added dynamic rule and var extra_firewall_rules
This commit is contained in:
parent
adca2a0e0b
commit
4fe79625b1
121
locals.tf
121
locals.tf
@ -17,6 +17,127 @@ locals {
|
||||
csi_version = var.hetzner_csi_version != null ? var.hetzner_csi_version : data.github_release.hetzner_csi.release_tag
|
||||
kured_version = data.github_release.kured.release_tag
|
||||
|
||||
base_firewall_rules = [
|
||||
# Allowing internal cluster traffic and Hetzner metadata service and cloud API IPs
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "udp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow all traffic to the kube api server
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "6443"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow all traffic to the ssh port
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "22"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow ping on ipv4
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow basic out traffic
|
||||
# ICMP to ping outside services
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "icmp"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# DNS
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# HTTP(s)
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "80"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "443"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
#NTP
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "123"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
||||
common_commands_install_k3s = [
|
||||
"set -ex",
|
||||
# prepare the k3s config directory
|
||||
|
125
main.tf
125
main.tf
@ -24,125 +24,16 @@ resource "hcloud_network_subnet" "subnet" {
|
||||
resource "hcloud_firewall" "k3s" {
|
||||
name = "k3s"
|
||||
|
||||
# Allowing internal cluster traffic and Hetzner metadata service and cloud API IPs
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
dynamic "rule" {
|
||||
for_each = concat(local.base_firewall_rules, var.extra_firewall_rules)
|
||||
content {
|
||||
direction = rule.value.direction
|
||||
protocol = rule.value.protocol
|
||||
port = lookup(rule.value, "port", null)
|
||||
destination_ips = lookup(rule.value, "destination_ips", null)
|
||||
source_ips = lookup(rule.value, "source_ips", null)
|
||||
}
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "udp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow all traffic to the kube api server
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "6443"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow all traffic to the ssh port
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "22"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow ping on ipv4
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow basic out traffic
|
||||
# ICMP to ping outside services
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "icmp"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# DNS
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# HTTP(s)
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "80"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "443"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
#NTP
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "123"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
resource "hcloud_placement_group" "k3s" {
|
||||
|
@ -50,3 +50,17 @@ agent_nodepools = {
|
||||
|
||||
# Allows you to specify either stable, latest, or testing (defaults to stable), see https://rancher.com/docs/k3s/latest/en/upgrades/basic/
|
||||
# initial_k3s_channel = "latest"
|
||||
|
||||
# Adding extra firewall rules, like opening a port
|
||||
# In this example with allow port TCP 5432 for a Postgres service we will open via a nodeport
|
||||
# More info on the format here https://registry.terraform.io/providers/hetznercloud/hcloud/latest/docs/resources/firewall
|
||||
extra_firewall_rules = [
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "5432"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
]
|
||||
|
@ -113,3 +113,9 @@ variable "automatically_upgrade_k3s" {
|
||||
default = true
|
||||
description = "Whether to automatically upgrade k3s based on the selected channel"
|
||||
}
|
||||
|
||||
variable "extra_firewall_rules" {
|
||||
type = list(any)
|
||||
default = []
|
||||
description = "Additional firewall rules to apply to the cluster"
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user