ton of changes

main
Benedikt Kristinsson 9 months ago
parent e3c8d3256b
commit 35dbbcd103
  1. 180
      cloudflare.tf
  2. 9
      hetznercloud.tf
  3. 17
      lon.tf
  4. 214
      oracle.tf
  5. 18
      outputs.tf
  6. 7
      sudoisnet/sudoisnet/wgdns.py
  7. 3
      variables.tf
  8. 67
      vpn-dns.tf

@ -26,7 +26,6 @@ resource "cloudflare_zone_settings_override" "settings" {
resource "cloudflare_record" "deadopsde" {
zone_id = cloudflare_zone.deadopsde.id
name = ""
#value = oci_core_instance.lon_instances[1].public_ip
value = local.freespace_ip
type = "A"
ttl = 1
@ -59,7 +58,7 @@ resource "cloudflare_record" "ytdldeadops" {
resource "cloudflare_record" "sudois" {
zone_id = cloudflare_zone.sudois.id
name = ""
value = oci_core_instance.lon_instances[1].public_ip
value = oci_core_instance.lon3.public_ip
type = "A"
ttl = 1
proxied = true # www.sudo.is
@ -102,40 +101,31 @@ resource "cloudflare_record" "sudo-is-txt" {
}
# hosts
resource "cloudflare_record" "lon0" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "lon0"
value = digitalocean_droplet.lon0.ipv4_address
ttl = 60
}
resource "cloudflare_record" "lon1" {
resource "cloudflare_record" "fra0" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "lon1"
value = digitalocean_droplet.lon1.ipv4_address
name = "fra0"
value = digitalocean_droplet.fra0.ipv4_address
ttl = 60
}
resource "cloudflare_record" "lon_instances" {
for_each = oci_core_instance.lon_instances
resource "cloudflare_record" "fra0-do" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = each.value.display_name
value = each.value.public_ip
name = "fra0.do"
value = digitalocean_droplet.fra0.ipv4_address
ttl = 60
}
resource "cloudflare_record" "fra0" {
resource "cloudflare_record" "ams0-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "fra0"
value = digitalocean_droplet.fra0.ipv4_address
name = "ams0"
value = local.ams0_ip
ttl = 60
}
resource "cloudflare_record" "ams0-sudo-is" {
resource "cloudflare_record" "ams0-scaleway-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "ams0"
name = "ams0.scaleway"
value = local.ams0_ip
ttl = 60
}
@ -146,11 +136,11 @@ resource "cloudflare_record" "freespace-sudo-is" {
value = local.freespace_ip
ttl = 60
}
resource "cloudflare_record" "chia-sudo-is" {
resource "cloudflare_record" "freespace-h-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "chia"
value = "148.251.190.208"
name = "freespace.h"
value = local.freespace_ip
ttl = 60
}
resource "cloudflare_record" "mainframe-sudo-is" {
@ -160,6 +150,13 @@ resource "cloudflare_record" "mainframe-sudo-is" {
value = local.mainframe_ip
ttl = 60
}
resource "cloudflare_record" "mainframe-h-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "mainframe.h"
value = local.mainframe_ip
ttl = 60
}
resource "cloudflare_record" "fra4-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
@ -167,6 +164,13 @@ resource "cloudflare_record" "fra4-sudo-is" {
value = local.mainframe_ip_2
ttl = 60
}
resource "cloudflare_record" "fra4-h-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "fra4.h"
value = local.mainframe_ip_2
ttl = 60
}
resource "cloudflare_record" "fra5-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
@ -174,6 +178,13 @@ resource "cloudflare_record" "fra5-sudo-is" {
value = local.freespace_ip
ttl = 60
}
resource "cloudflare_record" "fra5-h-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "fra5.h"
value = local.freespace_ip
ttl = 60
}
resource "cloudflare_record" "fra2-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
@ -307,7 +318,7 @@ resource "cloudflare_record" "edge-s21-sudois" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "edge.s21"
value = "192.168.21.1"
value = "10.102.47.138"
proxied = false
ttl = 60
}
@ -383,22 +394,6 @@ resource "cloudflare_record" "sensor-testbed-s21-sudois" {
proxied = false
ttl = 60
}
resource "cloudflare_record" "proxy-s21-sudois" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "proxy.s21"
value = "192.168.21.210"
proxied = false
ttl = 60
}
resource "cloudflare_record" "sink-s21-sudois" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "sink.s21"
value = "192.168.21.211"
proxied = false
ttl = 60
}
resource "cloudflare_record" "broker-sudois" {
zone_id = cloudflare_zone.sudois.id
@ -411,9 +406,9 @@ resource "cloudflare_record" "broker-sudois" {
resource "cloudflare_record" "jenkins-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
type = "A"
name = "jenkins"
value = "freespace.sudo.is"
value = local.freespace_ip
proxied = false
ttl = 60
}
@ -425,43 +420,11 @@ resource "cloudflare_record" "pirate-sudo-is" {
proxied = false
ttl = 60
}
resource "cloudflare_record" "microbork-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "microbork"
value = local.freespace_ip
proxied = false
ttl = 60
}
resource "cloudflare_record" "apt-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
type = "A"
name = "apt"
value = "freespace.sudo.is"
proxied = false
ttl = 60
}
resource "cloudflare_record" "kibana-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
name = "kibana"
value = "freespace.sudo.is"
proxied = false
ttl = 60
}
resource "cloudflare_record" "logstash-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
name = "logstash"
value = "freespace.vpn.sudo.is"
proxied = false
ttl = 60
}
resource "cloudflare_record" "syslog-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
name = "syslog"
value = "freespace.vpn.sudo.is"
value = local.freespace_ip
proxied = false
ttl = 60
}
@ -475,30 +438,13 @@ resource "cloudflare_record" "tools-sudo-is" {
}
resource "cloudflare_record" "builds-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
type = "A"
name = "builds"
value = "freespace.sudo.is"
value = local.freespace_ip
proxied = false
ttl = 60
}
resource "cloudflare_record" "test-maupka-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "CNAME"
name = "maupka"
value = "freespace.sudo.is"
proxied = true
ttl = 1
}
resource "cloudflare_record" "nextclouddeadopsde" {
zone_id = cloudflare_zone.deadopsde.id
type = "A"
value = local.mainframe_ip_2
name = "nextcloud"
ttl = 1
proxied = true
}
resource "cloudflare_record" "pihole-deadops-de" {
zone_id = cloudflare_zone.deadopsde.id
type = "CNAME"
@ -557,8 +503,8 @@ resource "cloudflare_record" "static" {
count = 2
# type = "CNAME"
# value = "f.sudo.is"
type = "CNAME"
value = "lon3.sudo.is"
type = "A"
value = oci_core_instance.lon3.public_ip
ttl = 1
proxied = true
}
@ -568,7 +514,6 @@ resource "cloudflare_record" "mirrors" {
zone_id = cloudflare_zone.deadopsde.id
name = "mirrors"
type = "CNAME"
#value = "lon3.sudo.is"
value = "freespace.sudo.is"
ttl = 1
proxied = true
@ -585,7 +530,6 @@ resource "cloudflare_record" "parler-archive" {
zone_id = cloudflare_zone.deadopsde.id
name = "parler-archive"
type = "CNAME"
#value = "lon3.sudo.is"
value = "freespace.sudo.is"
ttl = 1
proxied = true
@ -593,8 +537,8 @@ resource "cloudflare_record" "parler-archive" {
resource "cloudflare_record" "nkscans" {
zone_id = cloudflare_zone.sudois.id
name = "nk-scans"
type = "CNAME"
value = "lon3.sudo.is"
type = "A"
value = oci_core_instance.lon3.public_ip
ttl = 1
proxied = true
}
@ -699,19 +643,6 @@ resource "cloudflare_filter" "nextcloud_strict_countries" {
expression = "(not ip.geoip.country in {\"DE\" \"SE\" \"IS\" \"NO\"} and http.host eq \"nextcloud.sudo.is\")"
}
resource "cloudflare_filter" "deadcloud_strict_countries" {
zone_id = cloudflare_zone.deadopsde.id
description = "filter countries"
expression = "(not ip.geoip.country in {\"DE\" \"SE\" \"IS\" \"NO\"} and http.host eq \"nextcloud.deadops.de\")"
}
resource "cloudflare_firewall_rule" "deadcloud" {
zone_id = cloudflare_zone.deadopsde.id
description = "allowlist nextcloud"
filter_id = cloudflare_filter.deadcloud_strict_countries.id
action = "block"
}
resource "cloudflare_firewall_rule" "nextcloud" {
zone_id = cloudflare_zone.sudois.id
description = "allowlist nextcloud"
@ -733,7 +664,7 @@ resource "cloudflare_firewall_rule" "bypass-well-known" {
action = "bypass"
}
resource "cloudflare_page_rule" "always-online" {
resource "cloudflare_page_rule" "sudo-well-known" {
zone_id = cloudflare_zone.sudois.id
target = "sudo.is/.well-known/*"
priority = 1
@ -742,10 +673,11 @@ resource "cloudflare_page_rule" "always-online" {
always_online = "on"
browser_check = "off"
disable_security = true
cache_level = "cache_everything"
}
}
resource "cloudflare_page_rule" "www-always-online" {
resource "cloudflare_page_rule" "www-sudo-well-known" {
zone_id = cloudflare_zone.sudois.id
target = "www.sudo.is/.well-known/*"
priority = 2
@ -754,5 +686,17 @@ resource "cloudflare_page_rule" "www-always-online" {
always_online = "on"
browser_check = "off"
disable_security = true
cache_level = "cache_everything"
}
}
resource "cloudflare_page_rule" "mirrors" {
zone_id = cloudflare_zone.deadopsde.id
target = "mirrors.deadops.de/*"
priority = 1
actions {
always_online = "on"
cache_level = "cache_everything"
}
}

@ -55,6 +55,15 @@ resource "hcloud_firewall" "fw0" {
"::/0"
]
}
rule {
direction = "in"
protocol = "udp"
port = "4004"
source_ips = [
"0.0.0.0/0",
"::/0"
]
}
}
resource "hcloud_firewall" "fw1" {
name = "fw1"

@ -71,7 +71,7 @@ resource "digitalocean_firewall" "default-fw" {
"${local.freespace_ip6}/128",
]
}
inbound_rule {
inbound_rule {
protocol = "tcp"
port_range = "80"
source_addresses = ["0.0.0.0/0", "::/0"]
@ -102,3 +102,18 @@ resource "digitalocean_firewall" "default-fw" {
destination_addresses = ["0.0.0.0/0", "::/0"]
}
}
resource "cloudflare_record" "lon0" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "lon0"
value = digitalocean_droplet.lon0.ipv4_address
ttl = 60
}
resource "cloudflare_record" "lon1" {
name = "lon1"
ttl = 60
type = "A"
value = digitalocean_droplet.lon1.ipv4_address
zone_id = cloudflare_zone.sudois.id
}

@ -12,6 +12,26 @@ variable "lon1_subnet_cidr" {
default = "192.168.24.0/24"
}
variable "lon_instances_ips" {
default = {
# green
lon2-einlass-g0 = "192.168.24.214", # change to .2 if i have a chance
lon3-www-g0 = "192.168.24.3", # .3
lon3 = "192.168.24.3"
# blue
lon2-einlass-b0 = "192.168.24.4", # .4
lon3-www-b0 = "192.168.24.5" #. 5
}
}
variable "lon_instances" {
default = {
"lon2" = "lon2-einlass-g0",
"lon3" = "lon3-www-g0"
}
}
provider "oci" {
tenancy_ocid = var.tenancy_ocid
user_ocid = var.user_ocid
@ -30,7 +50,9 @@ resource "oci_core_vcn" "lon1_vcn" {
# need to do some more magic to open ports:
# https://stackoverflow.com/questions/54794217/opening-port-80-on-oracle-cloud-infrastructure-compute-node
# quick hack:
# apt: firewalld
# sudo firewall-cmd --zone=public --permanent --add-port=443/tcp
# sudo firewall-cmd --reload
resource "oci_core_security_list" "ssh-https" {
compartment_id = var.compartment_ocid
vcn_id = oci_core_vcn.lon1_vcn.id
@ -41,6 +63,16 @@ resource "oci_core_security_list" "ssh-https" {
protocol = "all"
}
ingress_security_rules {
protocol = "all"
source = var.lon1_subnet_cidr
}
ingress_security_rules {
protocol = "all"
source = var.wg_cidr
}
ingress_security_rules {
protocol = "6" // tcp
source = "${local.mainframe_ip}/32"
@ -104,15 +136,7 @@ resource "oci_core_security_list" "ssh-https" {
}
}
}
resource "oci_core_default_route_table" "defaultroute" {
manage_default_resource_id = oci_core_vcn.lon1_vcn.default_route_table_id
route_rules {
destination = "0.0.0.0/0"
destination_type = "CIDR_BLOCK"
network_entity_id = oci_core_internet_gateway.lon1_ig.id
}
}
resource "oci_core_subnet" "london1" {
availability_domain = var.free_availability_domain
cidr_block = var.lon1_subnet_cidr
@ -123,37 +147,55 @@ resource "oci_core_subnet" "london1" {
]
compartment_id = var.compartment_ocid
vcn_id = oci_core_vcn.lon1_vcn.id
route_table_id = oci_core_vcn.lon1_vcn.default_route_table_id
dhcp_options_id = oci_core_vcn.lon1_vcn.default_dhcp_options_id
}
resource "oci_core_internet_gateway" "lon1_ig" {
compartment_id = var.compartment_ocid
display_name = "lon1"
vcn_id = oci_core_vcn.lon1_vcn.id
}
variable "oci_lon_instances" {
default = {
1 = "lon3",
2 = "lon2"
}
}
resource "oci_core_instance" "lon_instances" {
for_each = var.oci_lon_instances
# resource "oci_core_instance" "lon_arm_instances" {
# shape = "VM.Standard.A1.Flex"
resource "oci_core_instance" "lon2" {
#for_each = var.lon_instances
#each.value, each.key
availability_domain = var.free_availability_domain
compartment_id = var.compartment_ocid
display_name = each.value
display_name = var.lon_instances["lon2"]
shape = var.instance_shape
create_vnic_details {
subnet_id = oci_core_subnet.london1.id
display_name = "${each.value}_vnic"
assign_public_ip = true
hostname_label = each.value
source_details {
source_type = "image"
source_id = var.instance_image_ocid[var.region]
}
metadata = {
ssh_authorized_keys = var.ssh_public_key
}
timeouts {
create = "60m"
}
agent_config {
is_management_disabled = true
is_monitoring_disabled = true
}
}
resource "oci_core_instance" "lon3" {
#for_each = var.lon_instances
#each.value, each.key
availability_domain = var.free_availability_domain
compartment_id = var.compartment_ocid
display_name = var.lon_instances["lon3"]
shape = var.instance_shape
source_details {
source_type = "image"
source_id = var.instance_image_ocid[var.region]
@ -172,8 +214,134 @@ resource "oci_core_instance" "lon_instances" {
is_monitoring_disabled = true
}
}
resource "oci_core_vnic_attachment" "lon2_vnic" {
instance_id = oci_core_instance.lon2.id
create_vnic_details {
subnet_id = oci_core_subnet.london1.id
display_name = "lon2_vnic"
assign_public_ip = true
skip_source_dest_check = true
hostname_label = oci_core_instance.lon2.display_name
}
}
resource "oci_core_vnic_attachment" "lon3_vnic" {
instance_id = oci_core_instance.lon3.id
create_vnic_details {
subnet_id = oci_core_subnet.london1.id
display_name = "lon3_vnic"
assign_public_ip = true
skip_source_dest_check = true
hostname_label = oci_core_instance.lon3.display_name
}
}
resource "oci_core_private_ip" "lon3" {
display_name = "lon3_vnic"
hostname_label = var.lon_instances["lon3"]
ip_address = var.lon_instances_ips[var.lon_instances["lon3"]]
vnic_id = oci_core_vnic_attachment.lon3_vnic.vnic_id
}
resource "oci_core_private_ip" "lon2" {
display_name = "lon2_vnic"
hostname_label = var.lon_instances["lon2"]
ip_address = var.lon_instances_ips[var.lon_instances["lon2"]]
vnic_id = oci_core_vnic_attachment.lon2_vnic.vnic_id
}
# resource "oci_core_instance_console_connection" "lon1connection" {
# #Required
# instance_id = oci_core_instance.lon1.id
# public_key = var.ssh_public_key
# }
resource "oci_core_route_table" "route0" {
