launch_config.yml 1.9 KB

1234567891011121314151617181920212223242526272829303132
  1. ---
  2. - name: fetch the security groups for launch config
  3. ec2_group_facts:
  4. filters:
  5. group-name: "{{ openshift_aws_launch_config_security_groups[openshift_aws_node_group.group] }}"
  6. vpc-id: "{{ vpcout.vpcs[0].id }}"
  7. region: "{{ openshift_aws_region }}"
  8. register: ec2sgs
  9. - fail:
  10. msg: >
  11. "Unable to fetch expected security groups: {{ openshift_aws_launch_config_security_groups[openshift_aws_node_group.group] }}"
  12. when:
  13. - (ec2sgs.security_groups | map(attribute='group_name') | list | sort) != (openshift_aws_launch_config_security_groups[openshift_aws_node_group.group] | sort)
  14. # Create the scale group config
  15. - name: Create the node scale group launch config
  16. ec2_lc:
  17. name: "{{ openshift_aws_node_group.name }}-{{ openshift_aws_ami_map[openshift_aws_node_group.group] | default(openshift_aws_ami) }}-{{ l_epoch_time }}"
  18. region: "{{ openshift_aws_region }}"
  19. image_id: "{{ openshift_aws_ami_map[openshift_aws_node_group.group] | default(openshift_aws_ami) }}"
  20. instance_type: "{{ l_node_group_config[openshift_aws_node_group.group].instance_type }}"
  21. security_groups: "{{ openshift_aws_launch_config_security_group_id | default(ec2sgs.security_groups | map(attribute='group_id')| list) }}"
  22. instance_profile_name: "{{ l_node_group_config[openshift_aws_node_group.group].iam_role if l_node_group_config[openshift_aws_node_group.group].iam_role is defined and
  23. l_node_group_config[openshift_aws_node_group.group].iam_role != '' and
  24. openshift_aws_create_iam_role
  25. else omit }}"
  26. user_data: "{{ lookup('template', 'user_data.j2') }}"
  27. key_name: "{{ openshift_aws_ssh_key_name }}"
  28. ebs_optimized: False
  29. volumes: "{{ l_node_group_config[openshift_aws_node_group.group].volumes }}"
  30. assign_public_ip: True