Skip to content

Commit

Permalink
Add ability to load balance TCP/UDP applications on Azure
Browse files Browse the repository at this point in the history
* Add ability to load balance TCP/UDP applications (e.g. NodePort)
* Output the load balancer ID as `loadbalancer_id`
* Output `worker_security_group_name` and `worker_address_prefix`
for extending firewall rules
  • Loading branch information
dghubble committed Apr 8, 2019
1 parent be29f52 commit 92fb576
Show file tree
Hide file tree
Showing 2 changed files with 32 additions and 6 deletions.
12 changes: 9 additions & 3 deletions CHANGES.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Notable changes between versions.

* Kubernetes [v1.14.0](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.14.md#v1140)
* Update Calico from v3.6.0 to v3.6.1
* Add `enable_aggregation` option for CNCF conformance
* Add `enable_aggregation` option for CNCF conformance ([#436](https://github.com/poseidon/typhoon/pull/436))
* Aggregation is disabled by default to retain our security stance
* Aggregation increases the security surface area. Extensions become part of the control plane and must be scrutinized carefully and trusted. Favor leaving aggregation disabled.

Expand All @@ -16,10 +16,16 @@ Notable changes between versions.
* Output the network load balancer ARN as `nlb_id`
* Accept a `worker_target_groups` (ARN) list to which worker instances should be added

#### Azure

* Add ability to load balance TCP/UDP applications ([#447](https://github.com/poseidon/typhoon/pull/447))
* Output the load balancer ID as `loadbalancer_id`
* Output `worker_security_group_name` and `worker_address_prefix` for extending firewall rules ([#447](https://github.com/poseidon/typhoon/pull/447))

#### DigitalOcean

* Harden internal (node-to-node) firewall rules to align with other platforms
* Output `controller_tag` and `worker_tag` to simplify custom firewall rule creation
* Harden internal (node-to-node) firewall rules to align with other platforms ([#444](https://github.com/poseidon/typhoon/pull/444))
* Output `controller_tag` and `worker_tag` to simplify extending firewall rules ([#444](https://github.com/poseidon/typhoon/pull/444))

#### Google Cloud

Expand Down
26 changes: 23 additions & 3 deletions azure/container-linux/kubernetes/outputs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -27,10 +27,30 @@ output "security_group_id" {
value = "${azurerm_network_security_group.worker.id}"
}

output "kubeconfig" {
value = "${module.bootkube.kubeconfig-kubelet}"
}

# Outputs for custom firewalling

output "worker_security_group_name" {
value = "${azurerm_network_security_group.worker.name}"
}

output "worker_address_prefix" {
description = "Worker network subnet CIDR address (for source/destination)"
value = "${azurerm_subnet.worker.address_prefix}"
}

# Outputs for custom load balancing

output "loadbalancer_id" {
description = "ID of the cluster load balancer"
value = "${azurerm_lb.cluster.id}"
}

output "backend_address_pool_id" {
description = "ID of the worker backend address pool"
value = "${azurerm_lb_backend_address_pool.worker.id}"
}

output "kubeconfig" {
value = "${module.bootkube.kubeconfig-kubelet}"
}

0 comments on commit 92fb576

Please sign in to comment.