Skip to content
This repository has been archived by the owner on Jul 27, 2023. It is now read-only.

Commit

Permalink
Changed terraform.sample.yml to sample.yml, and terraform.yml to mant…
Browse files Browse the repository at this point in the history
…l.yml
  • Loading branch information
sehqlr authored and langston-barrett committed Feb 24, 2016
1 parent da44f77 commit db2884c
Show file tree
Hide file tree
Showing 17 changed files with 24 additions and 25 deletions.
6 changes: 3 additions & 3 deletions .travis.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
language: python
env:
matrix:
- TERRAFORM_FILE=testing/aws.tf ANSIBLE_PLAYBOOK=terraform.sample.yml
- TERRAFORM_FILE=testing/do.tf ANSIBLE_PLAYBOOK=terraform.sample.yml
- TERRAFORM_FILE=testing/gce.tf ANSIBLE_PLAYBOOK=terraform.sample.yml
- TERRAFORM_FILE=testing/aws.tf ANSIBLE_PLAYBOOK=sample.yml
- TERRAFORM_FILE=testing/do.tf ANSIBLE_PLAYBOOK=sample.yml
- TERRAFORM_FILE=testing/gce.tf ANSIBLE_PLAYBOOK=sample.yml
# - TERRAFORM_FILE=testing/aws.tf ANSIBLE_PLAYBOOK=kubernetes.yml
# - TERRAFORM_FILE=testing/do.tf ANSIBLE_PLAYBOOK=kubernetes.yml
# - TERRAFORM_FILE=testing/gce.tf ANSIBLE_PLAYBOOK=kubernetes.yml
Expand Down
2 changes: 1 addition & 1 deletion Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ COPY . /mi/
# load user custom setup
ONBUILD COPY ssl/ /mi/ssl/
ONBUILD COPY security.yml /mi/security.yml
ONBUILD COPY terraform.yml /mi/terraform.yml
ONBUILD COPY mantl.yml /mi/mantl.yml
ONBUILD COPY *.tf /mi/

RUN mkdir -p /state
Expand Down
2 changes: 1 addition & 1 deletion Vagrantfile
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ config_hash = {
"control_cpus" => 1,
"edge_cpus" => 1,
"network" => "private",
"playbooks" => ["/vagrant/terraform.sample.yml"]
"playbooks" => ["/vagrant/sample.yml"]
}

config_path = File.join(File.dirname(__FILE__), "vagrant-config.yml")
Expand Down
3 changes: 1 addition & 2 deletions addons/glusterfs.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
---
# Gluster distributed storage. Run this playbook after running the core playbook
# (terraform.sample.yml)
# Gluster distributed storage. Run this playbook after mantl is up and running

# CHECK SECURITY - when customizing you should leave this in. If you take it out
# and forget to specify security.yml, security could be turned off on components
Expand Down
2 changes: 1 addition & 1 deletion docker_launch.sh
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ fi
terraform get
terraform apply -state=$TERRAFORM_STATE_ROOT/terraform.tfstate
ansible-playbook /mi/playbooks/wait-for-hosts.yml --private-key $SSH_KEY
ansible-playbook /mi/terraform.yml --extra-vars=@security.yml --private-key $SSH_KEY
ansible-playbook /mi/mantl.yml --extra-vars=@security.yml --private-key $SSH_KEY
2 changes: 1 addition & 1 deletion docs/getting_started/dockerfile.rst
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Setup
aws.rst

3. Finally, you need to create a custom ansible playbook for your cluster. You
can copy `terraform.sample.yml` to `terraform.yml` in your root directory to
can copy `sample.yml` to `mantl.yml` in your root directory to
get started.

Building a Docker Image
Expand Down
8 changes: 4 additions & 4 deletions docs/getting_started/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ inventory file, you can use the ``-i`` argument of ``ansible`` or

.. code-block:: shell
ansible-playbook -i path/to/inventory -e @security.yml terraform.yml
ansible-playbook -i path/to/inventory -e @security.yml mantl.yml
First, ping the servers to ensure they are reachable via ssh:

Expand Down Expand Up @@ -96,15 +96,15 @@ for verbose SSH debugging and try again to view the errors in more detail.
more details.

Next, deploy the software. First, you'll need to customize a playbook. A sample
can be found at ``terraform.sample.yml`` in the root directory, you can find
can be found at ``sample.yml`` in the root directory, you can find
more about customizing this at :doc:`playbook`. The main change you'll want
to make is changing ``consul_acl_datacenter`` to your preferred ACL datacenter.
If you only have one datacenter, you can remove this variable. Next, assuming
you've placed the filled-out template at ``terraform.yml``:
you've placed the filled-out template at ``mantl.yml``:

.. code-block:: shell
ansible-playbook -e @security.yml terraform.yml
ansible-playbook -e @security.yml mantl.yml
The deployment will probably take a while as all tasks are completed.

