[terraform][openstack] allow disabling port_security at port level (#8455)
Use openstack_networking_port_v2 and openstack_networking_floatingip_associate_v2 to attach floating ips. This gives us more flexibility on disabling port security when binding instances directly on provider networks in private cloud scenario.
This commit is contained in:
parent
aed187e56c
commit
7759494c85
4 changed files with 128 additions and 51 deletions
|
@ -17,7 +17,7 @@ most modern installs of OpenStack that support the basic services.
|
||||||
- [ELASTX](https://elastx.se/)
|
- [ELASTX](https://elastx.se/)
|
||||||
- [EnterCloudSuite](https://www.entercloudsuite.com/)
|
- [EnterCloudSuite](https://www.entercloudsuite.com/)
|
||||||
- [FugaCloud](https://fuga.cloud/)
|
- [FugaCloud](https://fuga.cloud/)
|
||||||
- [Open Telekom Cloud](https://cloud.telekom.de/) : requires to set the variable `wait_for_floatingip = "true"` in your cluster.tfvars
|
- [Open Telekom Cloud](https://cloud.telekom.de/)
|
||||||
- [OVH](https://www.ovh.com/)
|
- [OVH](https://www.ovh.com/)
|
||||||
- [Rackspace](https://www.rackspace.com/)
|
- [Rackspace](https://www.rackspace.com/)
|
||||||
- [Ultimum](https://ultimum.io/)
|
- [Ultimum](https://ultimum.io/)
|
||||||
|
@ -271,7 +271,6 @@ For your cluster, edit `inventory/$CLUSTER/cluster.tfvars`.
|
||||||
|`k8s_allowed_remote_ips` | List of CIDR allowed to initiate a SSH connection, empty by default |
|
|`k8s_allowed_remote_ips` | List of CIDR allowed to initiate a SSH connection, empty by default |
|
||||||
|`worker_allowed_ports` | List of ports to open on worker nodes, `[{ "protocol" = "tcp", "port_range_min" = 30000, "port_range_max" = 32767, "remote_ip_prefix" = "0.0.0.0/0"}]` by default |
|
|`worker_allowed_ports` | List of ports to open on worker nodes, `[{ "protocol" = "tcp", "port_range_min" = 30000, "port_range_max" = 32767, "remote_ip_prefix" = "0.0.0.0/0"}]` by default |
|
||||||
|`master_allowed_ports` | List of ports to open on master nodes, expected format is `[{ "protocol" = "tcp", "port_range_min" = 443, "port_range_max" = 443, "remote_ip_prefix" = "0.0.0.0/0"}]`, empty by default |
|
|`master_allowed_ports` | List of ports to open on master nodes, expected format is `[{ "protocol" = "tcp", "port_range_min" = 443, "port_range_max" = 443, "remote_ip_prefix" = "0.0.0.0/0"}]`, empty by default |
|
||||||
|`wait_for_floatingip` | Let Terraform poll the instance until the floating IP has been associated, `false` by default. |
|
|
||||||
|`node_root_volume_size_in_gb` | Size of the root volume for nodes, 0 to use ephemeral storage |
|
|`node_root_volume_size_in_gb` | Size of the root volume for nodes, 0 to use ephemeral storage |
|
||||||
|`master_root_volume_size_in_gb` | Size of the root volume for masters, 0 to use ephemeral storage |
|
|`master_root_volume_size_in_gb` | Size of the root volume for masters, 0 to use ephemeral storage |
|
||||||
|`master_volume_type` | Volume type of the root volume for control_plane, 'Default' by default |
|
|`master_volume_type` | Volume type of the root volume for control_plane, 'Default' by default |
|
||||||
|
|
|
@ -81,7 +81,6 @@ module "compute" {
|
||||||
supplementary_node_groups = var.supplementary_node_groups
|
supplementary_node_groups = var.supplementary_node_groups
|
||||||
master_allowed_ports = var.master_allowed_ports
|
master_allowed_ports = var.master_allowed_ports
|
||||||
worker_allowed_ports = var.worker_allowed_ports
|
worker_allowed_ports = var.worker_allowed_ports
|
||||||
wait_for_floatingip = var.wait_for_floatingip
|
|
||||||
use_access_ip = var.use_access_ip
|
use_access_ip = var.use_access_ip
|
||||||
master_server_group_policy = var.master_server_group_policy
|
master_server_group_policy = var.master_server_group_policy
|
||||||
node_server_group_policy = var.node_server_group_policy
|
node_server_group_policy = var.node_server_group_policy
|
||||||
|
|
|
@ -19,6 +19,10 @@ data "template_file" "cloudinit" {
