Files
nomad/e2e/terraform/variables.tf
Tim Gross d6800c41c1 E2E: include Windows 2022 host in test targets (#26003)
Some time ago the Windows host we were using as a Nomad client agent test target
started failing to allow ssh connections. The underlying problem appears to be
with sysprep but I wasn't able to debug the exact cause as it's not an area I
have a lot of expertise in.

Swap out the deprecated Windows 2016 host for a Windows 2022 host. This will use
a base image provided by Amazon and then we'll use a userdata script to
bootstrap ssh and some target directories for Terraform to upload files to. The
more modern Windows will let us drop some of extra powershell scripts we were
using as well.

Fixes: https://hashicorp.atlassian.net/browse/NMD-151
Fixes: https://github.com/hashicorp/nomad-e2e/issues/125
2025-06-16 12:12:15 -04:00

119 lines
3.2 KiB
HCL

# Copyright (c) HashiCorp, Inc.
# SPDX-License-Identifier: BUSL-1.1
variable "name" {
description = "Used to name various infrastructure components"
default = "nomad-e2e"
}
variable "region" {
description = "The AWS region to deploy to."
default = "us-east-1"
}
variable "availability_zone" {
description = "The AWS availability zone to deploy to."
default = "us-east-1b"
}
variable "instance_type" {
description = "The AWS instance type to use for both clients and servers."
default = "t3a.medium"
}
variable "instance_arch" {
description = "The architecture for the AWS instance type to use for both clients and servers."
default = "amd64"
}
variable "server_count" {
description = "The number of servers to provision."
default = "3"
}
variable "client_count_linux" {
description = "The number of Ubuntu clients to provision."
default = "4"
}
variable "client_count_windows_2022" {
description = "The number of windows 2022 clients to provision."
default = "0"
}
variable "restrict_ingress_cidrblock" {
description = "Restrict ingress traffic to cluster to invoker ip address"
type = bool
default = true
}
# ----------------------------------------
# The specific version of Nomad deployed will default to whichever one of
# nomad_sha, nomad_version, or nomad_local_binary is set
variable "nomad_local_binary" {
description = "The path to a local binary to provision"
}
variable "nomad_license" {
type = string
description = "If nomad_license is set, deploy a license"
}
variable "nomad_region" {
description = "The AWS region to deploy to."
default = "us-east-1"
}
variable "consul_license" {
type = string
description = "If consul_license is set, deploy a license"
}
variable "volumes" {
type = bool
description = "Include external EFS volumes (for CSI)"
default = true
}
variable "hcp_vault_cluster_id" {
description = "The ID of the HCP Vault cluster"
type = string
default = "nomad-e2e-shared-hcp-vault"
}
variable "hcp_vault_namespace" {
description = "The namespace where the HCP Vault cluster policy works"
type = string
default = "admin"
}
variable "aws_kms_alias" {
description = "The alias for the AWS KMS key ID"
type = string
default = "kms-nomad-keyring"
}
# ----------------------------------------
# If you want to deploy different versions you can use these variables to
# provide a build to override the values of nomad_sha, nomad_version,
# or nomad_local_binary. Most of the time you can ignore these variables!
variable "nomad_local_binary_server" {
description = "A path to an alternative binary to deploy to servers, to override nomad_local_binary"
type = string
default = ""
}
variable "nomad_local_binary_client_ubuntu_jammy" {
description = "A path to an alternative binary to deploy to ubuntu clients, to override nomad_local_binary"
type = string
default = ""
}
variable "nomad_local_binary_client_windows_2022" {
description = "A path to an alternative binary to deploy to windows clients, to override nomad_local_binary"
type = string
default = ""
}