| # upstream AMIs |
| data "aws_ami" "ubuntu" { |
| most_recent = true |
| |
| filter { |
| name = "name" |
| values = ["ubuntu/images/hvm-ssd/ubuntu-bionic-18.04-amd64-server-*"] |
| } |
| |
| owners = ["099720109477"] # Official Canonical ID |
| } |
| |
| # Production ------------ |
| # route53 - not currently managed by Systems terraform |
| # roles - not currently managed by Systems terraform |
| # server - not currently managed by Systems terraform |
| |
| # Staging -------------- |
| # route53 - handle manually |
| |
| #servers |
| resource "aws_instance" "staging-ci" { |
| ami = "ami-0ac80df6eff0e70b5" |
| instance_type = "t3.large" |
| # hardcoding for the time being. In the future we may want |
| # to split staging off to its own subnet. |
| subnet_id = "subnet-a0d573af" |
| vpc_security_group_ids = [ |
| "${aws_security_group.ci-sg.id}", |
| "${aws_security_group.flexnet-sg.id}", |
| ] |
| key_name = "systems-bot-ssh" |
| tags = { |
| Name = "staging-ci" |
| Environment = "staging" |
| } |
| root_block_device { |
| volume_size = 300 |
| volume_type = "gp2" |
| } |
| } |