44module "c1" {
55
66 source = " oracle-terraform-modules/oke/oci"
7- version = " 5.1.1 "
7+ version = " 5.2.2 "
88
99 count = lookup (lookup (var. clusters , " c1" ), " enabled" ) ? 1 : 0
1010
1111 home_region = lookup (local. regions , var. home_region )
12-
13- region = lookup (local. regions , lookup (lookup (var. clusters , " c1" ), " region" ))
12+
13+ region = lookup (local. regions , lookup (lookup (var. clusters , " c1" ), " region" ))
1414
1515 tenancy_id = var. tenancy_id
1616
@@ -23,7 +23,7 @@ module "c1" {
2323
2424 # networking
2525 create_drg = var. oke_control_plane == " private" ? true : false
26- drg_display_name = " c1"
26+ drg_display_name = " c1-drg "
2727
2828 remote_peering_connections = var. oke_control_plane == " private" ? {
2929 for k , v in var . clusters : " rpc-to-${ k } " => {} if k != " c1"
@@ -51,7 +51,6 @@ module "c1" {
5151 int_lb = { newbits = 11 , netnum = 16 , dns_label = " ilb" }
5252 pub_lb = { newbits = 11 , netnum = 17 , dns_label = " plb" }
5353 workers = { newbits = 2 , netnum = 1 , dns_label = " workers" }
54- pods = { newbits = 2 , netnum = 2 , dns_label = " pods" }
5554 }
5655
5756 # bastion host
@@ -78,32 +77,54 @@ module "c1" {
7877
7978
8079 # node pools
81- allow_worker_ssh_access = true
82- kubeproxy_mode = " iptables"
83- worker_pool_mode = " node-pool"
84- worker_pools = var. nodepools
85- worker_cloud_init = local. worker_cloud_init
86- worker_image_type = " oke"
80+ allow_worker_ssh_access = true
81+ kubeproxy_mode = " iptables"
82+ worker_pool_mode = " node-pool"
83+ worker_pools = var. nodepools
84+ worker_cloud_init = local. worker_cloud_init
85+ worker_image_type = " oke"
8786
8887 # oke load balancers
8988 load_balancers = " both"
9089 preferred_load_balancer = " public"
9190
92- allow_rules_internal_lb = {
91+ allow_rules_internal_lb = merge ( {
9392 for p in local . service_mesh_ports :
94-
95- format ( " Allow ingress to port %v " , p) => {
96- protocol = local.tcp_protocol, port = p, source = lookup ( lookup (var . clusters , " c2 " ), " vcn " ), source_type = local.rule_type_cidr,
93+ format ( " Allow ingress to port %v from cluster c2 for Istio " , p) => {
94+ protocol = local.tcp_protocol, port = p, source = lookup ( lookup (var . clusters , " c2 " ), " vcn " ),
95+ source_type = local.rule_type_cidr,
9796 }
98- }
99-
100- allow_rules_public_lb = {
97+ },
98+ {
99+ for c in var . clusters : format (" Allow TCP ingress from cluster %v for Cilium clustermesh" , lookup (c, " name" )) => {
100+ protocol = local.tcp_protocol, port = 2379 , source = lookup (c, " vcn" ), source_type = local.rule_type_cidr,
101+ } if lookup (c, " name" ) != " c1"
102+ },
103+ {
104+ for c in var . clusters :
105+ format (" Allow UDP ingress from cluster %v for cross-cluster DNS lookup via NLB for Coherence WKA" , lookup (c, " name" ))
106+ => {
107+ protocol = local.udp_protocol, port = 53 , source = lookup (c, " vcn" ), source_type = local.rule_type_cidr,
108+ } if lookup (c, " name" ) != " c1"
109+ },
110+ )
111+
112+ allow_rules_public_lb = merge ({
101113 for p in local . public_lb_allowed_ports :
102-
103114 format (" Allow ingress to port %v" , p) => {
104115 protocol = local.tcp_protocol, port = p, source = " 0.0.0.0/0" , source_type = local.rule_type_cidr,
105116 }
106- }
117+ },
118+ )
119+
120+ allow_rules_workers = merge (
121+ {
122+ for c in var . clusters :
123+ format (" Allow UDP ingress to workers from cluster %v for default VXLAN" , lookup (c, " name" )) => {
124+ protocol = local.udp_protocol, port = 8472 , source = lookup (c, " vcn" ), source_type = local.rule_type_cidr,
125+ } if lookup (c, " name" ) != " c1"
126+ },
127+ )
107128
108129 user_id = var. user_id
109130
0 commit comments