display_name = "route0"
vcn_id = oci_core_vcn.lon1_vcn.id
compartment_id = var.compartment_ocid
route_rules {
destination = var.wg_cidr
destination_type = "CIDR_BLOCK"
network_entity_id = oci_core_private_ip.lon3.id
}
route_rules {
destination = "0.0.0.0/0"
destination_type = "CIDR_BLOCK"
network_entity_id = oci_core_internet_gateway.lon1_ig.id
}
}
resource "oci_core_route_table_attachment" "route0" {
subnet_id = oci_core_subnet.london1.id
route_table_id = oci_core_route_table.route0.id
}
# total 200 gb block storage for free
# boot volumes are minimum 50gb
# 2x instances = 100gb
# 200gb-100gb=100gb
# this uses the full quote
resource "oci_core_volume" "lon3" {
compartment_id = var.compartment_ocid
availability_domain = var.free_availability_domain
display_name = "lon3_volume"
is_auto_tune_enabled = true
size_in_gbs = "100"
}
resource "oci_core_volume_attachment" "lon3" {
attachment_type = "paravirtualized"
instance_id = oci_core_instance.lon3.id
volume_id = oci_core_volume.lon3.id
#device = "/dev/sdd"
display_name = "lon3_volume_attachment"
is_read_only = false
is_shareable = false
}
resource "oci_core_public_ip" "float" {
compartment_id = var.compartment_ocid
lifetime = "RESERVED"
display_name = "float"
#private_ip_id = oci_core_private_ip.lon3.id
}
resource "cloudflare_record" "lon2" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = oci_core_instance.lon2.display_name
value = oci_core_instance.lon2.public_ip
ttl = 60
}
resource "cloudflare_record" "lon3" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = oci_core_instance.lon3.display_name
value = oci_core_instance.lon3.public_ip
ttl = 60
}
resource "cloudflare_record" "lon2_private" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "${oci_core_instance.lon2.display_name}.oci"
value = oci_core_instance.lon2.private_ip
ttl = 60
}
resource "cloudflare_record" "lon3_private" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "${oci_core_instance.lon3.display_name}.oci"
value = oci_core_instance.lon3.private_ip
ttl = 60
}
resource "cloudflare_record" "oci_float" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "float.oci"
value = oci_core_public_ip.float.ip_address
ttl = 60
}

@ -4,14 +4,20 @@ output "lon0" {
output "lon1" {
value = digitalocean_droplet.lon1.ipv4_address
}
output "oci" {
# Result is a map from instanc
value = {
for instance in oci_core_instance.lon_instances:
instance.display_name => instance.public_ip
}
output "lon2" {
value = oci_core_instance.lon2.public_ip
# value = {
# for instance in oci_core_instance.lon_instances:
# instance.display_name => instance.public_ip
# }
}
output "lon3" {
value = oci_core_instance.lon3.public_ip
}
output "oci_float" {
value = oci_core_public_ip.float.ip_address
}
output "fra1-auth-g0" {
value = hcloud_server.fra1-auth-g0.ipv4_address
}

@ -73,11 +73,12 @@ resource "cloudflare_record" "{hostname}-sudo-is" {{
vpn_names = {
'mariadb': 'mainframe.sudo.is',
'jollyroger': 'freespace.sudo.is',
'openldap': 'fra1-auth-g0.sudo.is',
'authelia': 'fra1-auth-g0.sudo.is',
'dockreg': 'mainframe.sudo.is',
'matrix-bridge-smtp': 'fra2.sudo.is',
'kibana': 'freespace.sudo.is',
'logstash': 'freespace.sudo.is',
# get rid of these
'pibuilder': 'ber1.sudo.is',
@ -95,13 +96,13 @@ def main():
records = [HEAD]
wg_clients = allvars['wireguard_clients']
wg_clients = allvars['wg_clients']
for fqdn_hostname, v in wg_clients.items():
hostname = fqdn_hostname.split('.')[0]
logger.debug(f"{hostname}: {v['ip']}")
if v.get('wg_is_primary', False):
if v.get('wg_is_primary_dns', False):
records.append(a_record(hostname, v['ip'], "."))
