mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-15 00:04:07 +01:00
Merge branch 'master' into aws-auth_enhancemnts
This commit is contained in:
@@ -16,6 +16,7 @@ project adheres to [Semantic Versioning](http://semver.org/).
|
||||
### Added
|
||||
|
||||
- kubelet_node_labels worker group option allows setting --node-labels= in kubelet. (Hat-tip, @bshelton229 👒)
|
||||
- `worker_iam_role_arn` added to outputs. Sweet, @hatemosphere 🔥
|
||||
|
||||
### Changed
|
||||
|
||||
|
||||
@@ -15,7 +15,7 @@ Read the [AWS docs on EKS to get connected to the k8s dashboard](https://docs.aw
|
||||
* You want to create an EKS cluster and an autoscaling group of workers for the cluster.
|
||||
* You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module.
|
||||
* You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources.
|
||||
* If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`heptio-authenticator-aws`](https://github.com/heptio/authenticator#4-set-up-kubectl-to-use-heptio-authenticator-for-aws-tokens) are installed and on your shell's PATH.
|
||||
* If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`aws-iam-authenticator`](https://github.com/kubernetes-sigs/aws-iam-authenticator#4-set-up-kubectl-to-use-authentication-tokens-provided-by-aws-iam-authenticator-for-kubernetes) are installed and on your shell's PATH.
|
||||
|
||||
## Usage example
|
||||
|
||||
@@ -128,5 +128,6 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| config_map_aws_auth | A kubernetes configuration to authenticate to this EKS cluster. |
|
||||
| kubeconfig | kubectl config file contents for this EKS cluster. |
|
||||
| worker_iam_role_name | IAM role name attached to EKS workers |
|
||||
| worker_iam_role_arn | IAM role ID attached to EKS workers |
|
||||
| worker_security_group_id | Security group ID attached to the EKS workers. |
|
||||
| workers_asg_arns | IDs of the autoscaling groups containing workers. |
|
||||
|
||||
@@ -13,7 +13,7 @@ resource "null_resource" "update_config_map_aws_auth" {
|
||||
config_map_rendered = "${data.template_file.config_map_aws_auth.rendered}"
|
||||
}
|
||||
|
||||
count = "${var.configure_kubectl_session ? 1 : 0}"
|
||||
count = "${var.manage_aws_auth ? 1 : 0}"
|
||||
}
|
||||
|
||||
data "template_file" "config_map_aws_auth" {
|
||||
|
||||
2
main.tf
2
main.tf
@@ -16,7 +16,7 @@
|
||||
** You want to create an EKS cluster and an autoscaling group of workers for the cluster.
|
||||
** You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module.
|
||||
** You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources.
|
||||
** If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`heptio-authenticator-aws`](https://github.com/heptio/authenticator#4-set-up-kubectl-to-use-heptio-authenticator-for-aws-tokens) are installed and on your shell's PATH.
|
||||
** If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`aws-iam-authenticator`](https://github.com/kubernetes-sigs/aws-iam-authenticator#4-set-up-kubectl-to-use-authentication-tokens-provided-by-aws-iam-authenticator-for-kubernetes) are installed and on your shell's PATH.
|
||||
|
||||
* ## Usage example
|
||||
|
||||
|
||||
@@ -53,3 +53,8 @@ output "worker_iam_role_name" {
|
||||
description = "IAM role name attached to EKS workers"
|
||||
value = "${aws_iam_role.workers.name}"
|
||||
}
|
||||
|
||||
output "worker_iam_role_arn" {
|
||||
description = "IAM role ID attached to EKS workers"
|
||||
value = "${aws_iam_role.workers.arn}"
|
||||
}
|
||||
|
||||
@@ -106,7 +106,7 @@ variable "worker_sg_ingress_from_port" {
|
||||
|
||||
variable "kubeconfig_aws_authenticator_command" {
|
||||
description = "Command to use to to fetch AWS EKS credentials"
|
||||
default = "heptio-authenticator-aws"
|
||||
default = "aws-iam-authenticator"
|
||||
}
|
||||
|
||||
variable "kubeconfig_aws_authenticator_additional_args" {
|
||||
|
||||
Reference in New Issue
Block a user