Files
loc_az_hci/.env.example
defiQUG c39465c2bd
Some checks failed
Test / test (push) Has been cancelled
Initial commit: loc_az_hci (smom-dbis-138 excluded via .gitignore)
Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-08 09:04:46 -08:00

37 lines
1.3 KiB
Plaintext

# Azure Configuration
AZURE_SUBSCRIPTION_ID=your-subscription-id
AZURE_TENANT_ID=your-tenant-id
AZURE_CLIENT_ID=your-client-id # Optional, for service principal
AZURE_CLIENT_SECRET=your-client-secret # Optional, for service principal
AZURE_RESOURCE_GROUP=HC-Stack
AZURE_LOCATION=eastus
# Entra ID (Azure AD) - same as Azure credentials above
# Or use separate service principal if needed:
# ENTRA_CLIENT_ID=your-entra-client-id
# ENTRA_CLIENT_SECRET=your-entra-client-secret
# Proxmox Configuration
# Root password is shared across all PVE instances
# Username 'root@pam' is implied and should not be stored
PVE_ROOT_PASS=your-secure-password
# Proxmox - HPE ML110 Gen9
# Internal IP (use for local network access)
PROXMOX_ML110_URL=https://192.168.1.206:8006
# External IP (if accessing via public network/VPN)
# PROXMOX_ML110_URL=https://45.49.73.136:8006
# Proxmox - Dell R630
# Internal IP (use for local network access)
PROXMOX_R630_URL=https://192.168.1.49:8006
# External IP (if accessing via public network/VPN)
# PROXMOX_R630_URL=https://45.49.65.67:8006
# Note: For production, use RBAC accounts and API tokens instead of root
# See docs/security/proxmox-rbac.md for best practices
#
# Optional: API tokens (per-host if different, tied to RBAC accounts)
# PROXMOX_ML110_TOKEN_ID=your-token-id@pam!token-name
# PROXMOX_ML110_TOKEN_SECRET=your-token-secret