Add logging dns

This commit is contained in:
Alexander Hosking 2019-05-14 08:08:45 -04:00
parent eb040db525
commit eaef7aadfe
4 changed files with 152 additions and 15 deletions

View File

@ -53,6 +53,14 @@ resource "aws_route53_record" "lab_ahoskingit" {
records = ["${aws_route53_record.kfa_ahoskingit.name}"] records = ["${aws_route53_record.kfa_ahoskingit.name}"]
} }
resource "aws_route53_record" "logs_ahoskingit" {
zone_id = "${aws_route53_zone.ahoskingit.zone_id}"
name = "logs.ahoskingit.com"
type = "CNAME"
ttl = "5"
records = ["${var.home_ip}"]
}
resource "aws_route53_record" "inventory_ahoskingit" { resource "aws_route53_record" "inventory_ahoskingit" {
zone_id = "${aws_route53_zone.ahoskingit.zone_id}" zone_id = "${aws_route53_zone.ahoskingit.zone_id}"
name = "inventory.ahoskingit.com" name = "inventory.ahoskingit.com"

View File

@ -1,7 +1,7 @@
{ {
"version": 3, "version": 3,
"terraform_version": "0.11.11", "terraform_version": "0.11.11",
"serial": 24, "serial": 25,
"lineage": "db7d87ff-3078-47ed-a0a9-91749a2dbba5", "lineage": "db7d87ff-3078-47ed-a0a9-91749a2dbba5",
"modules": [ "modules": [
{ {
@ -847,6 +847,33 @@
"deposed": [], "deposed": [],
"provider": "provider.aws" "provider": "provider.aws"
}, },
"aws_route53_record.logs_ahoskingit": {
"type": "aws_route53_record",
"depends_on": [
"aws_route53_zone.ahoskingit"
],
"primary": {
"id": "Z2HTSYFXB5HXD9_logs.ahoskingit.com_CNAME",
"attributes": {
"fqdn": "logs.ahoskingit.com",
"health_check_id": "",
"id": "Z2HTSYFXB5HXD9_logs.ahoskingit.com_CNAME",
"name": "logs.ahoskingit.com",
"records.#": "1",
"records.1816504638": "99.240.201.161",
"set_identifier": "",
"ttl": "5",
"type": "CNAME",
"zone_id": "Z2HTSYFXB5HXD9"
},
"meta": {
"schema_version": "2"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_route53_record.monitors_ahoskingit": { "aws_route53_record.monitors_ahoskingit": {
"type": "aws_route53_record", "type": "aws_route53_record",
"depends_on": [ "depends_on": [

View File

@ -1,7 +1,7 @@
{ {
"version": 3, "version": 3,
"terraform_version": "0.11.7", "terraform_version": "0.11.11",
"serial": 24, "serial": 25,
"lineage": "db7d87ff-3078-47ed-a0a9-91749a2dbba5", "lineage": "db7d87ff-3078-47ed-a0a9-91749a2dbba5",
"modules": [ "modules": [
{ {
@ -627,6 +627,34 @@
"deposed": [], "deposed": [],
"provider": "provider.aws" "provider": "provider.aws"
}, },
"aws_route53_record.goals_ahoskingit": {
"type": "aws_route53_record",
"depends_on": [
"aws_route53_record.home_ahoskingit",
"aws_route53_zone.ahoskingit"
],
"primary": {
"id": "Z2HTSYFXB5HXD9_goals.ahoskingit.com_CNAME",
"attributes": {
"fqdn": "goals.ahoskingit.com",
"health_check_id": "",
"id": "Z2HTSYFXB5HXD9_goals.ahoskingit.com_CNAME",
"name": "goals.ahoskingit.com",
"records.#": "1",
"records.1011144593": "home.ahoskingit.com",
"set_identifier": "",
"ttl": "5",
"type": "CNAME",
"zone_id": "Z2HTSYFXB5HXD9"
},
"meta": {
"schema_version": "2"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_route53_record.home_ahoskingit": { "aws_route53_record.home_ahoskingit": {
"type": "aws_route53_record", "type": "aws_route53_record",
"depends_on": [ "depends_on": [
@ -819,6 +847,34 @@
"deposed": [], "deposed": [],
"provider": "provider.aws" "provider": "provider.aws"
}, },
"aws_route53_record.monitors_ahoskingit": {
"type": "aws_route53_record",
"depends_on": [
"aws_route53_record.home_ahoskingit",
"aws_route53_zone.ahoskingit"
],
"primary": {
"id": "Z2HTSYFXB5HXD9_monitors.ahoskingit.com_CNAME",
"attributes": {
"fqdn": "monitors.ahoskingit.com",
"health_check_id": "",
"id": "Z2HTSYFXB5HXD9_monitors.ahoskingit.com_CNAME",
"name": "monitors.ahoskingit.com",
"records.#": "1",
"records.1011144593": "home.ahoskingit.com",
"set_identifier": "",
"ttl": "5",
"type": "CNAME",
"zone_id": "Z2HTSYFXB5HXD9"
},
"meta": {
"schema_version": "2"
},
"tainted": false
},
"deposed": [],
"provider": "provider.aws"
},
"aws_route53_record.mx_automatedbytes": { "aws_route53_record.mx_automatedbytes": {
"type": "aws_route53_record", "type": "aws_route53_record",
"depends_on": [ "depends_on": [

