Compare commits

...

29 Commits

Author SHA1 Message Date
Philippe Caseiro 4aba5c317d fix(vmware): adding network interface definiton for ovf imports 2023-11-29 11:15:50 +01:00
Philippe Caseiro 1ab2c571a6 Merge branch 'master' of https://forge.cadoles.com/CadolesKube/terracadoles 2023-11-03 10:58:22 +01:00
Philippe Caseiro 643c8e7547 feat(vmware): adding firmware choice support for vms
Now we have to tell witch boot firmware to use 'efi' of 'bios'
2023-11-03 10:58:16 +01:00
pcaseiro b565e85350 Mise à jour de 'README.md' 2023-10-20 15:23:08 +02:00
Philippe Caseiro 2b39ee3e29 fix(vmware): proper use of disks map 2023-10-19 14:59:41 +02:00
Philippe Caseiro a49d95b450 fix(vmware): removing unused variable in vm definitione 2023-10-19 14:40:51 +02:00
Philippe Caseiro 74d13e5f4c fix(vmware): adding missing variable file 2023-10-19 14:34:38 +02:00
Philippe Caseiro b9d7f4e414 feat(vmware): addin multiple disk support for vms 2023-10-19 14:31:39 +02:00
Philippe Caseiro b1de088d87 feat(vmware): adding vmware support 2023-07-05 16:06:56 +02:00
Philippe Caseiro d02e96d4f1 fix(nebula): remove obselete variable 2023-03-03 15:28:13 +01:00
Philippe Caseiro 58441c69b6 fix object type 2023-03-03 15:03:25 +01:00
Philippe Caseiro 814ef36bb7 fix conflict 2023-03-03 15:01:44 +01:00
Philippe Caseiro 9c077553d8 fix(nebula): force vms variable type to be safe 2023-03-03 14:59:50 +01:00
Philippe Caseiro 77eec91bf1 fix(nebula): actually use the data disks in the templates 2023-03-02 17:13:08 +01:00
Philippe Caseiro a8c3955121 fix(nebula): correct bad variable usage 2023-03-02 16:16:15 +01:00
Philippe Caseiro 0acf9bfc87 fix(nebula): properwq data disk image 2023-03-02 16:14:55 +01:00
Philippe Caseiro 18365fdf80 feat(nebula): adding multiple data disk support for Virtual Machines 2023-03-02 16:10:47 +01:00
Philippe Caseiro 75babdbff8 fix(nebula): fix unclear variable name 2023-03-02 10:26:50 +01:00
Philippe Caseiro 85bb5d597d fix(nebula): try to add mac and IP support 2023-03-02 10:12:45 +01:00
Philippe Caseiro d02ec11cb9 fix(nebula): correct sched_ds_requirements usage 2023-02-27 14:20:52 +01:00
Philippe Caseiro b214694cec fix(nebula): correct image usage in template 2023-02-27 14:16:49 +01:00
Philippe Caseiro e2e930045c Merge branch 'master' of https://forge.cadoles.com/CadolesKube/terracadoles 2023-02-27 14:14:10 +01:00
Philippe Caseiro f5412c3138 fix(nebula): improve resource templates 2023-02-27 14:13:58 +01:00
Philippe Caseiro 7043a580ca fix(nebula): add accurate name to VM templates 2023-02-24 10:40:18 +01:00
Philippe Caseiro 9dfd085877 fix(nebula): image driver is not wanted for now 2023-02-24 10:32:55 +01:00
Philippe Caseiro 985fd624ce feat(nebula): support system data store placement 2023-02-24 06:03:44 +01:00
Philippe Caseiro e785cf9df0 feat(nebula): removing support for ip in nic
This modules is made for matchbox/typhoon Kubernetes provisionning
so we need to use "Ethernet" networks and not IPs.
2023-02-07 14:40:58 +01:00
Philippe Caseiro 05711c4bbd feat(nebula): adding mac address definition for nics 2023-02-07 14:27:19 +01:00
Philippe Caseiro 5059720757 feat(module): adding Nebula module for OpenNebula virtual machine creation with a 'variable' 2023-02-02 14:43:16 +01:00
10 changed files with 353 additions and 2 deletions

View File

@ -1,3 +1,10 @@
# terracadoles
Cadoles Terraform modules
Cadoles Terraform modules
## Modules
* virtualMachine
* dns
* nebula
* vmware

