Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deployment fix #4

Merged
merged 24 commits into from
Aug 24, 2023
Merged
Show file tree
Hide file tree
Changes from 23 commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
7efdb60
removing read source data and data_factory
KennethSkylight Aug 21, 2023
e4099aa
remove storage references
KennethSkylight Aug 21, 2023
17317bf
removing storage account from destroy
KennethSkylight Aug 22, 2023
36a085c
making validity changes
KennethSkylight Aug 22, 2023
b3f0398
removing log_analytics_workspace_id
KennethSkylight Aug 22, 2023
3b483f5
adding postgres back in
KennethSkylight Aug 22, 2023
82276c9
checking if its running latest
KennethSkylight Aug 22, 2023
691d065
adding echo
KennethSkylight Aug 22, 2023
b07b2fa
removing tfvars
KennethSkylight Aug 22, 2023
1bd3aab
adding back in backend-vars
KennethSkylight Aug 22, 2023
8569282
adding back storage account name
KennethSkylight Aug 22, 2023
75d5ad3
adding storage account back in
KennethSkylight Aug 22, 2023
4cc100d
forcing unlock for one run
KennethSkylight Aug 22, 2023
2f837cc
switching positions
KennethSkylight Aug 22, 2023
1f8d09a
Add terraform for App Gateway Ingress Controller
nickclyde Aug 22, 2023
744c264
Merge pull request #6 from CDCgov/nick/agic-terraform
KennethSkylight Aug 22, 2023
2d38baa
remove force unlock
KennethSkylight Aug 22, 2023
12b0d75
smaller node and vm size for tf
KennethSkylight Aug 23, 2023
bef6ad3
changing node count back to 3
KennethSkylight Aug 23, 2023
af3db14
change back
KennethSkylight Aug 23, 2023
c7f8544
changing back to 1
KennethSkylight Aug 23, 2023
86cac0b
removed data pipeline
KennethSkylight Aug 24, 2023
20f5d99
resolving comments. deleting e2e and adding back line to destroy
KennethSkylight Aug 24, 2023
617fa7c
Merge branch 'main' into deployment_fix
KennethSkylight Aug 24, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 0 additions & 11 deletions .github/workflows/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -120,14 +120,3 @@ jobs:
client-id: ${{ secrets.CLIENT_ID }}
tenant-id: ${{ secrets.TENANT_ID }}
subscription-id: ${{ secrets.SUBSCRIPTION_ID }}

end-to-end:
name: End-to-end tests
needs:
- terraform
- azure-cli
if: ${{ needs.terraform.outputs.tf_env == 'dev' }}
uses: ./.github/workflows/end-to-end.yaml
with:
environment: ${{ needs.terraform.outputs.tf_env }}
secrets: inherit
90 changes: 0 additions & 90 deletions .github/workflows/end-to-end.yaml

This file was deleted.

18 changes: 15 additions & 3 deletions terraform/implementation/backend.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,19 @@ terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "= 3.43.0"
version = "= 3.69.0"
}
azuread = {
source = "hashicorp/azuread"
version = "= 2.37.2"
version = "= 2.41.0"
}
azapi = {
source = "azure/azapi"
version = "= 1.8.0"
}
random = {
source = "hashicorp/random"
version = "= 3.5.1"
}
}

Expand All @@ -23,4 +31,8 @@ provider "azurerm" {

provider "azuread" {
use_oidc = var.use_oidc
}
}

provider "azapi" {
use_oidc = var.use_oidc
}
19 changes: 19 additions & 0 deletions terraform/implementation/data.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
data "azuread_client_config" "current" {}

data "azurerm_client_config" "current" {}

data "azurerm_resource_group" "rg" {
name = var.resource_group_name
}

data "azurerm_subnet" "kubesubnet" {
name = local.aks_subnet_name
virtual_network_name = azurerm_virtual_network.aks_vnet.name
resource_group_name = var.resource_group_name
}

data "azurerm_subnet" "appgwsubnet" {
name = local.app_gateway_subnet_name
virtual_network_name = azurerm_virtual_network.aks_vnet.name
resource_group_name = var.resource_group_name
}
47 changes: 47 additions & 0 deletions terraform/implementation/helm-agic-config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
# This file contains the essential configs for the ingress controller helm chart

# Verbosity level of the App Gateway Ingress Controller
verbosityLevel: 3

################################################################################
# Specify which application gateway the ingress controller will manage
#
appgw:
subscriptionId: ${subscription_id}
resourceGroup: ${resource_group_name}
name: ${app_gateway_name}
usePrivateIP: false

# Setting appgw.shared to "true" will create an AzureIngressProhibitedTarget CRD.
# This prohibits AGIC from applying config for any host/path.
# Use "kubectl get AzureIngressProhibitedTargets" to view and change this.
shared: false

################################################################################
# Specify which kubernetes namespace the ingress controller will watch
# Default value is "default"
# Leaving this variable out or setting it to blank or empty string would
# result in Ingress Controller observing all acessible namespaces.
#
# kubernetes:
# watchNamespace: <namespace>

################################################################################
# Specify the authentication with Azure Resource Manager
#
# Two authentication methods are available:
# - Option 1: AAD-Pod-Identity (https://github.com/Azure/aad-pod-identity)
# armAuth:
# type: aadPodIdentity
# identityResourceID:
# identityClientID:

## Alternatively you can use Service Principal credentials
armAuth:
type: servicePrincipal
secretJSON: ${secret_json}

################################################################################
# Specify if the cluster is RBAC enabled or not
rbac:
enabled: true # true/false
Loading