@@ -198,62 +198,62 @@ locals {
198
198
subnets_oke = concat (local. subnets_oke_standard , local. subnet_vcn_native_pod_networking , local. subnet_bastion , local. subnet_fss_mount_targets )
199
199
subnets_oke_standard = [
200
200
{
201
- subnet_name = " oke_k8s_endpoint_subnet"
202
- cidr_block = lookup (local. network_cidrs , " ENDPOINT-REGIONAL-SUBNET-CIDR" )
203
- display_name = " OKE K8s Endpoint subnet (${ local . deploy_id } )"
204
- dns_label = " okek8s${ local . deploy_id } "
205
- prohibit_public_ip_on_vnic = (var.cluster_endpoint_visibility == " Private" ) ? true : false
206
- prohibit_internet_ingress = (var.cluster_endpoint_visibility == " Private" ) ? true : false
207
- route_table_id = (var.cluster_endpoint_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
208
- alternative_route_table = null
209
- dhcp_options_id = module.vcn.default_dhcp_options_id
210
- security_list_ids = [module.security_lists[" oke_endpoint_security_list" ].security_list_id]
211
- alternative_security_list = null
212
- ipv6cidr_block = null
201
+ subnet_name = " oke_k8s_endpoint_subnet"
202
+ cidr_block = lookup (local. network_cidrs , " ENDPOINT-REGIONAL-SUBNET-CIDR" )
203
+ display_name = " OKE K8s Endpoint subnet (${ local . deploy_id } )"
204
+ dns_label = " okek8s${ local . deploy_id } "
205
+ prohibit_public_ip_on_vnic = (var.cluster_endpoint_visibility == " Private" ) ? true : false
206
+ prohibit_internet_ingress = (var.cluster_endpoint_visibility == " Private" ) ? true : false
207
+ route_table_id = (var.cluster_endpoint_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
208
+ alternative_route_table_name = null
209
+ dhcp_options_id = module.vcn.default_dhcp_options_id
210
+ security_list_ids = [module.security_lists[" oke_endpoint_security_list" ].security_list_id]
211
+ extra_security_list_names = anytrue ([(var . extra_security_list_name_for_api_endpoint == " " ), (var . extra_security_list_name_for_api_endpoint == null )]) ? [] : [var.extra_security_list_name_for_api_endpoint]
212
+ ipv6cidr_block = null
213
213
},
214
214
{
215
- subnet_name = " oke_nodes_subnet"
216
- cidr_block = lookup (local. network_cidrs , " NODES-REGIONAL-SUBNET-CIDR" )
217
- display_name = " OKE Nodes subnet (${ local . deploy_id } )"
218
- dns_label = " okenodes${ local . deploy_id } "
219
- prohibit_public_ip_on_vnic = (var.cluster_workers_visibility == " Private" ) ? true : false
220
- prohibit_internet_ingress = (var.cluster_workers_visibility == " Private" ) ? true : false
221
- route_table_id = (var.cluster_workers_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
222
- alternative_route_table = null
223
- dhcp_options_id = module.vcn.default_dhcp_options_id
224
- security_list_ids = [module.security_lists[" oke_nodes_security_list" ].security_list_id]
225
- alternative_security_list = null
226
- ipv6cidr_block = null
215
+ subnet_name = " oke_nodes_subnet"
216
+ cidr_block = lookup (local. network_cidrs , " NODES-REGIONAL-SUBNET-CIDR" )
217
+ display_name = " OKE Nodes subnet (${ local . deploy_id } )"
218
+ dns_label = " okenodes${ local . deploy_id } "
219
+ prohibit_public_ip_on_vnic = (var.cluster_workers_visibility == " Private" ) ? true : false
220
+ prohibit_internet_ingress = (var.cluster_workers_visibility == " Private" ) ? true : false
221
+ route_table_id = (var.cluster_workers_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
222
+ alternative_route_table_name = null
223
+ dhcp_options_id = module.vcn.default_dhcp_options_id
224
+ security_list_ids = [module.security_lists[" oke_nodes_security_list" ].security_list_id]
225
+ extra_security_list_names = anytrue ([(var . extra_security_list_name_for_nodes == " " ), (var . extra_security_list_name_for_nodes == null )]) ? [] : [var.extra_security_list_name_for_nodes]
226
+ ipv6cidr_block = null
227
227
},
228
228
{
229
- subnet_name = " oke_lb_subnet"
230
- cidr_block = lookup (local. network_cidrs , " LB-REGIONAL-SUBNET-CIDR" )
231
- display_name = " OKE LoadBalancers subnet (${ local . deploy_id } )"
232
- dns_label = " okelb${ local . deploy_id } "
233
- prohibit_public_ip_on_vnic = (var.cluster_load_balancer_visibility == " Private" ) ? true : false
234
- prohibit_internet_ingress = (var.cluster_load_balancer_visibility == " Private" ) ? true : false
235
- route_table_id = (var.cluster_load_balancer_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
236
- alternative_route_table = null
237
- dhcp_options_id = module.vcn.default_dhcp_options_id
238
- security_list_ids = [module.security_lists[" oke_lb_security_list" ].security_list_id]
239
- alternative_security_list = null
240
- ipv6cidr_block = null
229
+ subnet_name = " oke_lb_subnet"
230
+ cidr_block = lookup (local. network_cidrs , " LB-REGIONAL-SUBNET-CIDR" )
231
+ display_name = " OKE LoadBalancers subnet (${ local . deploy_id } )"
232
+ dns_label = " okelb${ local . deploy_id } "
233
+ prohibit_public_ip_on_vnic = (var.cluster_load_balancer_visibility == " Private" ) ? true : false
234
+ prohibit_internet_ingress = (var.cluster_load_balancer_visibility == " Private" ) ? true : false
235
+ route_table_id = (var.cluster_load_balancer_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
236
+ alternative_route_table_name = null
237
+ dhcp_options_id = module.vcn.default_dhcp_options_id
238
+ security_list_ids = [module.security_lists[" oke_lb_security_list" ].security_list_id]
239
+ extra_security_list_names = []
240
+ ipv6cidr_block = null
241
241
}
242
242
]
243
243
subnet_vcn_native_pod_networking = (var. create_pod_network_subnet || var. cluster_cni_type == " OCI_VCN_IP_NATIVE" || var. node_pool_cni_type_1 == " OCI_VCN_IP_NATIVE" ) ? [
244
244
{
245
- subnet_name = " oke_pods_network_subnet"
246
- cidr_block = lookup (local. network_cidrs , " VCN-NATIVE-POD-NETWORKING-REGIONAL-SUBNET-CIDR" ) # e.g.: 10.20.128.0/17 (1,1) = 32766 usable IPs (10.20.128.0 - 10.20.255.255)
247
- display_name = " OKE PODs Network subnet (${ local . deploy_id } )"
248
- dns_label = " okenpn${ local . deploy_id } "
249
- prohibit_public_ip_on_vnic = (var.pods_network_visibility == " Private" ) ? true : false
250
- prohibit_internet_ingress = (var.pods_network_visibility == " Private" ) ? true : false
251
- route_table_id = (var.pods_network_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
252
- alternative_route_table = null
253
- dhcp_options_id = module.vcn.default_dhcp_options_id
254
- security_list_ids = [module.security_lists[" oke_pod_network_security_list" ].security_list_id]
255
- alternative_security_list = null
256
- ipv6cidr_block = null
245
+ subnet_name = " oke_pods_network_subnet"
246
+ cidr_block = lookup (local. network_cidrs , " VCN-NATIVE-POD-NETWORKING-REGIONAL-SUBNET-CIDR" ) # e.g.: 10.20.128.0/17 (1,1) = 32766 usable IPs (10.20.128.0 - 10.20.255.255)
247
+ display_name = " OKE PODs Network subnet (${ local . deploy_id } )"
248
+ dns_label = " okenpn${ local . deploy_id } "
249
+ prohibit_public_ip_on_vnic = (var.pods_network_visibility == " Private" ) ? true : false
250
+ prohibit_internet_ingress = (var.pods_network_visibility == " Private" ) ? true : false
251
+ route_table_id = (var.pods_network_visibility == " Private" ) ? module.route_tables[" private" ].route_table_id : module.route_tables[" public" ].route_table_id
252
+ alternative_route_table_name = null
253
+ dhcp_options_id = module.vcn.default_dhcp_options_id
254
+ security_list_ids = [module.security_lists[" oke_pod_network_security_list" ].security_list_id]
255
+ extra_security_list_names = []
256
+ ipv6cidr_block = null
257
257
}] : []
258
258
subnet_bastion = []
259
259
subnet_fss_mount_targets = [] # 10.20.20.64/26 (10,81) = 62 usable IPs (10.20.20.64 - 10.20.20.255)
0 commit comments