我一直试图在一个在GKE中运行的集群中使用Terraform安装Helm图表。
我的问题分两部分:
helm_release.release_name:获取https://XX.XXX.XX.X/apis/extensions/v1beta1/namespaces/kube-system/deployments/tiller-deploy:拨号tcp XX.XXX.XX.X:443: XX.XXX.XX.X:443:连接被拒绝
下面是我如何配置Helm图表:
provider "kubernetes" {
host = "${var.cluster-host}"
username = "${var.cluster-username}"
password = "${var.cluster-password}"
client_certificate = "${base64decode(var.cluster-client-cert)}"
client_key = "${base64decode(var.cluster-client-key)}"
cluster_ca_certificate = "${base64decode(var.cluster-ca-certificate)}"
}
resource "kubernetes_service_account" "tiller" {
metadata {
name = "tiller"
namespace = "kube-system"
}
}
resource "kubernetes_cluster_role_binding" "tiller" {
metadata {
name = "tiller"
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "ClusterRole"
name = "cluster-admin"
}
# api_group has to be empty because of a bug:
# https://github.com/terraform-providers/terraform-provider-kubernetes/issues/204
subject {
api_group = ""
kind = "ServiceAccount"
name = "tiller"
namespace = "kube-system"
}
}
provider "helm" {
install_tiller = true
service_account = "tiller"
namespace = "kube-system"
kubernetes {
host = "${var.cluster-host}"
username = "${var.cluster-username}"
password = "${var.cluster-password}"
client_certificate = "${base64decode(var.cluster-client-cert)}"
client_key = "${base64decode(var.cluster-client-key)}"
cluster_ca_certificate = "${base64decode(var.cluster-ca-certificate)}"
}
}发布于 2019-03-12 09:08:34
https://devops.stackexchange.com/questions/6555
复制相似问题