Last active
January 16, 2019 10:55
-
-
Save jkordish/95bd29084ec2907cf60697ccfc66e553 to your computer and use it in GitHub Desktop.
consul cluster --- cloud-init.sh agent discovery
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# not really needed anymore as consul supports the ability to filter our ec2 instances now | |
#create initial consul server config sans server IPs | |
cat<<EOF > /tmp/consul_config.json | |
{ | |
"datacenter": "${dc}", | |
"retry_join": [ | |
] | |
} | |
EOF | |
# load the credentials from the ec2 instance profile | |
source /etc/profile.d/creds.sh | |
# wait a bit until a couple consul servers are up | |
until [ "$(aws ec2 describe-instances --region $AWS_DEFAULT_REGION --filters "Name=tag:service,Values=consul" "Name=instance-state-name,Values=running" "Name=tag:cust_id,Values=${dc}"| jq -r '.Reservations[].Instances[].PrivateIpAddress' | wc -l | tr -d '[[:space:]]')" -gt "2" ]; do sleep 5;done | |
# find running consul servers within our vpc | |
CONSUL_SERVERS=$(aws ec2 describe-instances --region $AWS_DEFAULT_REGION --filters "Name=tag:service,Values=consul" "Name=instance-state-name,Values=running" "Name=tag:cust_id,Values=${dc}"| jq "[.Reservations[].Instances[].PrivateIpAddress]") | |
# add the IPs into the our consul config so we bring up the cluster | |
jq ".retry_join |= [.][]+ $CONSUL_SERVERS" /tmp/consul_config.json > /etc/consul.d/agent.json | |
stop consul || true | |
start consul || true |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
iam_role=$(/usr/bin/curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/) | |
export AWS_ACCOUNT_ID=$(/usr/bin/curl -s http://169.254.169.254/latest/dynamic/instance-identity/document | /usr/bin/jq .accountId | /usr/bin/tr -d '"') | |
export AWS_DEFAULT_REGION=$(/usr/bin/curl -s http://169.254.169.254/latest/dynamic/instance-identity/document | /usr/bin/jq .region | /usr/bin/tr -d '"') | |
export AWS_ACCESS_KEY_ID=$(/usr/bin/curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/$iam_role | /usr/bin/jq .AccessKeyId | /usr/bin/tr -d '"') | |
export AWS_SECRET_ACCESS_KEY=$(/usr/bin/curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/$iam_role | /usr/bin/jq .SecretAccessKey | /usr/bin/tr -d '"') | |
export AWS_SECURITY_TOKEN=$(/usr/bin/curl -s http://169.254.169.254/latest/meta-data/iam/security-credentials/$iam_role | /usr/bin/jq .Token | /usr/bin/tr -d '"') |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment