{Terraform} RDS/Alibaba

 

https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/db_instance


※1 RDS作成時に下記エラー発生
WaitForDBParameter Timeout In 1000 Seconds. Got: 0.100000 Expected: 0.1 !!!

小数のparametersに対応していないためと思われる。下記修正でエラー解消
    param_value = "0.1"

    value  = "1"


※2 RDS作成時に下記エラー発生
Message: code: 404, Specified connection string already exists in the Aliyun RDS. 

デフォルトポートを指定していたためと思われたので、コメントアウト  → エラー解消
#  port                       = 3306


※3 ECS作成時に下記エラー発生
Message: code: 403, Elastic quota record not found (ecs.t5-lc2m1.nano) .

ゾーンによって選択できるECSインスタンスタイプの品ぞろえが異なる。ゾーンを1cから1aへ変更  → エラー解消

 

 

 


cat <<-'EOF' > variables.tf

locals {
  availability_zone = "ap-northeast-1a"
}

 

EOF

 

cat <<-'EOF' > main.tf

terraform {
  required_version = ">= 1.0.0, < 2.0.0"
  required_providers {
    alicloud = {
      source  = "aliyun/alicloud"
      version = "= 1.217.0"
    }
  }
}

provider "alicloud" {
  region  = "ap-northeast-1"
}


resource "alicloud_vpc" "vpc01" {
  vpc_name          = "vpc01"
  description       = "vpc01"
  cidr_block        = "10.2.0.0/16"
}

 

resource "alicloud_vswitch" "sw01" {
  vswitch_name      = "sw01"
  description       = "sw01"
  vpc_id            = alicloud_vpc.vpc01.id
  cidr_block        = "10.2.1.0/24"
  zone_id           = local.availability_zone
}

resource "alicloud_security_group" "sg01" {
  name                = "sg01"
  description         = "sg01"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}


resource "alicloud_security_group_rule" "sg0101" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "3306/3306"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "10.2.1.0/24"
  description       = "sg0101"
}

 

resource "alicloud_db_instance" "rds01" {

  engine                     = "MySQL"
  engine_version             = "8.0"
  instance_type              = "mysql.n2e.small.1"
  instance_storage           = 20
  db_instance_storage_type   = "cloud_essd"
  db_time_zone               = "+9:00"
  instance_name              = "rds01"
  instance_charge_type       = "Postpaid"
  vswitch_id                 = alicloud_vswitch.sw01.id
  security_ips               = ["10.2.1.0/24"]
  db_is_ignore_case          = true
  security_group_ids         = [alicloud_security_group.sg01.id]
  auto_upgrade_minor_version = "Manual"
  storage_auto_scale         = "Disable"
  deletion_protection        = "false"
  category                   = "Basic"
  parameters {
    name    = "max_allowed_packet"
    value  = "123456512"
  }
  parameters {
    name    = "long_query_time"
    value  = "1"
  }  

}


resource "alicloud_rds_account" "account01" {
  db_instance_id   = alicloud_db_instance.rds01.id
  account_name     = "account01"
  account_password = "password"
  account_type     = "Super"
}

resource "alicloud_db_database" "db01" {
  instance_id   = alicloud_db_instance.rds01.id
  name          = "db01"
  character_set = "utf8mb4"
}


### 疎通確認用ECS

resource "alicloud_security_group" "sg02" {
  name                = "sg02"
  description         = "sg02"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}

resource "alicloud_security_group_rule" "sg0201" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "22/22"
  security_group_id = alicloud_security_group.sg02.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "0.0.0.0/0"
  description       = "sg0201"
}


resource "alicloud_vpc_ipv4_gateway" "gw01" {
  ipv4_gateway_name        = "gw01"
  ipv4_gateway_description = "gw01"
  vpc_id                   = alicloud_vpc.vpc01.id
  enabled                  = true
}

 

 

# ルートテーブルへvSwitchの関連付け
resource "alicloud_route_table_attachment" "sw01_rt01" {
  vswitch_id     = alicloud_vswitch.sw01.id
  route_table_id = alicloud_vpc.vpc01.route_table_id
}


# ルートテーブルへカスタムルート追加
resource "alicloud_route_entry" "rt0101" {
  name                  = "rt0101"
  route_table_id        = alicloud_vpc.vpc01.route_table_id
  destination_cidrblock = "0.0.0.0/0"
  nexthop_type          = "Ipv4Gateway"
  nexthop_id            = alicloud_vpc_ipv4_gateway.gw01.id
}


resource "alicloud_instance" "ecs01" {

  image_id                   = "aliyun_2_1903_x64_20G_alibase_20231221.vhd"
  instance_type              = "ecs.t5-lc2m1.nano"
  security_groups            = [alicloud_security_group.sg02.id]
  instance_name              = "ecs01"
  system_disk_category       = "cloud_ssd"
  system_disk_name           = "ecs01"
  system_disk_size           = 20
  description                = "ecs01"
  internet_charge_type       = "PayByBandwidth"
  internet_max_bandwidth_out = 0
  host_name                  = "ecs01"
  vswitch_id                 = alicloud_vswitch.sw01.id
  instance_charge_type       = "PostPaid"
  key_name                   = "alibabakey01"
  deletion_protection        = false
  credit_specification       = "Standard"

}


resource "alicloud_eip_address" "eip01" {
  address_name              = "eip01"
  bandwidth                 = 1
  deletion_protection       = false
  description               = "eip01"
  internet_charge_type      = "PayByTraffic"
  isp                       = "BGP"
  payment_type              = "PayAsYouGo"
  netmode                   = "public"
}

# インスタンスとEIPの関連付け
resource "alicloud_eip_association" "ecs01_eip01" {
  instance_id              = alicloud_instance.ecs01.id
  allocation_id            = alicloud_eip_address.eip01.id
}


EOF

 

cat <<-'EOF' > outputs.tf


output "vpc01_id" {
  value = alicloud_vpc.vpc01.id
  description = "vpc01.id"
}


output "sw01_id" {
  value = alicloud_vswitch.sw01.id
  description = "sw01.id"
}

output "sg01_id" {
  value = alicloud_security_group.sg01.id
  description = "sg01.id"
}


output "rds01_id" {
  value = alicloud_db_instance.rds01.id
  description = "rds01.id"
}

 

EOF

 


terraform init
terraform fmt
terraform -version

 

terraform plan

 

terraform apply -auto-approve

terraform destroy -auto-approve