diff options
author | pmikus <peter.mikus@protonmail.ch> | 2024-07-29 11:37:55 +0200 |
---|---|---|
committer | Peter Mikus <peter.mikus@protonmail.ch> | 2024-07-29 09:43:20 +0000 |
commit | 8e4705f2ec6e2e346909736a36ecb07f05741742 (patch) | |
tree | 7b099585b0e08911acfe72d8b4b592bd3bbe7a69 /fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio | |
parent | 93739bca5948ab5ae13a6e95ec84a0f84f8b65a2 (diff) |
feat(terraform): Update ETL
Signed-off-by: Peter Mikus <peter.mikus@protonmail.ch>
Change-Id: I840cbc5a95e9af41af1811fc28db71e6b0d19d1e
Diffstat (limited to 'fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio')
3 files changed, 234 insertions, 225 deletions
diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf index 28234bf6c7..026ab168d9 100644 --- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf +++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf @@ -1,23 +1,33 @@ -data "vault_generic_secret" "fdio_logs" { - path = "kv/secret/data/etl/fdio_logs" +data "vault_kv_secret_v2" "fdio_logs" { + mount = "kv" + name = "etl/fdio_logs" } -data "vault_generic_secret" "fdio_docs" { - path = "kv/secret/data/etl/fdio_docs" +data "vault_kv_secret_v2" "fdio_docs" { + mount = "kv" + name = "etl/fdio_docs" } +#data "vault_kv_secret_v2" "fdio_logs" { +# path = "kv/data/etl/fdio_logs" +#} +# +#data "vault_kv_secret_v2" "fdio_docs" { +# path = "kv/data/etl/fdio_docs" +#} + module "etl-stats" { providers = { nomad = nomad.yul1 } source = "../" - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] + aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key + aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key + aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region + out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key + out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key + out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region cron = "0 30 0 * * * *" datacenters = ["yul1"] job_name = "etl-stats" @@ -29,12 +39,12 @@ module "etl-trending-hoststack" { } source = "../" - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] + aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key + aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key + aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region + out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key + out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key + out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region cron = "0 30 0 * * * *" datacenters = ["yul1"] job_name = "etl-trending-hoststack" @@ -46,12 +56,12 @@ module "etl-trending-mrr" { } source = "../" - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] + aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key + aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key + aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region + out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key + out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key + out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region cron = "0 30 0 * * * *" datacenters = ["yul1"] job_name = "etl-trending-mrr" @@ -64,12 +74,12 @@ module "etl-trending-ndrpdr" { } source = "../" - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] + aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key + aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key + aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region + out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key + out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key + out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region cron = "0 30 0 * * * *" datacenters = ["yul1"] job_name = "etl-trending-ndrpdr" @@ -82,202 +92,201 @@ module "etl-trending-soak" { } source = "../" - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] + aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key + aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key + aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region + out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key + out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key + out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region cron = "0 30 0 * * * *" datacenters = ["yul1"] job_name = "etl-trending-soak" memory = 60000 } -module "etl-iterative-hoststack-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-iterative-hoststack-rls2406" -} - -module "etl-iterative-mrr-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-iterative-mrr-rls2406" -} - -module "etl-iterative-ndrpdr-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-iterative-ndrpdr-rls2406" -} - -module "etl-iterative-reconf-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-iterative-reconf-rls2406" -} - -module "etl-iterative-soak-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-iterative-soak-rls2406" -} - -module "etl-coverage-device-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-device-rls2406" -} - -module "etl-coverage-hoststack-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-hoststack-rls2406" -} - -module "etl-coverage-mrr-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-mrr-rls2406" -} - -module "etl-coverage-ndrpdr-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-ndrpdr-rls2406" -} - -module "etl-coverage-reconf-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-reconf-rls2406" -} - -module "etl-coverage-soak-rls2406" { - providers = { - nomad = nomad.yul1 - } - source = "../" - - aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"] - aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"] - aws_default_region = data.vault_generic_secret.fdio_logs.data["region"] - out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"] - out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"] - out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"] - cron = "0 30 0 * * * *" - datacenters = ["yul1"] - job_name = "etl-coverage-soak-rls2406" -} - +#module "etl-iterative-hoststack-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-iterative-hoststack-rls2406" +#} +# +#module "etl-iterative-mrr-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-iterative-mrr-rls2406" +#} +# +#module "etl-iterative-ndrpdr-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-iterative-ndrpdr-rls2406" +#} +# +#module "etl-iterative-reconf-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-iterative-reconf-rls2406" +#} +# +#module "etl-iterative-soak-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-iterative-soak-rls2406" +#} +# +#module "etl-coverage-device-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-device-rls2406" +#} +# +#module "etl-coverage-hoststack-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-hoststack-rls2406" +#} +# +#module "etl-coverage-mrr-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-mrr-rls2406" +#} +# +#module "etl-coverage-ndrpdr-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-ndrpdr-rls2406" +#} +# +#module "etl-coverage-reconf-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-reconf-rls2406" +#} +# +#module "etl-coverage-soak-rls2406" { +# providers = { +# nomad = nomad.yul1 +# } +# source = "../" +# +# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"] +# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"] +# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"] +# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"] +# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"] +# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"] +# cron = "0 30 0 * * * *" +# datacenters = ["yul1"] +# job_name = "etl-coverage-soak-rls2406" +#} diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf index db24bdf0fa..60298d4c99 100644 --- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf +++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf @@ -19,13 +19,13 @@ variable "nomad_provider_ca_file" { variable "nomad_provider_cert_file" { description = "A local file path to a PEM-encoded certificate." type = string - default = "/etc/nomad.d/ssl/nomad-cli.pem" + default = "/etc/nomad.d/ssl/nomad.pem" } variable "nomad_provider_key_file" { description = "A local file path to a PEM-encoded private key." type = string - default = "/etc/nomad.d/ssl/nomad-cli-key.pem" + default = "/etc/nomad.d/ssl/nomad-key.pem" } variable "vault_provider_address" { diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf index 0c05e76d65..ffe25bb42e 100644 --- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf +++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf @@ -7,10 +7,10 @@ terraform { required_providers { nomad = { source = "hashicorp/nomad" - version = ">= 1.4.20" + version = ">= 2.3.0" } vault = { - version = ">= 3.12.0" + version = ">= 4.3.0" } } required_version = ">= 1.5.4" |