Difference between revisions of "Terraform EKS module"
Jump to navigation
Jump to search
↑ https://registry.terraform.io/modules/terraform-aws-modules/eks/aws/latest/submodules/eks-managed-node-group
↑ https://registry.terraform.io/modules/terraform-aws-modules/eks/aws/latest?tab=inputs
↑ https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon
Line 18: | Line 18: | ||
* <code>[[create_aws_auth_configmap]]</code> | * <code>[[create_aws_auth_configmap]]</code> | ||
* <code>[[manage_aws_auth_configmap]]</code> | * <code>[[manage_aws_auth_configmap]]</code> | ||
− | * <code>[[enable_irsa]]</code> | + | * <code>[[enable_irsa]]</code>. See also: [[Terraform irsa-ebs-csi module]] |
+ | |||
* <code>[[aws_auth_users]]</code> | * <code>[[aws_auth_users]]</code> | ||
* <code>[[aws_auth_roles]]</code> | * <code>[[aws_auth_roles]]</code> |
Revision as of 17:40, 20 February 2024
Terraform EKS module
- https://registry.terraform.io/modules/terraform-aws-modules/eks/aws/latest
- Repo: https://github.com/terraform-aws-modules/terraform-aws-eks
- Changelog: https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/CHANGELOG.md
- Module official usage example
- Deploy EKS cluster using Terraform
Contents
Inputs [2]
cluster_version
cluster_name
cluster_addons[3]: kube-proxy, vpc-cni, aws-ebs-csi-driver, core_dns
cluster_enabled_log_types = ["API", "audit", "authenticator", "controllerManager", "scheduler"]
create_aws_auth_configmap
manage_aws_auth_configmap
enable_irsa
. See also: Terraform irsa-ebs-csi module
aws_auth_users
aws_auth_roles
aws_auth_accounts
eks_managed_node_group_defaults
eks_managed_node_groups
self_managed_node_groups
submoduleattach cluster primary security group
attach_cluster_encryption_policy
cluster_encryption_config
cluster_encryption_policy_description
cluster_encryption_policy_name
cluster_encryption_policy_path
cluster_encryption_policy_tags
cluster_encryption_policy_use_name_prefix
create_kms_key
: default trueenable_kms_key_rotation
cloudwatch_log_group_retention_in_day
, default 90 days.cluster_endpoint_public_access
Resources
39 Resources (.this, .node, .node_additional. .additional, .aws_auth, .before_compute, .cluster, .cluster_encryption, .cluster_primary_security_group, .cni_ipv6_policy, .controller, .controller_additional, .oidc_provider
) https://registry.terraform.io/modules/terraform-aws-modules/eks/aws/latest?tab=resources:
- aws_autoscaling_group.this
- aws_autoscaling_schedule.this
- aws_cloudwatch_event_rule.this
- aws_cloudwatch_log_group.this
- aws_ec2_tag.cluster_primary_security_group
- aws_eks_access_entry.node
- aws_eks_access_policy_association.this
- aws_eks_addon.before_compute
- aws_eks_addon.this
- aws_eks_cluster.this
- aws_eks_fargate_profile.this
- aws_eks_identity_provider_config.this
- aws_eks_node_group.this
- aws_iam_instance_profile.this
- aws_iam_openid_connect_provider.oidc_provider
- aws_iam_policy.cluster_encryption
- aws_iam_policy.cni_ipv6_policy
- aws_iam_policy.controller
- aws_iam_role.controller
- aws_iam_role.node
- aws_iam_role.this
- aws_iam_role_policy_attachment.additional
- aws_iam_role_policy_attachment.cluster_encryption
- aws_iam_role_policy_attachment.controller
- aws_iam_role_policy_attachment.controller_additional
- aws_iam_role_policy_attachment.node
- aws_iam_role_policy_attachment.node_additional
- aws_iam_role_policy_attachment.this
- aws_launch_template.this
- aws_security_group.cluster
- aws_security_group.node
- aws_security_group_rule.cluster
- aws_security_group_rule.node
- aws_sqs_queue.this
- aws_sqs_queue_policy.this
- kubernetes_config_map.aws_auth
- kubernetes_config_map_v1_data.aws_auth
- time_sleep.this
Resources
Submodules
Terraform provider: aws
eks_managed_node_groups
_user_data
eks-managed-node-group
fargate-profile
karpenter
self-managed-node-group (self_managed_node_groups)
Terraform providers
Examples
Activities
Related
- Terraform module: VPC
- hashicorp/kubernetes
Error: Unsupported argument
module.eks
- Terraform EKS resources
eks-cluster.tf
- Deploy EKS cluster using Terraform
- EKS addons: Terraform EKS module addons
instance_types
- Terraform submodule: iam-assumable-role-with-oidc
- KICS execution example
- Amazon EKS Blueprints for Terraform: eks_blueprints_addons, terraform-aws-eks-blueprints-teams
See also
- Terraform EKS module:
manage_aws_auth_configmap, create_aws_auth_configmap, aws_auth_roles, aws_auth_users, aws_auth_accounts, module.eks, Amazon EKS Blueprints for Terraform, OIDC
Advertising: