locals { cluster_name = "existingsg.example.com" master_autoscaling_group_ids = [aws_autoscaling_group.master-us-test-1a-masters-existingsg-example-com.id, aws_autoscaling_group.master-us-test-1b-masters-existingsg-example-com.id, aws_autoscaling_group.master-us-test-1c-masters-existingsg-example-com.id] master_security_group_ids = ["sg-master-1a", "sg-master-1b", aws_security_group.masters-existingsg-example-com.id] masters_role_arn = aws_iam_role.masters-existingsg-example-com.arn masters_role_name = aws_iam_role.masters-existingsg-example-com.name node_autoscaling_group_ids = [aws_autoscaling_group.nodes-existingsg-example-com.id] node_security_group_ids = ["sg-nodes"] node_subnet_ids = [aws_subnet.us-test-1a-existingsg-example-com.id] nodes_role_arn = aws_iam_role.nodes-existingsg-example-com.arn nodes_role_name = aws_iam_role.nodes-existingsg-example-com.name region = "us-test-1" route_table_public_id = aws_route_table.existingsg-example-com.id subnet_us-test-1a_id = aws_subnet.us-test-1a-existingsg-example-com.id subnet_us-test-1b_id = aws_subnet.us-test-1b-existingsg-example-com.id subnet_us-test-1c_id = aws_subnet.us-test-1c-existingsg-example-com.id vpc_cidr_block = aws_vpc.existingsg-example-com.cidr_block vpc_id = aws_vpc.existingsg-example-com.id vpc_ipv6_cidr_block = aws_vpc.existingsg-example-com.ipv6_cidr_block vpc_ipv6_cidr_length = local.vpc_ipv6_cidr_block == "" ? null : tonumber(regex(".*/(\\d+)", local.vpc_ipv6_cidr_block)[0]) } output "cluster_name" { value = "existingsg.example.com" } output "master_autoscaling_group_ids" { value = [aws_autoscaling_group.master-us-test-1a-masters-existingsg-example-com.id, aws_autoscaling_group.master-us-test-1b-masters-existingsg-example-com.id, aws_autoscaling_group.master-us-test-1c-masters-existingsg-example-com.id] } output "master_security_group_ids" { value = ["sg-master-1a", "sg-master-1b", aws_security_group.masters-existingsg-example-com.id] } output "masters_role_arn" { value = aws_iam_role.masters-existingsg-example-com.arn } output "masters_role_name" { value = aws_iam_role.masters-existingsg-example-com.name } output "node_autoscaling_group_ids" { value = [aws_autoscaling_group.nodes-existingsg-example-com.id] } output "node_security_group_ids" { value = ["sg-nodes"] } output "node_subnet_ids" { value = [aws_subnet.us-test-1a-existingsg-example-com.id] } output "nodes_role_arn" { value = aws_iam_role.nodes-existingsg-example-com.arn } output "nodes_role_name" { value = aws_iam_role.nodes-existingsg-example-com.name } output "region" { value = "us-test-1" } output "route_table_public_id" { value = aws_route_table.existingsg-example-com.id } output "subnet_us-test-1a_id" { value = aws_subnet.us-test-1a-existingsg-example-com.id } output "subnet_us-test-1b_id" { value = aws_subnet.us-test-1b-existingsg-example-com.id } output "subnet_us-test-1c_id" { value = aws_subnet.us-test-1c-existingsg-example-com.id } output "vpc_cidr_block" { value = aws_vpc.existingsg-example-com.cidr_block } output "vpc_id" { value = aws_vpc.existingsg-example-com.id } output "vpc_ipv6_cidr_block" { value = aws_vpc.existingsg-example-com.ipv6_cidr_block } output "vpc_ipv6_cidr_length" { value = local.vpc_ipv6_cidr_block == "" ? null : tonumber(regex(".*/(\\d+)", local.vpc_ipv6_cidr_block)[0]) } provider "aws" { region = "us-test-1" } provider "aws" { alias = "files" region = "us-test-1" } resource "aws_autoscaling_group" "master-us-test-1a-masters-existingsg-example-com" { enabled_metrics = ["GroupDesiredCapacity", "GroupInServiceInstances", "GroupMaxSize", "GroupMinSize", "GroupPendingInstances", "GroupStandbyInstances", "GroupTerminatingInstances", "GroupTotalInstances"] launch_template { id = aws_launch_template.master-us-test-1a-masters-existingsg-example-com.id version = aws_launch_template.master-us-test-1a-masters-existingsg-example-com.latest_version } load_balancers = [aws_elb.api-existingsg-example-com.id] max_instance_lifetime = 0 max_size = 1 metrics_granularity = "1Minute" min_size = 1 name = "master-us-test-1a.masters.existingsg.example.com" protect_from_scale_in = false tag { key = "KubernetesCluster" propagate_at_launch = true value = "existingsg.example.com" } tag { key = "Name" propagate_at_launch = true value = "master-us-test-1a.masters.existingsg.example.com" } tag { key = "aws-node-termination-handler/managed" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" propagate_at_launch = true value = "" } tag { key = "k8s.io/role/control-plane" propagate_at_launch = true value = "1" } tag { key = "k8s.io/role/master" propagate_at_launch = true value = "1" } tag { key = "kops.k8s.io/instancegroup" propagate_at_launch = true value = "master-us-test-1a" } tag { key = "kubernetes.io/cluster/existingsg.example.com" propagate_at_launch = true value = "owned" } vpc_zone_identifier = [aws_subnet.us-test-1a-existingsg-example-com.id] } resource "aws_autoscaling_group" "master-us-test-1b-masters-existingsg-example-com" { enabled_metrics = ["GroupDesiredCapacity", "GroupInServiceInstances", "GroupMaxSize", "GroupMinSize", "GroupPendingInstances", "GroupStandbyInstances", "GroupTerminatingInstances", "GroupTotalInstances"] launch_template { id = aws_launch_template.master-us-test-1b-masters-existingsg-example-com.id version = aws_launch_template.master-us-test-1b-masters-existingsg-example-com.latest_version } load_balancers = [aws_elb.api-existingsg-example-com.id] max_instance_lifetime = 0 max_size = 1 metrics_granularity = "1Minute" min_size = 1 name = "master-us-test-1b.masters.existingsg.example.com" protect_from_scale_in = false tag { key = "KubernetesCluster" propagate_at_launch = true value = "existingsg.example.com" } tag { key = "Name" propagate_at_launch = true value = "master-us-test-1b.masters.existingsg.example.com" } tag { key = "aws-node-termination-handler/managed" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" propagate_at_launch = true value = "" } tag { key = "k8s.io/role/control-plane" propagate_at_launch = true value = "1" } tag { key = "k8s.io/role/master" propagate_at_launch = true value = "1" } tag { key = "kops.k8s.io/instancegroup" propagate_at_launch = true value = "master-us-test-1b" } tag { key = "kubernetes.io/cluster/existingsg.example.com" propagate_at_launch = true value = "owned" } vpc_zone_identifier = [aws_subnet.us-test-1b-existingsg-example-com.id] } resource "aws_autoscaling_group" "master-us-test-1c-masters-existingsg-example-com" { enabled_metrics = ["GroupDesiredCapacity", "GroupInServiceInstances", "GroupMaxSize", "GroupMinSize", "GroupPendingInstances", "GroupStandbyInstances", "GroupTerminatingInstances", "GroupTotalInstances"] launch_template { id = aws_launch_template.master-us-test-1c-masters-existingsg-example-com.id version = aws_launch_template.master-us-test-1c-masters-existingsg-example-com.latest_version } load_balancers = [aws_elb.api-existingsg-example-com.id] max_instance_lifetime = 0 max_size = 1 metrics_granularity = "1Minute" min_size = 1 name = "master-us-test-1c.masters.existingsg.example.com" protect_from_scale_in = false tag { key = "KubernetesCluster" propagate_at_launch = true value = "existingsg.example.com" } tag { key = "Name" propagate_at_launch = true value = "master-us-test-1c.masters.existingsg.example.com" } tag { key = "aws-node-termination-handler/managed" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" propagate_at_launch = true value = "" } tag { key = "k8s.io/role/control-plane" propagate_at_launch = true value = "1" } tag { key = "k8s.io/role/master" propagate_at_launch = true value = "1" } tag { key = "kops.k8s.io/instancegroup" propagate_at_launch = true value = "master-us-test-1c" } tag { key = "kubernetes.io/cluster/existingsg.example.com" propagate_at_launch = true value = "owned" } vpc_zone_identifier = [aws_subnet.us-test-1c-existingsg-example-com.id] } resource "aws_autoscaling_group" "nodes-existingsg-example-com" { enabled_metrics = ["GroupDesiredCapacity", "GroupInServiceInstances", "GroupMaxSize", "GroupMinSize", "GroupPendingInstances", "GroupStandbyInstances", "GroupTerminatingInstances", "GroupTotalInstances"] launch_template { id = aws_launch_template.nodes-existingsg-example-com.id version = aws_launch_template.nodes-existingsg-example-com.latest_version } max_instance_lifetime = 0 max_size = 2 metrics_granularity = "1Minute" min_size = 2 name = "nodes.existingsg.example.com" protect_from_scale_in = false tag { key = "KubernetesCluster" propagate_at_launch = true value = "existingsg.example.com" } tag { key = "Name" propagate_at_launch = true value = "nodes.existingsg.example.com" } tag { key = "aws-node-termination-handler/managed" propagate_at_launch = true value = "" } tag { key = "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/node" propagate_at_launch = true value = "" } tag { key = "k8s.io/role/node" propagate_at_launch = true value = "1" } tag { key = "kops.k8s.io/instancegroup" propagate_at_launch = true value = "nodes" } tag { key = "kubernetes.io/cluster/existingsg.example.com" propagate_at_launch = true value = "owned" } vpc_zone_identifier = [aws_subnet.us-test-1a-existingsg-example-com.id] } resource "aws_autoscaling_lifecycle_hook" "master-us-test-1a-NTHLifecycleHook" { autoscaling_group_name = aws_autoscaling_group.master-us-test-1a-masters-existingsg-example-com.id default_result = "CONTINUE" heartbeat_timeout = 300 lifecycle_transition = "autoscaling:EC2_INSTANCE_TERMINATING" name = "master-us-test-1a-NTHLifecycleHook" } resource "aws_autoscaling_lifecycle_hook" "master-us-test-1b-NTHLifecycleHook" { autoscaling_group_name = aws_autoscaling_group.master-us-test-1b-masters-existingsg-example-com.id default_result = "CONTINUE" heartbeat_timeout = 300 lifecycle_transition = "autoscaling:EC2_INSTANCE_TERMINATING" name = "master-us-test-1b-NTHLifecycleHook" } resource "aws_autoscaling_lifecycle_hook" "master-us-test-1c-NTHLifecycleHook" { autoscaling_group_name = aws_autoscaling_group.master-us-test-1c-masters-existingsg-example-com.id default_result = "CONTINUE" heartbeat_timeout = 300 lifecycle_transition = "autoscaling:EC2_INSTANCE_TERMINATING" name = "master-us-test-1c-NTHLifecycleHook" } resource "aws_autoscaling_lifecycle_hook" "nodes-NTHLifecycleHook" { autoscaling_group_name = aws_autoscaling_group.nodes-existingsg-example-com.id default_result = "CONTINUE" heartbeat_timeout = 300 lifecycle_transition = "autoscaling:EC2_INSTANCE_TERMINATING" name = "nodes-NTHLifecycleHook" } resource "aws_cloudwatch_event_rule" "existingsg-example-com-ASGLifecycle" { event_pattern = file("${path.module}/data/aws_cloudwatch_event_rule_existingsg.example.com-ASGLifecycle_event_pattern") name = "existingsg.example.com-ASGLifecycle" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com-ASGLifecycle" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_cloudwatch_event_rule" "existingsg-example-com-InstanceScheduledChange" { event_pattern = file("${path.module}/data/aws_cloudwatch_event_rule_existingsg.example.com-InstanceScheduledChange_event_pattern") name = "existingsg.example.com-InstanceScheduledChange" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com-InstanceScheduledChange" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_cloudwatch_event_rule" "existingsg-example-com-InstanceStateChange" { event_pattern = file("${path.module}/data/aws_cloudwatch_event_rule_existingsg.example.com-InstanceStateChange_event_pattern") name = "existingsg.example.com-InstanceStateChange" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com-InstanceStateChange" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_cloudwatch_event_rule" "existingsg-example-com-SpotInterruption" { event_pattern = file("${path.module}/data/aws_cloudwatch_event_rule_existingsg.example.com-SpotInterruption_event_pattern") name = "existingsg.example.com-SpotInterruption" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com-SpotInterruption" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_cloudwatch_event_target" "existingsg-example-com-ASGLifecycle-Target" { arn = aws_sqs_queue.existingsg-example-com-nth.arn rule = aws_cloudwatch_event_rule.existingsg-example-com-ASGLifecycle.id } resource "aws_cloudwatch_event_target" "existingsg-example-com-InstanceScheduledChange-Target" { arn = aws_sqs_queue.existingsg-example-com-nth.arn rule = aws_cloudwatch_event_rule.existingsg-example-com-InstanceScheduledChange.id } resource "aws_cloudwatch_event_target" "existingsg-example-com-InstanceStateChange-Target" { arn = aws_sqs_queue.existingsg-example-com-nth.arn rule = aws_cloudwatch_event_rule.existingsg-example-com-InstanceStateChange.id } resource "aws_cloudwatch_event_target" "existingsg-example-com-SpotInterruption-Target" { arn = aws_sqs_queue.existingsg-example-com-nth.arn rule = aws_cloudwatch_event_rule.existingsg-example-com-SpotInterruption.id } resource "aws_ebs_volume" "a-etcd-events-existingsg-example-com" { availability_zone = "us-test-1a" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "a.etcd-events.existingsg.example.com" "k8s.io/etcd/events" = "a/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_ebs_volume" "a-etcd-main-existingsg-example-com" { availability_zone = "us-test-1a" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "a.etcd-main.existingsg.example.com" "k8s.io/etcd/main" = "a/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_ebs_volume" "b-etcd-events-existingsg-example-com" { availability_zone = "us-test-1b" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "b.etcd-events.existingsg.example.com" "k8s.io/etcd/events" = "b/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_ebs_volume" "b-etcd-main-existingsg-example-com" { availability_zone = "us-test-1b" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "b.etcd-main.existingsg.example.com" "k8s.io/etcd/main" = "b/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_ebs_volume" "c-etcd-events-existingsg-example-com" { availability_zone = "us-test-1c" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "c.etcd-events.existingsg.example.com" "k8s.io/etcd/events" = "c/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_ebs_volume" "c-etcd-main-existingsg-example-com" { availability_zone = "us-test-1c" encrypted = false iops = 3000 size = 20 tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "c.etcd-main.existingsg.example.com" "k8s.io/etcd/main" = "c/a,b,c" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kubernetes.io/cluster/existingsg.example.com" = "owned" } throughput = 125 type = "gp3" } resource "aws_elb" "api-existingsg-example-com" { connection_draining = true connection_draining_timeout = 300 cross_zone_load_balancing = false health_check { healthy_threshold = 2 interval = 10 target = "SSL:443" timeout = 5 unhealthy_threshold = 2 } idle_timeout = 300 listener { instance_port = 443 instance_protocol = "TCP" lb_port = 443 lb_protocol = "TCP" } name = "api-existingsg-example-co-ikb7m9" security_groups = ["sg-elb"] subnets = [aws_subnet.us-test-1a-existingsg-example-com.id, aws_subnet.us-test-1b-existingsg-example-com.id, aws_subnet.us-test-1c-existingsg-example-com.id] tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "api.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_iam_instance_profile" "masters-existingsg-example-com" { name = "masters.existingsg.example.com" role = aws_iam_role.masters-existingsg-example-com.name tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "masters.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_iam_instance_profile" "nodes-existingsg-example-com" { name = "nodes.existingsg.example.com" role = aws_iam_role.nodes-existingsg-example-com.name tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "nodes.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_iam_role" "masters-existingsg-example-com" { assume_role_policy = file("${path.module}/data/aws_iam_role_masters.existingsg.example.com_policy") name = "masters.existingsg.example.com" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "masters.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_iam_role" "nodes-existingsg-example-com" { assume_role_policy = file("${path.module}/data/aws_iam_role_nodes.existingsg.example.com_policy") name = "nodes.existingsg.example.com" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "nodes.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_iam_role_policy" "masters-existingsg-example-com" { name = "masters.existingsg.example.com" policy = file("${path.module}/data/aws_iam_role_policy_masters.existingsg.example.com_policy") role = aws_iam_role.masters-existingsg-example-com.name } resource "aws_iam_role_policy" "nodes-existingsg-example-com" { name = "nodes.existingsg.example.com" policy = file("${path.module}/data/aws_iam_role_policy_nodes.existingsg.example.com_policy") role = aws_iam_role.nodes-existingsg-example-com.name } resource "aws_internet_gateway" "existingsg-example-com" { tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_key_pair" "kubernetes-existingsg-example-com-c4a6ed9aa889b9e2c39cd663eb9c7157" { key_name = "kubernetes.existingsg.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57" public_key = file("${path.module}/data/aws_key_pair_kubernetes.existingsg.example.com-c4a6ed9aa889b9e2c39cd663eb9c7157_public_key") tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_launch_template" "master-us-test-1a-masters-existingsg-example-com" { block_device_mappings { device_name = "/dev/xvda" ebs { delete_on_termination = true encrypted = true iops = 3000 throughput = 125 volume_size = 64 volume_type = "gp3" } } block_device_mappings { device_name = "/dev/sdc" virtual_name = "ephemeral0" } iam_instance_profile { name = aws_iam_instance_profile.masters-existingsg-example-com.id } image_id = "ami-12345678" instance_type = "m3.medium" key_name = aws_key_pair.kubernetes-existingsg-example-com-c4a6ed9aa889b9e2c39cd663eb9c7157.id lifecycle { create_before_destroy = true } metadata_options { http_endpoint = "enabled" http_protocol_ipv6 = "disabled" http_put_response_hop_limit = 1 http_tokens = "required" } monitoring { enabled = false } name = "master-us-test-1a.masters.existingsg.example.com" network_interfaces { associate_public_ip_address = true delete_on_termination = true ipv6_address_count = 0 security_groups = ["sg-master-1a"] } tag_specifications { resource_type = "instance" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1a.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1a" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tag_specifications { resource_type = "volume" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1a.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1a" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1a.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1a" "kubernetes.io/cluster/existingsg.example.com" = "owned" } user_data = filebase64("${path.module}/data/aws_launch_template_master-us-test-1a.masters.existingsg.example.com_user_data") } resource "aws_launch_template" "master-us-test-1b-masters-existingsg-example-com" { block_device_mappings { device_name = "/dev/xvda" ebs { delete_on_termination = true encrypted = true iops = 3000 throughput = 125 volume_size = 64 volume_type = "gp3" } } block_device_mappings { device_name = "/dev/sdc" virtual_name = "ephemeral0" } iam_instance_profile { name = aws_iam_instance_profile.masters-existingsg-example-com.id } image_id = "ami-12345678" instance_type = "m3.medium" key_name = aws_key_pair.kubernetes-existingsg-example-com-c4a6ed9aa889b9e2c39cd663eb9c7157.id lifecycle { create_before_destroy = true } metadata_options { http_endpoint = "enabled" http_protocol_ipv6 = "disabled" http_put_response_hop_limit = 1 http_tokens = "required" } monitoring { enabled = false } name = "master-us-test-1b.masters.existingsg.example.com" network_interfaces { associate_public_ip_address = true delete_on_termination = true ipv6_address_count = 0 security_groups = ["sg-master-1b"] } tag_specifications { resource_type = "instance" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1b.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1b" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tag_specifications { resource_type = "volume" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1b.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1b" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1b.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1b" "kubernetes.io/cluster/existingsg.example.com" = "owned" } user_data = filebase64("${path.module}/data/aws_launch_template_master-us-test-1b.masters.existingsg.example.com_user_data") } resource "aws_launch_template" "master-us-test-1c-masters-existingsg-example-com" { block_device_mappings { device_name = "/dev/xvda" ebs { delete_on_termination = true encrypted = true iops = 3000 throughput = 125 volume_size = 64 volume_type = "gp3" } } block_device_mappings { device_name = "/dev/sdc" virtual_name = "ephemeral0" } iam_instance_profile { name = aws_iam_instance_profile.masters-existingsg-example-com.id } image_id = "ami-12345678" instance_type = "m3.medium" key_name = aws_key_pair.kubernetes-existingsg-example-com-c4a6ed9aa889b9e2c39cd663eb9c7157.id lifecycle { create_before_destroy = true } metadata_options { http_endpoint = "enabled" http_protocol_ipv6 = "disabled" http_put_response_hop_limit = 1 http_tokens = "required" } monitoring { enabled = false } name = "master-us-test-1c.masters.existingsg.example.com" network_interfaces { associate_public_ip_address = true delete_on_termination = true ipv6_address_count = 0 security_groups = [aws_security_group.masters-existingsg-example-com.id] } tag_specifications { resource_type = "instance" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1c.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1c" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tag_specifications { resource_type = "volume" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1c.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1c" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "master-us-test-1c.masters.