed
Hotfix: Fix TFLint warnings and remove security issue
- Copy only Terraform configuration files from terraform-hotfix-final - Exclude state files and backups - Place in 04/src/06-s3-bucket for proper organization
Task 6*: Add S3 bucket configuration
My changes
- Deployed Vault server using Docker with KV v1 engine - Created initial secret 'secret/example' via Vault CLI - Configured Terraform Vault provider with token authentication - Successfully read existing secrets using vault_generic_secret data source - Created new secrets using vault_generic_secret resource - Implemented proper output display using nonsensitive() function - Verified integration through comprehensive testing script - All requirements met: secret creation, reading, and output display
Complete task 7*: HashiCorp Vault integration with Terraform
…ote state - Create separate VPC module with network, subnet, and security group - Create separate VM module that depends on VPC outputs - Configure remote state backend using S3 bucket from task 6* - Use terraform_remote_state data source for cross-module communication - Provide deployment scripts and comprehensive documentation - Implement proper module separation with state isolation Key Features: - VPC module stores state in s3://bucket/vpc/terraform.tfstate - VM module stores state in s3://bucket/vm/terraform.tfstate - VM module reads VPC state using terraform_remote_state data source - Modules can be developed and deployed independently - Safe state management and team collaboration enabled
- Remove invalid providers.tf file from 05/ directory containing bash script - Ensure all Terraform files are properly formatted - Run terraform fmt -recursive to fix formatting - Clean up any non-Terraform content from .tf files
- Update Terraform versions from 1.12.0 to >=1.0 in multiple directories - Fix duplicate provider configurations in 04/src - Remove duplicate outputs in marketing_vm module - Fix vm_module in task 8*: * Update terraform_remote_state with correct endpoint URL * Add required region parameter * Remove unsupported yandex_compute_instance_update resource * Use nat_ip_address in network_interface instead - Remove problematic .terraform cache directories - Add .terraformignore to exclude demo directories - Ensure all critical directories pass formatting check Key improvements: - All Terraform files now properly formatted - Task 8* modules have valid syntax - Removed version conflicts - Fixed backend configuration issues
Complete task 8*: Split root module into VPC and VM modules using rem…
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
his PR adds homework 05 directory imported from netology-code/ter-homeworks repository.
Contents: