Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am rtrentin73 on github.
  • I am rtrentin73 (https://keybase.io/rtrentin73) on keybase.
  • I have a public key ASCGWz-_XUwuGzMcqfKPrTAGT9oahlFZpZqRcLH3l35xtgo

To claim this, I am signing this object:

resource "random_id" "instance_id_spoke3" {
byte_length = 8
}
resource "google_compute_instance" "instance-1-spoke3" {
name = "spoke3-vm-${random_id.instance_id_spoke3.hex}"
machine_type = "f1-micro"
zone = "${var.region}-b"
boot_disk {
module "mc_transit" {
source = "terraform-aviatrix-modules/mc-transit/aviatrix"
version = "v2.0.0"
cloud = var.cloud
cidr = var.vpcs["firenet"]
region = var.region
account = var.account
enable_transit_firenet = true
lan_cidr = var.vpcs["lan"]
}
terraform {
required_providers {
aviatrix = {
source = "AviatrixSystems/aviatrix"
version = "2.21.2"
}
google = {
source = "hashicorp/google"
version = "4.14.0"
}
module "mc-spoke" {
for_each = {
"spoke30" = "spoke30"
"spoke40" = "spoke40"
"ingress" = "ingress"
}
source = "terraform-aviatrix-modules/mc-spoke/aviatrix"
version = "1.1.2"
account = var.account
cloud = var.cloud
terraform {
required_providers {
aviatrix = {
source = "AviatrixSystems/aviatrix"
version = "2.21.2"
}
google = {
source = "hashicorp/google"
version = "4.14.0"
}
module "mc_transit" {
source = "terraform-aviatrix-modules/mc-transit/aviatrix"
version = "v2.0.0"
cloud = var.cloud
cidr = var.vpcs["firenet"]
region = var.region
account = var.account
enable_transit_firenet = true
lan_cidr = var.vpcs["lan"]
}
module "mc-spoke" {
for_each = {
"spoke10" = "spoke10"
"spoke20" = "spoke20"
"ingress" = "ingress"
}
source = "terraform-aviatrix-modules/mc-spoke/aviatrix"
version = "1.1.2"
account = var.account
cloud = var.cloud
resource "google_compute_instance" "instance-1" {
name = "ce-spoke10-instance"
machine_type = "g1-small"
zone = "${var.region}-b"
tags = ["ce-spoke10-instance"]
boot_disk {
initialize_params {
image = "centos-cloud/centos-stream-8"
crypto ikev2 proposal gcp-east1-gw-on-prem-csr-proposal
encryption aes-cbc-256 aes-cbc-192 aes-cbc-128
integrity sha256
group 16
!
crypto ikev2 policy gcp-east1-gw-on-prem-csr-policy
proposal gcp-east1-gw-on-prem-csr-proposal
!
crypto ikev2 keyring gcp-east1-gw-on-prem-csr-key-0
peer gcp-east1-gw-interface-0