2021-11-30 23:09:34 +01:00
|
|
|
resource "random_password" "k3s_token" {
|
2021-07-30 10:12:37 +02:00
|
|
|
length = 48
|
|
|
|
special = false
|
|
|
|
}
|
|
|
|
|
2022-02-05 00:02:25 +01:00
|
|
|
resource "hcloud_ssh_key" "k3s" {
|
|
|
|
name = "k3s"
|
2021-11-30 23:09:34 +01:00
|
|
|
public_key = local.ssh_public_key
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "hcloud_network" "k3s" {
|
2022-02-05 00:02:25 +01:00
|
|
|
name = "k3s"
|
2021-07-30 10:12:37 +02:00
|
|
|
ip_range = "10.0.0.0/8"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "hcloud_network_subnet" "k3s" {
|
|
|
|
network_id = hcloud_network.k3s.id
|
|
|
|
type = "cloud"
|
2022-01-29 20:21:30 +01:00
|
|
|
network_zone = var.network_region
|
2021-07-30 10:12:37 +02:00
|
|
|
ip_range = "10.0.0.0/16"
|
|
|
|
}
|
|
|
|
|
2021-09-01 00:37:11 +02:00
|
|
|
resource "hcloud_firewall" "k3s" {
|
2022-02-05 00:02:25 +01:00
|
|
|
name = "k3s"
|
2021-09-01 00:37:11 +02:00
|
|
|
|
2021-12-10 00:48:45 +01:00
|
|
|
# Allowing internal cluster traffic and Hetzner metadata service and cloud API IPs
|
2021-09-01 00:37:11 +02:00
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "any"
|
|
|
|
source_ips = [
|
|
|
|
"127.0.0.1/32",
|
|
|
|
"10.0.0.0/8",
|
|
|
|
"169.254.169.254/32",
|
|
|
|
"213.239.246.1/32"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "udp"
|
|
|
|
port = "any"
|
|
|
|
source_ips = [
|
|
|
|
"127.0.0.1/32",
|
|
|
|
"10.0.0.0/8",
|
|
|
|
"169.254.169.254/32",
|
|
|
|
"213.239.246.1/32"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "icmp"
|
|
|
|
source_ips = [
|
|
|
|
"127.0.0.1/32",
|
|
|
|
"10.0.0.0/8",
|
|
|
|
"169.254.169.254/32",
|
|
|
|
"213.239.246.1/32"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# Allow all traffic to the kube api server
|
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "6443"
|
|
|
|
source_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# Allow all traffic to the ssh port
|
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "22"
|
|
|
|
source_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
2021-07-30 10:12:37 +02:00
|
|
|
|
2021-11-30 23:09:34 +01:00
|
|
|
# Allow ping on ipv4
|
|
|
|
rule {
|
|
|
|
direction = "in"
|
|
|
|
protocol = "icmp"
|
|
|
|
source_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
2022-01-05 15:04:22 +01:00
|
|
|
|
|
|
|
# Allow basic out traffic
|
|
|
|
# ICMP to ping outside services
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "icmp"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# DNS
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "53"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "udp"
|
|
|
|
port = "53"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
# HTTP(s)
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "80"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "tcp"
|
|
|
|
port = "443"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
#NTP
|
|
|
|
rule {
|
|
|
|
direction = "out"
|
|
|
|
protocol = "udp"
|
|
|
|
port = "123"
|
|
|
|
destination_ips = [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
|
|
|
|
2022-02-10 03:01:40 +01:00
|
|
|
resource "hcloud_placement_group" "k3s" {
|
|
|
|
name = "k3s"
|
2022-01-29 21:15:23 +01:00
|
|
|
type = "spread"
|
|
|
|
labels = {
|
|
|
|
"provisioner" = "terraform",
|
|
|
|
"engine" = "k3s"
|
|
|
|
}
|
|
|
|
}
|
2022-02-14 00:24:08 +01:00
|
|
|
|
|
|
|
data "hcloud_load_balancer" "traefik" {
|
|
|
|
name = "traefik"
|
2022-02-14 11:14:14 +01:00
|
|
|
|
2022-02-21 16:18:11 +01:00
|
|
|
depends_on = [null_resource.cluster_provisioning]
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
resource "null_resource" "cluster_provisioning" {
|
|
|
|
|
|
|
|
triggers = {
|
|
|
|
agent_ids = "${join(",", module.agents.*.id)}"
|
|
|
|
control_plane_ids = "${join(",", concat([module.first_control_plane.id], module.control_planes.*.id))}"
|
|
|
|
}
|
|
|
|
|
2022-02-21 17:54:39 +01:00
|
|
|
depends_on = [null_resource.first_control_plane, null_resource.control_planes, null_resource.agents]
|
2022-02-21 16:18:11 +01:00
|
|
|
|
|
|
|
provisioner "remote-exec" {
|
|
|
|
connection {
|
|
|
|
user = "root"
|
|
|
|
private_key = local.ssh_private_key
|
|
|
|
agent_identity = local.ssh_identity
|
|
|
|
host = module.first_control_plane.ipv4_address
|
|
|
|
}
|
|
|
|
|
|
|
|
inline = [
|
|
|
|
<<-EOT
|
|
|
|
timeout 120 bash <<EOF
|
|
|
|
until [ -n "\$(kubectl get -n kube-system service/traefik --output=jsonpath='{.status.loadBalancer.ingress[0].ip}')" ]; do
|
|
|
|
echo "Waiting for load-balancer to get an IP..."
|
|
|
|
done
|
|
|
|
EOF
|
|
|
|
EOT
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
provisioner "local-exec" {
|
2022-02-21 17:54:39 +01:00
|
|
|
when = destroy
|
2022-02-21 16:18:11 +01:00
|
|
|
command = "hcloud load-balancer delete traefik"
|
|
|
|
}
|
2022-02-14 00:24:08 +01:00
|
|
|
}
|