This repository has been archived by the owner on Apr 11, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 4
/
variables.tf
135 lines (108 loc) · 3.77 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
variable google_project {
description = "The Google Cloud Project ID"
}
variable google_region {
description = "The Google Cloud region where resource will be created"
}
variable "google_kms_crypto_key_roles" {
type = "list"
default = [
"roles/cloudkms.cryptoKeyEncrypterDecrypter",
]
}
variable google_service_account_email {
default = ""
description = "Optionally provide a pre-existing service account for Vault"
}
variable "google_service_account_iam_roles" {
type = "list"
default = [
"roles/resourcemanager.projectIamAdmin",
"roles/iam.serviceAccountAdmin",
"roles/iam.serviceAccountKeyAdmin",
"roles/iam.serviceAccountTokenCreator",
"roles/iam.serviceAccountUser",
"roles/viewer",
]
}
variable "google_storage_bucket_name" {
description = "Optionally provide a pre-existing GCS bucket where Vault will use as it's storage backend. If supplied, it is up to the user to ensure the Vault GCP Service Account has appropriate permissions on the bucket (see var.google_storage_bucket_roles)."
default = ""
}
variable "google_storage_bucket_roles" {
description = "List of IAM roles that will be granted to the Vault Service Account on the GCS bucket."
type = "list"
default = [
"roles/storage.legacyBucketReader",
"roles/storage.objectAdmin",
]
}
variable "istio_mode" {
description = "Flag to indicate if Istio is enable for this deployment. With Istio sidecar injection Vault listens on plaintext HTTP only, and uses the Istio sidecar to encrypt traffic."
default = false
}
variable kubernetes_namespace {
description = "The Kubernetes namespace where Vault resources will be deployed."
default = "default"
}
variable vault_init_image_repository {
default = "registry.hub.docker.com/mmorrison/vault-init"
description = "The docker image repository of the `vault-init` image"
}
variable vault_init_image_tag {
description = "Docker image tag of 'vault-init' container"
default = "2.0.2"
}
variable vault_image_repository {
description = "The docker image repository of the `vault` image"
default = "registry.hub.docker.com/library/vault"
}
variable vault_image_tag {
description = "Docker image tag of 'vault' container"
default = "1.1.0"
}
variable vault_load_balancer_fqdn {
description = "FQDN entry that points to the Vault Load Balancer"
default = ""
}
variable vault_load_balancer_ip {
description = "Reserved IP address that will be used by Vault Kubernetes Service"
default = ""
}
variable vault_load_balancer_is_internal {
description = "Set to true to create an Internal Load Balancer + IP Reservation"
default = false
}
variable vault_load_balancer_ip_subnetwork {
description = "VPC Subnetwork name when IP will be reserved. Must be set when 'vault_load_balancer_type' == 'INTERNAL'."
default = ""
}
variable vault_replica_count {
type = "string"
description = <<EOF
The number of vault replicas to deploy.
Anti-affinity rules spread pods across availablenodes.
Please use an odd number for better availability.
EOF
default = "3"
}
variable vault_tls_cert {
description = "The Base64 encoded TLS certificate for vault server. If none is supplied, a CA will be created and used to sign a generated certificate."
default = ""
}
variable vault_tls_key {
description = "The Base64 encoded TLS key for vault server. If none is supplied, a private key will be generated."
default = ""
}
variable vault_request_cpu {
description = "Kubernetes CPU Request for Vault pods"
default = "500m"
}
variable vault_request_memory {
description = "Kubernetes Memory Request for Vault pods"
default = "256Mi"
}
variable vault_service_type {
description = "One of 'LoadBalancer', 'ClusterIP' OR 'NodePort'"
default = "NodePort"
}