records.append(a_record(hostname, v['ip'], "vpn"))

@ -23,6 +23,9 @@ variable "instance_shape" {
default = "VM.Standard.E2.1.Micro"
}
variable "wg_cidr" {
default = "10.102.47.0/24"
}
variable "instance_image_ocid" {
type = map

@ -49,36 +49,36 @@ resource "cloudflare_record" "lon0-vpn-sudo-is" {
}
resource "digitalocean_record" "lon2" {
resource "digitalocean_record" "lon2-einlass-g0" {
domain = digitalocean_domain.sudois-net.name
type = "A"
name = "lon2"
name = "lon2-einlass-g0"
value = "10.102.47.14"
ttl = 60
}
resource "cloudflare_record" "lon2-vpn-sudo-is" {
resource "cloudflare_record" "lon2-einlass-g0-vpn-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "lon2.vpn"
name = "lon2-einlass-g0.vpn"
value = "10.102.47.14"
proxied = false
ttl = 60
}
resource "digitalocean_record" "lon3" {
resource "digitalocean_record" "lon3-www-g0" {
domain = digitalocean_domain.sudois-net.name
type = "A"
name = "lon3"
name = "lon3-www-g0"
value = "10.102.47.15"
ttl = 60
}
resource "cloudflare_record" "lon3-vpn-sudo-is" {
resource "cloudflare_record" "lon3-www-g0-vpn-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "lon3.vpn"
name = "lon3-www-g0.vpn"
value = "10.102.47.15"
proxied = false
ttl = 60
@ -348,24 +348,6 @@ resource "cloudflare_record" "max-vpn-sudo-is" {
}
resource "digitalocean_record" "chia" {
domain = digitalocean_domain.sudois-net.name
type = "A"
name = "chia"
value = "10.102.47.140"
ttl = 60
}
resource "cloudflare_record" "chia-vpn-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "chia.vpn"
value = "10.102.47.140"
proxied = false
ttl = 60
}
resource "digitalocean_record" "ams0" {
domain = digitalocean_domain.sudois-net.name
type = "A"
@ -478,17 +460,6 @@ resource "cloudflare_record" "mariadb-sudo-is" {
resource "cloudflare_record" "jollyroger-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "jollyroger"
value = "10.102.47.133"
proxied = false
ttl = 60
}
resource "cloudflare_record" "openldap-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
@ -533,6 +504,28 @@ resource "cloudflare_record" "matrix-bridge-smtp-sudo-is" {
resource "cloudflare_record" "kibana-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "kibana"
value = "10.102.47.133"
proxied = false
ttl = 60
}
resource "cloudflare_record" "logstash-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"
name = "logstash"
value = "10.102.47.133"
proxied = false
ttl = 60
}
resource "cloudflare_record" "pibuilder-sudo-is" {
zone_id = cloudflare_zone.sudois.id
type = "A"

Loading…
Cancel
Save