This module was generated from terraform-google-module-template, which by default generates a module that simply creates a GCS bucket. As the module develops, this README should be updated.
The resources/services/activations/deletions that this module will create/trigger are:
- Create a GCS bucket with the provided name
Basic usage of this module is as follows:
module "three_tier_app" {
source = "terraform-google-modules/three-tier-app/google"
version = "~> 0.1"
project_id = var.project_id
region = "us-central1"
zone = "us-central1-a"
}
Functional examples are included in the examples directory.
Name | Description | Type | Default | Required |
---|---|---|---|---|
deployment_name | The name of this particular deployment, will get added as a prefix to most resources. | string |
"three-tier-app" |
no |
enable_apis | Whether or not to enable underlying apis in this solution. . | string |
true |
no |
labels | A map of labels to apply to contained resources. | map(string) |
{ |
no |
project_id | The project ID to deploy to | any |
n/a | yes |
region | The Compute Region to deploy to | string |
n/a | yes |
zone | The Compute Zonbe to deploy to | string |
n/a | yes |
Name | Description |
---|---|
endpoint | The url of the front end which we want to surface to the user |
sqlservername | The name of the database that we randomly generated. |
These sections describe requirements for using this module.
The following dependencies must be available:
- Terraform v0.13
- Terraform Provider for GCP plugin v3.0
A service account with the following roles must be used to provision the resources of this module:
- Storage Admin:
roles/storage.admin
The Project Factory module and the IAM module may be used in combination to provision a service account with the necessary roles applied.
A project with the following APIs enabled must be used to host the resources of this module:
- Google Cloud Storage JSON API:
storage-api.googleapis.com
The Project Factory module can be used to provision a project with the necessary APIs enabled.
Refer to the contribution guidelines for information on contributing to this module.
Please see our security disclosure process.