- This commit introduces the Terraform configuration to provision a production environment on Hetzner Cloud, building on the existing test setup. - Key improvements and new features include: * **Multi-node clusters:** Scaling to 3-node Swarm application and database clusters for improved resilience. * **High availability:** Utilizing a Hetzner Floating IP for the application entry point and `spread` placement groups for fault tolerance across physical hosts. * **Enhanced network security:** Internal management services (RabbitMQ, APISIX, Prometheus, Grafana) are restricted to the application subnet, expected to be accessed via an internal reverse proxy (SWAG). * **Internal database replication:** New firewall rules enable PostgreSQL replication and MongoDB replica set traffic within the database subnet. * **Refined test environment:** Updates to align `test` configuration with the new `prod` structure, including a dedicated floating IP and adjusted firewall rules. * **Configuration standardization:** Environment-specific details moved to `locals.tf` for clarity, with upgraded server types and migration to Rocky Linux as the base image. - Updates were also made to the latest version of Terraform to ensure consistency in the documentation
77 lines
1.8 KiB
HCL
77 lines
1.8 KiB
HCL
resource "hcloud_ssh_key" "admin" {
|
|
name = "${local.name_prefix}-admin-key"
|
|
public_key = file(var.admin_ssh_public_key_path)
|
|
}
|
|
|
|
resource "hcloud_server" "swarm" {
|
|
for_each = local.swarm_private_ips
|
|
|
|
name = each.key
|
|
server_type = var.server_type_swarm
|
|
image = var.image
|
|
location = var.location
|
|
ssh_keys = [hcloud_ssh_key.admin.id]
|
|
placement_group_id = hcloud_placement_group.app_spread.id
|
|
|
|
labels = {
|
|
environment = local.environment
|
|
role = "swarm"
|
|
type = "service"
|
|
}
|
|
|
|
lifecycle {
|
|
prevent_destroy = true
|
|
}
|
|
}
|
|
|
|
resource "hcloud_server" "db" {
|
|
for_each = local.db_private_ips
|
|
|
|
name = each.key
|
|
server_type = var.server_type_db
|
|
image = var.image
|
|
location = var.location
|
|
ssh_keys = [hcloud_ssh_key.admin.id]
|
|
placement_group_id = hcloud_placement_group.db_spread.id
|
|
|
|
labels = {
|
|
environment = local.environment
|
|
role = "db"
|
|
type = "db"
|
|
}
|
|
|
|
lifecycle {
|
|
prevent_destroy = true
|
|
}
|
|
}
|
|
|
|
resource "hcloud_server_network" "swarm" {
|
|
for_each = local.swarm_private_ips
|
|
|
|
server_id = hcloud_server.swarm[each.key].id
|
|
network_id = hcloud_network.main.id
|
|
ip = each.value
|
|
|
|
depends_on = [hcloud_network_subnet.app]
|
|
}
|
|
|
|
resource "hcloud_server_network" "db" {
|
|
for_each = local.db_private_ips
|
|
|
|
server_id = hcloud_server.db[each.key].id
|
|
network_id = hcloud_network.main.id
|
|
ip = each.value
|
|
|
|
depends_on = [hcloud_network_subnet.db]
|
|
}
|
|
|
|
resource "hcloud_firewall_attachment" "swarm" {
|
|
firewall_id = hcloud_firewall.swarm.id
|
|
server_ids = [for s in hcloud_server.swarm : s.id]
|
|
}
|
|
|
|
resource "hcloud_firewall_attachment" "db" {
|
|
firewall_id = hcloud_firewall.db.id
|
|
server_ids = [for s in hcloud_server.db : s.id]
|
|
}
|