-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhelm-deployments.tf
174 lines (148 loc) · 6.44 KB
/
helm-deployments.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
# Copyright (c) 2024 Oracle Corporation and/or its affiliates.
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl
locals {
deploy_from_operator = var.create_operator_and_bastion
deploy_from_local = alltrue([!local.deploy_from_operator, var.control_plane_is_public])
}
data "oci_containerengine_cluster_kube_config" "kube_config" {
count = local.deploy_from_local ? 1 : 0
cluster_id = module.oke.cluster_id
endpoint = "PUBLIC_ENDPOINT"
}
module "argo-workflows" {
count = var.deploy_argo_workflows ? 1 : 0
source = "./helm-module"
bastion_host = module.oke.bastion_public_ip
bastion_user = var.bastion_user
operator_host = module.oke.operator_private_ip
operator_user = var.bastion_user
ssh_private_key = tls_private_key.stack_key.private_key_openssh
deploy_from_operator = local.deploy_from_operator
deploy_from_local = local.deploy_from_local
deployment_name = "argo-workflows"
helm_chart_name = "argo-workflows"
namespace = "argo-workflows"
helm_repository_url = "https://argoproj.github.io/argo-helm"
pre_deployment_commands = [
"curl -sLO \"https://github.com/argoproj/argo-workflows/releases/download/v3.6.0-rc4/argo-linux-amd64.gz\"",
"gunzip \"argo-linux-amd64.gz\"",
"chmod +x \"argo-linux-amd64\"",
"sudo mv \"./argo-linux-amd64\" /usr/local/bin/argo"
]
post_deployment_commands = [
"kubectl create rolebinding default-admin --clusterrole=admin --serviceaccount=default:default",
"kubectl config set-context --current --namespace=argo-workflows",
"echo \"export NAMESPACE=\"${data.oci_identity_tenancy.tenant_details.name}\"\" >> /home/opc/.bashrc",
"kubectl create role oracle --verb=list,update --resource=workflows.argoproj.io",
"kubectl create sa oracle",
"kubectl create rolebinding oracle --role=oracle --serviceaccount=argo-workflows:oracle",
"kubectl create rolebinding oracle-admin --clusterrole=admin --serviceaccount=argo-workflows:oracle",
"kubectl apply -f - <<EOF",
"apiVersion: v1",
"kind: Secret",
"metadata:",
" name: oracle.service-account-token",
" annotations:",
" kubernetes.io/service-account.name: oracle",
"type: kubernetes.io/service-account-token",
"EOF",
"git clone https://github.com/dranicu/ml_training_medical_images.git",
"sudo dnf -y install podman",
"sudo dnf install curl gcc openssl-devel bzip2-devel libffi-devel zlib-devel wget make -y",
"wget https://www.python.org/ftp/python/3.10.4/Python-3.10.4.tgz",
"tar -xf Python-3.10.4.tgz",
"cd Python-3.10.4",
"./configure --enable-optimizations",
"make -j 2",
"nproc",
"sudo make altinstall",
"cd ~/ml_training_medical_images",
"kubectl config set-context --current --namespace=argo-workflows",
"sed -i 's/<NAMESPACE>/${data.oci_identity_tenancy.tenant_details.name}/g' train_model.py",
"sed -i 's/<NAMESPACE>/${data.oci_identity_tenancy.tenant_details.name}/g' validate_model.py",
"sed -i 's/<NAMESPACE>/${data.oci_identity_tenancy.tenant_details.name}/g' argo_workflow_ml_train.yaml",
"kubectl create -f argo_workflow_ml_train.yaml -n argo-workflows"
]
helm_template_values_override = templatefile(
"${path.root}/helm-values-templates/argo-workflows-values.yaml.tpl",
{}
)
helm_user_values_override = try(base64decode(var.argo_workflows_user_values_override), var.argo_workflows_user_values_override)
kube_config = one(data.oci_containerengine_cluster_kube_config.kube_config.*.content)
depends_on = [module.oke]
}
module "nginx" {
count = var.deploy_nginx ? 1 : 0
source = "./helm-module"
bastion_host = module.oke.bastion_public_ip
bastion_user = var.bastion_user
operator_host = module.oke.operator_private_ip
operator_user = var.bastion_user
ssh_private_key = tls_private_key.stack_key.private_key_openssh
deploy_from_operator = local.deploy_from_operator
deploy_from_local = local.deploy_from_local
deployment_name = "ingress-nginx"
helm_chart_name = "ingress-nginx"
namespace = "nginx"
helm_repository_url = "https://kubernetes.github.io/ingress-nginx"
pre_deployment_commands = []
post_deployment_commands = []
helm_template_values_override = templatefile(
"${path.root}/helm-values-templates/nginx-values.yaml.tpl",
{
min_bw = 100,
max_bw = 100,
pub_lb_nsg_id = module.oke.pub_lb_nsg_id
state_id = local.state_id
}
)
helm_user_values_override = try(base64decode(var.nginx_user_values_override), var.nginx_user_values_override)
kube_config = one(data.oci_containerengine_cluster_kube_config.kube_config.*.content)
depends_on = [module.oke]
}
module "cert-manager" {
count = var.deploy_cert_manager ? 1 : 0
source = "./helm-module"
bastion_host = module.oke.bastion_public_ip
bastion_user = var.bastion_user
operator_host = module.oke.operator_private_ip
operator_user = var.bastion_user
ssh_private_key = tls_private_key.stack_key.private_key_openssh
deploy_from_operator = local.deploy_from_operator
deploy_from_local = local.deploy_from_local
deployment_name = "cert-manager"
helm_chart_name = "cert-manager"
namespace = "cert-manager"
helm_repository_url = "https://charts.jetstack.io"
pre_deployment_commands = []
post_deployment_commands = [
"cat <<'EOF' | kubectl apply -f -",
"apiVersion: cert-manager.io/v1",
"kind: ClusterIssuer",
"metadata:",
" name: le-clusterissuer",
"spec:",
" acme:",
" # You must replace this email address with your own.",
" # Let's Encrypt will use this to contact you about expiring",
" # certificates, and issues related to your account.",
" email: [email protected]",
" server: https://acme-staging-v02.api.letsencrypt.org/directory",
" privateKeySecretRef:",
" # Secret resource that will be used to store the account's private key.",
" name: le-clusterissuer-secret",
" # Add a single challenge solver, HTTP01 using nginx",
" solvers:",
" - http01:",
" ingress:",
" ingressClassName: nginx",
"EOF"
]
helm_template_values_override = templatefile(
"${path.root}/helm-values-templates/cert-manager-values.yaml.tpl",
{}
)
helm_user_values_override = try(base64decode(var.cert_manager_user_values_override), var.cert_manager_user_values_override)
kube_config = one(data.oci_containerengine_cluster_kube_config.kube_config.*.content)
depends_on = [module.oke]
}