Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

A Terraform module for configuring GKE clusters.

License

NotificationsYou must be signed in to change notification settings

freexploit/terraform-google-kubernetes-engine

 
 

Repository files navigation

This module handles opinionated Google Cloud Platform Kubernetes Engine cluster creation and configuration with Node Pools, IP MASQ, Network Policy, etc.

The resources/services/activations/deletions that this module will create/trigger are:

  • Create a GKE cluster with the provided addons
  • Create GKE Node Pool(s) with provided configuration and attach to cluster
  • Replace the default kube-dns configmap ifstub_domains are provided
  • Activate network policy ifnetwork_policy is true
  • Addip-masq-agent configmap with providednon_masquerade_cidrs ifnetwork_policy is true

Usage

There are multiple examples included in theexamples folder but simple usage is as follows:

module"gke" {source="terraform-google-modules/kubernetes-engine/google"project_id="<PROJECT ID>"name="gke-test-1"region="us-central1"zones=["us-central1-a","us-central1-b","us-central1-f"]network="vpc-01"subnetwork="us-central1-01"ip_range_pods="us-central1-01-gke-01-pods"ip_range_services="us-central1-01-gke-01-services"http_load_balancing=falsehorizontal_pod_autoscaling=truekubernetes_dashboard=truenetwork_policy=truenode_pools=[    {      name="default-node-pool"      machine_type="n1-standard-2"      min_count=1      max_count=100      disk_size_gb=100      disk_type="pd-standard"      image_type="COS"      auto_repair=true      auto_upgrade=true      service_account="project-service-account@<PROJECT ID>.iam.gserviceaccount.com"    },  ]node_pools_labels={    all= {}    default-node-pool= {      default-node-pool="true"    }  }node_pools_taints={    all= []    default-node-pool= [      {        key="default-node-pool"        value="true"        effect="PREFER_NO_SCHEDULE"      },    ]  }node_pools_tags={    all= []    default-node-pool= ["default-node-pool",    ]  }}

Then perform the following commands on the root folder:

  • terraform init to get the plugins
  • terraform plan to see the infrastructure plan
  • terraform apply to apply the infrastructure build
  • terraform destroy to destroy the built infrastructure^: (autogen_docs_start)

Inputs

NameDescriptionTypeDefaultRequired
descriptionThe description of the clusterstring``no
horizontal_pod_autoscalingEnable horizontal pod autoscaling addonstringfalseno
http_load_balancingEnable httpload balancer addonstringtrueno
ip_masq_link_localWhether to masquerade traffic to the link-local prefix (169.254.0.0/16).stringfalseno
ip_masq_resync_intervalThe interval at which the agent attempts to sync its ConfigMap file from the disk.string60sno
ip_range_podsThe secondary ip range to use for podsstring-yes
ip_range_servicesThe secondary ip range to use for podsstring-yes
kubernetes_dashboardEnable kubernetes dashboard addonstringfalseno
kubernetes_versionThe Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region.string1.10.6-gke.2no
logging_serviceThe logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and nonestringlogging.googleapis.comno
maintenance_start_timeTime window specified for daily maintenance operations in RFC3339 formatstring05:00no
master_authorized_networks_configThe desired configuration options for master authorized networks. Omit the nested cidr_blocks attribute to disallow external access (except the cluster node IPs, which GKE automatically whitelists)

### example format ### master_authorized_networks_config = [{ cidr_blocks = [{ cidr_block = "10.0.0.0/8" display_name = "example_network" }], }]
list<list>no
monitoring_serviceThe monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and nonestringmonitoring.googleapis.comno
nameThe name of the cluster (required)string-yes
networkThe VPC network to host the cluster in (required)string-yes
network_policyEnable network policy addonstringfalseno
network_project_idThe project ID of the shared VPC's host (for shared vpc support)string``no
node_poolsList of maps containing node poolslist<list>no
node_pools_labelsMap of maps containing node labels by node-pool namemap<map>no
node_pools_tagsMap of lists containing node network tags by node-pool namemap<map>no
node_pools_taintsMap of lists containing node taints by node-pool namemap<map>no
node_versionThe Kubernetes version of the node pools. Defaults kubernetes_version (master) variable and can be overridden for individual node pools by setting theversion key on them. Must be empyty or set the same as master at cluster creation.string``no
non_masquerade_cidrsList of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading.list<list>no
project_idThe project ID to host the cluster in (required)string-yes
regionThe region to host the cluster in (required)string-yes
regionalWhether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!)stringtrueno
stub_domainsMap of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS servermap<map>no
subnetworkThe subnetwork to host the cluster in (required)string-yes
zonesThe zones to host the cluster in (optional if regional cluster / required if zonal)list<list>no

Outputs

NameDescription
ca_certificateCluster ca certificate (base64 encoded)
endpointCluster endpoint
horizontal_pod_autoscaling_enabledWhether horizontal pod autoscaling enabled
http_load_balancing_enabledWhether http load balancing enabled
kubernetes_dashboard_enabledWhether kubernetes dashboard enabled
locationCluster location (region if regional cluster, zone if zonal cluster)
logging_serviceLogging service used
master_authorized_networks_configNetworks from which access to master is permitted
master_versionCurrent master kubernetes version
min_master_versionMinimum master kubernetes version
monitoring_serviceMonitoring service used
nameCluster name
network_policy_enabledWhether network policy enabled
node_pools_namesList of node pools names
node_pools_versionsList of node pools versions
regionCluster region
typeCluster type (regional / zonal)
zonesList of zones in which the cluster resides

Requirements

Kubectl

Terraform plugins

Configure a Service Account

In order to execute this module you must have a Service Account with the following:

Roles

The service account with the following roles:

  • roles/compute.viewer on the project
  • roles/container.clusterAdmin on the project

Enable API's

In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:

  • Compute Engine API - compute.googleapis.com
  • Kubernetes Engine API - container.googleapis.com

Install

Terraform

Be sure you have the correct Terraform version (0.10.x), you can choose the binary here:

File structure

The project has the following folders and files:

  • /: root folder
  • /examples: examples for using this module
  • /scripts: Scripts for specific tasks on module (see Infrastructure section on this file)
  • /test: Folders with files for testing the module (see Testing section on this file)
  • /main.tf: main file for this module, contains all the resources to create
  • /variables.tf: all the variables for the module
  • /output.tf: the outputs of the module
  • /readme.MD: this file

Testing

Requirements

Autogeneration of documentation from .tf files

Run

make generate_docs

Integration test

Terraform integration tests

The integration tests for this module leveragekitchen-terraform andkitchen-inspec.

The tests will do the following:

  • Performbundle install command
    • Installskitchen-terraform andkitchen-inspec gems
  • Performkitchen create command
    • Performs aterraform init
  • Performkitchen converge command
    • Performs aterraform apply -auto-approve
  • Performkitchen validate command
    • Performs inspec tests.
      • Shell out togcloud to validate expected resources in GCP.
      • Shell out tokubectl to validate expected resource in Kubernetes.
      • Shell out toterraform to validate outputs.
  • Permoskitchen destroy command
    • Performs aterraform destroy -force

You can use the following command to run the integration test in the root folder

make test_integration

Linting

The makefile in this project will lint or sometimes just format any shell,Python, golang, Terraform, or Dockerfiles. The linters will only be run ifthe makefile finds files with the appropriate file extension.

All of the linter checks are in the default make target, so you just have torun

make -s

The -s is for 'silent'. Successful output looks like this

Running shellcheckRunning flake8Running go fmt and go vetRunning terraform validateRunning hadolint on DockerfilesChecking for required filesTesting the validity of the header check..----------------------------------------------------------------------Ran 2 tests in 0.026sOKChecking file headersThe following lines have trailing whitespace

The lintersare as follows:

  • Shell - shellcheck. Can be found in homebrew
  • Python - flake8. Can be installed with 'pip install flake8'
  • Golang - gofmt. gofmt comes with the standard golang installation. golangis a compiled language so there is no standard linter.
  • Terraform - terraform has a built-in linter in the 'terraform validate'command.
  • Dockerfiles - hadolint. Can be found in homebrew

About

A Terraform module for configuring GKE clusters.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • HCL38.2%
  • Shell20.6%
  • Python19.9%
  • Ruby18.4%
  • Makefile2.9%

[8]ページ先頭

©2009-2025 Movatter.jp