mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-04-30 20:34:37 +02:00
docs: Move examples that are more like test cases to the new tests/ directory; add better example configurations (#3069)
* chore: Move examples that are more like test cases to the new `tests/` directory * chore: Stash * feat: Add better examples for EKS managed node groups * chore: Add better examples for self-managed node groups * chore: Update docs and correct `nodegroup` to `node group`
This commit is contained in:
@@ -86,7 +86,7 @@ locals {
|
||||
}
|
||||
|
||||
# https://github.com/aws/containers-roadmap/issues/596#issuecomment-675097667
|
||||
# Managed nodegroup data must in MIME multi-part archive format,
|
||||
# Managed node group data must in MIME multi-part archive format,
|
||||
# as by default, EKS will merge the bootstrapping command required for nodes to join the
|
||||
# cluster with your user data. If you use a custom AMI in your launch template,
|
||||
# this merging will NOT happen and you are responsible for nodes joining the cluster.
|
||||
|
||||
@@ -122,7 +122,7 @@ module "eks_managed_node_group" {
|
||||
| <a name="input_create"></a> [create](#input\_create) | Determines whether to create EKS managed node group or not | `bool` | `true` | no |
|
||||
| <a name="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role) | Determines whether an IAM role is created or to use an existing IAM role | `bool` | `true` | no |
|
||||
| <a name="input_create_launch_template"></a> [create\_launch\_template](#input\_create\_launch\_template) | Determines whether to create a launch template or not. If set to `false`, EKS will use its own default launch template | `bool` | `true` | no |
|
||||
| <a name="input_create_placement_group"></a> [create\_placement\_group](#input\_create\_placement\_group) | Determines whether a placement group is created & used by the nodegroup | `bool` | `false` | no |
|
||||
| <a name="input_create_placement_group"></a> [create\_placement\_group](#input\_create\_placement\_group) | Determines whether a placement group is created & used by the node group | `bool` | `false` | no |
|
||||
| <a name="input_create_schedule"></a> [create\_schedule](#input\_create\_schedule) | Determines whether to create autoscaling group schedule or not | `bool` | `true` | no |
|
||||
| <a name="input_credit_specification"></a> [credit\_specification](#input\_credit\_specification) | Customize the credit specification of the instance | `map(string)` | `{}` | no |
|
||||
| <a name="input_desired_size"></a> [desired\_size](#input\_desired\_size) | Desired number of instances/nodes | `number` | `1` | no |
|
||||
|
||||
@@ -298,7 +298,7 @@ variable "placement" {
|
||||
}
|
||||
|
||||
variable "create_placement_group" {
|
||||
description = "Determines whether a placement group is created & used by the nodegroup"
|
||||
description = "Determines whether a placement group is created & used by the node group"
|
||||
type = bool
|
||||
default = false
|
||||
}
|
||||
|
||||
@@ -43,7 +43,7 @@ In the following example, the Karpenter module will create:
|
||||
- An IAM role for use with Pod Identity and a scoped IAM policy for the Karpenter controller
|
||||
- SQS queue and EventBridge event rules for Karpenter to utilize for spot termination handling, capacity re-balancing, etc.
|
||||
|
||||
In this scenario, Karpenter will re-use an existing Node IAM role from the EKS managed nodegroup which already has the necessary access entry permissions:
|
||||
In this scenario, Karpenter will re-use an existing Node IAM role from the EKS managed node group which already has the necessary access entry permissions:
|
||||
|
||||
```hcl
|
||||
module "eks" {
|
||||
@@ -70,7 +70,7 @@ module "karpenter" {
|
||||
create_node_iam_role = false
|
||||
node_iam_role_arn = module.eks.eks_managed_node_groups["initial"].iam_role_arn
|
||||
|
||||
# Since the nodegroup role will already have an access entry
|
||||
# Since the node group role will already have an access entry
|
||||
create_access_entry = false
|
||||
|
||||
tags = {
|
||||
|
||||
@@ -103,7 +103,7 @@ module "self_managed_node_group" {
|
||||
| <a name="input_context"></a> [context](#input\_context) | Reserved | `string` | `null` | no |
|
||||
| <a name="input_cpu_options"></a> [cpu\_options](#input\_cpu\_options) | The CPU options for the instance | `map(string)` | `{}` | no |
|
||||
| <a name="input_create"></a> [create](#input\_create) | Determines whether to create self managed node group or not | `bool` | `true` | no |
|
||||
| <a name="input_create_access_entry"></a> [create\_access\_entry](#input\_create\_access\_entry) | Determines whether an access entry is created for the IAM role used by the nodegroup | `bool` | `true` | no |
|
||||
| <a name="input_create_access_entry"></a> [create\_access\_entry](#input\_create\_access\_entry) | Determines whether an access entry is created for the IAM role used by the node group | `bool` | `true` | no |
|
||||
| <a name="input_create_autoscaling_group"></a> [create\_autoscaling\_group](#input\_create\_autoscaling\_group) | Determines whether to create autoscaling group or not | `bool` | `true` | no |
|
||||
| <a name="input_create_iam_instance_profile"></a> [create\_iam\_instance\_profile](#input\_create\_iam\_instance\_profile) | Determines whether an IAM instance profile is created or to use an existing IAM instance profile | `bool` | `true` | no |
|
||||
| <a name="input_create_launch_template"></a> [create\_launch\_template](#input\_create\_launch\_template) | Determines whether to create launch template or not | `bool` | `true` | no |
|
||||
|
||||
@@ -650,7 +650,7 @@ variable "iam_role_tags" {
|
||||
################################################################################
|
||||
|
||||
variable "create_access_entry" {
|
||||
description = "Determines whether an access entry is created for the IAM role used by the nodegroup"
|
||||
description = "Determines whether an access entry is created for the IAM role used by the node group"
|
||||
type = bool
|
||||
default = true
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user