-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhealthchecks.tf
108 lines (92 loc) · 2.03 KB
/
healthchecks.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
resource "kubernetes_namespace" "healthchecks" {
metadata {
name = "healthchecks"
annotations = {}
labels = {}
}
}
resource "helm_release" "healthchecks" {
name = "healthchecks"
namespace = kubernetes_namespace.healthchecks.metadata[0].name
repository = "https://k8s-at-home.com/charts/"
chart = "healthchecks"
depends_on = [
helm_release.longhorn
]
set {
name = "persistence.config.enabled"
value = "true"
}
set {
name = "persistence.config.mountpath"
value = "/config"
}
set {
name = "ingress.main.enabled"
value = "true"
}
set {
name = "ingress.main.hosts[0].host"
value = "healthchecks.${var.domain_name}"
}
set {
name = "ingress.main.hosts[0].paths[0].path"
value = "/"
}
set {
name = "ingress.main.hosts[0].paths[0].pathType"
value = "Prefix"
}
set {
name = "ingress.main.ingressClassName"
value = "nginx"
}
set {
name = "ingress.main.tls[0].secretName"
value = "healthchecks-tls-secret"
}
set {
name = "ingress.main.tls[0].hosts[0]"
value = "healthchecks.${var.domain_name}"
}
set {
name = "ingress.main.annotations.cert-manager\\.io/cluster-issuer"
value = "letsencrypt-prod"
}
set {
name = "ingress.main.annotations.external-dns\\.alpha\\.kubernetes\\.io/target"
value = "tunnel-origin.${tostring(var.domain_name)}"
}
set {
name = "env.TZ"
value = "US/Mountain"
}
set {
name = "env.REGENERATE_SETTINGS"
value = "False"
}
set {
name = "env.SITE_ROOT"
value = "https://healthchecks.${var.domain_name}"
}
set {
name = "env.SITE_NAME"
value = "Healthchecks"
}
set {
name = "env.SUPERUSER_EMAIL"
value = var.contact_email
}
set {
name = "env.SUPERUSER_PASSWORD"
value = random_password.bootstrap_password.result
}
set {
name = "env.SECRET_KEY"
value = random_password.secret_key.result
}
}
resource "random_password" "secret_key" {
length = 24
special = false
}