terraform-hcloud-kube-hetzner/agents.tf

77 lines
2.0 KiB
Terraform
Raw Normal View History

2022-02-19 13:38:24 +01:00
module "agents" {
source = "./modules/host"
2022-02-06 08:40:51 +01:00
count = var.agents_num
name = "k3s-agent-${count.index}"
ssh_keys = [hcloud_ssh_key.k3s.id]
2022-02-19 13:38:24 +01:00
public_key = var.public_key
private_key = var.private_key
2022-02-06 08:40:51 +01:00
firewall_ids = [hcloud_firewall.k3s.id]
2022-02-10 03:01:40 +01:00
placement_group_id = hcloud_placement_group.k3s.id
2022-02-19 13:38:24 +01:00
location = var.location
network_id = hcloud_network.k3s.id
ip = cidrhost(hcloud_network_subnet.k3s.ip_range, 513 + count.index)
server_type = var.control_plane_server_type
2022-02-06 08:40:51 +01:00
labels = {
"provisioner" = "terraform",
2022-02-19 13:38:24 +01:00
"engine" = "k3s"
2022-02-06 08:40:51 +01:00
}
2022-02-19 13:38:24 +01:00
hcloud_token = var.hcloud_token
}
2022-02-06 08:40:51 +01:00
2022-02-19 13:38:24 +01:00
resource "null_resource" "agents" {
count = var.agents_num
2022-02-19 13:38:24 +01:00
triggers = {
agent_id = module.agents[count.index].id
2022-02-06 08:40:51 +01:00
}
2022-02-19 13:38:24 +01:00
connection {
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
host = module.agents[count.index].ipv4_address
2022-02-06 08:40:51 +01:00
}
# Generating k3s agent config file
2022-02-06 08:40:51 +01:00
provisioner "file" {
content = yamlencode({
2022-02-19 13:38:24 +01:00
node-name = module.agents[count.index].name
2022-02-16 04:24:20 +01:00
server = "https://${local.first_control_plane_network_ip}:6443"
token = random_password.k3s_token.result
kubelet-arg = "cloud-provider=external"
flannel-iface = "eth1"
2022-02-16 10:56:22 +01:00
node-ip = cidrhost(hcloud_network_subnet.k3s.ip_range, 513 + count.index)
2022-02-16 11:06:47 +01:00
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
2022-02-06 08:40:51 +01:00
})
2022-02-16 03:18:40 +01:00
destination = "/tmp/config.yaml"
2022-02-06 08:40:51 +01:00
}
2022-02-16 03:18:40 +01:00
# Install k3s agent
2022-02-06 08:40:51 +01:00
provisioner "remote-exec" {
2022-02-16 04:24:20 +01:00
inline = local.install_k3s_agent
2022-02-16 03:18:40 +01:00
}
# Upon reboot verify that k3s agent starts correctly
provisioner "remote-exec" {
inline = [
<<-EOT
timeout 120 bash <<EOF
until systemctl status k3s-agent > /dev/null; do
echo "Waiting for the k3s agent to start..."
2022-02-16 04:24:20 +01:00
sleep 2
2022-02-10 03:01:40 +01:00
done
2022-02-16 03:18:40 +01:00
EOF
2022-02-10 03:01:40 +01:00
EOT
2022-02-06 08:40:51 +01:00
]
}
depends_on = [
2022-02-19 13:38:24 +01:00
null_resource.first_control_plane,
2022-02-06 08:40:51 +01:00
hcloud_network_subnet.k3s
]
}