mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-15 16:23:58 +01:00
101 lines
2.8 KiB
HCL
101 lines
2.8 KiB
HCL
data "aws_region" "current" {}
|
|
|
|
data "aws_iam_policy_document" "workers_assume_role_policy" {
|
|
statement {
|
|
sid = "EKSWorkerAssumeRole"
|
|
|
|
actions = [
|
|
"sts:AssumeRole",
|
|
]
|
|
|
|
principals {
|
|
type = "Service"
|
|
identifiers = ["ec2.amazonaws.com"]
|
|
}
|
|
}
|
|
}
|
|
|
|
data "aws_iam_policy_document" "cluster_assume_role_policy" {
|
|
statement {
|
|
sid = "EKSClusterAssumeRole"
|
|
|
|
actions = [
|
|
"sts:AssumeRole",
|
|
]
|
|
|
|
principals {
|
|
type = "Service"
|
|
identifiers = ["eks.amazonaws.com"]
|
|
}
|
|
}
|
|
}
|
|
|
|
locals {
|
|
# More information: https://amazon-eks.s3-us-west-2.amazonaws.com/1.10.3/2018-06-05/amazon-eks-nodegroup.yaml
|
|
workers_userdata = <<USERDATA
|
|
#!/bin/bash -xe
|
|
|
|
CA_CERTIFICATE_DIRECTORY=/etc/kubernetes/pki
|
|
CA_CERTIFICATE_FILE_PATH=$CA_CERTIFICATE_DIRECTORY/ca.crt
|
|
mkdir -p $CA_CERTIFICATE_DIRECTORY
|
|
echo "${aws_eks_cluster.this.certificate_authority.0.data}" | base64 -d > $CA_CERTIFICATE_FILE_PATH
|
|
INTERNAL_IP=$(curl -s http://169.254.169.254/latest/meta-data/local-ipv4)
|
|
sed -i s,MASTER_ENDPOINT,${aws_eks_cluster.this.endpoint},g /var/lib/kubelet/kubeconfig
|
|
sed -i s,CLUSTER_NAME,${var.cluster_name},g /var/lib/kubelet/kubeconfig
|
|
sed -i s,REGION,${data.aws_region.current.name},g /etc/systemd/system/kubelet.service
|
|
sed -i s,MAX_PODS,20,g /etc/systemd/system/kubelet.service
|
|
sed -i s,MASTER_ENDPOINT,${aws_eks_cluster.this.endpoint},g /etc/systemd/system/kubelet.service
|
|
sed -i s,INTERNAL_IP,$INTERNAL_IP,g /etc/systemd/system/kubelet.service
|
|
DNS_CLUSTER_IP=10.100.0.10
|
|
if [[ $INTERNAL_IP == 10.* ]] ; then DNS_CLUSTER_IP=172.20.0.10; fi
|
|
sed -i s,DNS_CLUSTER_IP,$DNS_CLUSTER_IP,g /etc/systemd/system/kubelet.service
|
|
sed -i s,CERTIFICATE_AUTHORITY_FILE,$CA_CERTIFICATE_FILE_PATH,g /var/lib/kubelet/kubeconfig
|
|
sed -i s,CLIENT_CA_FILE,$CA_CERTIFICATE_FILE_PATH,g /etc/systemd/system/kubelet.service
|
|
systemctl daemon-reload
|
|
systemctl restart kubelet kube-proxy
|
|
USERDATA
|
|
|
|
config_map_aws_auth = <<CONFIGMAPAWSAUTH
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: aws-auth
|
|
namespace: kube-system
|
|
data:
|
|
mapRoles: |
|
|
- rolearn: ${aws_iam_role.workers.arn}
|
|
username: system:node:{{EC2PrivateDNSName}}
|
|
groups:
|
|
- system:bootstrappers
|
|
- system:nodes
|
|
CONFIGMAPAWSAUTH
|
|
|
|
kubeconfig = <<KUBECONFIG
|
|
|
|
apiVersion: v1
|
|
clusters:
|
|
- cluster:
|
|
server: ${aws_eks_cluster.this.endpoint}
|
|
certificate-authority-data: ${aws_eks_cluster.this.certificate_authority.0.data}
|
|
name: kubernetes
|
|
contexts:
|
|
- context:
|
|
cluster: kubernetes
|
|
user: aws
|
|
name: aws
|
|
current-context: aws
|
|
kind: Config
|
|
preferences: {}
|
|
users:
|
|
- name: aws
|
|
user:
|
|
exec:
|
|
apiVersion: client.authentication.k8s.io/v1alpha1
|
|
command: heptio-authenticator-aws
|
|
args:
|
|
- "token"
|
|
- "-i"
|
|
- "${var.cluster_name}"
|
|
KUBECONFIG
|
|
}
|