A Terraform module to create a best-practice Google Kubernetes Engine (GKE) cluster.
This module is available on Terraform registry.
The module is designed to be used by Jetstack customers to make it easier for them to create clusters that are secure and follow Jetstack recommendations.It gives them flexibility with certain properties so the cluster can be customised to their needs, but gives fixed values for properties that could lead to issues or insecurity.
0.3
release of this module is planned to be the final release.
After this the module will be deprecated in favour of Google's GKE module.Jetstack will be producing an example project using Google's module as well as migration guidance.
The module requires an existing Google Cloud project, with VPC network and subnetwork for the cluster to use.The subnetwork must be in the same region as the cluster and have pod and service ranges specified.
The module allows the cluster to be extensively customised using input variables.These can be found with documentation in variables.tf
.
The customisable properties include:
Some of the properties of the cluster are fixed based on Jetstack's recommended best-practice settings:
cloud-platform
to manage permissions with IAM.The module itself is located in the root of this repo, and is designed to be used as part of a larger Terraform project.It can be used directly from the Terraform Registry like so:
module "gke-cluster" {
source = "jetstack/gke-cluster/google"
version = "0.3.0"
# insert the 9 required variables here
}
There is an example project in the example/
directory which can be used to test and demonstrate the module. It could also be used as the basis for your own Terraform project.
If private nodes are used then nodes will not have direct access to the internet.This means they cannot pull images hosted outside of the container registry in the same project as the cluster.The example project features a Cloud NAT to give the nodes to access the internet.
This project is licensed under the Apache 2.0 License.For full details see the LICENSE
file.
terraform Deployment workflow 部署工作流程 Before you get started, you need to install environment binaries. In this example the first few steps illustrate how to setup and configure binaries on Mac OSX/Lin
TL;DR: Generating and distributing service account keys poses severe security risks to your organization. They are long-lived credentials that are not automatically rotated. These keys can be leaked a
重要提示:Terraform 所在的 HashiCorp 公司宣布,不允许中国境内使用该公司旗下的企业版的产品和软件(开源版本不受影响)。 Terraform 是一个安全和高效的用来构建、更改和合并基础架构的工具。采用 Go 语言开发。Terraform 可管理已有的流行的服务,并提供自定义解决方案。 Terraform 的关键特性: 架构就是代码 执行计划 资源图 变更自动化
自动化部署使用 Terraform 在 Digital Ocean 上创建服务器,然后 Ansible 在这些服务器上创建和管理测试网络。 安装 注意:请参阅集成 bash 脚本,它可以在一个新的 DO 液滴上运行,并将自动启动一个 4 节点的测试网络。脚本或多或少完成了下面描述的所有工作。 在 Linux 机器上安装 Terraform 和 Ansible。 创建一个带读写能力的 Digital
Terraform是一个开源的互动高度场的产生和处理程序,使您能够生成随机地形和改变它。 Terraform 允许您创建分形地形(也称为高度场)和改造它使用了一些算法。其目的是为那些将要生成谁在光线跟踪或其他模拟使用数字地形模型的工具。 Terraform功能不同的看法和colormaps并预览模式,功能的交互式实时地形对象时旋转。 Terraform运行于GNOME桌面环境。
Terraform Landscape Terraform Landscape is a tool for reformatting the output of terraform planto be easier to read and understand. Before After Requirements Installation Usage Requirements Ruby 2.5+
mastodon-terraform Boilerplate for running Mastodon on AWS using Terraform and CircleCI. ┌---------------┐| Web Browser |└---------------┘▲ ▲| |(HTTPS) (WSS)|
Kubestack The Open Source Gitops Framework Join Our Contributors! Introduction Kubestack is a Gitops framework for managed Kubernetes services based on Terraform and Kustomize. Features Provides full