-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathaks.tf
103 lines (79 loc) · 3.47 KB
/
aks.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
locals {
aks_network = "${var.start.first}.${var.start.second + 1}"
}
resource "azurerm_virtual_network" "aks" {
name = "${var.prefix}-vnet-aks"
resource_group_name = azurerm_resource_group.network.name
location = var.location
tags = local.tags
address_space = ["${local.aks_network}.0.0/16"]
dns_servers = [azurerm_firewall.firewall.ip_configuration[0].private_ip_address]
}
# Peer the virtual network with the hub
resource "azurerm_virtual_network_peering" "aks_hub" {
name = "${var.prefix}-peer-aks-hub"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
remote_virtual_network_id = azurerm_virtual_network.hub.id
allow_forwarded_traffic = true
allow_gateway_transit = false
use_remote_gateways = false
}
##
## SUBNETS
##
resource "azurerm_subnet" "aks_load_balancers" {
name = "${var.prefix}-snet-aks-load-balancer"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
address_prefixes = ["${local.aks_network}.254.0/23"]
}
resource "azurerm_subnet" "aks_cloud_main_system" {
name = "${var.prefix}-snet-aks-cloud-main-system"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
address_prefixes = ["${local.aks_network}.253.128/25"]
service_endpoints = local.service_endpoints
}
resource "azurerm_subnet" "aks_system" {
name = "${var.prefix}-snet-aks-system"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
address_prefixes = ["${local.aks_network}.0.0/18"]
service_endpoints = local.service_endpoints
}
resource "azurerm_subnet" "aks_user_unclassified" {
name = "${var.prefix}-snet-aks-user-unclassified"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
address_prefixes = ["${local.aks_network}.64.0/18"]
service_endpoints = local.service_endpoints
}
resource "azurerm_subnet" "aks_user_protected_b" {
name = "${var.prefix}-snet-aks-user-protected-b"
resource_group_name = azurerm_virtual_network.aks.resource_group_name
virtual_network_name = azurerm_virtual_network.aks.name
address_prefixes = ["${local.aks_network}.128.0/18"]
service_endpoints = local.service_endpoints
}
# Associate the route table with the subnets
resource "azurerm_subnet_route_table_association" "aks_load_balancers" {
subnet_id = azurerm_subnet.aks_load_balancers.id
route_table_id = azurerm_route_table.network.id
}
resource "azurerm_subnet_route_table_association" "aks_cloud_main_system" {
subnet_id = azurerm_subnet.aks_cloud_main_system.id
route_table_id = azurerm_route_table.network.id
}
resource "azurerm_subnet_route_table_association" "aks_system" {
subnet_id = azurerm_subnet.aks_system.id
route_table_id = azurerm_route_table.network.id
}
resource "azurerm_subnet_route_table_association" "aks_user_unclassified" {
subnet_id = azurerm_subnet.aks_user_unclassified.id
route_table_id = azurerm_route_table.network.id
}
resource "azurerm_subnet_route_table_association" "aks_user_protected_b" {
subnet_id = azurerm_subnet.aks_user_protected_b.id
route_table_id = azurerm_route_table.network.id
}