-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'dev' into segev_dra_4.13
- Loading branch information
Showing
43 changed files
with
560 additions
and
79 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,214 @@ | ||
name: 'DSF POC CLI - Azure' | ||
|
||
on: | ||
workflow_call: | ||
inputs: | ||
use_modules_from_terraform_registry: | ||
required: true | ||
type: boolean | ||
explicit_ref: | ||
required: true | ||
type: string | ||
secrets: | ||
AWS_ACCESS_KEY_ID: | ||
required: true | ||
AWS_SECRET_ACCESS_KEY: | ||
required: true | ||
SLACK_WEBHOOK_URL: | ||
required: true | ||
ARM_CLIENT_SECRET: | ||
required: true | ||
|
||
workflow_dispatch: | ||
inputs: | ||
use_modules_from_terraform_registry: | ||
type: boolean | ||
required: false | ||
|
||
env: | ||
TF_CLI_ARGS: "-no-color" | ||
TF_INPUT: 0 | ||
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} # aws creds are needed for s3 backend | ||
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | ||
ARM_SUBSCRIPTION_ID: ${{ vars.ARM_SUBSCRIPTION_ID }} | ||
ARM_CLIENT_ID: ${{ vars.ARM_CLIENT_ID }} | ||
ARM_TENANT_ID: ${{ vars.ARM_TENANT_ID }} | ||
ARM_CLIENT_SECRET: ${{ secrets.ARM_CLIENT_SECRET }} | ||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
terraform: | ||
strategy: | ||
fail-fast: false | ||
matrix: | ||
include: | ||
- name: DSF POC - SONAR | ||
workspace: azure_cli- | ||
|
||
name: '${{ matrix.name }}' | ||
runs-on: ubuntu-latest | ||
env: | ||
EXAMPLE_DIR: ./examples/azure/dsf_deployment | ||
environment: test | ||
|
||
# Use the Bash shell regardless whether the GitHub Actions runner is ubuntu-latest, macos-latest, or windows-latest | ||
defaults: | ||
run: | ||
shell: bash | ||
steps: | ||
|
||
- name: Pick ref | ||
run: | | ||
if [ -z "${{ inputs.explicit_ref }}" ]; then | ||
echo REF=${{ github.ref }} >> $GITHUB_ENV; | ||
else | ||
echo REF=${{ inputs.explicit_ref }} >> $GITHUB_ENV; | ||
fi | ||
- name: Set Workspace Name | ||
run: | | ||
echo "Event Name: ${{ github.event_name }}" | ||
if [ ${{ github.event_name }} == 'schedule' ]; then | ||
echo TF_WORKSPACE=${{ matrix.workspace }}${{ github.event_name }}-$REF >> $GITHUB_ENV | ||
else | ||
echo TF_WORKSPACE=${{ matrix.workspace }}${{ github.run_number }}-${{ github.run_attempt }}-${{ inputs.explicit_ref }} >> $GITHUB_ENV | ||
echo TMP_WORKSPACE_NAME=${{ matrix.workspace }}${{ github.run_number }}-${{ github.run_attempt }}-${{ inputs.explicit_ref }} >> $GITHUB_ENV | ||
fi | ||
# Checkout the repository to the GitHub Actions runner | ||
- name: Checkout | ||
uses: actions/checkout@v3 | ||
with: | ||
ref: ${{ env.REF }} | ||
|
||
- name: Change the modules source to local | ||
if: ${{ inputs.use_modules_from_terraform_registry == false }} | ||
run: | | ||
find $EXAMPLE_DIR -type f -exec sed -i -f sed.expr {} \; | ||
- name: Sets env vars for environment | ||
run: | | ||
echo "TF_VAR_tarball_s3_bucket=0ed58e18-0c0c-11ed-861d-0242ac120003" >> $GITHUB_ENV | ||
if: github.ref != 'refs/heads/"master"' | ||
|
||
- name: Create terraform backend file | ||
run: | | ||
cat << EOF > $EXAMPLE_DIR/backend.tf | ||
terraform { | ||
backend "s3" { | ||
bucket = "terraform-state-bucket-dsfkit-github-tests" | ||
