aboutsummaryrefslogtreecommitdiffstats
path: root/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio
diff options
context:
space:
mode:
Diffstat (limited to 'fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio')
-rw-r--r--fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf451
-rw-r--r--fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf4
-rw-r--r--fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf4
3 files changed, 234 insertions, 225 deletions
diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf
index 28234bf6c7..026ab168d9 100644
--- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf
+++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/main.tf
@@ -1,23 +1,33 @@
-data "vault_generic_secret" "fdio_logs" {
- path = "kv/secret/data/etl/fdio_logs"
+data "vault_kv_secret_v2" "fdio_logs" {
+ mount = "kv"
+ name = "etl/fdio_logs"
}
-data "vault_generic_secret" "fdio_docs" {
- path = "kv/secret/data/etl/fdio_docs"
+data "vault_kv_secret_v2" "fdio_docs" {
+ mount = "kv"
+ name = "etl/fdio_docs"
}
+#data "vault_kv_secret_v2" "fdio_logs" {
+# path = "kv/data/etl/fdio_logs"
+#}
+#
+#data "vault_kv_secret_v2" "fdio_docs" {
+# path = "kv/data/etl/fdio_docs"
+#}
+
module "etl-stats" {
providers = {
nomad = nomad.yul1
}
source = "../"
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
+ aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key
+ aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key
+ aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region
+ out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key
+ out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key
+ out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region
cron = "0 30 0 * * * *"
datacenters = ["yul1"]
job_name = "etl-stats"
@@ -29,12 +39,12 @@ module "etl-trending-hoststack" {
}
source = "../"
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
+ aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key
+ aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key
+ aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region
+ out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key
+ out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key
+ out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region
cron = "0 30 0 * * * *"
datacenters = ["yul1"]
job_name = "etl-trending-hoststack"
@@ -46,12 +56,12 @@ module "etl-trending-mrr" {
}
source = "../"
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
+ aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key
+ aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key
+ aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region
+ out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key
+ out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key
+ out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region
cron = "0 30 0 * * * *"
datacenters = ["yul1"]
job_name = "etl-trending-mrr"
@@ -64,12 +74,12 @@ module "etl-trending-ndrpdr" {
}
source = "../"
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
+ aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key
+ aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key
+ aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region
+ out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key
+ out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key
+ out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region
cron = "0 30 0 * * * *"
datacenters = ["yul1"]
job_name = "etl-trending-ndrpdr"
@@ -82,202 +92,201 @@ module "etl-trending-soak" {
}
source = "../"
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
+ aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data.access_key
+ aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data.secret_key
+ aws_default_region = data.vault_kv_secret_v2.fdio_logs.data.region
+ out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data.access_key
+ out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data.secret_key
+ out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data.region
cron = "0 30 0 * * * *"
datacenters = ["yul1"]
job_name = "etl-trending-soak"
memory = 60000
}
-module "etl-iterative-hoststack-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-iterative-hoststack-rls2406"
-}
-
-module "etl-iterative-mrr-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-iterative-mrr-rls2406"
-}
-
-module "etl-iterative-ndrpdr-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-iterative-ndrpdr-rls2406"
-}
-
-module "etl-iterative-reconf-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-iterative-reconf-rls2406"
-}
-
-module "etl-iterative-soak-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-iterative-soak-rls2406"
-}
-
-module "etl-coverage-device-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-device-rls2406"
-}
-
-module "etl-coverage-hoststack-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-hoststack-rls2406"
-}
-
-module "etl-coverage-mrr-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-mrr-rls2406"
-}
-
-module "etl-coverage-ndrpdr-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-ndrpdr-rls2406"
-}
-
-module "etl-coverage-reconf-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-reconf-rls2406"
-}
-
-module "etl-coverage-soak-rls2406" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- aws_access_key_id = data.vault_generic_secret.fdio_logs.data["access_key"]
- aws_secret_access_key = data.vault_generic_secret.fdio_logs.data["secret_key"]
- aws_default_region = data.vault_generic_secret.fdio_logs.data["region"]
- out_aws_access_key_id = data.vault_generic_secret.fdio_docs.data["access_key"]
- out_aws_secret_access_key = data.vault_generic_secret.fdio_docs.data["secret_key"]
- out_aws_default_region = data.vault_generic_secret.fdio_docs.data["region"]
- cron = "0 30 0 * * * *"
- datacenters = ["yul1"]
- job_name = "etl-coverage-soak-rls2406"
-}
-
+#module "etl-iterative-hoststack-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-iterative-hoststack-rls2406"
+#}
+#
+#module "etl-iterative-mrr-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-iterative-mrr-rls2406"
+#}
+#
+#module "etl-iterative-ndrpdr-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-iterative-ndrpdr-rls2406"
+#}
+#
+#module "etl-iterative-reconf-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-iterative-reconf-rls2406"
+#}
+#
+#module "etl-iterative-soak-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-iterative-soak-rls2406"
+#}
+#
+#module "etl-coverage-device-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-device-rls2406"
+#}
+#
+#module "etl-coverage-hoststack-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-hoststack-rls2406"
+#}
+#
+#module "etl-coverage-mrr-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-mrr-rls2406"
+#}
+#
+#module "etl-coverage-ndrpdr-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-ndrpdr-rls2406"
+#}
+#
+#module "etl-coverage-reconf-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-reconf-rls2406"
+#}
+#
+#module "etl-coverage-soak-rls2406" {
+# providers = {
+# nomad = nomad.yul1
+# }
+# source = "../"
+#
+# aws_access_key_id = data.vault_kv_secret_v2.fdio_logs.data["access_key"]
+# aws_secret_access_key = data.vault_kv_secret_v2.fdio_logs.data["secret_key"]
+# aws_default_region = data.vault_kv_secret_v2.fdio_logs.data["region"]
+# out_aws_access_key_id = data.vault_kv_secret_v2.fdio_docs.data["access_key"]
+# out_aws_secret_access_key = data.vault_kv_secret_v2.fdio_docs.data["secret_key"]
+# out_aws_default_region = data.vault_kv_secret_v2.fdio_docs.data["region"]
+# cron = "0 30 0 * * * *"
+# datacenters = ["yul1"]
+# job_name = "etl-coverage-soak-rls2406"
+#}
diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf
index db24bdf0fa..60298d4c99 100644
--- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf
+++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/variables.tf
@@ -19,13 +19,13 @@ variable "nomad_provider_ca_file" {
variable "nomad_provider_cert_file" {
description = "A local file path to a PEM-encoded certificate."
type = string
- default = "/etc/nomad.d/ssl/nomad-cli.pem"
+ default = "/etc/nomad.d/ssl/nomad.pem"
}
variable "nomad_provider_key_file" {
description = "A local file path to a PEM-encoded private key."
type = string
- default = "/etc/nomad.d/ssl/nomad-cli-key.pem"
+ default = "/etc/nomad.d/ssl/nomad-key.pem"
}
variable "vault_provider_address" {
diff --git a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf
index 0c05e76d65..ffe25bb42e 100644
--- a/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf
+++ b/fdio.infra.terraform/terraform-nomad-pyspark-etl/fdio/versions.tf
@@ -7,10 +7,10 @@ terraform {
required_providers {
nomad = {
source = "hashicorp/nomad"
- version = ">= 1.4.20"
+ version = ">= 2.3.0"
}
vault = {
- version = ">= 3.12.0"
+ version = ">= 4.3.0"
}
}
required_version = ">= 1.5.4"