mirror of
https://github.com/puppetmaster/typhoon.git
synced 2024-12-25 17:39:33 +01:00
e79088baa0
* Allow kube-dns to respond to DNS queries with a custom suffix, instead of the default 'cluster.local' * Useful when multiple clusters exist on the same local network and wish to query services on one another
276 lines
7.1 KiB
HCL
276 lines
7.1 KiB
HCL
# Workers AutoScaling Group
|
|
resource "aws_autoscaling_group" "workers" {
|
|
name = "${var.cluster_name}-worker ${aws_launch_configuration.worker.name}"
|
|
load_balancers = ["${aws_elb.ingress.id}"]
|
|
|
|
# count
|
|
desired_capacity = "${var.worker_count}"
|
|
min_size = "${var.worker_count}"
|
|
max_size = "${var.worker_count + 2}"
|
|
default_cooldown = 30
|
|
health_check_grace_period = 30
|
|
|
|
# network
|
|
vpc_zone_identifier = ["${aws_subnet.public.*.id}"]
|
|
|
|
# template
|
|
launch_configuration = "${aws_launch_configuration.worker.name}"
|
|
|
|
lifecycle {
|
|
# override the default destroy and replace update behavior
|
|
create_before_destroy = true
|
|
ignore_changes = ["image_id"]
|
|
}
|
|
|
|
tags = [{
|
|
key = "Name"
|
|
value = "${var.cluster_name}-worker"
|
|
propagate_at_launch = true
|
|
}]
|
|
}
|
|
|
|
# Worker template
|
|
resource "aws_launch_configuration" "worker" {
|
|
image_id = "${data.aws_ami.coreos.image_id}"
|
|
instance_type = "${var.worker_type}"
|
|
|
|
user_data = "${data.ct_config.worker_ign.rendered}"
|
|
|
|
# storage
|
|
root_block_device {
|
|
volume_type = "standard"
|
|
volume_size = "${var.disk_size}"
|
|
}
|
|
|
|
# network
|
|
security_groups = ["${aws_security_group.worker.id}"]
|
|
|
|
lifecycle {
|
|
// Override the default destroy and replace update behavior
|
|
create_before_destroy = true
|
|
}
|
|
}
|
|
|
|
# Worker Container Linux Config
|
|
data "template_file" "worker_config" {
|
|
template = "${file("${path.module}/cl/worker.yaml.tmpl")}"
|
|
|
|
vars = {
|
|
k8s_dns_service_ip = "${cidrhost(var.service_cidr, 10)}"
|
|
k8s_etcd_service_ip = "${cidrhost(var.service_cidr, 15)}"
|
|
ssh_authorized_key = "${var.ssh_authorized_key}"
|
|
cluster_domain_suffix = "${var.cluster_domain_suffix}"
|
|
kubeconfig_ca_cert = "${module.bootkube.ca_cert}"
|
|
kubeconfig_kubelet_cert = "${module.bootkube.kubelet_cert}"
|
|
kubeconfig_kubelet_key = "${module.bootkube.kubelet_key}"
|
|
kubeconfig_server = "${module.bootkube.server}"
|
|
}
|
|
}
|
|
|
|
data "ct_config" "worker_ign" {
|
|
content = "${data.template_file.worker_config.rendered}"
|
|
pretty_print = false
|
|
}
|
|
|
|
# Security Group (instance firewall)
|
|
|
|
resource "aws_security_group" "worker" {
|
|
name = "${var.cluster_name}-worker"
|
|
description = "${var.cluster_name} worker security group"
|
|
|
|
vpc_id = "${aws_vpc.network.id}"
|
|
|
|
tags = "${map("Name", "${var.cluster_name}-worker")}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-icmp" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "icmp"
|
|
from_port = 0
|
|
to_port = 0
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-ssh" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 22
|
|
to_port = 22
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-http" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 80
|
|
to_port = 80
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-https" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 443
|
|
to_port = 443
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-flannel" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "udp"
|
|
from_port = 8472
|
|
to_port = 8472
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-flannel-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "udp"
|
|
from_port = 8472
|
|
to_port = 8472
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-node-exporter" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 9100
|
|
to_port = 9100
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-kubelet" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 10250
|
|
to_port = 10250
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-kubelet-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 10250
|
|
to_port = 10250
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-kubelet-read" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 10255
|
|
to_port = 10255
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-kubelet-read-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 10255
|
|
to_port = 10255
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "ingress-health-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 10254
|
|
to_port = 10254
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-bgp" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 179
|
|
to_port = 179
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-bgp-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = "tcp"
|
|
from_port = 179
|
|
to_port = 179
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-ipip" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = 4
|
|
from_port = 0
|
|
to_port = 0
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-ipip-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = 4
|
|
from_port = 0
|
|
to_port = 0
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-ipip-legacy" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = 94
|
|
from_port = 0
|
|
to_port = 0
|
|
source_security_group_id = "${aws_security_group.controller.id}"
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-ipip-legacy-self" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "ingress"
|
|
protocol = 94
|
|
from_port = 0
|
|
to_port = 0
|
|
self = true
|
|
}
|
|
|
|
resource "aws_security_group_rule" "worker-egress" {
|
|
security_group_id = "${aws_security_group.worker.id}"
|
|
|
|
type = "egress"
|
|
protocol = "-1"
|
|
from_port = 0
|
|
to_port = 0
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
ipv6_cidr_blocks = ["::/0"]
|
|
}
|