key = "states/terraform.tfstate" | ||
dynamodb_table = "terraform-state-lock" | ||
region = "us-east-1" | ||
} | ||
} | ||
EOF | ||
- name: Create terraform.tfvars file | ||
run: | | ||
cat << EOF > $EXAMPLE_DIR/terraform.tfvars | ||
resource_group_location = "East US" | ||
tarball_location = { | ||
az_resource_group = "eytan-resource-group" | ||
az_storage_account = "eytanstorageaccount" | ||
az_container = "sonar" | ||
az_blob = "jsonar-4.12.0.10.0.tar.gz" | ||
} | ||
EOF | ||
# Install the latest version of Terraform CLI and configure the Terraform CLI configuration file with a Terraform Cloud user API token | ||
- name: Setup Terraform | ||
uses: hashicorp/setup-terraform@v2 | ||
with: | ||
terraform_wrapper: false | ||
terraform_version: ~1.6.0 | ||
|
||
- name: Setup jq | ||
uses: sergeysova/jq-action@v2 | ||
|
||
# Initialize a new or existing Terraform working directory by creating initial files, loading any remote state, downloading modules, etc. | ||
- name: Terraform Init | ||
run: terraform -chdir=$EXAMPLE_DIR init | ||
env: | ||
TF_WORKSPACE: default | ||
|
||
- name: Cleaning environment | ||
run: | | ||
if [ ${{ github.event_name }} == 'schedule' ]; then | ||
mv $EXAMPLE_DIR/main.tf{,_} | ||
mv $EXAMPLE_DIR/outputs.tf{,_} | ||
mv $EXAMPLE_DIR/sonar.tf{,_} | ||
mv $EXAMPLE_DIR/networking.tf{,_} | ||
terraform -chdir=$EXAMPLE_DIR destroy -auto-approve | ||
mv $EXAMPLE_DIR/main.tf{_,} | ||
mv $EXAMPLE_DIR/outputs.tf{_,} | ||
mv $EXAMPLE_DIR/sonar.tf{_,} | ||
mv $EXAMPLE_DIR/networking.tf{_,} | ||
fi | ||
- name: Terraform Validate | ||
run: terraform -chdir=$EXAMPLE_DIR validate | ||
|
||
# Generates an execution plan for Terraform | ||
- name: Terraform Plan | ||
run: | | ||
terraform -chdir=$EXAMPLE_DIR workspace list | ||
terraform -chdir=$EXAMPLE_DIR plan | ||
# On push to "main", build or change infrastructure according to Terraform configuration files | ||
# Note: It is recommended to set up a required "strict" status check in your repository for "Terraform Cloud". See the documentation on "strict" required status checks for more information: https://help.github.com/en/github/administering-a-repository/types-of-required-status-checks | ||
- name: Terraform Apply | ||
id: apply | ||
# if: github.ref == 'refs/heads/"master"' && github.event_name == 'push' || github.event_name == 'workflow_dispatch' | ||
run: terraform -chdir=$EXAMPLE_DIR apply -auto-approve | ||
|
||
- name: Terraform Output | ||
if: always() | ||
run: terraform -chdir=$EXAMPLE_DIR output -json | ||
|
||
- name: Collect Artifacts | ||
if: always() | ||
uses: actions/upload-artifact@v2 | ||
with: | ||
name: collected-keys | ||
path: | | ||
${{ env.EXAMPLE_DIR }}/ssh_keys | ||
- name: Terraform Destroy | ||
id: destroy | ||
if: always() | ||
run: | | ||
if [ '${{ steps.apply.conclusion }}' == 'success' ] || [ ${{ github.event_name }} != 'schedule' ]; then | ||
terraform -chdir=$EXAMPLE_DIR destroy -auto-approve | ||
fi | ||
- name: Terraform Delete Workspace | ||
if: always() | ||
run: | | ||
if [ '${{ steps.destroy.conclusion }}' == 'success' ] && [ ${{ github.event_name }} != 'schedule' ]; then | ||
terraform -chdir=$EXAMPLE_DIR workspace delete $TMP_WORKSPACE_NAME | ||
