Skip to content

Commit b367563

Browse files
committed
updated readme
1 parent 890353c commit b367563

File tree

10 files changed

+34
-38
lines changed

10 files changed

+34
-38
lines changed

IAM.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,4 +82,4 @@ permissions = [
8282
"resourcemanager.projects.getIamPolicy",
8383
"resourcemanager.projects.setIamPolicy"
8484
]
85-
```
85+
```

README.md

Lines changed: 24 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -38,52 +38,48 @@ module "aws" {
3838
}
3939
4040
module "mysql" {
41-
source = "squareops/mysql/kubernetes"
41+
source = "squareops/mysql/kubernetes/"
42+
create_namespace = local.create_namespace
43+
namespace = local.namespace
4244
mysqldb_config = {
43-
name = "mysql"
44-
values_yaml = ""
45-
environment = "prod"
45+
name = local.name
46+
values_yaml = file("./helm/values.yaml")
47+
app_version = "8.0.29-debian-11-r9"
48+
environment = local.environment
4649
architecture = "replication"
47-
storage_class_name = "gp3"
48-
custom_user_username = "admin"
50+
custom_database = "test_db"
51+
storage_class_name = "gp2"
52+
custom_user_username = local.mysqldb_custom_credentials_enabled ? "" : local.custom_user_username
4953
primary_db_volume_size = "10Gi"
5054
secondary_db_volume_size = "10Gi"
5155
secondary_db_replica_count = 2
52-
store_password_to_secret_manager = true
56+
store_password_to_secret_manager = local.store_password_to_secret_manager
5357
}
54-
mysqldb_custom_credentials_enabled = true
55-
mysqldb_custom_credentials_config = {
56-
root_user = "root"
57-
root_password = "RJDRIFsYC8ZS1WQuV0ps"
58-
custom_username = "admin"
59-
custom_user_password = "NCPFUKEMd7rrWuvMAa73"
60-
replication_user = "replicator"
61-
replication_password = "nvAHhm1uGQNYWVw6ZyAH"
62-
exporter_user = "mysqld_exporter"
63-
exporter_password = "ZawhvpueAehRdKFlbjaq"
64-
}
65-
root_password = mysqldb_custom_credentials_enabled ? "" : module.aws.root_password
66-
metric_exporter_pasword = mysqldb_custom_credentials_enabled ? "" : module.aws.metric_exporter_pasword
67-
mysqldb_replication_user_password = mysqldb_custom_credentials_enabled ? "" : module.aws.mysqldb_replication_user_password
68-
custom_user_password = mysqldb_custom_credentials_enabled ? "" : module.aws.custom_user_password
58+
mysqldb_custom_credentials_enabled = local.mysqldb_custom_credentials_enabled
59+
mysqldb_custom_credentials_config = local.mysqldb_custom_credentials_config
60+
root_password = local.mysqldb_custom_credentials_enabled ? "" : module.aws.root_password
61+
metric_exporter_pasword = local.mysqldb_custom_credentials_enabled ? "" : module.aws.metric_exporter_pasword
62+
mysqldb_replication_user_password = local.mysqldb_custom_credentials_enabled ? "" : module.aws.mysqldb_replication_user_password
63+
custom_user_password = local.mysqldb_custom_credentials_enabled ? "" : module.aws.custom_user_password
6964
bucket_provider_type = "s3"
7065
iam_role_arn_backup = module.aws.iam_role_arn_backup
7166
mysqldb_backup_enabled = true
7267
mysqldb_backup_config = {
73-
bucket_uri = "backup-bucket-uri"
74-
s3_bucket_region = "backup-bucket-region"
75-
cron_for_full_backup = "* */12 * * *"
68+
bucket_uri = "s3://bucket_name"
69+
s3_bucket_region = ""
70+
cron_for_full_backup = "*/5 * * * *"
7671
}
7772
mysqldb_restore_enabled = true
7873
iam_role_arn_restore = module.aws.iam_role_arn_restore
7974
mysqldb_restore_config = {
80-
bucket_uri = "restore-bucket-uri/restore-file-name"
81-
file_name = "restore-file-name"
82-
s3_bucket_region = "restore-bucket-region"
75+
bucket_uri = "s3://bucket_name/mysqldump_20230710_120501.zip"
76+
file_name = "mysqldump_20230710_120501.zip"
77+
s3_bucket_region = ""
8378
}
8479
mysqldb_exporter_enabled = true
8580
}
8681
82+
8783
```
8884
- Refer [AWS examples](https://github.com/squareops/terraform-kubernetes-mysql/tree/main/examples/complete/aws) for more details.
8985
- Refer [Azure examples](https://github.com/squareops/terraform-kubernetes-mysql/tree/main/examples/complete/azure) for more details.

examples/complete/aws/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ locals {
77
Expires = "Never"
88
Department = "Engineering"
99
}
10-
create_namespace = false
11-
namespace = ""
10+
create_namespace = true
11+
namespace = "mysql"
1212
store_password_to_secret_manager = false
1313
mysqldb_custom_credentials_enabled = true
1414
mysqldb_custom_credentials_config = {

examples/complete/azure/helm/values.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,4 @@ secondary:
1818
- key: "Addons-Services"
1919
operator: In
2020
values:
21-
- "true"
21+
- "true"

examples/complete/azure/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ module "mysql" {
4545
source = "squareops/mysql/kubernetes"
4646
create_namespace = local.create_namespace
4747
namespace = local.namespace
48-
mysqldb_config = {
48+
mysqldb_config = {
4949
name = local.name
5050
values_yaml = file("./helm/values.yaml")
5151
environment = local.environment

examples/complete/azure/outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,4 @@ output "mysql_endpoints" {
66
output "mysql_credential" {
77
value = local.store_password_to_secret_manager ? null : module.mysql.mysqldb_credential
88
description = "MySQL credentials used for accessing the MySQL database."
9-
}
9+
}

examples/complete/gcp/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ module "mysql" {
3939
source = "squareops/mysql/kubernetes"
4040
create_namespace = local.create_namespace
4141
namespace = local.namespace
42-
mysqldb_config = {
42+
mysqldb_config = {
4343
name = local.name
4444
values_yaml = file("./helm/values.yaml")
4545
environment = local.environment

modules/resources/azure/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ resource "azurerm_key_vault" "mysql-secret" {
5454
}
5555

5656
resource "azurerm_key_vault_secret" "mysql-secret" {
57-
count = var.store_password_to_secret_manager ? 1 : 0
57+
count = var.store_password_to_secret_manager ? 1 : 0
5858
depends_on = [azurerm_key_vault.mysql-secret[0]]
5959
name = format("%s-%s-%s", var.environment, var.name, "secret")
6060
value = var.mysqldb_custom_credentials_enabled ? jsonencode(

modules/resources/azure/outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ output "mysqldb_replication_user_password" {
1616
output "custom_user_password" {
1717
value = var.mysqldb_custom_credentials_enabled ? null : nonsensitive(random_password.mysqldb_custom_user_password[0].result)
1818
description = "custom user's password of mysqldb"
19-
}
19+
}

modules/resources/azure/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,4 @@ variable "custom_user_username" {
6969
variable "storage_account_name" {
7070
type = string
7171
default = ""
72-
}
72+
}

0 commit comments

Comments
 (0)