|
||||||
template = file("${path.module}/templates/cloudinit.yaml")
|
template = file("${path.module}/templates/cloudinit.yaml")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
data "openstack_networking_network_v2" "k8s_network" {
|
||||||
|
name = var.network_name
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_keypair_v2" "k8s" {
|
resource "openstack_compute_keypair_v2" "k8s" {
|
||||||
name = "kubernetes-${var.cluster_name}"
|
name = "kubernetes-${var.cluster_name}"
|
||||||
public_key = chomp(file(var.public_key_path))
|
public_key = chomp(file(var.public_key_path))
|
||||||
|
@ -182,6 +186,16 @@ locals {
|
||||||
image_to_use_master = var.image_master_uuid != "" ? var.image_master_uuid : var.image_uuid != "" ? var.image_uuid : data.openstack_images_image_v2.image_master[0].id
|
image_to_use_master = var.image_master_uuid != "" ? var.image_master_uuid : var.image_uuid != "" ? var.image_uuid : data.openstack_images_image_v2.image_master[0].id
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "bastion_port" {
|
||||||
|
count = var.number_of_bastions
|
||||||
|
name = "${var.cluster_name}-bastion-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.bastion_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "bastion" {
|
resource "openstack_compute_instance_v2" "bastion" {
|
||||||
name = "${var.cluster_name}-bastion-${count.index + 1}"
|
name = "${var.cluster_name}-bastion-${count.index + 1}"
|
||||||
count = var.number_of_bastions
|
count = var.number_of_bastions
|
||||||
|
@ -203,11 +217,9 @@ resource "openstack_compute_instance_v2" "bastion" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.bastion_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.bastion_sec_groups : null
|
|
||||||
|
|
||||||
metadata = {
|
metadata = {
|
||||||
ssh_user = var.ssh_user
|
ssh_user = var.ssh_user
|
||||||
kubespray_groups = "bastion"
|
kubespray_groups = "bastion"
|
||||||
|
@ -220,6 +232,16 @@ resource "openstack_compute_instance_v2" "bastion" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_master_port" {
|
||||||
|
count = var.number_of_k8s_masters
|
||||||
|
name = "${var.cluster_name}-k8s-master-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.master_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_master" {
|
resource "openstack_compute_instance_v2" "k8s_master" {
|
||||||
name = "${var.cluster_name}-k8s-master-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-master-${count.index + 1}"
|
||||||
count = var.number_of_k8s_masters
|
count = var.number_of_k8s_masters
|
||||||
|
@ -244,11 +266,9 @@ resource "openstack_compute_instance_v2" "k8s_master" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_master_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.master_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -268,6 +288,16 @@ resource "openstack_compute_instance_v2" "k8s_master" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_master_no_etcd_port" {
|
||||||
|
count = var.number_of_k8s_masters_no_etcd
|
||||||
|
name = "${var.cluster_name}-k8s-master-ne-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.master_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_master_no_etcd" {
|
resource "openstack_compute_instance_v2" "k8s_master_no_etcd" {
|
||||||
name = "${var.cluster_name}-k8s-master-ne-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-master-ne-${count.index + 1}"
|
||||||
count = var.number_of_k8s_masters_no_etcd
|
count = var.number_of_k8s_masters_no_etcd
|
||||||
|
@ -292,11 +322,9 @@ resource "openstack_compute_instance_v2" "k8s_master_no_etcd" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_master_no_etcd_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.master_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -316,6 +344,16 @@ resource "openstack_compute_instance_v2" "k8s_master_no_etcd" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "etcd_port" {
|
||||||
