2017-12-05 20:48:47 +08:00
|
|
|
resource "openstack_compute_keypair_v2" "k8s" {
|
2018-01-05 19:09:04 +08:00
|
|
|
name = "kubernetes-${var.cluster_name}"
|
|
|
|
public_key = "${chomp(file(var.public_key_path))}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_v2" "k8s_master" {
|
2019-04-17 17:10:03 +08:00
|
|
|
name = "${var.cluster_name}-k8s-master"
|
|
|
|
description = "${var.cluster_name} - Kubernetes Master"
|
|
|
|
delete_default_rules = true
|
2018-09-28 17:35:02 +08:00
|
|
|
}
|
2018-01-05 19:09:04 +08:00
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "k8s_master" {
|
2019-04-21 16:57:44 +08:00
|
|
|
count = "${length(var.master_allowed_remote_ips)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
direction = "ingress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
protocol = "tcp"
|
|
|
|
port_range_min = "6443"
|
|
|
|
port_range_max = "6443"
|
2019-04-21 16:57:44 +08:00
|
|
|
remote_ip_prefix = "${var.master_allowed_remote_ips[count.index]}"
|
2018-09-28 17:35:02 +08:00
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.k8s_master.id}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_v2" "bastion" {
|
2019-04-17 17:10:03 +08:00
|
|
|
name = "${var.cluster_name}-bastion"
|
|
|
|
count = "${var.number_of_bastions ? 1 : 0}"
|
|
|
|
description = "${var.cluster_name} - Bastion Server"
|
|
|
|
delete_default_rules = true
|
2018-09-28 17:35:02 +08:00
|
|
|
}
|
2018-01-05 19:09:04 +08:00
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "bastion" {
|
2019-04-09 19:01:09 +08:00
|
|
|
count = "${var.number_of_bastions ? length(var.bastion_allowed_remote_ips) : 0}"
|
2019-02-18 13:04:41 +08:00
|
|
|
direction = "ingress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
protocol = "tcp"
|
|
|
|
port_range_min = "22"
|
|
|
|
port_range_max = "22"
|
|
|
|
remote_ip_prefix = "${var.bastion_allowed_remote_ips[count.index]}"
|
2018-09-28 17:35:02 +08:00
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.bastion.id}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_v2" "k8s" {
|
2019-04-17 17:10:03 +08:00
|
|
|
name = "${var.cluster_name}-k8s"
|
|
|
|
description = "${var.cluster_name} - Kubernetes"
|
|
|
|
delete_default_rules = true
|
2018-09-28 17:35:02 +08:00
|
|
|
}
|
2018-01-05 19:09:04 +08:00
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "k8s" {
|
2019-02-18 13:04:41 +08:00
|
|
|
direction = "ingress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
remote_group_id = "${openstack_networking_secgroup_v2.k8s.id}"
|
2018-09-28 17:35:02 +08:00
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.k8s.id}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
2018-09-28 17:35:02 +08:00
|
|
|
|
2019-04-15 22:22:08 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "k8s_allowed_remote_ips" {
|
|
|
|
count = "${length(var.k8s_allowed_remote_ips)}"
|
|
|
|
direction = "ingress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
protocol = "tcp"
|
|
|
|
port_range_min = "22"
|
|
|
|
port_range_max = "22"
|
|
|
|
remote_ip_prefix = "${var.k8s_allowed_remote_ips[count.index]}"
|
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.k8s.id}"
|
|
|
|
}
|
|
|
|
|
2019-04-17 17:10:03 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "egress" {
|
|
|
|
count = "${length(var.k8s_allowed_egress_ips)}"
|
|
|
|
direction = "egress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
remote_ip_prefix = "${var.k8s_allowed_egress_ips[count.index]}"
|
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.k8s.id}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_v2" "worker" {
|
2019-04-17 17:10:03 +08:00
|
|
|
name = "${var.cluster_name}-k8s-worker"
|
|
|
|
description = "${var.cluster_name} - Kubernetes worker nodes"
|
|
|
|
delete_default_rules = true
|
2018-09-28 17:35:02 +08:00
|
|
|
}
|
2018-07-27 20:57:29 +08:00
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
resource "openstack_networking_secgroup_rule_v2" "worker" {
|
2019-02-18 13:04:41 +08:00
|
|
|
count = "${length(var.worker_allowed_ports)}"
|
|
|
|
direction = "ingress"
|
|
|
|
ethertype = "IPv4"
|
|
|
|
protocol = "${lookup(var.worker_allowed_ports[count.index], "protocol", "tcp")}"
|
|
|
|
port_range_min = "${lookup(var.worker_allowed_ports[count.index], "port_range_min")}"
|
|
|
|
port_range_max = "${lookup(var.worker_allowed_ports[count.index], "port_range_max")}"
|
|
|
|
remote_ip_prefix = "${lookup(var.worker_allowed_ports[count.index], "remote_ip_prefix", "0.0.0.0/0")}"
|
2018-09-28 17:35:02 +08:00
|
|
|
security_group_id = "${openstack_networking_secgroup_v2.worker.id}"
|
2018-07-27 20:57:29 +08:00
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "bastion" {
|
2018-01-05 19:09:04 +08:00
|
|
|
name = "${var.cluster_name}-bastion-${count.index+1}"
|
|
|
|
count = "${var.number_of_bastions}"
|
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_bastion}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.bastion.name}",
|
2018-01-05 19:09:04 +08:00
|
|
|
]
|
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
|
|
|
kubespray_groups = "bastion"
|
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
provisioner "local-exec" {
|
2019-06-05 16:51:55 +08:00
|
|
|
command = "sed s/USER/${var.ssh_user}/ ../../contrib/terraform/openstack/ansible_bastion_template.txt | sed s/BASTION_ADDRESS/${var.bastion_fips[0]}/ > group_vars/no-floating.yml"
|
2018-01-05 19:09:04 +08:00
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_master" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-master-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_masters}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_master}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2019-04-15 22:22:08 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s_master.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.k8s.name}",
|
|
|
|
]
|
|
|
|
|
2018-01-05 19:09:04 +08:00
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-04-30 23:11:07 +08:00
|
|
|
kubespray_groups = "etcd,kube-master,${var.supplementary_master_groups},k8s-cluster,vault"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
2019-04-15 22:22:08 +08:00
|
|
|
|
2018-04-30 23:11:07 +08:00
|
|
|
provisioner "local-exec" {
|
2019-06-05 16:51:55 +08:00
|
|
|
command = "sed s/USER/${var.ssh_user}/ ../../contrib/terraform/openstack/ansible_bastion_template.txt | sed s/BASTION_ADDRESS/${element( concat(var.bastion_fips, var.k8s_master_fips), 0)}/ > group_vars/no-floating.yml"
|
2018-04-30 23:11:07 +08:00
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_master_no_etcd" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-master-ne-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_masters_no_etcd}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_master}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2019-04-15 22:22:08 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s_master.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.k8s.name}",
|
|
|
|
]
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-04-30 23:11:07 +08:00
|
|
|
kubespray_groups = "kube-master,${var.supplementary_master_groups},k8s-cluster,vault"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
|
|
|
|
2018-04-30 23:11:07 +08:00
|
|
|
provisioner "local-exec" {
|
2019-06-05 16:51:55 +08:00
|
|
|
command = "sed s/USER/${var.ssh_user}/ ../../contrib/terraform/openstack/ansible_bastion_template.txt | sed s/BASTION_ADDRESS/${element( concat(var.bastion_fips, var.k8s_master_fips), 0)}/ > group_vars/no-floating.yml"
|
2018-04-30 23:11:07 +08:00
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "etcd" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-etcd-${count.index+1}"
|
|
|
|
count = "${var.number_of_etcd}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_etcd}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s.name}"]
|
2017-12-05 20:48:47 +08:00
|
|
|
|
2018-01-05 19:09:04 +08:00
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
|
|
|
kubespray_groups = "etcd,vault,no-floating"
|
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-master-nf-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_masters_no_floating_ip}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_master}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s_master.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.k8s.name}",
|
2018-01-05 19:09:04 +08:00
|
|
|
]
|
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-04-30 23:11:07 +08:00
|
|
|
kubespray_groups = "etcd,kube-master,${var.supplementary_master_groups},k8s-cluster,vault,no-floating"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_master_no_floating_ip_no_etcd" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-master-ne-nf-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_masters_no_floating_ip_no_etcd}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_master}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s_master.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.k8s.name}",
|
2018-01-05 19:09:04 +08:00
|
|
|
]
|
2017-12-05 20:48:47 +08:00
|
|
|
|
2018-01-05 19:09:04 +08:00
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-04-30 23:11:07 +08:00
|
|
|
kubespray_groups = "kube-master,${var.supplementary_master_groups},k8s-cluster,vault,no-floating"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_node" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-node-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_nodes}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_node}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2019-04-15 22:22:08 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.worker.name}",