163
modules/nebula/main.tf Normal file
View File

@ -0,0 +1,163 @@
variable "vms" {
type = map(object(
{
domain = string
cpu = number
vcpu = number
ram = number
system_image_persistent = bool
data_disks = list(object({
name = string
size = string
persistent = bool
}))
network_interfaces = list(object({
network_id = string
ip = string
mac = string
}))
sysdatastore = string
}
))
description = "Virtual Machines description"
}
variable "image_format" {
default = "qcow2"
}
variable "dev_prefix" {
default = "sd"
}
variable "permissions" {
default = "600"
}
variable "graphics" {
default = {
keymap = "fr"
listen = "0.0.0.0"
type = "VNC"
}
}
variable "one_image_ds" {
default = "101"
}
variable "one_sys_datastore" {
default = "100"
}
locals {
data_disks = flatten([
for vm_key, vm in var.vms : [
for disk in vm.data_disks : {
vm_key = "${vm_key}.${vm.domain}"
name = disk.name
size = disk.size
persist = disk.persistent
}
]
])
}
// system image
resource "opennebula_image" "system" {
for_each = var.vms
name = "system-${each.key}.${each.value.domain}"
description = "System disk for ${each.key}"
datastore_id = var.one_image_ds
path = "https://vulcain.cadoles.com/empty_20G"
persistent = each.value.system_image_persistent
format = var.image_format
dev_prefix = var.dev_prefix
permissions = var.permissions
}
// data image not needed now
resource "opennebula_image" "data" {
for_each = {
for ds in local.data_disks : "${ds.vm_key}.${ds.name}" => ds
}
name = "${each.value.vm_key}-data-${each.value.name}"
path = "https://vulcain.cadoles.com/empty_${each.value.size}"
datastore_id = var.one_image_ds
description = "Data disk of ${each.value.size} for ${each.value.vm_key}"
persistent = each.value.persist
format = var.image_format
dev_prefix = var.dev_prefix
permissions = var.permissions
}
resource "opennebula_template" "vm_template" {
for_each = var.vms
name = "${each.key}.${each.value.domain}"
cpu = each.value.cpu
vcpu = each.value.vcpu
memory = each.value.ram
graphics {
keymap = var.graphics.keymap
listen = var.graphics.listen
type = var.graphics.type
}
context = {
SET_HOSTNAME = "$NAME"
DNS_HOSTNAME = "YES"
NETWORK = "YES"
SSH_PUBLIC_KEY = "$USER[SSH_PUBLIC_KEY]"
USERNAME = "root"
}
disk {
image_id = opennebula_image.system[each.key].id
}
dynamic "disk" {
for_each = {
for ds in local.data_disks : "${ds.vm_key}.${ds.name}" => ds if "${each.key}.${each.value.domain}" == ds.vm_key
}
iterator = current_disk
content {
image_id = opennebula_image.data[current_disk.key].id
}
}
//sched_ds_requirements = ( each.value.sysdatastore != "" ? "ID=\"${each.value.sysdatastore}\"" : "ID=\"${var.one_sys_datastore}\"" )
sched_ds_requirements = ( each.value.sysdatastore != "" ? "ID=\"${each.value.sysdatastore}\"" : "" )
os {
arch = "x86_64"
boot = "disk0,nic0"
}
dynamic "nic" {
for_each = each.value.network_interfaces
content {
network_id = nic.value.network_id
model = "virtio"
mac = ( nic.value.mac != "" ? nic.value.mac : "" )
ip = ( nic.value.ip != "" ? nic.value.ip : "" )
}
}
permissions = var.permissions
depends_on = [ opennebula_image.system ]
/* Not needed now
depends_on = [ opennebula_image.system,
opennebula_image.data ]
*/
}
resource "opennebula_virtual_machine" "vm" {
for_each = var.vms
name = "${each.key}.${each.value.domain}"
template_id = opennebula_template.vm_template[each.key].id
depends_on = [ opennebula_template.vm_template ]
}

11
modules/nebula/output.tf Normal file
View File

@ -0,0 +1,11 @@
output "shortnames" {
value = keys(var.vms)
}
output "first_macs" {
value = opennebula_virtual_machine.vm //FIXME .template_nic[0].computed_mac
}
output "virtual_machines" {
value = opennebula_virtual_machine.vm //template_nic[0].computed_mac)
}

View File

@ -0,0 +1,9 @@
terraform {
required_providers {
opennebula = {
source = "OpenNebula/opennebula"
version = "~> 1.0"
}
}
}