fi | ||
env: | ||
TF_WORKSPACE: default | ||
|
||
- name: Check how was the workflow run | ||
id: check-trigger | ||
if: ${{ failure() }} | ||
run: | | ||
if [ "${{ github.event_name }}" == "schedule" ]; then | ||
echo "run-by=Automation" >> $GITHUB_OUTPUT | ||
else | ||
echo "run-by=${{ github.actor }}" >> $GITHUB_OUTPUT | ||
fi | ||
# Send job failure to Slack | ||
- name: Send Slack When Failure | ||
run: | | ||
if [ ${{ env.REF }} == 'master' ]; then | ||
curl -X POST -H 'Content-type: application/json' --data '{"text":":exclamation: :exclamation: :exclamation:\n*${{ matrix.name }} Prod ${{ inputs.workspace }} automation Failed*\n<https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}|Please check the job!>\nRun by: ${{ steps.check-trigger.outputs.run-by }}", "channel": "#dsfkit-prod"}' ${{ secrets.SLACK_WEBHOOK_URL }} | ||
elif [ ${{ env.REF }} == 'dev' ]; then | ||
curl -X POST -H 'Content-type: application/json' --data '{"text":":exclamation: :exclamation: :exclamation:\n*${{ matrix.name }} dev ${{ inputs.workspace }} automation Failed*\n<https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}|Please check the job!>\nRun by: ${{ steps.check-trigger.outputs.run-by }}", "channel": "#edsf_automation"}' ${{ secrets.SLACK_WEBHOOK_URL }} | ||
else | ||
curl -X POST -H 'Content-type: application/json' --data '{"text":":exclamation: :exclamation: :exclamation:\n*${{ matrix.name }} private branch ${{ inputs.workspace }} automation Failed*\n<https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}|Please check the job!>\nRun by: ${{ steps.check-trigger.outputs.run-by }}", "channel": "#edsf_automation"}' ${{ secrets.SLACK_WEBHOOK_URL }} | ||
fi | ||
if: ${{ failure() }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
# DSF Deployment example | ||
[![GitHub tag](https://img.shields.io/github/v/tag/imperva/dsfkit.svg)](https://github.com/imperva/dsfkit/tags) | ||
|
||
This example provides DSF (Data Security Fabric) deployment with DSF Hub, and Agentless Gateways. | ||
|
||
## Modularity | ||
The deployment is modular and allows users to deploy one or more of the following modules: | ||
|
||
1. New VPC | ||
2. Sonar | ||
- DSF Hub | ||
- DSF Hub DR HADR (High Availability Disaster Recovery) node | ||
- Agentless Gateways | ||
- Agentless Gateways DR HADR (High Availability Disaster Recovery) nodes | ||
|
||
## Variables | ||
Several variables in the `variables.tf` file are important for configuring the deployment. The following variables dictate the deployment content and should be paid more attention to: | ||
- `enable_sonar`: Enable Sonar sub-product | ||
- `agent_gw_count`: Number of Agent Gateways | ||
- `hub_hadr`: Enable DSF Hub High Availability Disaster Recovery (HADR) | ||
- `agentless_gw_hadr`: Enable Agentless Gateway High Availability Disaster Recovery (HADR) | ||
|
||
### Networking | ||
- `subnet_ids`: IDs of the subnets for the deployment. If not specified, a new vpc is created. | ||
|
||
## Default Example | ||
To perform the default deployment, run the following command: | ||
|
||
```bash | ||
terraform apply -auto-approve | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.