mirror of
https://github.com/puppetmaster/typhoon.git
synced 2024-12-27 08:49:33 +01:00
b3c384fbc0
* Previously: Typhoon provisions clusters with kube-system components like CoreDNS, kube-proxy, and a chosen CNI provider (among flannel, Calico, or Cilium) pre-installed. This is convenient since clusters come with "batteries included". But it also means upgrading these components is generally done in lock-step, by upgrading to a new Typhoon / Kubernetes release * It can be valuable to manage these components with a separate plan/apply process or through automations and deploy systems. For example, this allows managing CoreDNS separately from the cluster's lifecycle. * These "components" will continue to be pre-installed by default, but a new `components` variable allows them to be disabled and managed as "addons", components you apply after cluster creation and manage on a rolling basis. For some of these, we may provide Terraform modules to aide in managing these components. ``` module "cluster" { # defaults components = { enable = true coredns = { enable = true } kube_proxy = { enable = true } # Only the CNI set in var.networking will be installed flannel = { enable = true } calico = { enable = true } cilium = { enable = true } } } ``` An earlier variable `install_container_networking = true/false` has been removed, since it can now be achieved with this more extensible and general components mechanism by setting the chosen networking provider enable field to false.
182 lines
4.7 KiB
HCL
182 lines
4.7 KiB
HCL
variable "cluster_name" {
|
|
type = string
|
|
description = "Unique cluster name (prepended to dns_zone)"
|
|
}
|
|
|
|
# Azure
|
|
|
|
variable "region" {
|
|
type = string
|
|
description = "Azure Region (e.g. centralus , see `az account list-locations --output table`)"
|
|
}
|
|
|
|
variable "dns_zone" {
|
|
type = string
|
|
description = "Azure DNS Zone (e.g. azure.example.com)"
|
|
}
|
|
|
|
variable "dns_zone_group" {
|
|
type = string
|
|
description = "Resource group where the Azure DNS Zone resides (e.g. global)"
|
|
}
|
|
|
|
# instances
|
|
|
|
variable "controller_count" {
|
|
type = number
|
|
description = "Number of controllers (i.e. masters)"
|
|
default = 1
|
|
}
|
|
|
|
variable "worker_count" {
|
|
type = number
|
|
description = "Number of workers"
|
|
default = 1
|
|
}
|
|
|
|
variable "controller_type" {
|
|
type = string
|
|
description = "Machine type for controllers (see `az vm list-skus --location centralus`)"
|
|
default = "Standard_B2s"
|
|
}
|
|
|
|
variable "worker_type" {
|
|
type = string
|
|
description = "Machine type for workers (see `az vm list-skus --location centralus`)"
|
|
default = "Standard_D2as_v5"
|
|
}
|
|
|
|
variable "os_image" {
|
|
type = string
|
|
description = "Channel for a Container Linux derivative (flatcar-stable, flatcar-beta, flatcar-alpha)"
|
|
default = "flatcar-stable"
|
|
|
|
validation {
|
|
condition = contains(["flatcar-stable", "flatcar-beta", "flatcar-alpha"], var.os_image)
|
|
error_message = "The os_image must be flatcar-stable, flatcar-beta, or flatcar-alpha."
|
|
}
|
|
}
|
|
|
|
variable "disk_size" {
|
|
type = number
|
|
description = "Size of the disk in GB"
|
|
default = 30
|
|
}
|
|
|
|
variable "worker_priority" {
|
|
type = string
|
|
description = "Set worker priority to Spot to use reduced cost surplus capacity, with the tradeoff that instances can be deallocated at any time."
|
|
default = "Regular"
|
|
}
|
|
|
|
variable "controller_snippets" {
|
|
type = list(string)
|
|
description = "Controller Container Linux Config snippets"
|
|
default = []
|
|
}
|
|
|
|
variable "worker_snippets" {
|
|
type = list(string)
|
|
description = "Worker Container Linux Config snippets"
|
|
default = []
|
|
}
|
|
|
|
# configuration
|
|
|
|
variable "ssh_authorized_key" {
|
|
type = string
|
|
description = "SSH public key for user 'core'"
|
|
}
|
|
|
|
variable "azure_authorized_key" {
|
|
type = string
|
|
description = "Optionally, pass a dummy RSA key to satisfy Azure validations (then use an ed25519 key set above)"
|
|
default = ""
|
|
}
|
|
|
|
variable "networking" {
|
|
type = string
|
|
description = "Choice of networking provider (flannel, calico, or cilium)"
|
|
default = "cilium"
|
|
}
|
|
|
|
variable "host_cidr" {
|
|
type = string
|
|
description = "CIDR IPv4 range to assign to instances"
|
|
default = "10.0.0.0/16"
|
|
}
|
|
|
|
variable "pod_cidr" {
|
|
type = string
|
|
description = "CIDR IPv4 range to assign Kubernetes pods"
|
|
default = "10.2.0.0/16"
|
|
}
|
|
|
|
variable "service_cidr" {
|
|
type = string
|
|
description = <<EOD
|
|
CIDR IPv4 range to assign Kubernetes services.
|
|
The 1st IP will be reserved for kube_apiserver, the 10th IP will be reserved for coredns.
|
|
EOD
|
|
default = "10.3.0.0/16"
|
|
}
|
|
|
|
variable "enable_reporting" {
|
|
type = bool
|
|
description = "Enable usage or analytics reporting to upstreams (Calico)"
|
|
default = false
|
|
}
|
|
|
|
variable "enable_aggregation" {
|
|
type = bool
|
|
description = "Enable the Kubernetes Aggregation Layer"
|
|
default = true
|
|
}
|
|
|
|
variable "worker_node_labels" {
|
|
type = list(string)
|
|
description = "List of initial worker node labels"
|
|
default = []
|
|
}
|
|
|
|
variable "arch" {
|
|
type = string
|
|
description = "Container architecture (amd64 or arm64)"
|
|
default = "amd64"
|
|
|
|
validation {
|
|
condition = var.arch == "amd64" || var.arch == "arm64"
|
|
error_message = "The arch must be amd64 or arm64."
|
|
}
|
|
}
|
|
|
|
variable "daemonset_tolerations" {
|
|
type = list(string)
|
|
description = "List of additional taint keys kube-system DaemonSets should tolerate (e.g. ['custom-role', 'gpu-role'])"
|
|
default = []
|
|
}
|
|
|
|
# unofficial, undocumented, unsupported
|
|
|
|
variable "cluster_domain_suffix" {
|
|
type = string
|
|
description = "Queries for domains with the suffix will be answered by coredns. Default is cluster.local (e.g. foo.default.svc.cluster.local) "
|
|
default = "cluster.local"
|
|
}
|
|
|
|
variable "components" {
|
|
description = "Configure pre-installed cluster components"
|
|
# Component configs are passed through to terraform-render-bootstrap,
|
|
# which handles type enforcement and defines defaults
|
|
# https://github.com/poseidon/terraform-render-bootstrap/blob/main/variables.tf#L95
|
|
type = object({
|
|
enable = optional(bool)
|
|
coredns = optional(map(any))
|
|
kube_proxy = optional(map(any))
|
|
flannel = optional(map(any))
|
|
calico = optional(map(any))
|
|
cilium = optional(map(any))
|
|
})
|
|
default = null
|
|
}
|