A Terraform module for deploying Sonarqube.
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.ci
.github
docker/sonarqube-aws-env
examples Testing pipeline (#6) Jan 25, 2019
modules Add Clean-up task to pipeline (#12) Jan 30, 2019
.gitignore Initial Commit Aug 7, 2018
.travis.yml
CODEOWNERS Initial Commit Aug 7, 2018
CONTRIBUTING.md Testing pipeline (#6) Jan 25, 2019
LICENSE
Makefile Initial Commit Aug 7, 2018
README.md Testing pipeline (#6) Jan 25, 2019
STYLE.md
main.tf
outputs.tf Firstrealcommit (#1) Aug 17, 2018
variables.tf Reduced CPU to 900 so that rolling updates work (#10) Jan 28, 2019

README.md

Sonarqube

Build Status

This terraform module creates a standalone instance of Sonarqube that is preconfigured to use Github oauth.

The module does the following:

  • Deploys Sonarqube in its own VPC with a postgres database
  • Configures Github oauth
  • Creates a new admin user
  • Removes the default admin user

Prerequisites

This module assumes that the AWS account this is deployed to has a Route53 zone set up so that this can be launched behind SSL

Quick start

To get a working Sonarqube installation up and running complete the following steps

  1. copy the default example including the init folder
  2. run terraform apply in the init folder and record the arn output.
  3. in the main.tf file: replace the value for parameters_key_arn with the value returned in the previous step replace the value for route53_zone with the name of your route53 hosted zone
  4. create the following ssm parameters in your AWS account and encrypt them using the key create above.
ssm parameter name description
<name_prefix>/github-auth-enabled set to true
<name_prefix>/github-client-id obtained from github
<name_prefix>/github-client-secret obtained from github
<name_prefix>/github-organizations github organisation for ouath
<name_prefix>/admin-username may only contain url safe chars
<name_prefix>/admin-password may only contain url safe chars
  1. run terraform apply