mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-03-18 07:23:45 +01:00
Remove unnecessary http callout and security rule
EKS masters are publicly accessible. You cannot restrict access nor need to explicitly grant access. https://github.com/terraform-aws-modules/terraform-aws-eks/pull/69#issuecomment-406123233
This commit is contained in:
@@ -114,7 +114,6 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| worker_security_group_id | If provided, all workers will be attached to this security group. If not given, a security group will be created with necessary ingres/egress to work with the EKS cluster. | string | `` | no |
|
||||
| worker_sg_ingress_from_port | Minimum port number from which pods will accept communication. Must be changed to a lower value if some pods in your cluster will expose a port lower than 1025 (e.g. 22, 80, or 443). | string | `1025` | no |
|
||||
| workers_group_defaults | Default values for target groups as defined by the list of maps. | map | `<map>` | no |
|
||||
| workstation_cidr | Override the default ingress rule that allows communication with the EKS cluster API. If not given, will use current IP/32. | string | `` | no |
|
||||
| write_kubeconfig | Whether to write a kubeconfig file containing the cluster configuration. | string | `true` | no |
|
||||
|
||||
## Outputs
|
||||
|
||||
Reference in New Issue
Block a user