dynk8s-provisioner/terraform
Dustin c63c4d9e8c
dustin/dynk8s-provisioner/pipeline/head This commit looks good Details
tf/userdata: Taint node for Jenkins only
If a Jenkins job runs for a while, Kubernetes may schedule other Pods
on it eventually.  If a long-running Pod gets assigned to the ephemeral
node, the Cluster Autoscaler won't be able to scale down the ASG.  To
prevent this, we apply a taint to the node so normal Pods will not get
assigned to it.  We have to apply the corresponding toleration to Pods
for Jenkins jobs.
2024-02-13 07:52:54 -06:00
..
.gitattributes terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.gitignore terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.terraform.lock.hcl terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
README.md terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
asg.tf tf/asg: Use larger instance type 2024-02-13 07:41:05 -06:00
eventbridge.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
iam-policy.json tf/asg: Look up Fedora AMI by attributes 2023-11-13 20:27:50 -06:00
main.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
sns.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
terraform.tfstate tf/userdata: Taint node for Jenkins only 2024-02-13 07:52:54 -06:00
userdata.yml tf/userdata: Taint node for Jenkins only 2024-02-13 07:52:54 -06:00
variables.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00

README.md

Configuring AWS Using Terraform

Prerequisites

The IAM user or role that runs Terraform must have the appropriate permissions. The iam-policy.json file defines a policy that will allow the Terraform to manage all of the necessary resources. Before running Terraform, create an IAM policy and assign it to a user, group, or role. Be sure to replace the AWS account ID in the various target resource names.

To use an IAM role, set the iam_role Terraform variable when executing terraform plan/terraform apply.

Create Resources

Terraform will create all resources automatically:

terraform apply