|
|
|
|
]
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-06-28 22:32:59 +08:00
|
|
|
kubespray_groups = "kube-node,k8s-cluster,${var.supplementary_node_groups}"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
|
|
|
|
2018-04-30 23:11:07 +08:00
|
|
|
provisioner "local-exec" {
|
2019-06-05 16:51:55 +08:00
|
|
|
command = "sed s/USER/${var.ssh_user}/ ../../contrib/terraform/openstack/ansible_bastion_template.txt | sed s/BASTION_ADDRESS/${element( concat(var.bastion_fips, var.k8s_node_fips), 0)}/ > group_vars/no-floating.yml"
|
2018-04-30 23:11:07 +08:00
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "k8s_node_no_floating_ip" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-k8s-node-nf-${count.index+1}"
|
|
|
|
count = "${var.number_of_k8s_nodes_no_floating_ip}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image}"
|
|
|
|
flavor_id = "${var.flavor_k8s_node}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2018-09-28 17:35:02 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s.name}",
|
|
|
|
"${openstack_networking_secgroup_v2.worker.name}",
|
2018-01-05 19:09:04 +08:00
|
|
|
]
|
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user}"
|
2018-06-28 22:32:59 +08:00
|
|
|
kubespray_groups = "kube-node,k8s-cluster,no-floating,${var.supplementary_node_groups}"
|
2018-01-05 19:09:04 +08:00
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_floatingip_associate_v2" "bastion" {
|
2019-05-09 17:16:50 +08:00
|
|
|
count = "${var.number_of_bastions}"
|
|
|
|
floating_ip = "${var.bastion_fips[count.index]}"
|
|
|
|
instance_id = "${element(openstack_compute_instance_v2.bastion.*.id, count.index)}"
|
|
|
|
wait_until_associated = "${var.wait_for_floatingip}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_floatingip_associate_v2" "k8s_master" {
|
2019-05-09 17:16:50 +08:00
|
|
|
count = "${var.number_of_k8s_masters}"
|
|
|
|
instance_id = "${element(openstack_compute_instance_v2.k8s_master.*.id, count.index)}"
|
|
|
|
floating_ip = "${var.k8s_master_fips[count.index]}"
|
|
|
|
wait_until_associated = "${var.wait_for_floatingip}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
2019-04-29 13:58:20 +08:00
|
|
|
resource "openstack_compute_floatingip_associate_v2" "k8s_master_no_etcd" {
|
|
|
|
count = "${var.number_of_k8s_masters_no_etcd}"
|
|
|
|
instance_id = "${element(openstack_compute_instance_v2.k8s_master_no_etcd.*.id, count.index)}"
|
|
|
|
floating_ip = "${var.k8s_master_no_etcd_fips[count.index]}"
|
|
|
|
}
|
|
|
|
|
2017-12-05 20:48:47 +08:00
|
|
|
resource "openstack_compute_floatingip_associate_v2" "k8s_node" {
|
2019-05-09 17:16:50 +08:00
|
|
|
count = "${var.number_of_k8s_nodes}"
|
|
|
|
floating_ip = "${var.k8s_node_fips[count.index]}"
|
|
|
|
instance_id = "${element(openstack_compute_instance_v2.k8s_node.*.id, count.index)}"
|
|
|
|
wait_until_associated = "${var.wait_for_floatingip}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_blockstorage_volume_v2" "glusterfs_volume" {
|
2018-01-05 19:09:04 +08:00
|
|
|
name = "${var.cluster_name}-glusterfs_volume-${count.index+1}"
|
|
|
|
count = "${var.number_of_gfs_nodes_no_floating_ip}"
|
2017-12-05 20:48:47 +08:00
|
|
|
description = "Non-ephemeral volume for GlusterFS"
|
2018-01-05 19:09:04 +08:00
|
|
|
size = "${var.gfs_volume_size_in_gb}"
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_instance_v2" "glusterfs_node_no_floating_ip" {
|
2019-02-18 13:04:41 +08:00
|
|
|
name = "${var.cluster_name}-gfs-node-nf-${count.index+1}"
|
|
|
|
count = "${var.number_of_gfs_nodes_no_floating_ip}"
|
2018-07-31 17:18:27 +08:00
|
|
|
availability_zone = "${element(var.az_list, count.index)}"
|
2019-02-18 13:04:41 +08:00
|
|
|
image_name = "${var.image_gfs}"
|
|
|
|
flavor_id = "${var.flavor_gfs_node}"
|
|
|
|
key_pair = "${openstack_compute_keypair_v2.k8s.name}"
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
network {
|
|
|
|
name = "${var.network_name}"
|
|
|
|
}
|
|
|
|
|
2019-04-17 17:10:03 +08:00
|
|
|
security_groups = ["${openstack_networking_secgroup_v2.k8s.name}"]
|
2018-01-05 19:09:04 +08:00
|
|
|
|
|
|
|
metadata = {
|
|
|
|
ssh_user = "${var.ssh_user_gfs}"
|
|
|
|
kubespray_groups = "gfs-cluster,network-storage,no-floating"
|
|
|
|
depends_on = "${var.network_id}"
|
|
|
|
}
|
2017-12-05 20:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "openstack_compute_volume_attach_v2" "glusterfs_volume" {
|
2018-01-05 19:09:04 +08:00
|
|
|
count = "${var.number_of_gfs_nodes_no_floating_ip}"
|
2017-12-05 20:48:47 +08:00
|
|
|
instance_id = "${element(openstack_compute_instance_v2.glusterfs_node_no_floating_ip.*.id, count.index)}"
|
|
|
|
volume_id = "${element(openstack_blockstorage_volume_v2.glusterfs_volume.*.id, count.index)}"
|
|
|
|
}
|