Skip to content

Cluster zones #21

Merged
merged 2 commits into from
Mar 6, 2026
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Change logs are auto-generated with commitizen.
| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.0.0 |
| <a name="provider_aws.route53_main"></a> [aws.route53\_main](#provider\_aws.route53\_main) | 6.0.0 |
| <a name="provider_aws.route53_main_legacy"></a> [aws.route53\_main\_legacy](#provider\_aws.route53\_main\_legacy) | 6.0.0 |
| <a name="provider_aws.self"></a> [aws.self](#provider\_aws.self) | 6.0.0 |
| <a name="provider_aws.route53_self"></a> [aws.route53\_self](#provider\_aws.route53\_self) | 6.0.0 |
| <a name="provider_null"></a> [null](#provider\_null) | 3.2.4 |

## Modules
Expand Down
2 changes: 1 addition & 1 deletion dns-providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ provider "aws" {
}

provider "aws" {
alias = "self"
alias = "route53_self"
profile = var.profile
assume_role {
role_arn = format("arn:%v:iam::%v:role/r-inf-terraform-route53", data.aws_arn.current.partition, data.aws_caller_identity.current.account_id)
Expand Down
56 changes: 29 additions & 27 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ locals {
is_shared_vpc = data.aws_vpc.eks_vpc.owner_id != data.aws_caller_identity.current.account_id
region = var.region
vpc_domain_name = var.vpc_domain_name
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
}

#-------------------------------------------------
Expand All @@ -21,7 +22,7 @@ resource "aws_route53_zone" "cluster_domain" {
force_destroy = false

vpc {
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
vpc_id = local.vpc_id
vpc_region = local.region
}

Expand All @@ -44,19 +45,19 @@ resource "aws_route53_zone" "cluster_domain" {
# east region
#---
resource "aws_route53_vpc_association_authorization" "cluster_zone_east" {
count = local.region == "us-gov-east-1" ? 1 : 0
count = local.region != var.region_map["east"] ? 1 : 0

provider = aws.self
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
provider = aws.route53_self
vpc_id = local.vpc_id
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "cluster_zone_east" {
count = local.region == "us-gov-east-1" ? 1 : 0
count = local.region != var.region_map["east"] ? 1 : 0

provider = aws.route53_main
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
vpc_id = local.vpc_id
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id

Expand All @@ -67,19 +68,18 @@ resource "aws_route53_zone_association" "cluster_zone_east" {
# cluster PHZ Association west region
#-------------------------------------------------
resource "aws_route53_vpc_association_authorization" "cluster_zone_west" {
count = local.region == "us-gov-west-1" ? 1 : 0
count = local.region != var.region_map["west"] ? 1 : 0

provider = aws.self
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
provider = aws.route53_self
vpc_id = local.vpc_id
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "cluster_zone_west" {
count = local.region == "us-gov-west-1" ? 1 : 0

count = local.region != var.region_map["west"] ? 1 : 0
provider = aws.route53_main
vpc_id = local.is_shared_vpc ? try(data.aws_vpc.dummy_vpc[0].id, null) : data.aws_vpc.eks_vpc.id
vpc_id = local.vpc_id
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id

Expand All @@ -91,15 +91,15 @@ resource "aws_route53_zone_association" "cluster_zone_west" {
# east region
#---
resource "aws_route53_vpc_association_authorization" "central_zone_east" {
provider = aws.self
vpc_id = var.route53_endpoints.route53_main["us-gov-east-1"]
provider = aws.route53_self
vpc_id = var.route53_endpoints.route53_main[var.region_map["east"]]
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "central_zone_east" {
provider = aws.route53_main
vpc_id = var.route53_endpoints.route53_main["us-gov-east-1"]
vpc_id = var.route53_endpoints.route53_main[var.region_map["east"]]
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id

Expand All @@ -110,15 +110,15 @@ resource "aws_route53_zone_association" "central_zone_east" {
# west region
#-------------------------------------------------
resource "aws_route53_vpc_association_authorization" "central_zone_west" {
provider = aws.self
vpc_id = var.route53_endpoints.route53_main["us-gov-west-1"]
provider = aws.route53_self
vpc_id = var.route53_endpoints.route53_main[var.region_map["west"]]
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "central_zone_west" {
provider = aws.route53_main
vpc_id = var.route53_endpoints.route53_main["us-gov-west-1"]
vpc_id = var.route53_endpoints.route53_main[var.region_map["west"]]
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id

Expand All @@ -130,34 +130,35 @@ resource "aws_route53_zone_association" "central_zone_west" {
# east region
#---
resource "aws_route53_vpc_association_authorization" "legacy_zone_east" {
provider = aws.self
vpc_id = var.route53_endpoints.route53_main_legacy["us-gov-east-1"]
provider = aws.route53_self
vpc_id = var.route53_endpoints.route53_main_legacy[var.region_map["east"]]
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "legacy_zone_east" {
provider = aws.route53_main_legacy
vpc_id = var.route53_endpoints.route53_main_legacy["us-gov-east-1"]
vpc_id = var.route53_endpoints.route53_main_legacy[var.region_map["east"]]
vpc_region = var.region_map["east"]
zone_id = aws_route53_zone.cluster_domain.zone_id

depends_on = [aws_route53_vpc_association_authorization.legacy_zone_east]
}

#-------------------------------------------------
# cluster domain associations with legacy do2-gov networking
# west region
#-------------------------------------------------
resource "aws_route53_vpc_association_authorization" "legacy_zone_west" {
provider = aws.self
vpc_id = var.route53_endpoints.route53_main_legacy["us-gov-west-1"]
provider = aws.route53_self
vpc_id = var.route53_endpoints.route53_main_legacy[var.region_map["west"]]
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id
}

resource "aws_route53_zone_association" "legacy_zone_west" {
provider = aws.route53_main_legacy
vpc_id = var.route53_endpoints.route53_main_legacy["us-gov-west-1"]
vpc_id = var.route53_endpoints.route53_main_legacy[var.region_map["west"]]
vpc_region = var.region_map["west"]
zone_id = aws_route53_zone.cluster_domain.zone_id

Expand All @@ -174,9 +175,10 @@ resource "aws_route53_record" "entry" {
type = "A"

alias {
name = var.istio_ingress_lb.dns_name
zone_id = var.istio_ingress_lb.zone_id
evaluate_target_health = false # scaling actions will cause dns to drop otherwise
name = var.istio_ingress_lb.dns_name
zone_id = var.istio_ingress_lb.zone_id
# scaling actions will cause dns to drop otherwise
evaluate_target_health = false
}
}

Expand Down