diff --git a/README.md b/README.md index 4604d57c99343b1a070cb55b5adf82b8812e090b..50186f86d99d5107be190a6993c63cdd6301450b 100644 --- a/README.md +++ b/README.md @@ -211,6 +211,24 @@ $ terraform validate $ cat secure_agent.tfvars image_name="265723766240.dkr.ecr.us-east-1.amazonaws.com/enterprise-integrations/iics_secure_agent:git-8f6f0d24" +# sample `secure_agent.tfvars` for production set up. +$ cat prod.secure_agent.tvfars +image_name="265723766240.dkr.ecr.us-east-1.amazonaws.com/enterprise-integrations/iics_secure_agent:git-8f6f0d24" +aws_region="us-east-2" +vpc_tags={"Name":"prod-tier","tier":"prod"} +private_subnets_filter={"Name":"prod-private-*"} +security_group={"Name":"internal","tier":"prod"} +container_name="iics-secure-agent-prod" +container_hostname="prod.ei.secureagent.doit.wisc.edu" +ecs_iam_role="iics-secure-agent-iam-role-prod" +ecs_execution_role="iics-secure-agent-ecs-execution-role-prod" +ecs_cluster_tags={"Name":"iics-agent-cluster","tier":"prod"} +ecs_task_tags={"Name":"iics-secure-agent","tier":"prod"} +efs_tags={"Name":"iics-secure-agent","tier":"prod"} +secure_agent_sg_tags={"Name":"secure-agent-efs-sg","tier":"prod"} +iam_instance_profile="secure-agent-ecs-instance-profile-prod" +iics_secret_access_policy="iics-secret-access-policy-prod" + $ terraform plan -out agent.tfplan -var-file=<path>/<to>/secure_agent.tfvars $ terraform apply "agent.tfplan" ```