mirror of
https://github.com/vcscsvcscs/OCI-Kubernetes-cluster-with-traefik.git
synced 2025-08-12 13:59:09 +02:00
144 lines
3.5 KiB
HCL
144 lines
3.5 KiB
HCL
resource "oci_core_instance_configuration" "k3s_server_template" {
|
|
|
|
compartment_id = var.compartment_ocid
|
|
display_name = "k3s server configuration"
|
|
|
|
timeouts {
|
|
create = "11m"
|
|
update = "11m"
|
|
delete = "10m"
|
|
}
|
|
|
|
freeform_tags = {
|
|
"provisioner" = "terraform"
|
|
"environment" = "${var.environment}"
|
|
"${var.unique_tag_key}" = "${var.unique_tag_value}"
|
|
"k3s-template-type" = "k3s-server"
|
|
}
|
|
|
|
instance_details {
|
|
instance_type = "compute"
|
|
|
|
launch_details {
|
|
|
|
agent_config {
|
|
is_management_disabled = "false"
|
|
is_monitoring_disabled = "false"
|
|
|
|
plugins_config {
|
|
desired_state = "DISABLED"
|
|
name = "Vulnerability Scanning"
|
|
}
|
|
|
|
plugins_config {
|
|
desired_state = "ENABLED"
|
|
name = "Compute Instance Monitoring"
|
|
}
|
|
|
|
plugins_config {
|
|
desired_state = "DISABLED"
|
|
name = "Bastion"
|
|
}
|
|
}
|
|
|
|
availability_domain = var.availability_domain
|
|
compartment_id = var.compartment_ocid
|
|
|
|
create_vnic_details {
|
|
assign_public_ip = true
|
|
subnet_id = oci_core_subnet.default_oci_core_subnet10.id
|
|
nsg_ids = [oci_core_network_security_group.lb_to_instances_kubeapi.id]
|
|
}
|
|
|
|
display_name = "k3s server template"
|
|
|
|
metadata = {
|
|
"ssh_authorized_keys" = file(var.public_key_path)
|
|
"user_data" = data.cloudinit_config.k3s_server_tpl.rendered
|
|
}
|
|
|
|
shape = var.server_compute_shape
|
|
shape_config {
|
|
memory_in_gbs = "1"
|
|
ocpus = "1"
|
|
}
|
|
source_details {
|
|
image_id = var.server_os_image_id
|
|
source_type = "image"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "oci_core_instance_configuration" "k3s_worker_template" {
|
|
|
|
compartment_id = var.compartment_ocid
|
|
display_name = "k3s worker configuration"
|
|
|
|
freeform_tags = {
|
|
"provisioner" = "terraform"
|
|
"environment" = "${var.environment}"
|
|
"${var.unique_tag_key}" = "${var.unique_tag_value}"
|
|
"k3s-template-type" = "k3s-worker"
|
|
}
|
|
|
|
timeouts {
|
|
create = "11m"
|
|
update = "11m"
|
|
delete = "10m"
|
|
}
|
|
|
|
instance_details {
|
|
instance_type = "compute"
|
|
|
|
launch_details {
|
|
|
|
agent_config {
|
|
is_management_disabled = "false"
|
|
is_monitoring_disabled = "false"
|
|
|
|
plugins_config {
|
|
desired_state = "DISABLED"
|
|
name = "Vulnerability Scanning"
|
|
}
|
|
|
|
plugins_config {
|
|
desired_state = "ENABLED"
|
|
name = "Compute Instance Monitoring"
|
|
}
|
|
|
|
plugins_config {
|
|
desired_state = "DISABLED"
|
|
name = "Bastion"
|
|
}
|
|
}
|
|
|
|
availability_domain = var.availability_domain
|
|
# fault_domain = "FAULT-DOMAIN-3"
|
|
compartment_id = var.compartment_ocid
|
|
|
|
create_vnic_details {
|
|
assign_public_ip = true
|
|
subnet_id = oci_core_subnet.default_oci_core_subnet10.id
|
|
nsg_ids = [oci_core_network_security_group.lb_to_instances_http.id]
|
|
}
|
|
|
|
display_name = "k3s worker template"
|
|
|
|
metadata = {
|
|
"ssh_authorized_keys" = file(var.public_key_path)
|
|
"user_data" = data.cloudinit_config.k3s_worker_tpl.rendered
|
|
}
|
|
|
|
shape = var.agent_compute_shape
|
|
shape_config {
|
|
memory_in_gbs = "12"
|
|
ocpus = "2"
|
|
}
|
|
source_details {
|
|
image_id = var.agent_os_image_id
|
|
source_type = "image"
|
|
}
|
|
}
|
|
}
|
|
} |