snix/ops/glesys
Vincent Ambo 324e050ee6 chore(ops/glesys): prepare DNS setup for whitby decomissioning
Reduces the whitby record TTLs everywhere, and sets up the scaffolding for
adding nevsky/bugry records.

This relates to b/433.

Change-Id: I31b5503fa4fcf5463c989f4cf47a3d403d34c684
Reviewed-on: https://cl.tvl.fyi/c/depot/+/13066
Tested-by: BuildkiteCI
Reviewed-by: sterni <sternenseemann@systemli.org>
2025-02-01 19:59:42 +00:00
..
.gitignore feat(ops/glesys): Add gitignore for Terraform files 2021-12-24 18:54:44 +00:00
default.nix refactor(ops/glesys): Use tools.checks.validateTerraform 2022-06-07 09:32:13 +00:00
dns-nixery-dev.tf feat(ops/glesys): point nixery.dev records at bugry 2025-01-15 15:38:48 +00:00
dns-tvix-dev.tf feat(ops/glesys): add bolt.tvix.dev 2024-02-23 18:44:18 +00:00
dns-tvl-fyi.tf chore(ops/glesys): prepare DNS setup for whitby decomissioning 2025-02-01 19:59:42 +00:00
dns-tvl-su.tf chore(ops/glesys): prepare DNS setup for whitby decomissioning 2025-02-01 19:59:42 +00:00
main.tf chore(ops/glesys): prepare DNS setup for whitby decomissioning 2025-02-01 19:59:42 +00:00
README.md feat(ops/secrets): Import secrets for tf-glesys 2021-12-27 15:53:57 +00:00

Terraform for GleSYS

This contains the Terraform configuration for deploying TVL's infrastructure at GleSYS. This includes object storage (e.g. for backups and Terraform state) and DNS.

Secrets are needed for applying this. The encrypted file //ops/secrets/tf-glesys.age contains export calls which should be sourced, for example via direnv, by users with the appropriate credentials.

An example direnv configuration used by tazjin is this:

# //ops/secrets/.envrc
source_up
eval $(age --decrypt -i ~/.ssh/id_ed25519 $(git rev-parse --show-toplevel)/ops/secrets/tf-glesys.age)
watch_file $(git rev-parse --show-toplevel)/secrets/tf-glesys.age