Expand Down
4 changes: 2 additions & 2 deletions docs/getting_started/playbook.rst
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
Custom Playbook
===============

Your customized ``terraform.yml`` `playbook`_ should be used to deploy
Your customized ``mantl.yml`` `playbook`_ should be used to deploy
Mantl to your servers.

Below is an annotated playbook explaining the values:

.. literalinclude:: ../../terraform.sample.yml
.. literalinclude:: ../../sample.yml
:language: yaml+jinja

Run this playbook with ``ansible-playbook -i plugins/inventory/terraform.py -e
Expand Down
4 changes: 2 additions & 2 deletions docs/upgrading/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Prior to 1.0, the ansible ``consul_dns_domain`` variable was defined in a number
of different playbooks. It is now included in ``security.yml`` and can be
customized from a single location. This simplifies the configuration and reduces
the likelihood of mistakes. If you are working with a customized
``terraform.yml`` file, you should remove all ``consul_dns_domain`` definitions
``mantl.yml`` file, you should remove all ``consul_dns_domain`` definitions
from it and ensure ``consul_dns_domain`` is set as desired in your
``security.yml``.

Expand All @@ -75,4 +75,4 @@ standard provisioning playbook:

.. code-block:: shell
ansible-playbook -e @security.yml terraform.yml
ansible-playbook -e @security.yml mantl.yml
2 changes: 1 addition & 1 deletion packer/vagrant.json
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
},
{
"type": "ansible-local",
"playbook_file": "{{pwd}}/terraform.sample.yml",
"playbook_file": "{{pwd}}/sample.yml",
"role_paths": [
"{{pwd}}/roles/calico",
"{{pwd}}/roles/chronos",
Expand Down
2 changes: 1 addition & 1 deletion requirements.txt
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
alabaster==0.6.3
# Change concurrently with the required ansible version in terraform.sample.yml
# Change concurrently with the required ansible version in sample.yml
ansible>=1.9.1,<2
pytest==2.7.1
PyYAML==3.11
Expand Down
2 changes: 1 addition & 1 deletion roles/calico/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ container on each worker node and managed by systemd. Any workload managed by
Calico is registered as a service in Consul.

Calico is not enabled by default. In order to run Calico, you should make a
couple of changes to your ``terraform.yml``. You will need to add the ``etcd``
couple of changes to your ``mantl.yml``. You will need to add the ``etcd``
role into the ``roles`` section for ``all`` hosts:

.. code-block:: json
Expand Down
2 changes: 1 addition & 1 deletion roles/glusterfs/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Installation
------------

As of 0.5.1, GlusterFS is distributed as an addon for Mantl. After a successful
initial run (from your customized ``terraform.sample.yml``), install it with
initial run (from your customized ``sample.yml``), install it with
``ansible-playbook -e @security.yml addons/glusterfs.yml``.

Restarting
Expand Down
2 changes: 1 addition & 1 deletion roles/traefik/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Migrating from haproxy

In 0.5, this role replaces haproxy. To migrate, set ``traefik_marathon_domain``
to whatever was previously the value of ``haproxy_domain`` and make sure your
customized config has the new role from ``terraform.sample.yml``.
customized config has the new role from ``sample.yml``.

Variables
---------
Expand Down
File renamed without changes.
2 changes: 1 addition & 1 deletion testing/build-cluster.py
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ def run_cmds(cmds, fail_sequential=False):
(["terraform", "apply"], 1),
(ap + ["playbooks/wait-for-hosts.yml"], 3),
(ap + ["-e", "serial=0", "playbooks/upgrade-packages.yml"], 1),
(ap + ["terraform.yml"], 1),
(ap + ["sample.yml"], 1),
(["python2", "testing/healthchecks.py"], 2)
]
debug = []
Expand Down
4 changes: 2 additions & 2 deletions vagrant/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ lightweight, reproducible, and portable development environments." We use it
to test Mantl locally before deploying to a cloud provider.
Our current setup creates a configurable number of virtual machines, and you can
define how many you want to build using a configuration file as described below.
One of the control servers provisions the others using the terraform.sample.yml
One of the control servers provisions the others using the sample.yml
playbook.

Getting Started
Expand Down Expand Up @@ -56,7 +56,7 @@ in the provided Vagrantfile.
For example, to attempt to run the GlusterFS addon
(``./addons/glusterfs.yml``), you would add a
``/vagrant/addons/glusterfs.yml`` entry. You can also use this directive to
run playbooks other than ``terraform.sample.yml`` after provisioning for the
run playbooks other than ``sample.yml`` after provisioning for the
first time, by modifying this variable and running ``vagrant provision``.

Limitations
Expand Down

0 comments on commit db2884c

Please sign in to comment.