2016-06-07 19:45:25 +00:00
## Kubernetes on AWS with Terraform
**Overview:**
2017-03-01 17:25:58 +00:00
This project will create:
* VPC with Public and Private Subnets in # Availability Zones
* Bastion Hosts and NAT Gateways in the Public Subnet
* A dynamic number of masters, etcd, and worker nodes in the Private Subnet
* even distributed over the # of Availability Zones
* AWS ELB in the Public Subnet for accessing the Kubernetes API from the internet
2016-06-07 19:45:25 +00:00
2017-03-01 17:25:58 +00:00
**Requirements**
- Terraform 0.8.7 or newer
2016-06-07 19:45:25 +00:00
**How to Use:**
2017-04-12 13:11:39 +00:00
- Export the variables for your AWS credentials or edit `credentials.tfvars` :
2016-06-07 19:45:25 +00:00
```
2017-04-12 13:11:39 +00:00
export AWS_ACCESS_KEY_ID="www"
export AWS_SECRET_ACCESS_KEY ="xxx"
export AWS_SSH_KEY_NAME="yyy"
export AWS_DEFAULT_REGION="zzz"
2016-06-07 19:45:25 +00:00
```
2017-04-12 13:11:39 +00:00
- Rename `contrib/terraform/aws/terraform.tfvars.example` to `terraform.tfvars`
2016-06-07 19:45:25 +00:00
2017-04-12 13:11:39 +00:00
- Update `contrib/terraform/aws/terraform.tfvars` with your data
2017-09-05 15:41:47 +00:00
- Allocate a new AWS Elastic IP. Use this for your `loadbalancer_apiserver_address` value (below)
- Create an AWS EC2 SSH Key
2017-04-12 13:11:39 +00:00
- Run with `terraform apply --var-file="credentials.tfvars"` or `terraform apply` depending if you exported your AWS credentials
2017-09-05 15:41:47 +00:00
Example:
```commandline
terraform apply -var-file=credentials.tfvars -var 'loadbalancer_apiserver_address=34.212.228.77'
```
2017-04-12 13:11:39 +00:00
- Terraform automatically creates an Ansible Inventory file called `hosts` with the created infrastructure in the directory `inventory`
2017-03-01 17:25:58 +00:00
2017-10-27 11:18:39 +00:00
- Ansible will automatically generate an ssh config file for your bastion hosts. To connect to hosts with ssh using bastion host use generated ssh-bastion.conf.
Ansible automatically detects bastion and changes ssh_args
2017-09-07 20:26:52 +00:00
```commandline
2017-10-27 11:18:39 +00:00
ssh -F ./ssh-bastion.conf user@$ip
2017-09-07 20:26:52 +00:00
```
2017-06-16 17:25:46 +00:00
- Once the infrastructure is created, you can run the kubespray playbooks and supply inventory/hosts with the `-i` flag.
2016-06-07 19:45:25 +00:00
2017-09-05 15:41:47 +00:00
Example (this one assumes you are using CoreOS)
```commandline
ansible-playbook -i ./inventory/hosts ./cluster.yml -e ansible_ssh_user=core -e bootstrap_os=coreos -b --become-user=root --flush-cache
```
2017-04-12 13:11:39 +00:00
**Troubleshooting**
***Remaining AWS IAM Instance Profile***:
If the cluster was destroyed without using Terraform it is possible that
the AWS IAM Instance Profiles still remain. To delete them you can use
the `AWS CLI` with the following command:
```
aws iam delete-instance-profile --region < region_name > --instance-profile-name < profile_name >
```
***Ansible Inventory doesnt get created:***
It could happen that Terraform doesnt create an Ansible Inventory file automatically. If this is the case copy the output after `inventory=` and create a file named `hosts` in the directory `inventory` and paste the inventory into the file.
2017-03-01 17:25:58 +00:00
**Architecture**
2016-06-07 19:45:25 +00:00
2017-03-01 17:25:58 +00:00
Pictured is an AWS Infrastructure created with this Terraform project distributed over two Availability Zones.
2016-06-07 19:45:25 +00:00
2017-06-16 17:25:46 +00:00
![AWS Infrastructure with Terraform ](docs/aws_kubespray.png )