-
-
Notifications
You must be signed in to change notification settings - Fork 28
/
node_groups.tf
150 lines (124 loc) · 5.04 KB
/
node_groups.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
data "aws_ssm_parameter" "bottlerocket_ami" {
name = "/aws/service/bottlerocket/aws-k8s-${var.cluster_version}/x86_64/latest/image_id"
}
data "aws_ssm_parameter" "eks_al2_ami" {
name = "/aws/service/eks/optimized-ami/${var.cluster_version}/amazon-linux-2/recommended/image_id"
}
module "eks_mng_bottlerocket_custom_ami" {
source = "github.com/terraform-aws-modules/terraform-aws-eks/modules/_user_data"
platform = "bottlerocket"
cluster_name = var.environment_name
cluster_endpoint = aws_eks_cluster.cluster.endpoint
cluster_auth_base64 = aws_eks_cluster.cluster.certificate_authority[0].data
cluster_service_cidr = aws_eks_cluster.cluster.kubernetes_network_config.0.service_ipv4_cidr
enable_bootstrap_user_data = true
bootstrap_extra_args = <<-EOT
# extra args added
[settings.kernel]
lockdown = "integrity"
EOT
}
resource "aws_launch_template" "encrypted_launch_template" {
for_each = var.node_groups != null ? { for k, v in var.node_groups : k => v if lookup(v, "node_disk_encrypted", false) == true } : {}
name_prefix = "${var.environment_name}-${each.key}"
image_id = data.aws_ssm_parameter.bottlerocket_ami.value
user_data = module.eks_mng_bottlerocket_custom_ami.user_data
metadata_options {
http_endpoint = "enabled"
http_tokens = "required"
}
monitoring {
enabled = true
}
block_device_mappings {
device_name = "/dev/xvda"
no_device = true
ebs {
delete_on_termination = true
volume_size = 2
volume_type = "gp3"
encrypted = true
}
}
block_device_mappings {
device_name = "/dev/xvdb"
no_device = true
ebs {
delete_on_termination = true
volume_size = lookup(each.value, "node_disk_size", 20)
volume_type = "gp3"
encrypted = true
}
}
}
resource "aws_eks_node_group" "node_group" {
for_each = var.node_groups
cluster_name = aws_eks_cluster.cluster.name
node_group_name = "${var.environment_name}-${each.key}"
node_role_arn = aws_iam_role.node.arn
subnet_ids = length(lookup(each.value, "subnet_ids", [])) == 0 ? (lookup(each.value, "nodes_in_public_subnet", true) ? aws_subnet.public.*.id : aws_subnet.private.*.id) : lookup(each.value, "subnet_ids", [])
ami_type = lookup(each.value, "node_disk_encrypted", false) ? "CUSTOM" : lookup(each.value, "ami_type", "BOTTLEROCKET_x86_64")
instance_types = lookup(each.value, "instance_types", ["t2.micro"])
disk_size = lookup(each.value, "node_disk_encrypted", false) ? null : lookup(each.value, "node_disk_size", null)
capacity_type = lookup(each.value, "capacity_type", "ON_DEMAND")
labels = lookup(each.value, "labels", {})
dynamic "launch_template" {
for_each = lookup(each.value, "node_disk_encrypted", false) ? [{
id = aws_launch_template.encrypted_launch_template[each.key].id
version = "$Latest"
}] : lookup(each.value, "launch_template", [])
content {
id = lookup(launch_template.value, "id", null)
name = lookup(launch_template.value, "name", null)
version = lookup(launch_template.value, "version")
}
}
scaling_config {
desired_size = lookup(each.value, "node_desired_capacity", 1)
max_size = lookup(each.value, "nodes_max_size", 1)
min_size = lookup(each.value, "nodes_min_size", 1)
}
update_config {
max_unavailable_percentage = lookup(each.value, "update_unavailable_percent", 50)
}
dynamic "taint" {
for_each = lookup(each.value, "taints", [])
content {
key = taint.value["key"]
value = lookup(taint.value, "value", null)
effect = taint.value["effect"]
}
}
tags = merge(
local.tags,
{
"Name" = "${var.environment_name}-${each.key}"
"karpenter.sh/discovery" = var.environment_name
},
)
# Ensure that IAM Role permissions are created before and deleted after EKS Node Group handling.
# Otherwise, EKS will not be able to properly delete EC2 Instances and Elastic Network Interfaces.
depends_on = [
aws_iam_role_policy_attachment.node-AmazonEKSWorkerNodePolicy,
aws_iam_role_policy_attachment.node-AmazonEKS_CNI_Policy,
aws_iam_role_policy_attachment.node-AmazonEC2ContainerRegistryReadOnly,
]
}
resource "aws_cloudwatch_metric_alarm" "node_group_cpu_threshold" {
# One Alarm Per One Node Group
for_each = aws_eks_node_group.node_group
alarm_name = "${var.environment_name}-${each.value.node_group_name}"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "2"
metric_name = "CPUUtilization"
namespace = "AWS/EC2"
period = "300"
statistic = "Average"
threshold = var.node_group_cpu_threshold
alarm_description = "This metric monitors ec2 cpu utilization"
insufficient_data_actions = []
dimensions = {
AutoScalingGroupName = join("", flatten(each.value.resources[*].autoscaling_groups.*.name))
}
tags = local.tags
}