View File

@ -3,4 +3,5 @@ locals {
system_image_name = "system.${local.fqdn}"
system_image_source = var.system_image_source
data_image_name = "data.${local.fqdn}"
group = "${var.group}"
}

View File

@ -1,4 +1,3 @@
resource "opennebula_group" "main" {
name = var.group
}

91
modules/vmware/main.tf Normal file
View File

@ -0,0 +1,91 @@
data "vsphere_datacenter" "datacenter" {
name = var.cluster.datacenter_name
}
data "vsphere_datastore" "datastore" {
name = var.cluster.datastore_name
datacenter_id = data.vsphere_datacenter.datacenter.id
}
data "vsphere_resource_pool" "pool" {
name = var.cluster.resource_pool_name
datacenter_id = data.vsphere_datacenter.datacenter.id
}
data "vsphere_host" "host" {
name = "10.253.10.50"
datacenter_id = data.vsphere_datacenter.datacenter.id
}
data "vsphere_network" "network" {
for_each = var.cluster.vnets
name = each.value.name
datacenter_id = data.vsphere_datacenter.datacenter.id
}
resource "vsphere_virtual_machine" "vm" {
for_each = var.vms
name = "${each.key}.${each.value.domain}"
resource_pool_id = data.vsphere_resource_pool.pool.id
datastore_id = data.vsphere_datastore.datastore.id
folder = each.value.folder
num_cpus = each.value.cpu
memory = each.value.ram
guest_id = each.value.guest_id
firmware = each.value.firmware
dynamic "network_interface" {
for_each = each.value.network_interfaces
//for_each = { for idx, value in each.value.network_interfaces : idx => value }
//for_each = { for idx, vnet in data.vsphere_network.network : idx => vnet }
content {
network_id = data.vsphere_network.network[network_interface.value.id].id
use_static_mac = true
mac_address = network_interface.value.mac
}
}
dynamic "disk" {
for_each = each.value.disks
content {
label = disk.key
size = disk.value.size
thin_provisioned = disk.value.thin_provisioned
unit_number = disk.value.unit_number
}
}
}
resource "vsphere_virtual_machine" "ova" {
for_each = var.ovfs
name = "${each.key}.${each.value.domain}"
resource_pool_id = data.vsphere_resource_pool.pool.id
datastore_id = data.vsphere_datastore.datastore.id
host_system_id = data.vsphere_host.host.id
folder = var.cluster.folder
wait_for_guest_net_timeout = 0
wait_for_guest_ip_timeout = 0
dynamic "network_interface" {
for_each = each.value.network_map
content {
network_id = data.vsphere_network.network[network_interface.value].id
}
}
ovf_deploy {
allow_unverified_ssl_cert = each.value.allow_unverified_ssl_cert
remote_ovf_url = each.value.remote_ovf_url
disk_provisioning = each.value.disk_provisioning
ip_protocol = each.value.ip_protocol
ip_allocation_policy = each.value.ip_allocation_policy
ovf_network_map = {
"Network 1" = data.vsphere_network.network[each.value.network_map[0]].id
}
}
vapp {
properties = each.value.vapp_properties
}
}

7
modules/vmware/output.tf Normal file
View File

@ -0,0 +1,7 @@
output "shortnames" {
value = keys(var.vms)
}
//output "virtual_machines" {
// value = vsphere.virtual_machine.vm //template_nic[0].computed_mac)
//}

View File

@ -0,0 +1,55 @@
variable "vms" {
type = map(object(
{
domain = string
cpu = number
ram = number
guest_id = string
firmware = string
disks = map(object({
size = string
thin_provisioned = bool
unit_number = number
}))
network_interfaces = list(object(
{
id = string
mac = string
}
))
folder = string
}
))
description = "Virtual Machines description"
}
variable "cluster" {
type = object({
datacenter_name = string
datastore_name = string
resource_pool_name = string
folder = string
vnets = map(object({
name = string
}))
}
)
description = "vSphere cluster definition"
}
variable "ovfs" {
type = map(object(
{
domain = string
allow_unverified_ssl_cert = bool
remote_ovf_url = string
disk_provisioning = string
ip_protocol = string
ip_allocation_policy = string
network_map = list(string)
vapp_properties = object({})
}
))
description = "Virtual Machines description"
default = {}
}

View File

@ -0,0 +1,8 @@
terraform {
required_providers {
vsphere = {
source = "hashicorp/vsphere"
version = "~> 2.5.1"
}
}
}