terraform-hcloud-kube-hetzner/master.tf

134 lines
4.5 KiB
Terraform
Raw Normal View History

2021-07-30 10:12:37 +02:00
resource "hcloud_server" "first_control_plane" {
2021-12-03 02:11:52 +01:00
name = "k3s-control-plane-0"
2021-07-30 10:12:37 +02:00
image = data.hcloud_image.linux.name
rescue = "linux64"
server_type = var.control_plane_server_type
location = var.location
2022-02-05 00:02:25 +01:00
ssh_keys = [hcloud_ssh_key.k3s.id]
firewall_ids = [hcloud_firewall.k3s.id]
placement_group_id = hcloud_placement_group.k3s_placement_group.id
2021-07-30 10:12:37 +02:00
labels = {
"provisioner" = "terraform",
2021-11-30 23:09:34 +01:00
"engine" = "k3s"
2021-07-30 10:12:37 +02:00
}
2021-11-30 23:09:34 +01:00
provisioner "file" {
2022-02-06 08:40:51 +01:00
content = templatefile("${path.module}/templates/config.ign.tpl", {
2021-12-03 02:11:52 +01:00
name = self.name
ssh_public_key = local.ssh_public_key
})
2022-02-06 08:40:51 +01:00
destination = "/root/config.ign"
connection {
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
host = self.ipv4_address
}
}
# Install MicroOS
provisioner "remote-exec" {
inline = local.MicroOS_install_commands
2021-07-30 10:12:37 +02:00
connection {
2022-01-25 14:04:12 +01:00
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
2022-01-25 14:04:12 +01:00
host = self.ipv4_address
2021-07-30 10:12:37 +02:00
}
}
2022-02-07 09:11:07 +01:00
# Issue a reboot command
provisioner "local-exec" {
command = "ssh ${local.ssh_args} root@${self.ipv4_address} '(sleep 2; reboot)&'; sleep 3"
2022-02-07 09:11:07 +01:00
}
2022-02-06 08:40:51 +01:00
# Wait for MicroOS to reboot and be ready
provisioner "local-exec" {
command = "ping ${self.ipv4_address} | grep --line-buffered 'bytes from' | head -1 && sleep 10 && until ssh ${local.ssh_args} -o ConnectTimeout=2 root@${self.ipv4_address} true; do sleep 1; done"
2022-02-06 08:40:51 +01:00
}
# Generating k3s master config file
2022-02-05 01:22:35 +01:00
provisioner "file" {
2022-02-06 08:40:51 +01:00
content = templatefile("${path.module}/templates/master_config.yaml.tpl", {
node_ip = local.first_control_plane_network_ip
token = random_password.k3s_token.result
node_name = self.name
allow_scheduling_on_control_plane = var.allow_scheduling_on_control_plane
2022-02-05 01:22:35 +01:00
})
2022-02-06 08:40:51 +01:00
destination = "/etc/rancher/k3s/config.yaml"
2022-02-05 01:22:35 +01:00
connection {
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
host = self.ipv4_address
}
}
2022-02-06 08:40:51 +01:00
# Run the first control plane
2021-07-30 10:12:37 +02:00
provisioner "remote-exec" {
2022-02-06 08:40:51 +01:00
inline = [
"set -ex",
# first we disable automatic reboot (after transactional updates), and configure the reboot method as kured
"rebootmgrctl set-strategy off && echo 'REBOOT_METHOD=kured' > /etc/transactional-update.conf",
# then we initiate the cluster
"systemctl --now enable k3s-server",
]
2021-07-30 10:12:37 +02:00
connection {
2022-01-25 14:04:12 +01:00
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
2022-01-25 14:04:12 +01:00
host = self.ipv4_address
2021-07-30 10:12:37 +02:00
}
}
2022-02-06 08:40:51 +01:00
# Get the Kubeconfig, and wait for the node to be available
2021-07-30 10:12:37 +02:00
provisioner "local-exec" {
2021-11-30 23:09:34 +01:00
command = <<-EOT
2022-02-06 08:40:51 +01:00
set -ex
sleep 30
scp ${local.ssh_args} root@${self.ipv4_address}:/etc/rancher/k3s/k3s.yaml ${path.module}/kubeconfig.yaml
2021-11-30 23:09:34 +01:00
sed -i -e 's/127.0.0.1/${self.ipv4_address}/g' ${path.module}/kubeconfig.yaml
sleep 10 && until kubectl get node ${self.name} --kubeconfig ${path.module}/kubeconfig.yaml; do sleep 5; done
2021-11-30 23:09:34 +01:00
EOT
2021-07-30 10:12:37 +02:00
}
2022-02-06 08:40:51 +01:00
# Install the Hetzner CCM and CSI
2021-07-30 10:12:37 +02:00
provisioner "local-exec" {
2021-11-30 23:09:34 +01:00
command = <<-EOT
2022-02-06 08:40:51 +01:00
set -ex
2021-12-05 10:50:51 +01:00
kubectl -n kube-system create secret generic hcloud --from-literal=token=${var.hcloud_token} --from-literal=network=${hcloud_network.k3s.name} --kubeconfig ${path.module}/kubeconfig.yaml
2022-01-13 13:32:17 +01:00
kubectl apply -k ${dirname(local_file.hetzner_ccm_config.filename)} --kubeconfig ${path.module}/kubeconfig.yaml
2021-12-05 10:50:51 +01:00
kubectl -n kube-system create secret generic hcloud-csi --from-literal=token=${var.hcloud_token} --kubeconfig ${path.module}/kubeconfig.yaml
2022-01-13 13:32:17 +01:00
kubectl apply -k ${dirname(local_file.hetzner_csi_config.filename)} --kubeconfig ${path.module}/kubeconfig.yaml
2021-11-30 23:09:34 +01:00
EOT
2021-07-30 10:12:37 +02:00
}
# Install Kured
provisioner "local-exec" {
command = <<-EOT
set -ex
kubectl -n kube-system apply -k ${dirname(local_file.kured_config.filename)} --kubeconfig ${path.module}/kubeconfig.yaml
EOT
}
2022-01-05 15:04:22 +01:00
# Configure the Traefik ingress controller
provisioner "local-exec" {
command = "kubectl apply -f ${local_file.traefik_config.filename} --kubeconfig ${path.module}/kubeconfig.yaml"
}
2022-02-06 08:40:51 +01:00
2021-07-30 10:12:37 +02:00
network {
network_id = hcloud_network.k3s.id
ip = local.first_control_plane_network_ip
2021-07-30 10:12:37 +02:00
}
depends_on = [
hcloud_network_subnet.k3s,
hcloud_firewall.k3s
2021-07-30 10:12:37 +02:00
]
}