fix 201-aks-helm (#183)

This commit is contained in:
lonegunmanb 2023-03-01 10:23:16 +08:00 committed by GitHub
parent 4b813f543c
commit 819a4b141d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 66 additions and 113 deletions

View File

@ -1,24 +1,17 @@
resource "azurerm_kubernetes_cluster" "default" { resource "azurerm_kubernetes_cluster" "default" {
name = "${var.name}-aks" name = "${var.name}-aks"
location = "${azurerm_resource_group.default.location}" location = azurerm_resource_group.default.location
resource_group_name = "${azurerm_resource_group.default.name}" resource_group_name = azurerm_resource_group.default.name
dns_prefix = "${var.dns_prefix}-${var.name}-aks-${var.environment}" dns_prefix = "${var.dns_prefix}-${var.name}-aks-${var.environment}"
depends_on = ["azurerm_role_assignment.default"] role_based_access_control_enabled = true
default_node_pool {
agent_pool_profile {
name = "default" name = "default"
count = "${var.node_count}" node_count = var.node_count
vm_size = "${var.node_type}"
os_type = "Linux"
os_disk_size_gb = 30 os_disk_size_gb = 30
vm_size = var.node_type
} }
identity {
service_principal { type = "SystemAssigned"
client_id = "${azuread_application.default.application_id}"
client_secret = "${azuread_service_principal_password.default.value}"
}
role_based_access_control {
enabled = true
} }
} }

View File

@ -1,24 +1,5 @@
resource "azuread_application" "default" {
name = "${var.name}-${var.environment}"
}
resource "azuread_service_principal" "default" {
application_id = "${azuread_application.default.application_id}"
}
resource "random_string" "password" {
length = 32
special = true
}
resource "azuread_service_principal_password" "default" {
service_principal_id = "${azuread_service_principal.default.id}"
value = "${random_string.password.result}"
end_date = "2099-01-01T01:00:00Z"
}
resource "azurerm_role_assignment" "default" { resource "azurerm_role_assignment" "default" {
scope = "${data.azurerm_subscription.current.id}/resourceGroups/${azurerm_resource_group.default.name}" scope = azurerm_resource_group.default.id
role_definition_name = "Network Contributor" role_definition_name = "Network Contributor"
principal_id = "${azuread_service_principal.default.id}" principal_id = azurerm_kubernetes_cluster.default.identity[0].principal_id
} }

View File

@ -1,20 +1,12 @@
# Define the helm provider to use the AKS cluster # Install nginx-ingress-controller
provider "helm" {
kubernetes {
host = "${azurerm_kubernetes_cluster.default.kube_config.0.host}"
client_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_certificate)}"
client_key = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_key)}"
cluster_ca_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.cluster_ca_certificate)}"
}
service_account = "tiller"
}
# Install a sample ghost blog
resource "helm_release" "ghost" { resource "helm_release" "ghost" {
name = "ghost-blog" name = "nginx-ingress-controller"
chart = "bitnami/ghost"
depends_on = ["kubernetes_cluster_role_binding.tiller"] repository = "https://charts.bitnami.com/bitnami"
chart = "nginx-ingress-controller"
set {
name = "service.type"
value = "ClusterIP"
}
} }

View File

@ -1,35 +0,0 @@
# Define Kubernetes provider to use the AKS cluster
provider "kubernetes" {
host = "${azurerm_kubernetes_cluster.default.kube_config.0.host}"
client_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_certificate)}"
client_key = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_key)}"
cluster_ca_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.cluster_ca_certificate)}"
}
# Create a service account for the Helm Tiller
resource "kubernetes_service_account" "tiller" {
metadata {
name = "tiller"
namespace = "kube-system"
}
}
# Grant cluster-admin rights to the Tiller Service Account
resource "kubernetes_cluster_role_binding" "tiller" {
metadata {
name = "${kubernetes_service_account.tiller.metadata.0.name}"
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "ClusterRole"
name = "cluster-admin"
}
subject {
kind = "ServiceAccount"
name = "${kubernetes_service_account.tiller.metadata.0.name}"
namespace = "kube-system"
}
}

View File

@ -1,18 +1,7 @@
# The Azure Active Resource Manager Terraform provider resource "random_pet" "rand" {}
provider "azurerm" {
version = "=1.36.1"
}
# The Azure Active Directory Terraform provider
provider "azuread" {
version = "=0.6.0"
}
# Reference to the current subscription. Used when creating role assignments
data "azurerm_subscription" "current" {}
# The main resource group for this deployment # The main resource group for this deployment
resource "azurerm_resource_group" "default" { resource "azurerm_resource_group" "default" {
name = "${var.name}-${var.environment}-rg" name = "${var.name}-${var.environment}-rg-${random_pet.rand.id}"
location = "${var.location}" location = var.location
} }

View File

@ -0,0 +1,33 @@
terraform {
required_version = ">=1.2"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "~> 3.0"
}
helm = {
source = "hashicorp/helm"
version = "2.9.0"
}
random = {
source = "hashicorp/random"
version = "~> 3.0"
}
}
}
provider "azurerm" {
features {}
}
# Define the helm provider to use the AKS cluster
provider "helm" {
kubernetes {
host = azurerm_kubernetes_cluster.default.kube_config[0].host
client_certificate = base64decode(azurerm_kubernetes_cluster.default.kube_config[0].client_certificate)
client_key = base64decode(azurerm_kubernetes_cluster.default.kube_config[0].client_key)
cluster_ca_certificate = base64decode(azurerm_kubernetes_cluster.default.kube_config[0].cluster_ca_certificate)
}
}

View File

@ -1,12 +1,12 @@
// Naming // Naming
variable "name" { variable "name" {
type = "string" type = string
description = "Location of the azure resource group." description = "Location of the azure resource group."
default = "quickstart-aks" default = "quickstart-aks"
} }
variable "environment" { variable "environment" {
type = "string" type = string
description = "Name of the deployment environment" description = "Name of the deployment environment"
default = "dev" default = "dev"
} }
@ -14,7 +14,7 @@ variable "environment" {
// Resource information // Resource information
variable "location" { variable "location" {
type = "string" type = string
description = "Location of the azure resource group." description = "Location of the azure resource group."
default = "WestUS2" default = "WestUS2"
} }
@ -22,19 +22,19 @@ variable "location" {
// Node type information // Node type information
variable "node_count" { variable "node_count" {
type = "string" type = number
description = "The number of K8S nodes to provision." description = "The number of K8S nodes to provision."
default = 3 default = 3
} }
variable "node_type" { variable "node_type" {
type = "string" type = string
description = "The size of each node." description = "The size of each node."
default = "Standard_D1_v2" default = "Standard_D2_v3"
} }
variable "dns_prefix" { variable "dns_prefix" {
type = "string" type = string
description = "DNS Prefix" description = "DNS Prefix"
default = "tfquickstart" default = "tfquickstart"
} }