Terraform AWS ASG:错误:超时-最后错误:ssh:握手失败:ssh:无法认证

时间:2019-07-05 08:55:50

标签: terraform terraform-provider-aws

我正在使用terraform 0.12创建带有aws的自动缩放组,当我应用terraform时,我得到了:

aws_autoscaling_group.satellite_websites_asg: Still creating... [4m50s elapsed]
aws_autoscaling_group.satellite_websites_asg: Still creating... [5m0s elapsed]
aws_autoscaling_group.satellite_websites_asg: Still creating... [5m10s elapsed]
aws_autoscaling_group.satellite_websites_asg: Still creating... [5m20s elapsed]
aws_autoscaling_group.satellite_websites_asg: Still creating... [5m30s elapsed]


Error: timeout - last error: ssh: handshake failed: ssh: unable to authenticate, attempted methods [none], no supported methods remain

如果我签入aws,则说明ASG已创建,并且可以通过SSH进入ASG中的实例

我的.tf文件

data "aws_ami" "ubuntu" {
  most_recent = true
  owners      = ["099720109477"] # Canonical

  filter {
    name   = "name"
    values = ["ubuntu/images/hvm-ssd/ubuntu-bionic-18.04-amd64-server-*"]
  }
}

resource "aws_launch_configuration" "satellite_websites_conf" {
  name_prefix          = "satellite_websites_conf-"
  image_id             = "${data.aws_ami.ubuntu.id}"
  instance_type        = "t3.micro"
  enable_monitoring    = "true"
  key_name             = data.terraform_remote_state.shared_infra.outputs.vpc_access_keyname
  iam_instance_profile = data.terraform_remote_state.shared_infra.outputs.ecs_iam_instance_profile
  security_groups      = [aws_security_group.ghost_ec2_http_https_ssh.id]
  user_data            = "${file("./boot-script.sh")}"

  lifecycle {
    create_before_destroy = true
  }
}


# ASG in which we'll host EC2 instance running ghost servers
resource "aws_autoscaling_group" "satellite_websites_asg" {
  name_prefix          = "satellite_websites_asg-"
  max_size             = 1
  min_size             = 1
  launch_configuration = "${aws_launch_configuration.satellite_websites_conf.name}"
  vpc_zone_identifier  = data.terraform_remote_state.shared_infra.outputs.vpc_private_subnets
  load_balancers       = ["${aws_elb.satellite_websites_elb.name}"]
  health_check_type    = "ELB"

  provisioner "file" {
    content = templatefile("${path.module}/ghost-config.json.template", {
         // somestuff
    })
    destination = "~/config.production.template"
  }
  provisioner "file" {
    source      = "${path.module}/boot-script.sh"
    destination = "~/boot-script.sh"
  }

  lifecycle {
    create_before_destroy = true
  }
}

1 个答案:

答案 0 :(得分:1)

您需要提供connection details以便文件供应商能够连接到ASG实例。

不幸的是,ASG资源仅间接管理它创建的实例,因此不会返回此信息。

您可能有一个aws_instance data source依赖于ASG并使用它来查找它创建的实例,但是在创建ASG后通过连接该实例来修改实例是一种反模式,如果此时,ASG将替换实例,因为此时您和您的自动化软件(例如Terraform)不在循环中。

相反,您应该尝试使用Packer之类的东西将任何常规配置(例如,我认为是Ghost及其依赖项安装?)烘焙到AMI中。对于任何在环境之间需要有所不同的内容,请使用用户数据在实例创建时进行这些更改,或者使用更加动态和基于运行时的内容(例如Consul)进行修改。