View File

@ -1,16 +1,44 @@
#!/usr/bin/env python
import argparse import argparse
import os import os
import subprocess
import string import string
import sys import sys
import shutil
from ansible_vault import Vault from ansible_vault import Vault
def create_credentials():
print("Creating Terraform Credentials")
creds_file = os.path.expanduser("~/.aws/credentials")
backup_file = os.path.expanduser("~/.aws/credentials.terrarist.bak")
if os.path.exists(backup_file):
os.remove(backup_file)
if os.path.exists(creds_file):
shutil.copy(creds_file, backup_file)
f = open(creds_file, "w+")
f.write("[default]\n")
writer = "aws_access_key_id=" + data["aws_access_key"] + "\n"
f.write(writer)
writer = "aws_secret_access_key=" + data["aws_secret_key"] + "\n"
f.write(writer)
if __name__ == "__main__": if __name__ == "__main__":
parser = argparse.ArgumentParser(description='Securely wrap terraform like a terrarist!') parser = argparse.ArgumentParser(
parser.add_argument('action', choices=['plan', 'apply', 'import', 'init'], help='Terraform action to execute') description='Securely wrap terraform like a terrarist!')
parser.add_argument('--vault', '--ansible-vault', dest='vault_file', required=True, help='Ansible Vault File') parser.add_argument('action', choices=[
parser.add_argument('--vault-password-file', dest='vault_password', required=True, help='Ansible Vault Password File') 'plan', 'apply', 'import', 'init', 'destroy'], help='Terraform action to execute')
parser.add_argument('--environment', dest='environment', required=True, help='Production, Staging, etc...') parser.add_argument('--vault', '--ansible-vault', dest='vault_file',
default='terraform.vault', required=False, help='Ansible Vault File')
parser.add_argument('--vault-password-file', dest='vault_password',
required=True, help='Ansible Vault Password File')
parser.add_argument('--environment', dest='environment', default='dev',
required=False, help='Production, Staging, etc...')
parser.add_argument('--no-landscape', action="store_true", dest="pretty_output",
required=False, help='Only define this if you do not want pretty output.')
args, options = parser.parse_known_args() args, options = parser.parse_known_args()
@ -27,13 +55,31 @@ if __name__ == "__main__":
vault = Vault(password) vault = Vault(password)
data = vault.load(open(args.vault_file).read()) data = vault.load(open(args.vault_file).read())
cmd = ["terraform", args.action, "--var", "environment=%s" %args.environment, '--var-file=var_homeip.tfvar' ] create_credentials()
cmd = ["terraform", args.action, "--var",
"environment=%s" % args.environment]
for key, value in data.items(): for key, value in data.items():
cmd.append("--var") cmd.append("--var")
cmd.append("'%s=%s'" %(key, value)) cmd.append("'%s=%s'" % (key, value))
cmd += string.join(options) for option in options:
cmd.append(option)
x = os.system(string.join(cmd))
sys.exit(x) if args.action == 'plan':
try:
landscape = shutil.which('landscape') # Pretty terraform output
if landscape is not None and not args.pretty_output:
cmd.append(" | landscape")
except:
landscape = os.system('which landscape')
if landscape != 256 and not args.pretty_output:
cmd.append(" | landscape")
if sys.version_info[0] < 3: # Python 2
x = os.system(string.join(cmd))
sys.exit(x)
else: # Python 3
x = os.system(' '.join(cmd))
sys.exit(x)