mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-02-24 11:34:50 +01:00
236 lines
5.5 KiB
HCL
236 lines
5.5 KiB
HCL
provider "aws" {
|
|
region = local.region
|
|
}
|
|
|
|
locals {
|
|
name = "fargate-${random_string.suffix.result}"
|
|
cluster_version = "1.20"
|
|
region = "eu-west-1"
|
|
}
|
|
|
|
################################################################################
|
|
# EKS Module
|
|
################################################################################
|
|
|
|
module "eks" {
|
|
source = "../.."
|
|
|
|
cluster_name = local.name
|
|
cluster_version = local.cluster_version
|
|
|
|
vpc_id = module.vpc.vpc_id
|
|
subnets = [module.vpc.private_subnets[0], module.vpc.public_subnets[1]]
|
|
fargate_subnets = [module.vpc.private_subnets[2]]
|
|
|
|
cluster_endpoint_private_access = true
|
|
cluster_endpoint_public_access = true
|
|
|
|
# You require a node group to schedule coredns which is critical for running correctly internal DNS.
|
|
# If you want to use only fargate you must follow docs `(Optional) Update CoreDNS`
|
|
# available under https://docs.aws.amazon.com/eks/latest/userguide/fargate-getting-started.html
|
|
node_groups = {
|
|
example = {
|
|
desired_capacity = 1
|
|
|
|
instance_types = ["t3.large"]
|
|
k8s_labels = {
|
|
Example = "managed_node_groups"
|
|
GithubRepo = "terraform-aws-eks"
|
|
GithubOrg = "terraform-aws-modules"
|
|
}
|
|
additional_tags = {
|
|
ExtraTag = "example"
|
|
}
|
|
update_config = {
|
|
max_unavailable_percentage = 50 # or set `max_unavailable`
|
|
}
|
|
}
|
|
}
|
|
|
|
fargate_profiles = {
|
|
default = {
|
|
name = "default"
|
|
selectors = [
|
|
{
|
|
namespace = "kube-system"
|
|
labels = {
|
|
k8s-app = "kube-dns"
|
|
}
|
|
},
|
|
{
|
|
namespace = "default"
|
|
labels = {
|
|
WorkerType = "fargate"
|
|
}
|
|
}
|
|
]
|
|
|
|
tags = {
|
|
Owner = "default"
|
|
}
|
|
|
|
timeouts = {
|
|
create = "20m"
|
|
delete = "20m"
|
|
}
|
|
}
|
|
|
|
secondary = {
|
|
name = "secondary"
|
|
selectors = [
|
|
{
|
|
namespace = "default"
|
|
labels = {
|
|
Environment = "test"
|
|
GithubRepo = "terraform-aws-eks"
|
|
GithubOrg = "terraform-aws-modules"
|
|
}
|
|
}
|
|
]
|
|
|
|
# Using specific subnets instead of the ones configured in EKS (`subnets` and `fargate_subnets`)
|
|
subnets = [module.vpc.private_subnets[1]]
|
|
|
|
tags = {
|
|
Owner = "secondary"
|
|
}
|
|
}
|
|
}
|
|
|
|
manage_aws_auth = false
|
|
|
|
tags = {
|
|
Example = local.name
|
|
GithubRepo = "terraform-aws-eks"
|
|
GithubOrg = "terraform-aws-modules"
|
|
}
|
|
}
|
|
|
|
|
|
##############################################
|
|
# Calling submodule with existing EKS cluster
|
|
##############################################
|
|
|
|
module "fargate_profile_existing_cluster" {
|
|
source = "../../modules/fargate"
|
|
|
|
cluster_name = module.eks.cluster_id
|
|
subnets = [module.vpc.private_subnets[0], module.vpc.private_subnets[2]]
|
|
|
|
fargate_profiles = {
|
|
profile1 = {
|
|
name = "profile1"
|
|
selectors = [
|
|
{
|
|
namespace = "kube-system"
|
|
labels = {
|
|
k8s-app = "kube-dns"
|
|
}
|
|
},
|
|
{
|
|
namespace = "profile"
|
|
labels = {
|
|
WorkerType = "fargate"
|
|
}
|
|
}
|
|
]
|
|
|
|
tags = {
|
|
Owner = "profile1"
|
|
submodule = "true"
|
|
}
|
|
}
|
|
|
|
profile2 = {
|
|
name = "profile2"
|
|
selectors = [
|
|
{
|
|
namespace = "default"
|
|
labels = {
|
|
Fargate = "profile2"
|
|
}
|
|
}
|
|
]
|
|
|
|
# Using specific subnets instead of the ones configured in EKS (`subnets` and `fargate_subnets`)
|
|
subnets = [module.vpc.private_subnets[0]]
|
|
|
|
tags = {
|
|
Owner = "profile2"
|
|
submodule = "true"
|
|
}
|
|
|
|
timeouts = {
|
|
delete = "20m"
|
|
}
|
|
}
|
|
}
|
|
|
|
tags = {
|
|
Example = local.name
|
|
GithubRepo = "terraform-aws-eks"
|
|
GithubOrg = "terraform-aws-modules"
|
|
}
|
|
}
|
|
|
|
################################################################################
|
|
# Kubernetes provider configuration
|
|
################################################################################
|
|
|
|
data "aws_eks_cluster" "cluster" {
|
|
name = module.eks.cluster_id
|
|
}
|
|
|
|
data "aws_eks_cluster_auth" "cluster" {
|
|
name = module.eks.cluster_id
|
|
}
|
|
|
|
provider "kubernetes" {
|
|
host = data.aws_eks_cluster.cluster.endpoint
|
|
cluster_ca_certificate = base64decode(data.aws_eks_cluster.cluster.certificate_authority[0].data)
|
|
token = data.aws_eks_cluster_auth.cluster.token
|
|
}
|
|
|
|
################################################################################
|
|
# Supporting Resources
|
|
################################################################################
|
|
|
|
data "aws_availability_zones" "available" {
|
|
}
|
|
|
|
resource "random_string" "suffix" {
|
|
length = 8
|
|
special = false
|
|
}
|
|
|
|
module "vpc" {
|
|
source = "terraform-aws-modules/vpc/aws"
|
|
version = "~> 3.0"
|
|
|
|
name = local.name
|
|
cidr = "10.0.0.0/16"
|
|
azs = data.aws_availability_zones.available.names
|
|
private_subnets = ["10.0.1.0/24", "10.0.2.0/24", "10.0.3.0/24"]
|
|
public_subnets = ["10.0.4.0/24", "10.0.5.0/24", "10.0.6.0/24"]
|
|
enable_nat_gateway = true
|
|
single_nat_gateway = true
|
|
enable_dns_hostnames = true
|
|
|
|
public_subnet_tags = {
|
|
"kubernetes.io/cluster/${local.name}" = "shared"
|
|
"kubernetes.io/role/elb" = "1"
|
|
}
|
|
|
|
private_subnet_tags = {
|
|
"kubernetes.io/cluster/${local.name}" = "shared"
|
|
"kubernetes.io/role/internal-elb" = "1"
|
|
}
|
|
|
|
tags = {
|
|
Example = local.name
|
|
GithubRepo = "terraform-aws-eks"
|
|
GithubOrg = "terraform-aws-modules"
|
|
}
|
|
}
|
|
|