2018-12-17 17:40:09 +00:00
|
|
|
resource "aws_instance" "server" {
|
2019-11-19 16:06:10 +00:00
|
|
|
ami = data.aws_ami.linux.image_id
|
2019-10-14 15:27:08 +00:00
|
|
|
instance_type = var.instance_type
|
|
|
|
key_name = module.keys.key_name
|
|
|
|
vpc_security_group_ids = [aws_security_group.primary.id]
|
|
|
|
count = var.server_count
|
2018-12-17 17:40:09 +00:00
|
|
|
|
|
|
|
# Instance tags
|
2019-10-14 15:27:08 +00:00
|
|
|
tags = {
|
2018-12-17 17:40:09 +00:00
|
|
|
Name = "${local.random_name}-server-${count.index}"
|
|
|
|
ConsulAutoJoin = "auto-join"
|
2019-10-14 15:27:08 +00:00
|
|
|
SHA = var.nomad_sha
|
|
|
|
User = data.aws_caller_identity.current.arn
|
2018-12-17 17:40:09 +00:00
|
|
|
}
|
|
|
|
|
2019-10-14 15:27:08 +00:00
|
|
|
iam_instance_profile = aws_iam_instance_profile.instance_profile.name
|
2018-12-17 17:40:09 +00:00
|
|
|
|
2019-10-25 12:08:24 +00:00
|
|
|
# copy up all provisioning scripts and configs
|
|
|
|
provisioner "file" {
|
|
|
|
source = "shared/"
|
|
|
|
destination = "/ops/shared"
|
|
|
|
|
|
|
|
connection {
|
|
|
|
host = coalesce(self.public_ip, self.private_ip)
|
|
|
|
type = "ssh"
|
|
|
|
user = "ubuntu"
|
|
|
|
private_key = module.keys.private_key_pem
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-17 17:40:09 +00:00
|
|
|
provisioner "remote-exec" {
|
|
|
|
inline = [
|
2019-10-25 12:08:24 +00:00
|
|
|
"chmod +x /ops/shared/config/provision-server.sh",
|
2019-10-28 13:27:40 +00:00
|
|
|
"/ops/shared/config/provision-server.sh aws ${var.server_count} '${var.nomad_sha}' '${var.indexed == false ? "server.hcl" : "indexed/server-${count.index}.hcl"}'",
|
2018-12-17 17:40:09 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
connection {
|
2019-10-14 15:27:08 +00:00
|
|
|
host = coalesce(self.public_ip, self.private_ip)
|
|
|
|
type = "ssh"
|
2018-12-17 17:40:09 +00:00
|
|
|
user = "ubuntu"
|
2019-10-14 15:27:08 +00:00
|
|
|
private_key = module.keys.private_key_pem
|
2018-12-17 17:40:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-25 18:31:00 +00:00
|
|
|
resource "aws_instance" "client_linux" {
|
2019-11-19 16:06:10 +00:00
|
|
|
ami = data.aws_ami.linux.image_id
|
2019-10-14 15:27:08 +00:00
|
|
|
instance_type = var.instance_type
|
|
|
|
key_name = module.keys.key_name
|
|
|
|
vpc_security_group_ids = [aws_security_group.primary.id]
|
|
|
|
count = var.client_count
|
|
|
|
depends_on = [aws_instance.server]
|
2018-12-17 17:40:09 +00:00
|
|
|
|
|
|
|
# Instance tags
|
2019-10-14 15:27:08 +00:00
|
|
|
tags = {
|
2018-12-17 17:40:09 +00:00
|
|
|
Name = "${local.random_name}-client-${count.index}"
|
|
|
|
ConsulAutoJoin = "auto-join"
|
2019-10-14 15:27:08 +00:00
|
|
|
SHA = var.nomad_sha
|
|
|
|
User = data.aws_caller_identity.current.arn
|
2018-12-17 17:40:09 +00:00
|
|
|
}
|
|
|
|
|
2019-10-14 15:27:08 +00:00
|
|
|
ebs_block_device {
|
2019-09-17 18:06:50 +00:00
|
|
|
device_name = "/dev/xvdd"
|
|
|
|
volume_type = "gp2"
|
|
|
|
volume_size = "50"
|
|
|
|
delete_on_termination = "true"
|
2018-12-17 17:40:09 +00:00
|
|
|
}
|
|
|
|
|
2019-10-14 15:27:08 +00:00
|
|
|
iam_instance_profile = aws_iam_instance_profile.instance_profile.name
|
2018-12-17 17:40:09 +00:00
|
|
|
|
2019-10-25 12:08:24 +00:00
|
|
|
# copy up all provisioning scripts and configs
|
|
|
|
provisioner "file" {
|
|
|
|
source = "shared/"
|
|
|
|
destination = "/ops/shared"
|
|
|
|
|
|
|
|
connection {
|
|
|
|
host = coalesce(self.public_ip, self.private_ip)
|
|
|
|
type = "ssh"
|
|
|
|
user = "ubuntu"
|
|
|
|
private_key = module.keys.private_key_pem
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-17 17:40:09 +00:00
|
|
|
provisioner "remote-exec" {
|
|
|
|
inline = [
|
2019-10-25 12:08:24 +00:00
|
|
|
"chmod +x /ops/shared/config/provision-client.sh",
|
2019-10-28 13:27:40 +00:00
|
|
|
"/ops/shared/config/provision-client.sh aws '${var.nomad_sha}' '${var.indexed == false ? "client.hcl" : "indexed/client-${count.index}.hcl"}'",
|
2018-12-17 17:40:09 +00:00
|
|
|
]
|
|
|
|
|
|
|
|
connection {
|
2019-10-14 15:27:08 +00:00
|
|
|
host = coalesce(self.public_ip, self.private_ip)
|
|
|
|
type = "ssh"
|
2018-12-17 17:40:09 +00:00
|
|
|
user = "ubuntu"
|
2019-10-14 15:27:08 +00:00
|
|
|
private_key = module.keys.private_key_pem
|
2018-12-17 17:40:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-11-19 16:06:10 +00:00
|
|
|
data "template_file" "user_data_client_windows" {
|
|
|
|
template = file("${path.root}/shared/config/userdata-windows.ps1")
|
|
|
|
vars = {
|
|
|
|
nomad_sha = var.nomad_sha
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
data "archive_file" "windows_configs" {
|
|
|
|
type = "zip"
|
|
|
|
source_dir = "./shared"
|
|
|
|
output_path = "./windows_configs.zip"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "client_windows" {
|
|
|
|
ami = data.aws_ami.windows.image_id
|
|
|
|
instance_type = var.instance_type
|
|
|
|
key_name = module.keys.key_name
|
|
|
|
vpc_security_group_ids = [aws_security_group.primary.id]
|
|
|
|
count = var.windows_client_count
|
|
|
|
depends_on = [aws_instance.server]
|
|
|
|
iam_instance_profile = "${aws_iam_instance_profile.instance_profile.name}"
|
|
|
|
|
|
|
|
# Instance tags
|
|
|
|
tags = {
|
|
|
|
Name = "${local.random_name}-client-windows-${count.index}"
|
|
|
|
ConsulAutoJoin = "auto-join"
|
|
|
|
}
|
|
|
|
|
|
|
|
ebs_block_device {
|
|
|
|
device_name = "xvdd"
|
|
|
|
volume_type = "gp2"
|
|
|
|
volume_size = "50"
|
|
|
|
delete_on_termination = "true"
|
|
|
|
}
|
|
|
|
|
|
|
|
# We need this userdata script because Windows machines don't
|
|
|
|
# configure ssh with cloud-init by default.
|
|
|
|
user_data = data.template_file.user_data_client_windows.rendered
|
|
|
|
|
|
|
|
# Note:
|
|
|
|
# we're copying up all the provisioning scripts and configs as
|
|
|
|
# a zipped bundle because TF's file provisioner dies in the middle
|
|
|
|
# of pushing up multiple files (whereas 'scp -r' works fine).
|
|
|
|
#
|
|
|
|
# We're also running all the provisioning scripts inside the
|
|
|
|
# userdata by polling for the zip file to show up. (Gross!)
|
|
|
|
# This is because remote-exec provisioners are failing on Windows
|
|
|
|
# with the same symptoms as:
|
|
|
|
# https://github.com/hashicorp/terraform/issues/17728
|
|
|
|
#
|
|
|
|
# If we can't fix this, it'll prevent us from having multiple
|
|
|
|
# Windows clients running until TF supports count interpolation
|
|
|
|
# in the template_file, which is planned for a later 0.12 release
|
|
|
|
#
|
|
|
|
provisioner "file" {
|
|
|
|
source = "./windows_configs.zip"
|
|
|
|
destination = "C:/ops/windows_configs.zip"
|
|
|
|
|
|
|
|
connection {
|
|
|
|
host = coalesce(self.public_ip, self.private_ip)
|
|
|
|
type = "ssh"
|
|
|
|
user = "Administrator"
|
|
|
|
private_key = module.keys.private_key_pem
|
|
|
|
timeout = "10m"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|