|
count = var.number_of_etcd
|
||||||
|
name = "${var.cluster_name}-etcd-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.etcd_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "etcd" {
|
resource "openstack_compute_instance_v2" "etcd" {
|
||||||
name = "${var.cluster_name}-etcd-${count.index + 1}"
|
name = "${var.cluster_name}-etcd-${count.index + 1}"
|
||||||
count = var.number_of_etcd
|
count = var.number_of_etcd
|
||||||
|
@ -338,11 +376,9 @@ resource "openstack_compute_instance_v2" "etcd" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.etcd_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.etcd_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.etcd_server_group_policy ? [openstack_compute_servergroup_v2.k8s_etcd[0]] : []
|
for_each = var.etcd_server_group_policy ? [openstack_compute_servergroup_v2.k8s_etcd[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -358,6 +394,16 @@ resource "openstack_compute_instance_v2" "etcd" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_master_no_floating_ip_port" {
|
||||||
|
count = var.number_of_k8s_masters_no_floating_ip
|
||||||
|
name = "${var.cluster_name}-k8s-master-nf-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.master_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip" {
|
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip" {
|
||||||
name = "${var.cluster_name}-k8s-master-nf-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-master-nf-${count.index + 1}"
|
||||||
count = var.number_of_k8s_masters_no_floating_ip
|
count = var.number_of_k8s_masters_no_floating_ip
|
||||||
|
@ -380,11 +426,9 @@ resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_master_no_floating_ip_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.master_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -400,6 +444,16 @@ resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_master_no_floating_ip_no_etcd_port" {
|
||||||
|
count = var.number_of_k8s_masters_no_floating_ip_no_etcd
|
||||||
|
name = "${var.cluster_name}-k8s-master-ne-nf-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.master_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip_no_etcd" {
|
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip_no_etcd" {
|
||||||
name = "${var.cluster_name}-k8s-master-ne-nf-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-master-ne-nf-${count.index + 1}"
|
||||||
count = var.number_of_k8s_masters_no_floating_ip_no_etcd
|
count = var.number_of_k8s_masters_no_floating_ip_no_etcd
|
||||||
|
@ -423,11 +477,9 @@ resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip_no_etcd" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_master_no_floating_ip_no_etcd_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.master_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
for_each = var.master_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_master[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -443,6 +495,16 @@ resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip_no_etcd" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_node_port" {
|
||||||
|
count = var.number_of_k8s_nodes
|
||||||
|
name = "${var.cluster_name}-k8s-node-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.worker_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_node" {
|
resource "openstack_compute_instance_v2" "k8s_node" {
|
||||||
name = "${var.cluster_name}-k8s-node-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-node-${count.index + 1}"
|
||||||
count = var.number_of_k8s_nodes
|
count = var.number_of_k8s_nodes
|
||||||
|
@ -466,10 +528,9 @@ resource "openstack_compute_instance_v2" "k8s_node" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_node_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.worker_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
||||||
|
@ -490,6 +551,16 @@ resource "openstack_compute_instance_v2" "k8s_node" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_node_no_floating_ip_port" {
