@@ -59,7 +59,6 @@ parse_params "$@"
5959
6060load_cluster_state_env
6161check_provision_env -p
62- load_provision_values
6362save_cluster_env
6463
6564load_cluster_state_env
@@ -68,100 +67,25 @@ if ! load_scm_auth; then
6867fi
6968save_scm_auth
7069
71- update_kube_config
72-
7370#
7471# Create Cluster Configuration
7572#
76- export FILE_SYSTEM_ID=$( aws efs --region ${AWS_REGION} describe-file-systems --query " FileSystems[?Name == '${CLUSTER_NAME} '].FileSystemId" --output text)
77- export S3_PREFIX=$( get_s3_prefix)
78-
79- export TRAEFIK_TG_HASH=$( echo -n " ${CLUSTER_NAME} -traefik-default" | sha256sum | cut -c-32)
80- export TRAEFIKGRPC_TG_HASH=$( echo -n " ${CLUSTER_NAME} -traefik-grpc" | sha256sum | cut -c-32)
81- export NGINX_TG_HASH=$( echo -n " ${CLUSTER_NAME} -traefik2-https" | sha256sum | cut -c-32)
82- export ARGOCD_TG_HASH=$( echo -n " ${CLUSTER_NAME} -argocd-default" | sha256sum | cut -c-32)
83-
84- export TRAEFIK_TG_ARN=$( aws elbv2 describe-target-groups --names ${TRAEFIK_TG_HASH} | jq -r ' .TargetGroups[].TargetGroupArn' )
85- if [ -z $TRAEFIK_TG_ARN ]; then
86- export TRAEFIK_TG_ARN=$( aws elbv2 describe-target-groups --names ${CLUSTER_NAME} -traefik-https | jq -r ' .TargetGroups[].TargetGroupArn' )
87- fi
88- if [ -z $TRAEFIK_TG_ARN ]; then
89- echo " error: Load balancer Target Group for ${CLUSTER_NAME} not found."
73+ if [ -z " $FILE_SYSTEM_ID " ] || [ -z " $TRAEFIK_TG_ARN " ] || [ -z " $ARGOCD_TG_ARN " ]; then
74+ echo " Missing one or more of: FILE_SYSTEM_ID, TRAEFIK_TG_ARN, ARGOCD_TG_ARN"
75+ echo " Please run provision.sh first."
9076 exit 1
9177fi
9278
93- export TRAEFIKGRPC_TG_ARN=$( aws elbv2 describe-target-groups --names ${TRAEFIKGRPC_TG_HASH} | jq -r ' .TargetGroups[].TargetGroupArn' )
94- export NGINX_TG_ARN=$( aws elbv2 describe-target-groups --names ${NGINX_TG_HASH} | jq -r ' .TargetGroups[].TargetGroupArn' )
95- export ARGOCD_TG_ARN=$( aws elbv2 describe-target-groups --names ${ARGOCD_TG_HASH} | jq -r ' .TargetGroups[].TargetGroupArn' )
96- if [ -z $ARGOCD_TG_ARN ]; then
97- export ARGOCD_TG_ARN=$( aws elbv2 describe-target-groups --names ${CLUSTER_NAME} -argocd-https | jq -r ' .TargetGroups[].TargetGroupArn' )
98- fi
99-
100-
101- # AO_PROFILE disabled check
102- if [ " ${DISABLE_CO_PROFILE:- false} " = " true" ] || [ " ${DISABLE_AO_PROFILE:- false} " = " true" ]; then
103- export AO_PROFILE=" #- orch-configs/profiles/enable-app-orch.yaml"
104- else
105- export AO_PROFILE=" - orch-configs/profiles/enable-app-orch.yaml"
106- fi
107-
108- # CO_PROFILE disabled check
109- if [ " ${DISABLE_CO_PROFILE:- false} " = " true" ]; then
110- export CO_PROFILE=" #- orch-configs/profiles/enable-cluster-orch.yaml"
111- export AO_PROFILE=" #- orch-configs/profiles/enable-app-orch.yaml"
112- else
113- export CO_PROFILE=" - orch-configs/profiles/enable-cluster-orch.yaml"
114- fi
115-
116- if [ -n " $SRE_BASIC_AUTH_USERNAME " ] || [ -n " $SRE_BASIC_AUTH_PASSWORD " ] || [ -n " $SRE_DESTINATION_SECRET_URL " ] || [ -n " $SRE_DESTINATION_CA_SECRET " ]; then
117- export SRE_PROFILE=" - orch-configs/profiles/enable-sre.yaml"
118- else
119- export SRE_PROFILE=" #- orch-configs/profiles/enable-sre.yaml"
120- fi
121-
122- if [ -z $SINGLE_TENANCY ]; then
123- export SINGLE_TENANCY_PROFILE=" #- orch-configs/profiles/enable-singleTenancy.yaml"
124- else
125- export SINGLE_TENANCY_PROFILE=" - orch-configs/profiles/enable-singleTenancy.yaml"
126- fi
127-
128- if [ " ${DISABLE_O11Y:- false} " = " true" ]; then
129- export O11Y_ENABLE_PROFILE=" #- orch-configs/profiles/enable-o11y.yaml"
130- else
131- export O11Y_ENABLE_PROFILE=" - orch-configs/profiles/enable-o11y.yaml"
132- fi
79+ export FILE_SYSTEM_ID
80+ export TRAEFIK_TG_ARN
81+ export TRAEFIKGRPC_TG_ARN
82+ export NGINX_TG_ARN
83+ export ARGOCD_TG_ARN
84+ export S3_PREFIX
13385
134- if [ -z $SMTP_URL ]; then
135- export EMAIL_PROFILE=" #- orch-configs/profiles/alerting-emails.yaml"
136- else
137- export EMAIL_PROFILE=" - orch-configs/profiles/alerting-emails.yaml"
138- fi
86+ source ./generate_cluster_yaml.sh aws
13987
140- if [ -z $AUTO_CERT ]; then
141- export AUTOCERT_PROFILE=" #- orch-configs/profiles/profile-autocert.yaml"
142- else
143- export AUTOCERT_PROFILE=" - orch-configs/profiles/profile-autocert.yaml"
144- fi
145-
146- export AWS_PROD_PROFILE=" - orch-configs/profiles/profile-aws-production.yaml"
147- if [[ " $DISABLE_AWS_PROD_PROFILE " == " true" ]]; then
148- export AWS_PROD_PROFILE=" #- orch-configs/profiles/profile-aws-production.yaml"
149- fi
150-
151- if [ " ${DISABLE_O11Y:- false} " = " true" ]; then
152- export O11Y_PROFILE=" #- orch-configs/profiles/o11y-release.yaml"
153- else
154- export O11Y_PROFILE=" - orch-configs/profiles/o11y-release.yaml"
155- if [[ " $CLUSTER_SCALE_PROFILE " == " 500en" || " $CLUSTER_SCALE_PROFILE " == " 1ken" || " $CLUSTER_SCALE_PROFILE " == " 10ken" ]]; then
156- export O11Y_PROFILE=" - orch-configs/profiles/o11y-release-large.yaml"
157- fi
158- fi
159-
160- export CLUSTER_SCALE_PROFILE=$( grep -oP ' ^# Profile: "\K[^"]+' ~ /pod-configs/SAVEME/${AWS_ACCOUNT} -${CLUSTER_NAME} -profile.tfvar)
161-
162- echo
163- echo " Creating cluster definition for ${CLUSTER_NAME} "
164- cat cluster.tpl | envsubst > edge-manageability-framework/orch-configs/clusters/${CLUSTER_NAME} .yaml
88+ cp -rf ${CLUSTER_NAME} .yaml edge-manageability-framework/orch-configs/clusters/
16589
16690echo
16791echo =============================================================================
0 commit comments