2022-03-04 22:04:07 +01:00
|
|
|
resource "random_pet" "cluster" {
|
2022-03-05 00:19:16 +01:00
|
|
|
length = 1
|
2022-03-05 05:33:29 +01:00
|
|
|
prefix = var.cluster_prefix
|
2022-03-04 22:04:07 +01:00
|
|
|
}
|
|
|
|
|
2021-11-30 23:09:34 +01:00
|
|
|
resource "random_password" "k3s_token" {
|
2021-07-30 10:12:37 +02:00
|
|
|
length = 48
|
|
|
|
special = false
|
|
|
|
}
|
|
|
|
|
2022-02-05 00:02:25 +01:00
|
|
|
resource "hcloud_ssh_key" "k3s" {
|
2022-03-05 05:33:29 +01:00
|
|
|
name = random_pet.cluster.id
|
2021-11-30 23:09:34 +01:00
|
|
|
public_key = local.ssh_public_key
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "hcloud_network" "k3s" {
|
2022-03-05 05:33:29 +01:00
|
|
|
name = random_pet.cluster.id
|
2022-03-09 02:07:24 +01:00
|
|
|
ip_range = local.network_ipv4_cidr
|
2022-03-05 06:04:08 +01:00
|
|
|
}
|
|
|
|
|
2022-02-25 19:16:38 +01:00
|
|
|
resource "hcloud_network_subnet" "subnet" {
|
2022-03-09 02:07:24 +01:00
|
|
|
count = length(local.network_ipv4_subnets)
|
2021-07-30 10:12:37 +02:00
|
|
|
network_id = hcloud_network.k3s.id
|
|
|
|
type = "cloud"
|
2022-01-29 20:21:30 +01:00
|
|
|
network_zone = var.network_region
|
2022-03-09 02:07:24 +01:00
|
|
|
ip_range = local.network_ipv4_subnets[count.index]
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
|
|
|
|
2021-09-01 00:37:11 +02:00
|
|
|
resource "hcloud_firewall" "k3s" {
|
2022-03-05 05:33:29 +01:00
|
|
|
name = random_pet.cluster.id
|
2021-09-01 00:37:11 +02:00
|
|
|
|
2022-02-27 23:15:46 +01:00
|
|
|
dynamic "rule" {
|
|
|
|
for_each = concat(local.base_firewall_rules, var.extra_firewall_rules)
|
|
|
|
content {
|
|
|
|
direction = rule.value.direction
|
|
|
|
protocol = rule.value.protocol
|
|
|
|
port = lookup(rule.value, "port", null)
|
2022-02-28 00:07:31 +01:00
|
|
|
destination_ips = lookup(rule.value, "destination_ips", [])
|
|
|
|
source_ips = lookup(rule.value, "source_ips", [])
|
2022-02-27 23:15:46 +01:00
|
|
|
}
|
2021-09-01 00:37:11 +02:00
|
|
|
}
|
2021-07-30 10:12:37 +02:00
|
|
|
}
|
|
|
|
|
2022-02-10 03:01:40 +01:00
|
|
|
resource "hcloud_placement_group" "k3s" {
|
2022-03-05 05:33:29 +01:00
|
|
|
name = random_pet.cluster.id
|
2022-01-29 21:15:23 +01:00
|
|
|
type = "spread"
|
|
|
|
labels = {
|
|
|
|
"provisioner" = "terraform",
|
|
|
|
"engine" = "k3s"
|
|
|
|
}
|
|
|
|
}
|
2022-02-14 00:24:08 +01:00
|
|
|
|
|
|
|
data "hcloud_load_balancer" "traefik" {
|
2022-03-03 13:29:21 +01:00
|
|
|
count = local.is_single_node_cluster ? 0 : 1
|
2022-03-05 05:33:29 +01:00
|
|
|
name = "${random_pet.cluster.id}-traefik"
|
2022-02-14 11:14:14 +01:00
|
|
|
|
2022-02-22 08:50:54 +01:00
|
|
|
depends_on = [null_resource.kustomization]
|
2022-02-14 00:24:08 +01:00
|
|
|
}
|
2022-02-24 01:44:56 +01:00
|
|
|
|
2022-02-25 00:21:28 +01:00
|
|
|
resource "null_resource" "destroy_traefik_loadbalancer" {
|
|
|
|
# this only gets triggered before total destruction of the cluster, but when the necessary elements to run the commands are still available
|
2022-02-24 01:44:56 +01:00
|
|
|
triggers = {
|
2022-02-25 00:21:28 +01:00
|
|
|
kustomization_id = null_resource.kustomization.id
|
2022-02-24 01:44:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
# Important when issuing terraform destroy, otherwise the LB will not let the network get deleted
|
|
|
|
provisioner "local-exec" {
|
2022-02-25 00:21:28 +01:00
|
|
|
when = destroy
|
|
|
|
command = <<-EOT
|
|
|
|
kubectl -n kube-system delete service traefik --kubeconfig ${path.module}/kubeconfig.yaml
|
2022-02-24 01:44:56 +01:00
|
|
|
EOT
|
|
|
|
on_failure = continue
|
|
|
|
}
|
2022-02-25 00:21:28 +01:00
|
|
|
|
|
|
|
depends_on = [
|
|
|
|
local_file.kubeconfig,
|
|
|
|
null_resource.control_planes[0],
|
2022-02-25 20:36:20 +01:00
|
|
|
hcloud_network_subnet.subnet,
|
2022-02-25 00:21:28 +01:00
|
|
|
hcloud_network.k3s,
|
|
|
|
hcloud_firewall.k3s,
|
|
|
|
hcloud_placement_group.k3s,
|
|
|
|
hcloud_ssh_key.k3s
|
|
|
|
]
|
2022-02-24 01:44:56 +01:00
|
|
|
}
|