infra/dev/main.tf (27 lines of code) (raw):
terraform {}
provider "vault" {
}
data "vault_generic_secret" "dev" {
path = "secret/observability-team/gcp-kubernetes-app/elastic-agent-dev"
}
provider "google" {
project = data.vault_generic_secret.dev.data["gcp_project_id"]
}
module "cluster" {
source = "../modules/cluster"
}
# NOTE: no need for registry, is already enabled
resource "google_project_service" "project" {
# enabling this API automatically enables on demand vulnerability scanning
# We scan on demand from CI pipelines after building images to prevent possible issues
# when pushing to the staging repo in production project
service = "ondemandscanning.googleapis.com"
disable_dependent_services = false
# NOTE: this settings will require manual disabling of the API after destroy
disable_on_destroy = false
}
output "gcp_project_id" {
value = data.vault_generic_secret.dev.data["gcp_project_id"]
sensitive = true
}
output "location" {
value = module.cluster.compute_zone
}
output "name" {
value = module.cluster.name
}