Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save pedrogimenez/5ddbf6e4699b402697e60327e143bba5 to your computer and use it in GitHub Desktop.
Save pedrogimenez/5ddbf6e4699b402697e60327e143bba5 to your computer and use it in GitHub Desktop.
terraform {
required_version = ">= 0.12"
}
variable "kubeconfig" {}
provider "kubernetes" {
version = "~> 1.8.1"
config_path = var.kubeconfig
}
/*
-----
k8s dashboard
-----
*/
locals {
kubernetes_dashboard = {
name = "kubernetes-dashboard"
namespace = "kube-system"
k8s_app = "kubernetes-dashboard"
replicas = 1
}
}
/*
# ------------------- Dashboard Secret ------------------- #
apiVersion: v1
kind: Secret
metadata:
labels:
k8s-app: kubernetes-dashboard
name: kubernetes-dashboard-certs
namespace: kube-system
type: Opaque
*/
resource "kubernetes_secret" "kubernetes-dashboard-certs" {
metadata {
name = format("%s-certs", local.kubernetes_dashboard.name)
namespace = local.kubernetes_dashboard.namespace
labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
}
/*
# ------------------- Dashboard Service Account ------------------- #
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-app: kubernetes-dashboard
name: kubernetes-dashboard
namespace: kube-system
*/
resource "kubernetes_service_account" "kubernetes-dashboard" {
metadata {
name = local.kubernetes_dashboard.name
namespace = local.kubernetes_dashboard.namespace
labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
}
/*
# ------------------- Dashboard Role & Role Binding ------------------- #
kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: kubernetes-dashboard-minimal
namespace: kube-system
rules:
# Allow Dashboard to create 'kubernetes-dashboard-key-holder' secret.
- apiGroups: [""]
resources: ["secrets"]
verbs: ["create"]
# Allow Dashboard to create 'kubernetes-dashboard-settings' config map.
- apiGroups: [""]
resources: ["configmaps"]
verbs: ["create"]
# Allow Dashboard to get, update and delete Dashboard exclusive secrets.
- apiGroups: [""]
resources: ["secrets"]
resourceNames: ["kubernetes-dashboard-key-holder", "kubernetes-dashboard-certs"]
verbs: ["get", "update", "delete"]
# Allow Dashboard to get and update 'kubernetes-dashboard-settings' config map.
- apiGroups: [""]
resources: ["configmaps"]
resourceNames: ["kubernetes-dashboard-settings"]
verbs: ["get", "update"]
# Allow Dashboard to get metrics from heapster.
- apiGroups: [""]
resources: ["services"]
resourceNames: ["heapster"]
verbs: ["proxy"]
- apiGroups: [""]
resources: ["services/proxy"]
resourceNames: ["heapster", "http:heapster:", "https:heapster:"]
verbs: ["get"]
*/
resource "kubernetes_role" "kubernetes-dashboard-minimal" {
metadata {
name = format("%s-minimal", local.kubernetes_dashboard.name)
namespace = local.kubernetes_dashboard.namespace
}
# Allow Dashboard to create 'kubernetes-dashboard-key-holder' secret.
rule {
api_groups = [""]
resources = ["secrets"]
verbs = ["create"]
}
# Allow Dashboard to create 'kubernetes-dashboard-settings' config map.
rule {
api_groups = [""]
resources = ["configmaps"]
verbs = ["create"]
}
# Allow Dashboard to get, update and delete Dashboard exclusive secrets.
rule {
api_groups = [""]
resources = ["secrets"]
resource_names = [
"kubernetes-dashboard-key-holder",
kubernetes_secret.kubernetes-dashboard-certs.metadata[0].name]
verbs = ["get", "update", "delete"]
}
# Allow Dashboard to get and update 'kubernetes-dashboard-settings' config map.
rule {
api_groups = [""]
resources = ["configmaps"]
resource_names = ["kubernetes-dashboard-settings"]
verbs = ["get", "update"]
}
# Allow Dashboard to get metrics from heapster.
rule {
api_groups = [""]
resources = ["services"]
resource_names = ["heapster"]
verbs = ["proxy"]
}
rule {
api_groups = [""]
resources = ["services/proxy"]
resource_names = ["heapster", "http:heapster:", "https:heapster:"]
verbs = ["get"]
}
}
/*
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: kubernetes-dashboard-minimal
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: kubernetes-dashboard-minimal
subjects:
- kind: ServiceAccount
name: kubernetes-dashboard
namespace: kube-system
*/
resource "kubernetes_role_binding" "kubernetes-dashboard-minimal" {
metadata {
name = format("%s-minimal", local.kubernetes_dashboard.name)
namespace = local.kubernetes_dashboard.namespace
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "Role"
name = kubernetes_role.kubernetes-dashboard-minimal.metadata[0].name
}
subject {
kind = "ServiceAccount"
name = kubernetes_service_account.kubernetes-dashboard.metadata[0].name
namespace = local.kubernetes_dashboard.namespace
}
}
/*
# ------------------- Dashboard Deployment ------------------- #
kind: Deployment
apiVersion: apps/v1
metadata:
labels:
k8s-app: kubernetes-dashboard
name: kubernetes-dashboard
namespace: kube-system
spec:
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
k8s-app: kubernetes-dashboard
template:
metadata:
labels:
k8s-app: kubernetes-dashboard
spec:
containers:
- name: kubernetes-dashboard
image: k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1
ports:
- containerPort: 8443
protocol: TCP
args:
- --auto-generate-certificates
# Uncomment the following line to manually specify Kubernetes API server Host
# If not specified, Dashboard will attempt to auto discover the API server and connect
# to it. Uncomment only if the default does not work.
# - --apiserver-host=http://my-address:port
volumeMounts:
- name: kubernetes-dashboard-certs
mountPath: /certs
# Create on-disk volume to store exec logs
- mountPath: /tmp
name: tmp-volume
livenessProbe:
httpGet:
scheme: HTTPS
path: /
port: 8443
initialDelaySeconds: 30
timeoutSeconds: 30
volumes:
- name: kubernetes-dashboard-certs
secret:
secretName: kubernetes-dashboard-certs
- name: tmp-volume
emptyDir: {}
serviceAccountName: kubernetes-dashboard
# Comment the following tolerations if Dashboard must not be deployed on master
tolerations:
- key: node-role.kubernetes.io/master
effect: NoSchedule
*/
resource "kubernetes_deployment" "kubernetes-dashboard" {
metadata {
name = local.kubernetes_dashboard.name
namespace = local.kubernetes_dashboard.namespace
labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
spec {
replicas = local.kubernetes_dashboard.replicas
revision_history_limit = 10
selector {
match_labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
template {
metadata {
labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
spec {
automount_service_account_token = true
container {
name = local.kubernetes_dashboard.name
image = "k8s.gcr.io/kubernetes-dashboard-amd64:v1.10.1"
port {
container_port = 8443
protocol = "TCP"
}
args = [
"--auto-generate-certificates"
]
volume_mount {
name = kubernetes_secret.kubernetes-dashboard-certs.metadata[0].name
mount_path = "/certs"
}
volume_mount {
name = "tmp-volume"
mount_path = "/tmp"
}
liveness_probe {
http_get {
scheme = "HTTPS"
path = "/"
port = 8443
}
initial_delay_seconds = 30
timeout_seconds = 30
}
}
volume {
name = kubernetes_secret.kubernetes-dashboard-certs.metadata[0].name
secret {
secret_name = kubernetes_secret.kubernetes-dashboard-certs.metadata[0].name
}
}
volume {
name = "tmp-volume"
empty_dir {}
}
service_account_name = kubernetes_service_account.kubernetes-dashboard.metadata[0].name
toleration {
key = "node-role.kubernetes.io/master"
effect = "NoSchedule"
}
}
}
}
}
/*
# ------------------- Dashboard Service ------------------- #
kind: Service
apiVersion: v1
metadata:
labels:
k8s-app: kubernetes-dashboard
name: kubernetes-dashboard
namespace: kube-system
spec:
ports:
- port: 443
targetPort: 8443
selector:
k8s-app: kubernetes-dashboard
*/
resource "kubernetes_service" "kubernetes-dashboard" {
metadata {
name = local.kubernetes_dashboard.name
namespace = local.kubernetes_dashboard.namespace
labels = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
spec {
port {
port = 443
target_port = 8443
}
selector = {
k8s-app = local.kubernetes_dashboard.k8s_app
}
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment