From patchwork Fri Nov 8 20:12:43 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Chuck Lever X-Patchwork-Id: 13868939 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C17561A9B42 for ; Fri, 8 Nov 2024 20:12:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1731096768; cv=none; b=ZfjJw8aJ/BjIBfokeEqS8+ULpCbCnFcL/dy4KYyG+W+ymTWO+P7Bc96xMLesmWt/wGh4pAS4wbqH+LrTEdntuCwLb/yVSw+yORFrGG9QY3u2rKjRJ95wGnyNfUtfZQvoX2Vy0g9K9wtKFiYqnmJUoaLWv0AxgYAAmS3jHYscCbw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1731096768; c=relaxed/simple; bh=n4xMG6uuNEMeBuPWq4q90HnatykbzzUhVTp3atDexQ8=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=IuPSSieFBt5dfyoDY0Ku/E27TUIMOU+71rbuoqgP8XLmGtzn52ZnXPmmfS8bpS8fFucK4lIqrvTcL4HnLPLK8Zn5Q2M9QxQgIUTtqEuDAxc0DcbI3emupRl4mamgMuwtlxUSYVbjBL+L2izJ1CGtQbmTDEx6pPJPwf2ITfxQAbM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=kN56ZId4; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="kN56ZId4" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0580AC4CECD; Fri, 8 Nov 2024 20:12:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1731096768; bh=n4xMG6uuNEMeBuPWq4q90HnatykbzzUhVTp3atDexQ8=; h=From:To:Cc:Subject:Date:From; b=kN56ZId4bkOy9lrTtf3L0/g20had/1X3kyQqninRg5RoaiVEPzYaHDPvBFd5/FazT ZbqNJGtcK/bd8bzIhrIOqaXO7jK6me5F7f0xO3I30c99ajIQAVFUYRUQAeYgTsdu/w pRH7hoJwZ6J+PYftV/Cq2/3NT2bi+ABIKL0cFooRyRf9CoNGISvHDpJYhyRZj9aKVk CV7x3q0bhIkCP7Ozjw8/7AmqqzlpWiyZQPa1cnNXoi7bRT9Rtyoma2E+ibNUJtJ/7i 4xeorb35+mZgiWGfQIAIG0QIwI+VEc5S4Z9dkvrs/4DuoX1ihG/1D1bcdrlhBH+53i 4DkOZKJtZ4q1A== From: cel@kernel.org To: Cc: Chuck Lever Subject: [RFC PATCH 0/2] Provisioning the AWS private network Date: Fri, 8 Nov 2024 15:12:43 -0500 Message-ID: <20241108201245.561269-1-cel@kernel.org> X-Mailer: git-send-email 2.47.0 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Chuck Lever Here are a couple of improvements to make terraform provision a security group and DNS for handling NFS traffic between the test nodes. The DNS set-up here is what I'd like to see for libvirt as well, rather than poking IP addresses into the target node's /etc/hosts files. But that's for another day. Chuck Lever (2): aws: Permit inter-node network traffic aws: Add each test instance to the local DNS service terraform/aws/main.tf | 51 ++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 50 insertions(+), 1 deletion(-) Tested-by: Luis Chamberlain