-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add all file for terraform module alb-ingress-controller
- Loading branch information
campaand
committed
Apr 7, 2022
1 parent
71d7652
commit 9b22e38
Showing
10 changed files
with
474 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
# Authors | ||
|
||
## Maintainer | ||
|
||
- Andrea Campice <a.campice@gmail.com> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
# Changelog | ||
|
||
All notable changes to this project will be documented in this file. | ||
|
||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), | ||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). | ||
|
||
# 1.0.0 - (07 April 2022) | ||
|
||
## Breaking Changes | ||
|
||
* First Release | ||
|
||
# 0.1.0 - (07 April 2022) | ||
|
||
## Breaking Changes | ||
|
||
* Test terraform module release |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,67 @@ | ||
# terraform-aws-alb-ingress-controller | ||
Terraform module to ease deployment of the AWS ALB Ingress Controller, based on best practices. | ||
# Terraform module: AWS ALB Ingress Controller | ||
|
||
This Terraform module can be used to install the [AWS ALB Ingress Controller](https://github.com/kubernetes-sigs/aws-alb-ingress-controller) | ||
into a Kubernetes cluster. | ||
|
||
IMPORTANT WARNING: considering that the kubernetes provider, in order to run the plan and apply, must be able to access the cluster api, it is not possible to insert the module within the same file and / or terraform configuration that creates the EKS cluster as it is not the cluster would exist. | ||
|
||
For this reason, I recommend separating the terraform configurations and launching the one containing this module and other modules like this one at a later time. [HERE THE ISSUE DIRECTLY FROM KUBERNETES PROVIDER](https://github.com/hashicorp/terraform-provider-kubernetes-alpha/issues/199#issuecomment-832614387) | ||
|
||
## Examples | ||
|
||
### EKS Basic Deployment | ||
|
||
To deploy the AWS ALB Ingress Controller into an EKS cluster. | ||
|
||
```hcl | ||
module "alb_controller" { | ||
source = "campaand/alb-controller/aws" | ||
version = "0.1.0" | ||
cluster_name = var.cluster_name | ||
vpc_id = module.vpc.vpc_id | ||
oidc_provider = module.eks.odic_provider | ||
} | ||
``` | ||
|
||
### EKS Deployment with Different Namespace | ||
|
||
To deploy the AWS ALB Ingress Controller into an EKS cluster using different custom namespace, if not exist, the namespace will be created. | ||
|
||
```hcl | ||
module "alb_controller" { | ||
source = "campaand/alb-controller/aws" | ||
version = "0.1.0" | ||
namespace = "your-custom-namespace" | ||
cluster_name = var.cluster_name | ||
vpc_id = module.vpc.vpc_id | ||
oidc_provider = module.eks.odic_provider | ||
} | ||
``` | ||
|
||
### EKS Deployment with Different Helm Settings | ||
|
||
To deploy the AWS ALB Ingress Controller into an EKS cluster using different helm parameters based on [Helm Chart Values](https://github.com/kubernetes-sigs/aws-alb-ingress-controller). | ||
|
||
If you need to insert custom annotations for Ingresses and Services, consult [ALB Controller Annotations](https://kubernetes-sigs.github.io/aws-load-balancer-controller/v2.2/guide/ingress/annotations/). | ||
|
||
```hcl | ||
module "alb_controller" { | ||
source = "campaand/alb-controller/aws" | ||
version = "0.1.0" | ||
cluster_name = var.cluster_name | ||
vpc_id = module.vpc.vpc_id | ||
oidc_provider = module.eks.odic_provider | ||
helm_chart_version = "1.4.1" | ||
settings = { | ||
key1 = value1, | ||
key2 = value2, | ||
key3 = value3, | ||
key4 = value4 | ||
} | ||
} | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,219 @@ | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"iam:CreateServiceLinkedRole" | ||
], | ||
"Resource": "*", | ||
"Condition": { | ||
"StringEquals": { | ||
"iam:AWSServiceName": "elasticloadbalancing.amazonaws.com" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:DescribeAccountAttributes", | ||
"ec2:DescribeAddresses", | ||
"ec2:DescribeAvailabilityZones", | ||
"ec2:DescribeInternetGateways", | ||
"ec2:DescribeVpcs", | ||
"ec2:DescribeVpcPeeringConnections", | ||
"ec2:DescribeSubnets", | ||
"ec2:DescribeSecurityGroups", | ||
"ec2:DescribeInstances", | ||
"ec2:DescribeNetworkInterfaces", | ||
"ec2:DescribeTags", | ||
"ec2:GetCoipPoolUsage", | ||
"ec2:DescribeCoipPools", | ||
"elasticloadbalancing:DescribeLoadBalancers", | ||
"elasticloadbalancing:DescribeLoadBalancerAttributes", | ||
"elasticloadbalancing:DescribeListeners", | ||
"elasticloadbalancing:DescribeListenerCertificates", | ||
"elasticloadbalancing:DescribeSSLPolicies", | ||
"elasticloadbalancing:DescribeRules", | ||
"elasticloadbalancing:DescribeTargetGroups", | ||
"elasticloadbalancing:DescribeTargetGroupAttributes", | ||
"elasticloadbalancing:DescribeTargetHealth", | ||
"elasticloadbalancing:DescribeTags" | ||
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"cognito-idp:DescribeUserPoolClient", | ||
"acm:ListCertificates", | ||
"acm:DescribeCertificate", | ||
"iam:ListServerCertificates", | ||
"iam:GetServerCertificate", | ||
"waf-regional:GetWebACL", | ||
"waf-regional:GetWebACLForResource", | ||
"waf-regional:AssociateWebACL", | ||
"waf-regional:DisassociateWebACL", | ||
"wafv2:GetWebACL", | ||
"wafv2:GetWebACLForResource", | ||
"wafv2:AssociateWebACL", | ||
"wafv2:DisassociateWebACL", | ||
"shield:GetSubscriptionState", | ||
"shield:DescribeProtection", | ||
"shield:CreateProtection", | ||
"shield:DeleteProtection" | ||
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:AuthorizeSecurityGroupIngress", | ||
"ec2:RevokeSecurityGroupIngress" | ||
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:CreateSecurityGroup" | ||
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:CreateTags" | ||
], | ||
"Resource": "arn:aws:ec2:*:*:security-group/*", | ||
"Condition": { | ||
"StringEquals": { | ||
"ec2:CreateAction": "CreateSecurityGroup" | ||
}, | ||
"Null": { | ||
"aws:RequestTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:CreateTags", | ||
"ec2:DeleteTags" | ||
], | ||
"Resource": "arn:aws:ec2:*:*:security-group/*", | ||
"Condition": { | ||
"Null": { | ||
"aws:RequestTag/elbv2.k8s.aws/cluster": "true", | ||
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:AuthorizeSecurityGroupIngress", | ||
"ec2:RevokeSecurityGroupIngress", | ||
"ec2:DeleteSecurityGroup" | ||
], | ||
"Resource": "*", | ||
"Condition": { | ||
"Null": { | ||
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:CreateLoadBalancer", | ||
"elasticloadbalancing:CreateTargetGroup" | ||
], | ||
"Resource": "*", | ||
"Condition": { | ||
"Null": { | ||
"aws:RequestTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:CreateListener", | ||
"elasticloadbalancing:DeleteListener", | ||
"elasticloadbalancing:CreateRule", | ||
"elasticloadbalancing:DeleteRule" | ||
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:AddTags", | ||
"elasticloadbalancing:RemoveTags" | ||
], | ||
"Resource": [ | ||
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*", | ||
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*", | ||
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*" | ||
], | ||
"Condition": { | ||
"Null": { | ||
"aws:RequestTag/elbv2.k8s.aws/cluster": "true", | ||
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:AddTags", | ||
"elasticloadbalancing:RemoveTags" | ||
], | ||
"Resource": [ | ||
"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*", | ||
"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*", | ||
"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*", | ||
"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*" | ||
] | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:ModifyLoadBalancerAttributes", | ||
"elasticloadbalancing:SetIpAddressType", | ||
"elasticloadbalancing:SetSecurityGroups", | ||
"elasticloadbalancing:SetSubnets", | ||
"elasticloadbalancing:DeleteLoadBalancer", | ||
"elasticloadbalancing:ModifyTargetGroup", | ||
"elasticloadbalancing:ModifyTargetGroupAttributes", | ||
"elasticloadbalancing:DeleteTargetGroup" | ||
], | ||
"Resource": "*", | ||
"Condition": { | ||
"Null": { | ||
"aws:ResourceTag/elbv2.k8s.aws/cluster": "false" | ||
} | ||
} | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:RegisterTargets", | ||
"elasticloadbalancing:DeregisterTargets" | ||
], | ||
"Resource": "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*" | ||
}, | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"elasticloadbalancing:SetWebAcl", | ||
"elasticloadbalancing:ModifyListener", | ||
"elasticloadbalancing:AddListenerCertificates", | ||
"elasticloadbalancing:RemoveListenerCertificates", | ||
"elasticloadbalancing:ModifyRule" | ||
], | ||
"Resource": "*" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Principal": { | ||
"Federated": "arn:aws:iam::${customer_account_id}:oidc-provider/${oidc_provider}" | ||
}, | ||
"Action": "sts:AssumeRoleWithWebIdentity", | ||
"Condition": { | ||
"StringEquals": { | ||
"${oidc_provider}:aud": "sts.amazonaws.com", | ||
"${oidc_provider}:sub": "system:serviceaccount:${namespace}:aws-load-balancer-controller" | ||
} | ||
} | ||
} | ||
] | ||
} |
Oops, something went wrong.