-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automate EC2 based staging environment for StrataSTOR #1
Comments
Hey @raamsri , I would like to take up this issue |
Hi @yendelevium , Thank you for volunteering to take on this issue! Your proposal to use the AWS SDK with custom wrappers sounds interesting, but I’d like to share a few points to ensure we align with the objectives and constraints of this task:
Proposed Path Forward:
Your contributions and insights are valuable, and I’d love to hear your thoughts on this direction! Let’s prioritize delivering a functional setup quickly and explore custom tooling in subsequent iterations? I'll update the Issue's description to align with the goals. |
Understood @raamsri. I have one concern, shouldn't rodent also be installed in the staging environment? Only then can we run the test commands. Also, i plan on using sensitive variables to store terraform credentials. The documentation will cover how to use them. Is this fine, or should we try other options like the AWS-CLI , or the AWS- vault? |
Actually, scratch this, I will be storing the info in terraform.tfvars, and then git-ignoring the file |
@raamsri Does this mean the environment is fine |
Yes, that checks out ZFS 👍 |
- Create an EC2 based staging environment via terraform - Create a VPC, internet gateway, route table, subnet, security group, network interface, elastic IP and an EC2 - Configure the EC2 via the user_data shell script - Add a README documenting deployment, validation, and destruction (in forge/infra) - Add a .gitgnore file (sourced from a github template) Resolves stratastor#1
Issue
Objective
Provision a staging environment on AWS EC2 to test StrataSTOR, ensuring compatibility with ZFS and related dependencies. The setup should be automated and validated through Go tests for ZFS operations.
Clearly, there may be other IaC choices including AWS Cloud Formation templates but not limited to Terraform. To prevent the analysis-paralysis, let's choose Terraform favoring faster initial iteration and scalable future development.
Assumptions
AWS Resources
Terraform State Management
Validation Criteria
Tasks
1. Provisioning
ssh
,git
,setfacl
,jq
and other development utils as necessary2. Validation
3. Cleanup
Deliverables
Additional Considerations
Parallel issue on a similar requirement for Rodent CI: stratastor/rodent#44
The text was updated successfully, but these errors were encountered: