From 1c0b57878c9ac06b707ce52a2f381b244f4ea7ac Mon Sep 17 00:00:00 2001 From: Spike Date: Thu, 9 May 2019 14:18:09 +0100 Subject: Adding cluster, and security groups to allow comms with worker nodes --- terraform/eks.tf | 15 +++++++++++++++ terraform/iam.tf | 40 ++++++++++++++++++++++++++++++++++++++++ terraform/sg.tf | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 104 insertions(+) create mode 100644 terraform/eks.tf diff --git a/terraform/eks.tf b/terraform/eks.tf new file mode 100644 index 0000000..6fdaf42 --- /dev/null +++ b/terraform/eks.tf @@ -0,0 +1,15 @@ +resource "aws_eks_cluster" "sensyne_demo_cluster" { + name = "${var.cluster_name}" + role_arn = "${aws_iam_role.sensyne_demo_cluster.arn}" + + vpc_config { + security_group_ids = ["${aws_security_group.sensyne_demo_cluster.id}"] + subnet_ids = ["${aws_subnet.sensyne_demo_subnet.*.id}"] + } + + depends_on = [ + "aws_iam_role_policy_attachment.demo_cluster_AmazonEKSClusterPolicy", + "aws_iam_role_policy_attachment.demo_cluster_AmazonEKSServicePolicy", + ] +} + diff --git a/terraform/iam.tf b/terraform/iam.tf index 0286993..ed61946 100644 --- a/terraform/iam.tf +++ b/terraform/iam.tf @@ -26,3 +26,43 @@ resource "aws_iam_role_policy_attachment" "demo_cluster_AmazonEKSServicePolicy" policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy" role = "${aws_iam_role.sensyne_demo_cluster.name}" } + +resource "aws_iam_role" "sensyne_demo_node" { + name = "sensyne_demo_node" + + assume_role_policy = <