modules/compute-engine-hpc/main.tf (122 lines of code) (raw):

/** * Copyright 2023 Google LLC * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ resource "random_id" "sa_sufix" { byte_length = 8 } data "google_service_account" "existing_account" { count = var.compute_service_account == "" ? 0 : 1 account_id = var.compute_service_account project = var.project_id } # module "vm_service_account" { # count = var.compute_service_account == "" ? 1 : 0 # source = "../service_account" # account_id = "sa-${var.sa_prefix}${random_id.sa_sufix.dec}" # display_name = "vm_service_account" # description = "service account for vm" # project_id = var.project_id # } resource "google_service_account" "service_account" { count = var.compute_service_account == "" ? 1 : 0 account_id = "sa-${var.sa_prefix}${random_id.sa_sufix.dec}" project = var.project_id display_name = "HPC vm_service_account" description = "service account for HPC vm" } resource "google_compute_instance_iam_member" "instance_iam" { for_each = toset(var.roles_list) project = var.project_id instance_name = module.compute_instance.instances_self_links[0] role = each.key zone = var.zone member = var.compute_service_account == "" ? google_service_account.service_account[0].member : "serviceAccount:${data.google_service_account.existing_account[0].email}" } resource "google_project_iam_member" "project" { for_each = toset(var.srv_roles_list) project = var.project_id role = each.key member = var.compute_service_account == "" ? google_service_account.service_account[0].member : "serviceAccount:${data.google_service_account.existing_account[0].email}" } data "google_project" "compute_project" { project_id = var.project_id } module "kms" { count = var.create_key ? 1 : 0 source = "../kms/" #project_id = var.project_id cmek_project_id = var.cmek_project_id use_existing_keyring = var.use_existing_keyring keyring = var.keyring_name location = var.region keys = [var.key_name] key_rotation_period = var.key_rotation_period encrypters = ["serviceAccount:service-${data.google_project.compute_project.number}@compute-system.iam.gserviceaccount.com"] set_encrypters_for = [var.key_name] decrypters = ["serviceAccount:service-${data.google_project.compute_project.number}@compute-system.iam.gserviceaccount.com"] set_decrypters_for = [var.key_name] } resource "google_kms_crypto_key_iam_binding" "crypto_key" { count = var.create_key ? 0 : 1 crypto_key_id = var.disk_encryption_key role = "roles/cloudkms.cryptoKeyEncrypterDecrypter" members = ["serviceAccount:service-${data.google_project.compute_project.number}@compute-system.iam.gserviceaccount.com"] } module "instance_template" { source = "terraform-google-modules/vm/google//modules/instance_template" version = "~> 8.0.0" name_prefix = var.instance_prefix labels = var.labels project_id = var.project_id region = var.region network = var.network subnetwork = var.subnetwork subnetwork_project = var.project_id service_account = var.compute_service_account == "" ? ({ email = google_service_account.service_account[0].email scopes = ["compute-rw", "storage-rw"] }) : ({ email = data.google_service_account.existing_account[0].email scopes = ["compute-rw", "storage-rw"] }) access_config = [{ nat_ip = null, network_tier = null }] can_ip_forward = false disk_encryption_key = var.create_key ? module.kms[0].keys[var.key_name] : var.disk_encryption_key disk_size_gb = var.disk_size_gb disk_type = var.disk_type machine_type = var.machine_type enable_shielded_vm = true shielded_instance_config = ({ enable_secure_boot = true enable_vtpm = true enable_integrity_monitoring = true }) # enable_confidential_vm = true enable_nested_virtualization = false source_image_family = var.source_image_family source_image_project = var.source_image_project # guestOsFeatures = ({type = SEV_CAPABLE}) startup_script = file("${path.module}/scripts/install.sh") metadata = var.metadata on_host_maintenance = "TERMINATE" tags = var.tags automatic_restart = true depends_on = [module.kms] } module "compute_instance" { source = "terraform-google-modules/vm/google//modules/compute_instance" version = "~> 8.0.0" instance_template = module.instance_template.self_link hostname = var.instance_name add_hostname_suffix = true deletion_protection = var.deletion_protection region = var.region num_instances = var.num_instances network = var.network subnetwork = var.subnetwork subnetwork_project = var.project_id zone = var.zone access_config = var.access_config # resource_policies = [google_compute_resource_policy.vm_resource_policy.self_link] depends_on = [module.instance_template] }