terraform-hcloud-kube-hetzner/control_planes.tf

93 lines
3.2 KiB
Terraform
Raw Normal View History

2022-02-19 13:38:24 +01:00
module "control_planes" {
source = "./modules/host"
2022-03-05 04:02:09 +01:00
count = var.control_plane_count
2022-03-09 05:19:06 +01:00
name = "${var.use_cluster_name_in_node_name ? "${var.cluster_name}-" : ""}control-plane"
2022-02-20 11:30:07 +01:00
ssh_keys = [hcloud_ssh_key.k3s.id]
public_key = var.public_key
private_key = var.private_key
additional_public_keys = var.additional_public_keys
firewall_ids = [hcloud_firewall.k3s.id]
placement_group_id = hcloud_placement_group.k3s.id
location = var.location
server_type = var.control_plane_server_type
2022-03-09 02:07:24 +01:00
ipv4_subnet_id = hcloud_network_subnet.subnet[1].id
2022-03-06 00:59:19 +01:00
# We leave some room so 100 eventual Hetzner LBs that can be created perfectly safely
2022-03-11 14:24:24 +01:00
# It leaves the subnet with 254 x 254 - 100 = 64416 IPs to use, so probably enough.
2022-03-09 02:07:24 +01:00
private_ipv4 = cidrhost(local.network_ipv4_subnets[1], count.index + 101)
2022-02-06 08:40:51 +01:00
labels = {
"provisioner" = "terraform",
2022-02-19 13:38:24 +01:00
"engine" = "k3s"
2022-02-06 08:40:51 +01:00
}
2022-02-25 19:16:38 +01:00
depends_on = [
hcloud_network_subnet.subnet
]
2022-02-19 13:38:24 +01:00
}
2022-02-06 08:40:51 +01:00
2022-02-19 13:38:24 +01:00
resource "null_resource" "control_planes" {
2022-02-26 12:04:45 +01:00
count = var.control_plane_count
2022-02-19 13:38:24 +01:00
triggers = {
control_plane_id = module.control_planes[count.index].id
2022-02-06 08:40:51 +01:00
}
2022-02-19 13:38:24 +01:00
connection {
user = "root"
private_key = local.ssh_private_key
agent_identity = local.ssh_identity
host = module.control_planes[count.index].ipv4_address
2022-02-06 08:40:51 +01:00
}
# Generating k3s server config file
provisioner "file" {
2022-04-02 22:45:41 +02:00
content = yamlencode(merge({
2022-02-19 13:38:24 +01:00
node-name = module.control_planes[count.index].name
server = "https://${element(module.control_planes.*.private_ipv4_address, count.index > 0 ? 0 : 1)}:6443"
2022-02-16 04:24:20 +01:00
token = random_password.k3s_token.result
disable-cloud-controller = true
2022-03-22 11:47:51 +01:00
disable = local.disable_extras
flannel-iface = "eth1"
kubelet-arg = "cloud-provider=external"
node-ip = module.control_planes[count.index].private_ipv4_address
advertise-address = module.control_planes[count.index].private_ipv4_address
2022-02-08 09:12:16 +01:00
node-taint = var.allow_scheduling_on_control_plane ? [] : ["node-role.kubernetes.io/master:NoSchedule"]
2022-02-16 11:06:47 +01:00
node-label = var.automatically_upgrade_k3s ? ["k3s_upgrade=true"] : []
disable-network-policy = var.cni_plugin == "calico" ? true : var.disable_network_policy
2022-04-02 22:45:41 +02:00
},
var.cni_plugin == "calico" ? {
flannel-backend = "none"
2022-04-10 19:35:02 +02:00
kube-controller-manager-arg = "flex-volume-plugin-dir=/var/lib/kubelet/volumeplugins"
2022-04-02 22:45:41 +02:00
} : {}))
2022-02-16 03:18:40 +01:00
destination = "/tmp/config.yaml"
}
# Install k3s server
provisioner "remote-exec" {
inline = local.install_k3s_server
}
2022-02-20 02:04:37 +01:00
# Start the k3s server and wait for it to have started correctly
2022-02-06 08:40:51 +01:00
provisioner "remote-exec" {
inline = [
2022-02-20 13:36:41 +01:00
"systemctl start k3s 2> /dev/null",
2022-02-10 03:01:40 +01:00
<<-EOT
2022-02-16 03:18:40 +01:00
timeout 120 bash <<EOF
until systemctl status k3s > /dev/null; do
2022-02-20 13:36:41 +01:00
systemctl start k3s 2> /dev/null
2022-02-16 03:18:40 +01:00
echo "Waiting for the k3s server to start..."
2022-02-16 04:24:20 +01:00
sleep 2
2022-02-10 03:01:40 +01:00
done
2022-02-16 03:18:40 +01:00
EOF
2022-02-10 03:01:40 +01:00
EOT
2022-02-06 08:40:51 +01:00
]
}
depends_on = [
2022-02-19 13:38:24 +01:00
null_resource.first_control_plane,
2022-02-25 19:16:38 +01:00
hcloud_network_subnet.subnet
2022-02-06 08:40:51 +01:00
]
}