Difference between revisions of "Terraform EKS module input: cluster endpoint public access"
Jump to navigation
Jump to search
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
[[create_cluster_security_group]] = false | [[create_cluster_security_group]] = false | ||
[[create_node_security_group]] = false | [[create_node_security_group]] = false | ||
+ | |||
+ | |||
+ | [[cluster_endpoint_private_access]] | ||
+ | [[cluster_endpoint_public_access]] | ||
+ | |||
== Related == | == Related == | ||
Line 11: | Line 16: | ||
* <code>[[aws_iam_openid_connect_provider]]</code> | * <code>[[aws_iam_openid_connect_provider]]</code> | ||
* [[Amazon EKS cluster endpoint]] | * [[Amazon EKS cluster endpoint]] | ||
+ | * <code>[[aws-auth]]</code> | ||
+ | * [[Terraform provider: rancher2]] | ||
== See also == | == See also == |
Latest revision as of 12:32, 4 March 2024
cluster_endpoint_public_access = true | false
. Indicates whether or not the Amazon EKS public API server endpoint is enabled
# Fargate profiles use the cluster primary security group so these are not utilized create_cluster_security_group = false create_node_security_group = false
cluster_endpoint_private_access cluster_endpoint_public_access
Related[edit]
vpc_config
module.eks.data.tls_certificate
Configure SSH access to nodes
aws_iam_openid_connect_provider
- Amazon EKS cluster endpoint
aws-auth
- Terraform provider: rancher2
See also[edit]
Advertising: