Merge branch 'master' into aws-auth_enhancemnts

This commit is contained in:
Max Williams
2018-07-11 10:56:13 +02:00
6 changed files with 11 additions and 4 deletions

View File

@@ -16,6 +16,7 @@ project adheres to [Semantic Versioning](http://semver.org/).
### Added ### Added
- kubelet_node_labels worker group option allows setting --node-labels= in kubelet. (Hat-tip, @bshelton229 👒) - kubelet_node_labels worker group option allows setting --node-labels= in kubelet. (Hat-tip, @bshelton229 👒)
- `worker_iam_role_arn` added to outputs. Sweet, @hatemosphere 🔥
### Changed ### Changed

View File

@@ -15,7 +15,7 @@ Read the [AWS docs on EKS to get connected to the k8s dashboard](https://docs.aw
* You want to create an EKS cluster and an autoscaling group of workers for the cluster. * You want to create an EKS cluster and an autoscaling group of workers for the cluster.
* You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module. * You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module.
* You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources. * You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources.
* If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`heptio-authenticator-aws`](https://github.com/heptio/authenticator#4-set-up-kubectl-to-use-heptio-authenticator-for-aws-tokens) are installed and on your shell's PATH. * If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`aws-iam-authenticator`](https://github.com/kubernetes-sigs/aws-iam-authenticator#4-set-up-kubectl-to-use-authentication-tokens-provided-by-aws-iam-authenticator-for-kubernetes) are installed and on your shell's PATH.
## Usage example ## Usage example
@@ -128,5 +128,6 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
| config_map_aws_auth | A kubernetes configuration to authenticate to this EKS cluster. | | config_map_aws_auth | A kubernetes configuration to authenticate to this EKS cluster. |
| kubeconfig | kubectl config file contents for this EKS cluster. | | kubeconfig | kubectl config file contents for this EKS cluster. |
| worker_iam_role_name | IAM role name attached to EKS workers | | worker_iam_role_name | IAM role name attached to EKS workers |
| worker_iam_role_arn | IAM role ID attached to EKS workers |
| worker_security_group_id | Security group ID attached to the EKS workers. | | worker_security_group_id | Security group ID attached to the EKS workers. |
| workers_asg_arns | IDs of the autoscaling groups containing workers. | | workers_asg_arns | IDs of the autoscaling groups containing workers. |

View File

@@ -13,7 +13,7 @@ resource "null_resource" "update_config_map_aws_auth" {
config_map_rendered = "${data.template_file.config_map_aws_auth.rendered}" config_map_rendered = "${data.template_file.config_map_aws_auth.rendered}"
} }
count = "${var.configure_kubectl_session ? 1 : 0}" count = "${var.manage_aws_auth ? 1 : 0}"
} }
data "template_file" "config_map_aws_auth" { data "template_file" "config_map_aws_auth" {

View File

@@ -16,7 +16,7 @@
** You want to create an EKS cluster and an autoscaling group of workers for the cluster. ** You want to create an EKS cluster and an autoscaling group of workers for the cluster.
** You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module. ** You want these resources to exist within security groups that allow communication and coordination. These can be user provided or created within the module.
** You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources. ** You've created a Virtual Private Cloud (VPC) and subnets where you intend to put the EKS resources.
** If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`heptio-authenticator-aws`](https://github.com/heptio/authenticator#4-set-up-kubectl-to-use-heptio-authenticator-for-aws-tokens) are installed and on your shell's PATH. ** If using the default variable value (`true`) for `configure_kubectl_session`, it's required that both [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) (>=1.10) and [`aws-iam-authenticator`](https://github.com/kubernetes-sigs/aws-iam-authenticator#4-set-up-kubectl-to-use-authentication-tokens-provided-by-aws-iam-authenticator-for-kubernetes) are installed and on your shell's PATH.
* ## Usage example * ## Usage example

View File

@@ -53,3 +53,8 @@ output "worker_iam_role_name" {
description = "IAM role name attached to EKS workers" description = "IAM role name attached to EKS workers"
value = "${aws_iam_role.workers.name}" value = "${aws_iam_role.workers.name}"
} }
output "worker_iam_role_arn" {
description = "IAM role ID attached to EKS workers"
value = "${aws_iam_role.workers.arn}"
}

View File

@@ -106,7 +106,7 @@ variable "worker_sg_ingress_from_port" {
variable "kubeconfig_aws_authenticator_command" { variable "kubeconfig_aws_authenticator_command" {
description = "Command to use to to fetch AWS EKS credentials" description = "Command to use to to fetch AWS EKS credentials"
default = "heptio-authenticator-aws" default = "aws-iam-authenticator"
} }
variable "kubeconfig_aws_authenticator_additional_args" { variable "kubeconfig_aws_authenticator_additional_args" {