split provisioning for better logging

This commit is contained in:
phaer 2022-02-12 00:32:11 +01:00
parent 1daa14defc
commit ca64e97563

View File

@ -135,11 +135,17 @@ resource "hcloud_server" "first_control_plane" {
destination = "/tmp/post_install/traefik.yaml" destination = "/tmp/post_install/traefik.yaml"
} }
# Deploy our post-installation kustomization # Deploy secrets, logging is automatically disabled due to sensitive variables
provisioner "remote-exec" { provisioner "remote-exec" {
inline = [ inline = [
"kubectl -n kube-system create secret generic hcloud --from-literal=token=${var.hcloud_token} --from-literal=network=${hcloud_network.k3s.name}", "kubectl -n kube-system create secret generic hcloud --from-literal=token=${var.hcloud_token} --from-literal=network=${hcloud_network.k3s.name}",
"kubectl -n kube-system create secret generic hcloud-csi --from-literal=token=${var.hcloud_token}", "kubectl -n kube-system create secret generic hcloud-csi --from-literal=token=${var.hcloud_token}",
]
}
# Deploy our post-installation kustomization
provisioner "remote-exec" {
inline = [
"kubectl apply -k /tmp/post_install", "kubectl apply -k /tmp/post_install",
"rm -rf /tmp/post_install" "rm -rf /tmp/post_install"
] ]