decomission crm.office host and service
Not used according to Jinho. Backups exist in Restic. Signed-off-by: Jakub Sokołowski <jakub@status.im>
This commit is contained in:
parent
6e99156b9d
commit
d21cea739f
|
@ -18,6 +18,7 @@ This repo configures infrastructure for cloud office services.
|
|||
|
||||
# Services
|
||||
|
||||
* [daybyday-crm](ansible/roles/daybyday-crm) - [DayByDayCRM](https://github.com/Bottelet/DaybydayCRM) platform
|
||||
* [gitea](ansible/roles/gitea) - [Gitea](https://gitea.io/) Git Web Frontent
|
||||
* [hackmd](ansible/roles/hackmd) - HackMD instance for our use
|
||||
* [keycloak](ansible/roles/keycloak) - Identity and Access Management
|
||||
|
|
|
@ -1,21 +0,0 @@
|
|||
---
|
||||
- name: 'Verify Ansible versions'
|
||||
hosts: all
|
||||
tags: always
|
||||
become: false
|
||||
run_once: true
|
||||
gather_facts: false
|
||||
tasks:
|
||||
- local_action: command ./versioncheck.py
|
||||
changed_when: false
|
||||
|
||||
- name: Configure DayByDay-CRM
|
||||
hosts: crm
|
||||
roles:
|
||||
- { role: swap-file, tags: swap-file }
|
||||
- { role: open-ports, tags: open-ports }
|
||||
- { role: origin-certs, tags: origin-certs }
|
||||
- { role: daybyday-crm, tags: daybyday-crm }
|
||||
- { role: nginx, tags: nginx }
|
||||
- { role: restic-backups, tags: restic-backups }
|
||||
- { role: threatstack, tags: threatstack }
|
|
@ -1,47 +0,0 @@
|
|||
---
|
||||
swap_file_size_mb: 2048
|
||||
|
||||
# DayByDay-CRM
|
||||
daybyday_crm_domain: 'admin-ambassador.status.im'
|
||||
# Admin
|
||||
daybyday_crm_admin_user_name: 'admin'
|
||||
daybyday_crm_admin_user_pass: '{{lookup("bitwarden", "daybydaycrm/admin")}}'
|
||||
daybyday_crm_admin_user_email: 'devops@status.im'
|
||||
# Ports
|
||||
daybyday_crm_proxy_cont_port: 9080
|
||||
|
||||
# Restic Backups
|
||||
restic_user_groups: ['docker', 'dockremap']
|
||||
restic_backups:
|
||||
- name: 'daybyday-crm-db'
|
||||
tags: ['mysqldump']
|
||||
path: '/docker/daybyday-crm/db/backup'
|
||||
after: 'dump-daybyday-crm-db.service'
|
||||
frequency: 'daily'
|
||||
timeout: 300
|
||||
|
||||
# Open Nginx Ports
|
||||
open_ports_default_comment: 'Nginx'
|
||||
open_ports_default_chain: 'SERVICES'
|
||||
open_ports_list:
|
||||
- { port: 80 }
|
||||
- { port: 443 }
|
||||
|
||||
# Nginx SSL Proxy configuration
|
||||
nginx_sites:
|
||||
crm_http:
|
||||
- listen 80
|
||||
- server_name {{ daybyday_crm_domain | mandatory }}
|
||||
- return 301 https://$host$request_uri
|
||||
|
||||
crm_ssl:
|
||||
- listen 443 ssl
|
||||
- server_name {{ daybyday_crm_domain | mandatory }}
|
||||
|
||||
- ssl_certificate /certs/origin.crt
|
||||
- ssl_certificate_key /certs/origin.key
|
||||
|
||||
- location / {
|
||||
proxy_pass http://127.0.0.1:{{ daybyday_crm_proxy_cont_port }}/;
|
||||
include /etc/nginx/proxy_params;
|
||||
}
|
|
@ -19,7 +19,7 @@ gitea_app_admin_token: '{{lookup("passwordstore", "services/gitea/admin/token")}
|
|||
gitea_app_admin_email: 'devops@status.im'
|
||||
|
||||
# GitHub Mirroring
|
||||
gitea_mirrors_orgs: ['dap-ps', 'embarklabs', 'vacp2p', 'waku-org', 'status-im']
|
||||
gitea_mirrors_orgs: ['dap-ps', 'embarklabs', 'vacp2p', 'waku-org', 'status-im', 'logos-co']
|
||||
gitea_mirrors_api_token: '{{ gitea_app_admin_token }}' # requires gitea role to run
|
||||
gitea_mirrors_gh_api_token: '{{lookup("passwordstore", "services/gitea/gh/token")}}' # status-im-bot
|
||||
# Some repos are just too big
|
||||
|
|
|
@ -1,21 +1,13 @@
|
|||
# NOTE: This file is generated by terraform.py
|
||||
# For emergency use when Consul fails
|
||||
[all]
|
||||
node-01.do-ams3.crm.office hostname=node-01.do-ams3.crm.office ansible_host=64.225.80.14 env=crm stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.crm.office.statusim.net
|
||||
node-01.do-ams3.gitea.office hostname=node-01.do-ams3.gitea.office ansible_host=167.99.19.46 env=gitea stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.gitea.office.statusim.net
|
||||
node-01.do-ams3.keycloak.office hostname=node-01.do-ams3.keycloak.office ansible_host=206.189.241.168 env=keycloak stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.keycloak.office.statusim.net
|
||||
node-01.do-ams3.nextcloud.office hostname=node-01.do-ams3.nextcloud.office ansible_host=64.225.82.112 env=nextcloud stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.nextcloud.office.statusim.net
|
||||
node-01.do-ams3.todo.office hostname=node-01.do-ams3.todo.office ansible_host=178.128.140.226 env=todo stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.todo.office.statusim.net
|
||||
node-01.do-ams3.wekan.office hostname=node-01.do-ams3.wekan.office ansible_host=174.138.107.118 env=wekan stage=office data_center=do-ams3 region=ams3 dns_entry=node-01.do-ams3.wekan.office.statusim.net
|
||||
|
||||
[crm]
|
||||
node-01.do-ams3.crm.office
|
||||
|
||||
[crm.office]
|
||||
node-01.do-ams3.crm.office
|
||||
|
||||
[do-ams3]
|
||||
node-01.do-ams3.crm.office
|
||||
node-01.do-ams3.gitea.office
|
||||
node-01.do-ams3.keycloak.office
|
||||
node-01.do-ams3.nextcloud.office
|
||||
|
|
20
crm.tf
20
crm.tf
|
@ -1,20 +0,0 @@
|
|||
/* Ambassador Program CRM */
|
||||
|
||||
module "crm" {
|
||||
source = "github.com/status-im/infra-tf-digital-ocean"
|
||||
|
||||
env = "crm"
|
||||
group = "crm"
|
||||
type = "s-2vcpu-4gb"
|
||||
domain = var.domain
|
||||
|
||||
open_tcp_ports = ["80", "443"]
|
||||
}
|
||||
|
||||
resource "cloudflare_record" "crm" {
|
||||
zone_id = local.zones["status.im"]
|
||||
name = "admin-ambassador"
|
||||
type = "A"
|
||||
proxied = true
|
||||
value = module.crm.public_ips[0]
|
||||
}
|
|
@ -1,6 +1,5 @@
|
|||
output "hosts" {
|
||||
value = merge(
|
||||
module.crm.hosts,
|
||||
module.gitea.hosts,
|
||||
module.keycloak.hosts,
|
||||
module.nextcloud.hosts,
|
||||
|
|
Loading…
Reference in New Issue