|
||||||
|
count = var.number_of_k8s_nodes_no_floating_ip
|
||||||
|
name = "${var.cluster_name}-k8s-node-nf-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.worker_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_node_no_floating_ip" {
|
resource "openstack_compute_instance_v2" "k8s_node_no_floating_ip" {
|
||||||
name = "${var.cluster_name}-k8s-node-nf-${count.index + 1}"
|
name = "${var.cluster_name}-k8s-node-nf-${count.index + 1}"
|
||||||
count = var.number_of_k8s_nodes_no_floating_ip
|
count = var.number_of_k8s_nodes_no_floating_ip
|
||||||
|
@ -513,11 +584,9 @@ resource "openstack_compute_instance_v2" "k8s_node_no_floating_ip" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.k8s_node_no_floating_ip_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.worker_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -533,6 +602,16 @@ resource "openstack_compute_instance_v2" "k8s_node_no_floating_ip" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "k8s_nodes_port" {
|
||||||
|
for_each = var.number_of_k8s_nodes == 0 && var.number_of_k8s_nodes_no_floating_ip == 0 ? var.k8s_nodes : {}
|
||||||
|
name = "${var.cluster_name}-k8s-node-${each.key}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.worker_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "k8s_nodes" {
|
resource "openstack_compute_instance_v2" "k8s_nodes" {
|
||||||
for_each = var.number_of_k8s_nodes == 0 && var.number_of_k8s_nodes_no_floating_ip == 0 ? var.k8s_nodes : {}
|
for_each = var.number_of_k8s_nodes == 0 && var.number_of_k8s_nodes_no_floating_ip == 0 ? var.k8s_nodes : {}
|
||||||
name = "${var.cluster_name}-k8s-node-${each.key}"
|
name = "${var.cluster_name}-k8s-node-${each.key}"
|
||||||
|
@ -556,11 +635,9 @@ resource "openstack_compute_instance_v2" "k8s_nodes" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = openstack_networking_port_v2.k8s_nodes_port[each.key].id
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.worker_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -580,6 +657,16 @@ resource "openstack_compute_instance_v2" "k8s_nodes" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
resource "openstack_networking_port_v2" "glusterfs_node_no_floating_ip_port" {
|
||||||
|
count = var.number_of_gfs_nodes_no_floating_ip
|
||||||
|
name = "${var.cluster_name}-gfs-node-nf-${count.index + 1}"
|
||||||
|
network_id = "${data.openstack_networking_network_v2.k8s_network.id}"
|
||||||
|
admin_state_up = "true"
|
||||||
|
port_security_enabled = var.port_security_enabled
|
||||||
|
security_group_ids = var.port_security_enabled ? local.gfs_sec_groups : null
|
||||||
|
no_security_groups = var.port_security_enabled ? null : false
|
||||||
|
}
|
||||||
|
|
||||||
resource "openstack_compute_instance_v2" "glusterfs_node_no_floating_ip" {
|
resource "openstack_compute_instance_v2" "glusterfs_node_no_floating_ip" {
|
||||||
name = "${var.cluster_name}-gfs-node-nf-${count.index + 1}"
|
name = "${var.cluster_name}-gfs-node-nf-${count.index + 1}"
|
||||||
count = var.number_of_gfs_nodes_no_floating_ip
|
count = var.number_of_gfs_nodes_no_floating_ip
|
||||||
|
@ -601,11 +688,9 @@ resource "openstack_compute_instance_v2" "glusterfs_node_no_floating_ip" {
|
||||||
}
|
}
|
||||||
|
|
||||||
network {
|
network {
|
||||||
name = var.network_name
|
port = element(openstack_networking_port_v2.glusterfs_node_no_floating_ip_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
security_groups = var.port_security_enabled ? local.gfs_sec_groups : null
|
|
||||||
|
|
||||||
dynamic "scheduler_hints" {
|
dynamic "scheduler_hints" {
|
||||||
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
for_each = var.node_server_group_policy != "" ? [openstack_compute_servergroup_v2.k8s_node[0]] : []
|
||||||
content {
|
content {
|
||||||
|
@ -621,39 +706,35 @@ resource "openstack_compute_instance_v2" "glusterfs_node_no_floating_ip" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "openstack_compute_floatingip_associate_v2" "bastion" {
