|
| 1 | + |
| 2 | +############################################################################## |
| 3 | +# Provision an OCP cluster with one extra worker pool inside a VPC |
| 4 | +############################################################################## |
| 5 | + |
| 6 | +module "resource_group" { |
| 7 | + source = "terraform-ibm-modules/resource-group/ibm" |
| 8 | + version = "1.0.6" |
| 9 | + # if an existing resource group is not set (null) create a new one using prefix |
| 10 | + resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null |
| 11 | + existing_resource_group_name = var.resource_group |
| 12 | +} |
| 13 | + |
| 14 | +module "cos_fscloud" { |
| 15 | + source = "terraform-ibm-modules/cos/ibm" |
| 16 | + version = "6.10.0" |
| 17 | + resource_group_id = module.resource_group.resource_group_id |
| 18 | + create_cos_bucket = false |
| 19 | + cos_instance_name = "${var.prefix}-cos" |
| 20 | + skip_iam_authorization_policy = true |
| 21 | + |
| 22 | + sysdig_crn = module.observability_instances.sysdig_crn |
| 23 | + activity_tracker_crn = local.at_crn |
| 24 | + # Don't set CBR rules here as we don't want to create a circular dependency with the VPC module |
| 25 | +} |
| 26 | + |
| 27 | +module "flowlogs_bucket" { |
| 28 | + source = "terraform-ibm-modules/cos/ibm//modules/buckets" |
| 29 | + version = "6.10.0" |
| 30 | + |
| 31 | + bucket_configs = [ |
| 32 | + { |
| 33 | + bucket_name = "${var.prefix}-vpc-flowlogs" |
| 34 | + kms_encryption_enabled = true |
| 35 | + kms_guid = var.hpcs_instance_guid |
| 36 | + kms_key_crn = var.hpcs_key_crn_cluster |
| 37 | + region_location = var.region |
| 38 | + resource_instance_id = module.cos_fscloud.cos_instance_id |
| 39 | + resource_group_id = module.resource_group.resource_group_id |
| 40 | + } |
| 41 | + ] |
| 42 | +} |
| 43 | + |
| 44 | +############################################################################## |
| 45 | +# VPC |
| 46 | +############################################################################## |
| 47 | +module "vpc" { |
| 48 | + depends_on = [module.flowlogs_bucket] |
| 49 | + source = "terraform-ibm-modules/landing-zone-vpc/ibm" |
| 50 | + version = "7.3.2" |
| 51 | + resource_group_id = module.resource_group.resource_group_id |
| 52 | + region = var.region |
| 53 | + prefix = var.prefix |
| 54 | + tags = [] |
| 55 | + name = var.vpc_name |
| 56 | + address_prefixes = { |
| 57 | + zone-1 = ["10.10.10.0/24"] |
| 58 | + zone-2 = ["10.20.10.0/24"] |
| 59 | + zone-3 = ["10.30.10.0/24"] |
| 60 | + } |
| 61 | + clean_default_acl = true |
| 62 | + clean_default_security_group = true |
| 63 | + enable_vpc_flow_logs = true |
| 64 | + create_authorization_policy_vpc_to_cos = true |
| 65 | + existing_storage_bucket_name = module.flowlogs_bucket.bucket_configs[0].bucket_name |
| 66 | + security_group_rules = [] |
| 67 | + existing_cos_instance_guid = module.cos_fscloud.cos_instance_guid |
| 68 | + subnets = { |
| 69 | + zone-1 = [ |
| 70 | + { |
| 71 | + acl_name = "vpc-acl" |
| 72 | + name = "zone-1" |
| 73 | + cidr = "10.10.10.0/24" |
| 74 | + } |
| 75 | + ], |
| 76 | + zone-2 = [ |
| 77 | + { |
| 78 | + acl_name = "vpc-acl" |
| 79 | + name = "zone-2" |
| 80 | + cidr = "10.20.10.0/24" |
| 81 | + } |
| 82 | + ], |
| 83 | + zone-3 = [ |
| 84 | + { |
| 85 | + acl_name = "vpc-acl" |
| 86 | + name = "zone-3" |
| 87 | + cidr = "10.30.10.0/24" |
| 88 | + } |
| 89 | + ] } |
| 90 | + use_public_gateways = { |
| 91 | + zone-1 = false |
| 92 | + zone-2 = false |
| 93 | + zone-3 = false |
| 94 | + } |
| 95 | + ibmcloud_api_key = var.ibmcloud_api_key |
| 96 | +} |
| 97 | + |
| 98 | +############################################################################## |
| 99 | +# Observability Instances (Sysdig + AT) |
| 100 | +############################################################################## |
| 101 | + |
| 102 | +locals { |
| 103 | + existing_at = var.existing_at_instance_crn != null ? true : false |
| 104 | + at_crn = var.existing_at_instance_crn == null ? module.observability_instances.activity_tracker_crn : var.existing_at_instance_crn |
| 105 | +} |
| 106 | + |
| 107 | + |
| 108 | +# Create Sysdig and Activity Tracker instance |
| 109 | +module "observability_instances" { |
| 110 | + source = "terraform-ibm-modules/observability-instances/ibm" |
| 111 | + version = "2.7.0" |
| 112 | + providers = { |
| 113 | + logdna.at = logdna.at |
| 114 | + logdna.ld = logdna.ld |
| 115 | + } |
| 116 | + region = var.region |
| 117 | + resource_group_id = module.resource_group.resource_group_id |
| 118 | + sysdig_instance_name = "${var.prefix}-sysdig" |
| 119 | + sysdig_plan = "graduated-tier" |
| 120 | + enable_platform_logs = false |
| 121 | + enable_platform_metrics = false |
| 122 | + logdna_provision = false |
| 123 | + activity_tracker_instance_name = "${var.prefix}-at" |
| 124 | + activity_tracker_plan = "7-day" |
| 125 | + activity_tracker_provision = !local.existing_at |
| 126 | +} |
| 127 | + |
| 128 | +############################################################################## |
| 129 | +# Get Cloud Account ID |
| 130 | +############################################################################## |
| 131 | + |
| 132 | +data "ibm_iam_account_settings" "iam_account_settings" { |
| 133 | +} |
| 134 | + |
| 135 | + |
| 136 | +############################################################################## |
| 137 | +# Create CBR Zone and Rules |
| 138 | +############################################################################## |
| 139 | +module "cbr_zone" { |
| 140 | + source = "terraform-ibm-modules/cbr/ibm//cbr-zone-module" |
| 141 | + version = "1.2.0" |
| 142 | + name = "${var.prefix}-VPC-network-zone" |
| 143 | + zone_description = "CBR Network zone containing VPC" |
| 144 | + account_id = data.ibm_iam_account_settings.iam_account_settings.account_id |
| 145 | + addresses = [{ |
| 146 | + type = "vpc", # to bind a specific vpc to the zone |
| 147 | + value = module.vpc.vpc_crn, |
| 148 | + }] |
| 149 | +} |
| 150 | + |
| 151 | +module "cbr_rules" { |
| 152 | + source = "terraform-ibm-modules/cbr/ibm//cbr-rule-module" |
| 153 | + version = "1.2.0" |
| 154 | + rule_description = "${var.prefix} rule for vpc flow log access to cos" |
| 155 | + enforcement_mode = "enabled" |
| 156 | + resources = [{ |
| 157 | + attributes = [ |
| 158 | + { |
| 159 | + name = "accountId" |
| 160 | + value = data.ibm_iam_account_settings.iam_account_settings.account_id |
| 161 | + operator = "stringEquals" |
| 162 | + }, |
| 163 | + { |
| 164 | + name = "resourceGroupId", |
| 165 | + value = module.resource_group.resource_group_id |
| 166 | + operator = "stringEquals" |
| 167 | + }, |
| 168 | + { |
| 169 | + name = "serviceInstance" |
| 170 | + value = module.cos_fscloud.cos_instance_id |
| 171 | + operator = "stringEquals" |
| 172 | + }, |
| 173 | + { |
| 174 | + name = "serviceName" |
| 175 | + value = "cloud-object-storage" |
| 176 | + operator = "stringEquals" |
| 177 | + } |
| 178 | + ], |
| 179 | + }] |
| 180 | + rule_contexts = [{ |
| 181 | + attributes = [ |
| 182 | + { |
| 183 | + "name" : "endpointType", |
| 184 | + "value" : "private" |
| 185 | + }, |
| 186 | + { |
| 187 | + name = "networkZoneId" |
| 188 | + value = module.cbr_zone.zone_id |
| 189 | + }] |
| 190 | + }] |
| 191 | +} |
| 192 | + |
| 193 | + |
| 194 | + |
| 195 | +############################################################################## |
| 196 | +# Base OCP Cluster |
| 197 | +############################################################################## |
| 198 | +locals { |
| 199 | + cluster_hpcs_worker_pool_key_id = regex("key:(.*)", var.hpcs_key_crn_worker_pool)[0] |
| 200 | + cluster_hpcs_cluster_key_id = regex("key:(.*)", var.hpcs_key_crn_cluster)[0] |
| 201 | + cluster_vpc_subnets = { |
| 202 | + default = [ |
| 203 | + for subnet in module.vpc.subnet_zone_list : |
| 204 | + { |
| 205 | + id = subnet.id |
| 206 | + zone = subnet.zone |
| 207 | + cidr_block = subnet.cidr |
| 208 | + } |
| 209 | + ] |
| 210 | + } |
| 211 | + |
| 212 | + worker_pools = [ |
| 213 | + { |
| 214 | + subnet_prefix = "default" |
| 215 | + pool_name = "default" # ibm_container_vpc_cluster automatically names default pool "default" (See https://github.com/IBM-Cloud/terraform-provider-ibm/issues/2849) |
| 216 | + machine_type = "bx2.4x16" |
| 217 | + workers_per_zone = 2 |
| 218 | + labels = {} |
| 219 | + resource_group_id = module.resource_group.resource_group_id |
| 220 | + boot_volume_encryption_kms_config = { |
| 221 | + crk = local.cluster_hpcs_worker_pool_key_id |
| 222 | + kms_instance_id = var.hpcs_instance_guid |
| 223 | + private_endpoint = true |
| 224 | + } |
| 225 | + } |
| 226 | + ] |
| 227 | +} |
| 228 | + |
| 229 | +module "ocp_fscloud" { |
| 230 | + source = "../../modules/fscloud" |
| 231 | + cluster_name = var.prefix |
| 232 | + ibmcloud_api_key = var.ibmcloud_api_key |
| 233 | + resource_group_id = module.resource_group.resource_group_id |
| 234 | + region = "us-south" |
| 235 | + force_delete_storage = true |
| 236 | + vpc_id = module.vpc.vpc_id |
| 237 | + vpc_subnets = local.cluster_vpc_subnets |
| 238 | + existing_cos_id = module.cos_fscloud.cos_instance_id |
| 239 | + worker_pools = local.worker_pools |
| 240 | + tags = var.resource_tags |
| 241 | + verify_worker_network_readiness = false # No access from public internet to check worker network readiness |
| 242 | + kms_config = { |
| 243 | + instance_id = var.hpcs_instance_guid |
| 244 | + crk_id = local.cluster_hpcs_cluster_key_id |
| 245 | + private_endpoint = true |
| 246 | + } |
| 247 | +} |
| 248 | + |
| 249 | +############################################################################## |
0 commit comments