feat: Allow communication between pods on workers and pods using the primary cluster security group (optional) (#892)

NOTES: New variable `worker_create_cluster_primary_security_group_rules` to allow communication between pods on workers and pods using the primary cluster security group (Managed Node Groups or Fargate). It defaults to `false` to avoid potential conflicts with existing security group rules users may have implemented.
This commit is contained in:
Simon Gurcke
2020-05-31 06:43:26 +10:00
committed by GitHub
parent 7ffe5fa88f
commit 3fefc2a66c
5 changed files with 35 additions and 5 deletions

View File

@@ -53,7 +53,7 @@ output "cluster_oidc_issuer_url" {
output "cluster_primary_security_group_id" {
description = "The cluster primary security group ID created by the EKS cluster on 1.14 or later. Referred to as 'Cluster security group' in the EKS console."
value = var.cluster_version >= 1.14 ? element(concat(aws_eks_cluster.this[*].vpc_config[0].cluster_security_group_id, list("")), 0) : null
value = local.cluster_primary_security_group_id
}
output "cloudwatch_log_group_name" {