terraform-hcloud-kube-hetzner/main.tf

90 lines
2.4 KiB
Terraform
Raw Normal View History

2021-11-30 23:09:34 +01:00
resource "random_password" "k3s_token" {
2021-07-30 10:12:37 +02:00
length = 48
special = false
}
2022-02-05 00:02:25 +01:00
resource "hcloud_ssh_key" "k3s" {
2022-03-09 05:19:06 +01:00
name = var.cluster_name
2021-11-30 23:09:34 +01:00
public_key = local.ssh_public_key
2021-07-30 10:12:37 +02:00
}
resource "hcloud_network" "k3s" {
2022-03-09 05:19:06 +01:00
name = var.cluster_name
ip_range = var.network_ipv4_range
2021-07-30 10:12:37 +02:00
}
# This is the default subnet to be used by the load balancer.
resource "hcloud_network_subnet" "default" {
network_id = hcloud_network.k3s.id
type = "cloud"
network_zone = var.network_region
ip_range = "10.0.0.0/16"
}
2022-02-25 19:16:38 +01:00
resource "hcloud_network_subnet" "subnet" {
for_each = var.network_ipv4_subnets
2021-07-30 10:12:37 +02:00
network_id = hcloud_network.k3s.id
type = "cloud"
network_zone = var.network_region
2022-02-25 19:16:38 +01:00
ip_range = each.value
depends_on = [hcloud_network_subnet.default]
2021-07-30 10:12:37 +02:00
}
resource "hcloud_firewall" "k3s" {
2022-03-09 05:19:06 +01:00
name = var.cluster_name
dynamic "rule" {
for_each = concat(local.base_firewall_rules, var.extra_firewall_rules)
content {
direction = rule.value.direction
protocol = rule.value.protocol
port = lookup(rule.value, "port", null)
2022-02-28 00:07:31 +01:00
destination_ips = lookup(rule.value, "destination_ips", [])
source_ips = lookup(rule.value, "source_ips", [])
}
}
2021-07-30 10:12:37 +02:00
}
2022-02-10 03:01:40 +01:00
resource "hcloud_placement_group" "k3s" {
2022-03-09 05:19:06 +01:00
name = var.cluster_name
type = "spread"
labels = {
"provisioner" = "terraform",
"engine" = "k3s"
}
}
2022-02-14 00:24:08 +01:00
data "hcloud_load_balancer" "traefik" {
count = local.is_single_node_cluster ? 0 : var.traefik_enabled == false ? 0 : 1
2022-03-09 05:19:06 +01:00
name = "${var.cluster_name}-traefik"
depends_on = [null_resource.kustomization]
2022-02-14 00:24:08 +01:00
}
2022-02-24 01:44:56 +01:00
2022-02-25 00:21:28 +01:00
resource "null_resource" "destroy_traefik_loadbalancer" {
# this only gets triggered before total destruction of the cluster, but when the necessary elements to run the commands are still available
2022-02-24 01:44:56 +01:00
triggers = {
2022-02-25 00:21:28 +01:00
kustomization_id = null_resource.kustomization.id
2022-02-24 01:44:56 +01:00
}
# Important when issuing terraform destroy, otherwise the LB will not let the network get deleted
provisioner "local-exec" {
2022-02-25 00:21:28 +01:00
when = destroy
command = <<-EOT
kubectl -n kube-system delete service traefik --kubeconfig ${path.module}/kubeconfig.yaml
2022-02-24 01:44:56 +01:00
EOT
on_failure = continue
}
2022-02-25 00:21:28 +01:00
depends_on = [
local_file.kubeconfig,
null_resource.control_planes[0],
2022-02-25 20:36:20 +01:00
hcloud_network_subnet.subnet,
2022-02-25 00:21:28 +01:00
hcloud_network.k3s,
hcloud_firewall.k3s,
hcloud_placement_group.k3s,
hcloud_ssh_key.k3s
]
2022-02-24 01:44:56 +01:00
}