|
resource "openstack_networking_floatingip_associate_v2" "bastion" {
|
||||||
count = var.number_of_bastions
|
count = var.number_of_bastions
|
||||||
floating_ip = var.bastion_fips[count.index]
|
floating_ip = var.bastion_fips[count.index]
|
||||||
instance_id = element(openstack_compute_instance_v2.bastion.*.id, count.index)
|
port_id = element(openstack_networking_port_v2.bastion_port.*.id, count.index)
|
||||||
wait_until_associated = var.wait_for_floatingip
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
resource "openstack_compute_floatingip_associate_v2" "k8s_master" {
|
resource "openstack_networking_floatingip_associate_v2" "k8s_master" {
|
||||||
count = var.number_of_k8s_masters
|
count = var.number_of_k8s_masters
|
||||||
instance_id = element(openstack_compute_instance_v2.k8s_master.*.id, count.index)
|
|
||||||
floating_ip = var.k8s_master_fips[count.index]
|
floating_ip = var.k8s_master_fips[count.index]
|
||||||
wait_until_associated = var.wait_for_floatingip
|
port_id = element(openstack_networking_port_v2.k8s_master_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "openstack_compute_floatingip_associate_v2" "k8s_master_no_etcd" {
|
resource "openstack_networking_floatingip_associate_v2" "k8s_master_no_etcd" {
|
||||||
count = var.master_root_volume_size_in_gb == 0 ? var.number_of_k8s_masters_no_etcd : 0
|
count = var.master_root_volume_size_in_gb == 0 ? var.number_of_k8s_masters_no_etcd : 0
|
||||||
instance_id = element(openstack_compute_instance_v2.k8s_master_no_etcd.*.id, count.index)
|
|
||||||
floating_ip = var.k8s_master_no_etcd_fips[count.index]
|
floating_ip = var.k8s_master_no_etcd_fips[count.index]
|
||||||
|
port_id = element(openstack_networking_port_v2.k8s_master_no_etcd_port.*.id, count.index)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "openstack_compute_floatingip_associate_v2" "k8s_node" {
|
resource "openstack_networking_floatingip_associate_v2" "k8s_node" {
|
||||||
count = var.node_root_volume_size_in_gb == 0 ? var.number_of_k8s_nodes : 0
|
count = var.node_root_volume_size_in_gb == 0 ? var.number_of_k8s_nodes : 0
|
||||||
floating_ip = var.k8s_node_fips[count.index]
|
floating_ip = var.k8s_node_fips[count.index]
|
||||||
instance_id = element(openstack_compute_instance_v2.k8s_node[*].id, count.index)
|
port_id = element(openstack_networking_port_v2.k8s_node_port.*.id, count.index)
|
||||||
wait_until_associated = var.wait_for_floatingip
|
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "openstack_compute_floatingip_associate_v2" "k8s_nodes" {
|
resource "openstack_networking_floatingip_associate_v2" "k8s_nodes" {
|
||||||
for_each = var.number_of_k8s_nodes == 0 && var.number_of_k8s_nodes_no_floating_ip == 0 ? { for key, value in var.k8s_nodes : key => value if value.floating_ip } : {}
|
for_each = var.number_of_k8s_nodes == 0 && var.number_of_k8s_nodes_no_floating_ip == 0 ? { for key, value in var.k8s_nodes : key => value if value.floating_ip } : {}
|
||||||
floating_ip = var.k8s_nodes_fips[each.key].address
|
floating_ip = var.k8s_nodes_fips[each.key].address
|
||||||
instance_id = openstack_compute_instance_v2.k8s_nodes[each.key].id
|
port_id = openstack_networking_port_v2.k8s_nodes_port[each.key].id
|
||||||
wait_until_associated = var.wait_for_floatingip
|
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "openstack_blockstorage_volume_v2" "glusterfs_volume" {
|
resource "openstack_blockstorage_volume_v2" "glusterfs_volume" {
|
||||||
|
|
|
@ -106,8 +106,6 @@ variable "k8s_allowed_egress_ips" {
|
||||||
|
|
||||||
variable "k8s_nodes" {}
|
variable "k8s_nodes" {}
|
||||||
|
|
||||||
variable "wait_for_floatingip" {}
|
|
||||||
|
|
||||||
variable "supplementary_master_groups" {
|
variable "supplementary_master_groups" {
|
||||||
default = ""
|
default = ""
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue