Files
domain/share/dataset-mongo/mongo.tf
2024-05-12 12:03:32 +02:00

132 lines
3.9 KiB
HCL

locals {
mongo-labels = merge(local.common_labels, {
"app.kubernetes.io/component" = "mongo"
})
}
resource "kubectl_manifest" "prj_mongo_secret" {
ignore_fields = ["metadata.annotations"]
yaml_body = <<-EOF
apiVersion: "secretgenerator.mittwald.de/v1alpha1"
kind: "StringSecret"
metadata:
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
labels: ${jsonencode(local.mongo-labels)}
spec:
forceRegenerate: false
fields:
- fieldName: "password"
length: "16"
EOF
}
data "kubernetes_secret_v1" "prj_mongo_secret" {
depends_on = [ kubectl_manifest.prj_mongo_secret ]
metadata {
name = "${var.instance}-${var.component}"
namespace = var.namespace
}
}
locals {
mongo-password = data.kubernetes_secret_v1.prj_mongo_secret.data["password"]
}
resource "kubectl_manifest" "prj_mongo" {
yaml_body = <<-EOF
apiVersion: mongodbcommunity.mongodb.com/v1
kind: MongoDBCommunity
metadata:
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
labels: ${jsonencode(local.mongo-labels)}
spec:
members: ${var.replicas}
type: ReplicaSet
version: "${var.mongo.version}"
statefulSet:
spec:
template:
metadata:
annotations:
"k8up.io/backupcommand": "sh -c 'mongodump --username=$MONGODB_USER --password=$MONGODB_PASSWORD mongodb://localhost/$MONGODB_NAME --archive'"
"k8up.io/file-extension": ".archive"
spec:
containers:
- name: mongod
imagePullPolicy: "${var.image.pull_policy}"
resources:
limits:
cpu: "${var.ressources.limits.cpu}"
memory: "${var.ressources.limits.memory}"
requests:
cpu: "${var.ressources.requests.cpu}"
memory: "${var.ressources.requests.memory}"
env:
- name: MONGODB_NAME
value: ${var.instance}
- name: MONGODB_USER
value: ${var.instance}
- name: MONGODB_PASSWORD
valueFrom:
secretKeyRef:
name: "${var.instance}-${var.component}"
key: password
security:
authentication:
modes: ["SCRAM"]
additionalMongodConfig:
storage.wiredTiger.engineConfig.cacheSizeGB: ${var.cacheSizeGB}
users:
- name: ${var.instance}
db: ${var.instance}
passwordSecretRef:
name: "${var.instance}-${var.component}"
roles:
- db: ${var.instance}
name: readWrite
scramCredentialsSecretName: "${var.instance}-${var.component}-scram"
EOF
}
resource "kubectl_manifest" "prj_mongo_sa" {
yaml_body = <<-EOF
apiVersion: v1
kind: ServiceAccount
metadata:
name: "mongodb-database"
namespace: "${var.namespace}"
labels: ${jsonencode(local.mongo-labels)}
EOF
}
resource "kubectl_manifest" "prj_mongo_role" {
yaml_body = <<-EOF
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: "mongodb-database"
namespace: "${var.namespace}"
labels: ${jsonencode(local.mongo-labels)}
rules:
- apiGroups: [""]
resources: ["secrets"]
verbs: ["get"]
- apiGroups: [""]
resources: ["pods"]
verbs: ["patch", "delete", "get"]
EOF
}
resource "kubectl_manifest" "prj_mongo_rb" {
yaml_body = <<-EOF
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: "mongodb-database"
namespace: "${var.namespace}"
labels: ${jsonencode(local.mongo-labels)}
subjects:
- kind: ServiceAccount
name: mongodb-database
roleRef:
kind: Role
name: mongodb-database
apiGroup: rbac.authorization.k8s.io
EOF
}