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/kops-controller-pki" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/control-plane" = "" "k8s.io/cluster-autoscaler/node-template/label/node.kubernetes.io/exclude-from-external-load-balancers" = "" "k8s.io/role/control-plane" = "1" "k8s.io/role/master" = "1" "kops.k8s.io/instancegroup" = "master-us-test-1c" "kubernetes.io/cluster/existingsg.example.com" = "owned" } user_data = filebase64("${path.module}/data/aws_launch_template_master-us-test-1c.masters.existingsg.example.com_user_data") } resource "aws_launch_template" "nodes-existingsg-example-com" { block_device_mappings { device_name = "/dev/xvda" ebs { delete_on_termination = true encrypted = true iops = 3000 throughput = 125 volume_size = 128 volume_type = "gp3" } } iam_instance_profile { name = aws_iam_instance_profile.nodes-existingsg-example-com.id } image_id = "ami-12345678" instance_type = "t2.medium" key_name = aws_key_pair.kubernetes-existingsg-example-com-c4a6ed9aa889b9e2c39cd663eb9c7157.id lifecycle { create_before_destroy = true } metadata_options { http_endpoint = "enabled" http_protocol_ipv6 = "disabled" http_put_response_hop_limit = 1 http_tokens = "required" } monitoring { enabled = false } name = "nodes.existingsg.example.com" network_interfaces { associate_public_ip_address = true delete_on_termination = true ipv6_address_count = 0 security_groups = ["sg-nodes"] } tag_specifications { resource_type = "instance" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "nodes.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/node" = "" "k8s.io/role/node" = "1" "kops.k8s.io/instancegroup" = "nodes" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tag_specifications { resource_type = "volume" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "nodes.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/node" = "" "k8s.io/role/node" = "1" "kops.k8s.io/instancegroup" = "nodes" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "nodes.existingsg.example.com" "aws-node-termination-handler/managed" = "" "k8s.io/cluster-autoscaler/node-template/label/node-role.kubernetes.io/node" = "" "k8s.io/role/node" = "1" "kops.k8s.io/instancegroup" = "nodes" "kubernetes.io/cluster/existingsg.example.com" = "owned" } user_data = filebase64("${path.module}/data/aws_launch_template_nodes.existingsg.example.com_user_data") } resource "aws_route" "route-0-0-0-0--0" { destination_cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.existingsg-example-com.id route_table_id = aws_route_table.existingsg-example-com.id } resource "aws_route" "route-__--0" { destination_ipv6_cidr_block = "::/0" gateway_id = aws_internet_gateway.existingsg-example-com.id route_table_id = aws_route_table.existingsg-example-com.id } resource "aws_route53_record" "api-existingsg-example-com" { alias { evaluate_target_health = false name = aws_elb.api-existingsg-example-com.dns_name zone_id = aws_elb.api-existingsg-example-com.zone_id } name = "api.existingsg.example.com" type = "A" zone_id = "/hostedzone/Z1AFAKE1ZON3YO" } resource "aws_route53_record" "api-existingsg-example-com-AAAA" { alias { evaluate_target_health = false name = aws_elb.api-existingsg-example-com.dns_name zone_id = aws_elb.api-existingsg-example-com.zone_id } name = "api.existingsg.example.com" type = "AAAA" zone_id = "/hostedzone/Z1AFAKE1ZON3YO" } resource "aws_route_table" "existingsg-example-com" { tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" "kubernetes.io/kops/role" = "public" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_route_table_association" "us-test-1a-existingsg-example-com" { route_table_id = aws_route_table.existingsg-example-com.id subnet_id = aws_subnet.us-test-1a-existingsg-example-com.id } resource "aws_route_table_association" "us-test-1b-existingsg-example-com" { route_table_id = aws_route_table.existingsg-example-com.id subnet_id = aws_subnet.us-test-1b-existingsg-example-com.id } resource "aws_route_table_association" "us-test-1c-existingsg-example-com" { route_table_id = aws_route_table.existingsg-example-com.id subnet_id = aws_subnet.us-test-1c-existingsg-example-com.id } resource "aws_s3_object" "cluster-completed-spec" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_cluster-completed.spec_content") key = "clusters.example.com/existingsg.example.com/cluster-completed.spec" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "etcd-cluster-spec-events" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-events_content") key = "clusters.example.com/existingsg.example.com/backups/etcd/events/control/etcd-cluster-spec" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "etcd-cluster-spec-main" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_etcd-cluster-spec-main_content") key = "clusters.example.com/existingsg.example.com/backups/etcd/main/control/etcd-cluster-spec" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-aws-cloud-controller-addons-k8s-io-k8s-1-18" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-aws-cloud-controller.addons.k8s.io-k8s-1.18_content") key = "clusters.example.com/existingsg.example.com/addons/aws-cloud-controller.addons.k8s.io/k8s-1.18.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-aws-ebs-csi-driver-addons-k8s-io-k8s-1-17" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17_content") key = "clusters.example.com/existingsg.example.com/addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-bootstrap" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-bootstrap_content") key = "clusters.example.com/existingsg.example.com/addons/bootstrap-channel.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-coredns-addons-k8s-io-k8s-1-12" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-coredns.addons.k8s.io-k8s-1.12_content") key = "clusters.example.com/existingsg.example.com/addons/coredns.addons.k8s.io/k8s-1.12.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-dns-controller-addons-k8s-io-k8s-1-12" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-dns-controller.addons.k8s.io-k8s-1.12_content") key = "clusters.example.com/existingsg.example.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-kops-controller-addons-k8s-io-k8s-1-16" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-kops-controller.addons.k8s.io-k8s-1.16_content") key = "clusters.example.com/existingsg.example.com/addons/kops-controller.addons.k8s.io/k8s-1.16.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-kubelet-api-rbac-addons-k8s-io-k8s-1-9" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9_content") key = "clusters.example.com/existingsg.example.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-limit-range-addons-k8s-io" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-limit-range.addons.k8s.io_content") key = "clusters.example.com/existingsg.example.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-node-termination-handler-aws-k8s-1-11" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-node-termination-handler.aws-k8s-1.11_content") key = "clusters.example.com/existingsg.example.com/addons/node-termination-handler.aws/k8s-1.11.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "existingsg-example-com-addons-storage-aws-addons-k8s-io-v1-15-0" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_existingsg.example.com-addons-storage-aws.addons.k8s.io-v1.15.0_content") key = "clusters.example.com/existingsg.example.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "kops-version-txt" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_kops-version.txt_content") key = "clusters.example.com/existingsg.example.com/kops-version.txt" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1a" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1a_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/events-master-us-test-1a.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1b" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1b_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/events-master-us-test-1b.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-events-master-us-test-1c" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-events-master-us-test-1c_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/events-master-us-test-1c.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1a" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1a_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/main-master-us-test-1a.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1b" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1b_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/main-master-us-test-1b.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-etcdmanager-main-master-us-test-1c" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-etcdmanager-main-master-us-test-1c_content") key = "clusters.example.com/existingsg.example.com/manifests/etcd/main-master-us-test-1c.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "manifests-static-kube-apiserver-healthcheck" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_manifests-static-kube-apiserver-healthcheck_content") key = "clusters.example.com/existingsg.example.com/manifests/static/kube-apiserver-healthcheck.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "nodeupconfig-master-us-test-1a" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1a_content") key = "clusters.example.com/existingsg.example.com/igconfig/control-plane/master-us-test-1a/nodeupconfig.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "nodeupconfig-master-us-test-1b" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1b_content") key = "clusters.example.com/existingsg.example.com/igconfig/control-plane/master-us-test-1b/nodeupconfig.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "nodeupconfig-master-us-test-1c" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_nodeupconfig-master-us-test-1c_content") key = "clusters.example.com/existingsg.example.com/igconfig/control-plane/master-us-test-1c/nodeupconfig.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_s3_object" "nodeupconfig-nodes" { bucket = "testingBucket" content = file("${path.module}/data/aws_s3_object_nodeupconfig-nodes_content") key = "clusters.example.com/existingsg.example.com/igconfig/node/nodes/nodeupconfig.yaml" provider = aws.files server_side_encryption = "AES256" } resource "aws_security_group" "masters-existingsg-example-com" { description = "Security group for masters" name = "masters.existingsg.example.com" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "masters.existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_security_group_rule" "from-0-0-0-0--0-ingress-tcp-22to22-masters-existingsg-example-com" { cidr_blocks = ["0.0.0.0/0"] from_port = 22 protocol = "tcp" security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 22 type = "ingress" } resource "aws_security_group_rule" "from-0-0-0-0--0-ingress-tcp-22to22-sg-master-1a-ControlPlane" { cidr_blocks = ["0.0.0.0/0"] from_port = 22 protocol = "tcp" security_group_id = "sg-master-1a" to_port = 22 type = "ingress" } resource "aws_security_group_rule" "from-0-0-0-0--0-ingress-tcp-22to22-sg-master-1b-ControlPlane" { cidr_blocks = ["0.0.0.0/0"] from_port = 22 protocol = "tcp" security_group_id = "sg-master-1b" to_port = 22 type = "ingress" } resource "aws_security_group_rule" "from-0-0-0-0--0-ingress-tcp-22to22-sg-nodes-Node" { cidr_blocks = ["0.0.0.0/0"] from_port = 22 protocol = "tcp" security_group_id = "sg-nodes" to_port = 22 type = "ingress" } resource "aws_security_group_rule" "from-0-0-0-0--0-ingress-tcp-443to443-api-elb-existingsg-example-com" { cidr_blocks = ["0.0.0.0/0"] from_port = 443 protocol = "tcp" security_group_id = "sg-elb" to_port = 443 type = "ingress" } resource "aws_security_group_rule" "from-api-elb-existingsg-example-com-egress-all-0to0-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 0 protocol = "-1" security_group_id = "sg-elb" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-api-elb-existingsg-example-com-egress-all-0to0-__--0" { from_port = 0 ipv6_cidr_blocks = ["::/0"] protocol = "-1" security_group_id = "sg-elb" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-egress-all-0to0-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 0 protocol = "-1" security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-egress-all-0to0-__--0" { from_port = 0 ipv6_cidr_blocks = ["::/0"] protocol = "-1" security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-ingress-all-0to0-masters-existingsg-example-com" { from_port = 0 protocol = "-1" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-ingress-all-0to0-sg-master-1a-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1a" source_security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-ingress-all-0to0-sg-master-1b-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1b" source_security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-masters-existingsg-example-com-ingress-all-0to0-sg-nodes-Node" { from_port = 0 protocol = "-1" security_group_id = "sg-nodes" source_security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-egress-all-0to0-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 0 protocol = "-1" security_group_id = "sg-master-1a" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-egress-all-0to0-__--0" { from_port = 0 ipv6_cidr_blocks = ["::/0"] protocol = "-1" security_group_id = "sg-master-1a" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-ingress-all-0to0-masters-existingsg-example-com" { from_port = 0 protocol = "-1" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-master-1a" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-ingress-all-0to0-sg-master-1a-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1a" source_security_group_id = "sg-master-1a" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-ingress-all-0to0-sg-master-1b-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1b" source_security_group_id = "sg-master-1a" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1a-ControlPlane-ingress-all-0to0-sg-nodes-Node" { from_port = 0 protocol = "-1" security_group_id = "sg-nodes" source_security_group_id = "sg-master-1a" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-egress-all-0to0-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 0 protocol = "-1" security_group_id = "sg-master-1b" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-egress-all-0to0-__--0" { from_port = 0 ipv6_cidr_blocks = ["::/0"] protocol = "-1" security_group_id = "sg-master-1b" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-ingress-all-0to0-masters-existingsg-example-com" { from_port = 0 protocol = "-1" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-master-1b" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-ingress-all-0to0-sg-master-1a-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1a" source_security_group_id = "sg-master-1b" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-ingress-all-0to0-sg-master-1b-ControlPlane" { from_port = 0 protocol = "-1" security_group_id = "sg-master-1b" source_security_group_id = "sg-master-1b" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-master-1b-ControlPlane-ingress-all-0to0-sg-nodes-Node" { from_port = 0 protocol = "-1" security_group_id = "sg-nodes" source_security_group_id = "sg-master-1b" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-egress-all-0to0-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 0 protocol = "-1" security_group_id = "sg-nodes" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-nodes-Node-egress-all-0to0-__--0" { from_port = 0 ipv6_cidr_blocks = ["::/0"] protocol = "-1" security_group_id = "sg-nodes" to_port = 0 type = "egress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-all-0to0-sg-nodes-Node" { from_port = 0 protocol = "-1" security_group_id = "sg-nodes" source_security_group_id = "sg-nodes" to_port = 0 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-1to2379-masters-existingsg-example-com" { from_port = 1 protocol = "tcp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-nodes" to_port = 2379 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-1to2379-sg-master-1a-ControlPlane" { from_port = 1 protocol = "tcp" security_group_id = "sg-master-1a" source_security_group_id = "sg-nodes" to_port = 2379 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-1to2379-sg-master-1b-ControlPlane" { from_port = 1 protocol = "tcp" security_group_id = "sg-master-1b" source_security_group_id = "sg-nodes" to_port = 2379 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-2382to4000-masters-existingsg-example-com" { from_port = 2382 protocol = "tcp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-nodes" to_port = 4000 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-2382to4000-sg-master-1a-ControlPlane" { from_port = 2382 protocol = "tcp" security_group_id = "sg-master-1a" source_security_group_id = "sg-nodes" to_port = 4000 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-2382to4000-sg-master-1b-ControlPlane" { from_port = 2382 protocol = "tcp" security_group_id = "sg-master-1b" source_security_group_id = "sg-nodes" to_port = 4000 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-4003to65535-masters-existingsg-example-com" { from_port = 4003 protocol = "tcp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-4003to65535-sg-master-1a-ControlPlane" { from_port = 4003 protocol = "tcp" security_group_id = "sg-master-1a" source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-tcp-4003to65535-sg-master-1b-ControlPlane" { from_port = 4003 protocol = "tcp" security_group_id = "sg-master-1b" source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-udp-1to65535-masters-existingsg-example-com" { from_port = 1 protocol = "udp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-udp-1to65535-sg-master-1a-ControlPlane" { from_port = 1 protocol = "udp" security_group_id = "sg-master-1a" source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "from-sg-nodes-Node-ingress-udp-1to65535-sg-master-1b-ControlPlane" { from_port = 1 protocol = "udp" security_group_id = "sg-master-1b" source_security_group_id = "sg-nodes" to_port = 65535 type = "ingress" } resource "aws_security_group_rule" "https-elb-to-master" { from_port = 443 protocol = "tcp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-elb" to_port = 443 type = "ingress" } resource "aws_security_group_rule" "https-elb-to-master-sg-master-1a" { from_port = 443 protocol = "tcp" security_group_id = "sg-master-1a" source_security_group_id = "sg-elb" to_port = 443 type = "ingress" } resource "aws_security_group_rule" "https-elb-to-master-sg-master-1b" { from_port = 443 protocol = "tcp" security_group_id = "sg-master-1b" source_security_group_id = "sg-elb" to_port = 443 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-api-elb-0-0-0-0--0" { cidr_blocks = ["0.0.0.0/0"] from_port = 3 protocol = "icmp" security_group_id = "sg-elb" to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-cp-sg-master-1a-to-elb" { from_port = 3 protocol = "icmp" security_group_id = "sg-elb" source_security_group_id = "sg-master-1a" to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-cp-sg-master-1b-to-elb" { from_port = 3 protocol = "icmp" security_group_id = "sg-elb" source_security_group_id = "sg-master-1b" to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-cp-to-elb" { from_port = 3 protocol = "icmp" security_group_id = "sg-elb" source_security_group_id = aws_security_group.masters-existingsg-example-com.id to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-elb-to-cp" { from_port = 3 protocol = "icmp" security_group_id = aws_security_group.masters-existingsg-example-com.id source_security_group_id = "sg-elb" to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-elb-to-cp-sg-master-1a" { from_port = 3 protocol = "icmp" security_group_id = "sg-master-1a" source_security_group_id = "sg-elb" to_port = 4 type = "ingress" } resource "aws_security_group_rule" "icmp-pmtu-elb-to-cp-sg-master-1b" { from_port = 3 protocol = "icmp" security_group_id = "sg-master-1b" source_security_group_id = "sg-elb" to_port = 4 type = "ingress" } resource "aws_sqs_queue" "existingsg-example-com-nth" { message_retention_seconds = 300 name = "existingsg-example-com-nth" policy = file("${path.module}/data/aws_sqs_queue_existingsg-example-com-nth_policy") tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg-example-com-nth" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_subnet" "us-test-1a-existingsg-example-com" { availability_zone = "us-test-1a" cidr_block = "172.20.32.0/19" enable_resource_name_dns_a_record_on_launch = true private_dns_hostname_type_on_launch = "resource-name" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "us-test-1a.existingsg.example.com" "SubnetType" = "Public" "kubernetes.io/cluster/existingsg.example.com" = "owned" "kubernetes.io/role/elb" = "1" "kubernetes.io/role/internal-elb" = "1" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_subnet" "us-test-1b-existingsg-example-com" { availability_zone = "us-test-1b" cidr_block = "172.20.64.0/19" enable_resource_name_dns_a_record_on_launch = true private_dns_hostname_type_on_launch = "resource-name" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "us-test-1b.existingsg.example.com" "SubnetType" = "Public" "kubernetes.io/cluster/existingsg.example.com" = "owned" "kubernetes.io/role/elb" = "1" "kubernetes.io/role/internal-elb" = "1" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_subnet" "us-test-1c-existingsg-example-com" { availability_zone = "us-test-1c" cidr_block = "172.20.96.0/19" enable_resource_name_dns_a_record_on_launch = true private_dns_hostname_type_on_launch = "resource-name" tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "us-test-1c.existingsg.example.com" "SubnetType" = "Public" "kubernetes.io/cluster/existingsg.example.com" = "owned" "kubernetes.io/role/elb" = "1" "kubernetes.io/role/internal-elb" = "1" } vpc_id = aws_vpc.existingsg-example-com.id } resource "aws_vpc" "existingsg-example-com" { assign_generated_ipv6_cidr_block = true cidr_block = "172.20.0.0/16" enable_dns_hostnames = true enable_dns_support = true tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_vpc_dhcp_options" "existingsg-example-com" { domain_name = "us-test-1.compute.internal" domain_name_servers = ["AmazonProvidedDNS"] tags = { "KubernetesCluster" = "existingsg.example.com" "Name" = "existingsg.example.com" "kubernetes.io/cluster/existingsg.example.com" = "owned" } } resource "aws_vpc_dhcp_options_association" "existingsg-example-com" { dhcp_options_id = aws_vpc_dhcp_options.existingsg-example-com.id vpc_id = aws_vpc.existingsg-example-com.id } terraform { required_version = ">= 0.15.0" required_providers { aws = { "configuration_aliases" = [aws.files] "source" = "hashicorp/aws" "version" = ">= 5.0.0" } } }