Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

deploy/aws: split public and private subnets when using existing vpc #530

Merged
merged 5 commits into from Jun 6, 2019

Conversation

AstroProfundis
Copy link
Contributor

What problem does this PR solve?

This should close #514

What is changed and how it works?

  • Split subnets to private_subnet_idsand public_subnet_ids, to correctly put resources into different network.
  • Add cluster_name to helm release name, making pod names unique

Check List

Tests

  • Manual test (add detailed scripts or steps below)

Code changes

  • Has Terraform change
  • Has documents change

Side effects

  • It may cause error when using terraform with new code to manage an cluster deployed by old versions.

Related changes

  • N/A

Does this PR introduce a user-facing change?:


@AstroProfundis AstroProfundis added the type/bug Something isn't working label May 28, 2019
@AstroProfundis AstroProfundis self-assigned this May 28, 2019
@aylei aylei self-requested a review May 29, 2019 04:18
Copy link
Contributor

@aylei aylei left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you move the variable comments to description in favor of document generation?

By default, the terraform script will create a new VPC. You can use an existing VPC by setting `create_vpc` to `false` and specify your existing VPC id and subnet ids to `vpc_id` and `subnets` variables.
By default, the terraform script will create a new VPC. You can use an existing VPC by setting `create_vpc` to `false` and specify your existing VPC id and subnet ids to `vpc_id`, `private_subnet_ids` and `public_subnet_ids` variables.

**Note:** Reusing VPC and subnets of an existing EKS cluster is not supported yet due to limitations of AWS and Terraform, so only change this option if you have to use a manually created VPC.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

quote the note?

variable "private_subnet_ids" {
description = "private subnet id list"
type = "list"
default = ["subnet-899e79f3", "subnet-a72d80cf", "subnet-a76d34ea"]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These defaults are wired and seems to be environment dependent

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These are samples and should be changed to user's values if they need to use existing ones, by default (with create_vpc=true) these values are ignored.

deploy/aws/README.md Outdated Show resolved Hide resolved
Copy link
Contributor

@aylei aylei left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Member

@tennix tennix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@tennix tennix merged commit 76902fc into pingcap:master Jun 6, 2019
yahonda pushed a commit that referenced this pull request Dec 27, 2021
* add link achor check

* fix dead anchors

* reorder

* fix anchors

* fix an anchor according to hailong's suggestion

Co-authored-by: Ran <huangran@pingcap.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type/bug Something isn't working
Projects
None yet
Development

Successfully merging this pull request may close these issues.

AWS EKS: unable to connect to the cluster with create_vpc=false and existing VPC
3 participants