Newer
Older
terraform {
backend "http" {
}
required_providers {
google = {
source = "hashicorp/google"
version = "4.3.0"
}
}
}
provider "google" {
project = var.project_id
region = var.region
}
data "google_project" "project" {
provider = google
project_id = var.project_id
}
### Reserve Static IP
resource "google_compute_global_address" "static_ip" {
provider = google
project = var.project_id
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
}
### Create Network
resource "google_compute_network" "vpc_network" {
provider = google
project = var.project_id
name = var.vpc_network_name
auto_create_subnetworks = false
mtu = 1460
routing_mode = "GLOBAL"
}
### Create Subnetwork
resource "google_compute_subnetwork" "vpc_subnetwork" {
provider = google
project = var.project_id
name = var.vpc_subnetwork_name
ip_cidr_range = "192.168.100.0/24"
region = var.region
network = google_compute_network.vpc_network.id
secondary_ip_range {
range_name = "pods"
ip_cidr_range = "10.0.0.0/14"
}
secondary_ip_range {
range_name = "services"
ip_cidr_range = "10.4.0.0/19"
}
private_ip_google_access = true
depends_on = [
google_compute_network.vpc_network
]
}
### Create VPC network peering
resource "google_compute_global_address" "vpc_private_ip_address" {
provider = google
project = var.project_id
name = var.vpc_private_ip_address_name
purpose = "VPC_PEERING"
address_type = "INTERNAL"
prefix_length = 16
network = google_compute_network.vpc_network.id
}
resource "google_service_networking_connection" "vpc_private_vpc_connection" {
provider = google
network = google_compute_network.vpc_network.id
service = "servicenetworking.googleapis.com"
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
reserved_peering_ranges = [
google_compute_global_address.vpc_private_ip_address.name
]
}
### Create firewall rules
resource "google_compute_firewall" "fw_http" {
provider = google
project = var.project_id
name = var.fw_http_name
network = google_compute_network.vpc_network.name
allow {
protocol = "tcp"
ports = ["80"]
}
target_tags = ["http-server"]
source_ranges = ["0.0.0.0/0"]
disabled = false
}
resource "google_compute_firewall" "fw_https" {
provider = google
project = var.project_id
name = var.fw_https_name
network = google_compute_network.vpc_network.name
allow {
protocol = "tcp"
ports = ["443"]
}
target_tags = ["https-server"]
source_ranges = ["0.0.0.0/0"]
disabled = false
}
resource "google_compute_firewall" "allow_from_iap_to_instances" {
provider = google
project = var.project_id
name = var.fw_ssh_name
network = google_compute_network.vpc_network.name
allow {
protocol = "tcp"
ports = ["22"]
}
source_ranges = ["35.235.240.0/20"]
}
### Create Cloud NAT
resource "google_compute_router" "router" {
provider = google
project = var.project_id
name = var.router_name
region = var.region
network = google_compute_network.vpc_network.id
bgp {
asn = 64514
}
}
resource "google_compute_router_nat" "cloud_nat" {
provider = google
project = var.project_id
name = var.cloud_nat_name
region = var.region
router = google_compute_router.router.name
nat_ip_allocate_option = "AUTO_ONLY"
source_subnetwork_ip_ranges_to_nat = "ALL_SUBNETWORKS_ALL_IP_RANGES"
log_config {
enable = false
filter = "ERRORS_ONLY"
}
min_ports_per_vm = 64
}
### Create Kubernetes Cluster
resource "google_container_cluster" "cluster" {
provider = google
project = var.project_id
name = var.cluster_name
location = var.region
remove_default_node_pool = true
initial_node_count = 1
logging_service = "logging.googleapis.com/kubernetes"
default_max_pods_per_node = 20
networking_mode = "VPC_NATIVE"
network = google_compute_network.vpc_network.id
subnetwork = google_compute_subnetwork.vpc_subnetwork.id
enable_shielded_nodes = true
private_cluster_config {
enable_private_endpoint = false
enable_private_nodes = true
master_ipv4_cidr_block = "172.16.0.0/28"
}
default_snat_status {
disabled = false
}
ip_allocation_policy {
cluster_secondary_range_name = "pods"
services_secondary_range_name = "services"
}
workload_identity_config {
workload_pool = "${data.google_project.project.project_id}.svc.id.goog"
}
depends_on = [
google_compute_network.vpc_network,
]
}
### Create Kubernetes Node Pool
resource "google_container_node_pool" "node_pool" {
provider = google
project = var.project_id
name = var.node_pool_name
location = var.region
cluster = google_container_cluster.cluster.name
node_count = 1
node_config {
preemptible = true
machine_type = "e2-standard-4"
disk_size_gb = "100"
disk_type = "pd-ssd"
image_type = "cos"
oauth_scopes = [
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
"https://www.googleapis.com/auth/cloud-platform"
]
labels = {
disktype = "ssd"
cputype = "e2"
preemptible = "true"
}
}
}
### Create Cloud SQL
resource "google_sql_database_instance" "cloud_sql" {
provider = google
project = var.project_id
name = var.cloud_sql_name
region = var.region
database_version = "MYSQL_8_0"
deletion_protection = true
settings {
tier = "db-custom-2-3840" # 2vCPU - 3.75 Go
availability_type = "REGIONAL"
backup_configuration {
enabled = true
binary_log_enabled = true
location = "eu"
}
ip_configuration {
ipv4_enabled = false
private_network = google_compute_network.vpc_network.id
}
location_preference {
zone = "europe-west1-b"
}
maintenance_window {
day = 1
hour = 0
}
}
}
### Create Redis
resource "google_redis_instance" "memory_store" {
provider = google
project = var.project_id
name = var.memory_store_name
region = var.region
memory_size_gb = 1
authorized_network = google_compute_network.vpc_network.id
connect_mode = "PRIVATE_SERVICE_ACCESS"
redis_version = "REDIS_6_X"
}