mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-02-24 19:44:49 +01:00
new release (#452)
This commit is contained in:
21
CHANGELOG.md
21
CHANGELOG.md
@@ -7,26 +7,33 @@ project adheres to [Semantic Versioning](http://semver.org/).
|
||||
|
||||
## Next release
|
||||
|
||||
## [[v5.?.?](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.0.0...HEAD)] - 2019-06-??]
|
||||
## [[v5.?.?](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.1.0...HEAD)] - 2019-08-??]
|
||||
|
||||
### Added
|
||||
|
||||
- Write your awesome addition here (by @you)
|
||||
|
||||
### Changed
|
||||
|
||||
- Write your awesome change here (by @you)
|
||||
|
||||
# History
|
||||
|
||||
## [[v5.1.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v5.0.0...v5.1.0)] - 2019-07-30]
|
||||
|
||||
### Added
|
||||
|
||||
- Option to set a KMS key for the log group and encrypt it (by @till-krauss)
|
||||
- Output the name of the cloudwatch log group (by @gbooth27)
|
||||
- Option to use spot instances with launch templates without defining pools, especially useful for GPU instance types (@onur-sam-gtn-ai)
|
||||
- Added `cpu_credits` param for the workers defined in `worker_groups_launch_template` (by @a-shink)
|
||||
- Added support for EBS Volumes tag in `worker_groups_launch_template` and `workers_launch_template_mixed.tf` (by @sppwf)
|
||||
- Write your awesome addition here (by @you)
|
||||
|
||||
### Changed
|
||||
|
||||
- Update default override instance types to work with Cluster Autoscaler (by @nauxliu on behalf of RightCapital)
|
||||
- Examples now specify `enable_dns_hostnames = true`, as per [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html) (by @karolinepauls)
|
||||
- Write your awesome change here (by @you)
|
||||
|
||||
# History
|
||||
|
||||
## [[v5.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.2...v5.0.0)] - 2019-05-07]
|
||||
## [[v5.0.0](https://github.com/terraform-aws-modules/terraform-aws-eks/compare/v4.0.2...v5.0.0)] - 2019-06-19]
|
||||
|
||||
### Added
|
||||
|
||||
|
||||
@@ -141,7 +141,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| permissions\_boundary | If provided, all IAM roles will be created with this permissions boundary attached. | string | `""` | no |
|
||||
| subnets | A list of subnets to place the EKS cluster and workers within. | list(string) | n/a | yes |
|
||||
| tags | A map of tags to add to all resources. | map(string) | `{}` | no |
|
||||
| vpc\_id | VPC where the cluster and workers will be deployed. It must satisfy [EKS requirements](https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html). | string | n/a | yes |
|
||||
| vpc\_id | VPC where the cluster and workers will be deployed. | string | n/a | yes |
|
||||
| worker\_additional\_security\_group\_ids | A list of additional security group ids to attach to worker instances | list(string) | `[]` | no |
|
||||
| worker\_ami\_name\_filter | Additional name filter for AWS EKS worker AMI. Default behaviour will get latest for the cluster_version but could be set to a release from amazon-eks-ami, e.g. "v20190220" | string | `"v*"` | no |
|
||||
| worker\_create\_security\_group | Whether to create a security group for the workers or attach the workers to `worker_security_group_id`. | bool | `"true"` | no |
|
||||
@@ -159,6 +159,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
|
||||
| Name | Description |
|
||||
|------|-------------|
|
||||
| cloudwatch\_log\_group\_name | Name of cloudwatch log group created |
|
||||
| cluster\_arn | The Amazon Resource Name (ARN) of the cluster. |
|
||||
| cluster\_certificate\_authority\_data | Nested attribute containing certificate-authority-data for your cluster. This is the base64 encoded certificate data required to communicate with your cluster. |
|
||||
| cluster\_endpoint | The endpoint for your EKS Kubernetes API. |
|
||||
@@ -167,7 +168,6 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
|
||||
| cluster\_id | The name/id of the EKS cluster. |
|
||||
| cluster\_security\_group\_id | Security group ID attached to the EKS cluster. |
|
||||
| cluster\_version | The Kubernetes server version for the EKS cluster. |
|
||||
| cloudwatch\_log\_group\_name | The name of the cloudwatch log group created for the EKS cluster. |
|
||||
| config\_map\_aws\_auth | A kubernetes configuration to authenticate to this EKS cluster. |
|
||||
| kubeconfig | kubectl config file contents for this EKS cluster. |
|
||||
| kubeconfig\_filename | The filename of the generated kubectl config. |
|
||||
|
||||
2
local.tf
2
local.tf
@@ -81,7 +81,6 @@ locals {
|
||||
spot_allocation_strategy = "lowest-price" # The only valid value is lowest-price, which is also the default value. The Auto Scaling group selects the cheapest Spot pools and evenly allocates your Spot capacity across the number of Spot pools that you specify.
|
||||
spot_instance_pools = 10 # "Number of Spot pools per availability zone to allocate capacity. EC2 Auto Scaling selects the cheapest Spot pools and evenly allocates Spot capacity across the number of Spot pools that you specify."
|
||||
spot_max_price = "" # Maximum price per unit hour that the user is willing to pay for the Spot instances. Default is the on-demand price
|
||||
market_type = null # set to "spot" to use spot instances without defining pools
|
||||
}
|
||||
|
||||
workers_group_defaults = merge(
|
||||
@@ -241,4 +240,3 @@ locals {
|
||||
"x1e.32xlarge" = true
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -229,14 +229,6 @@ resource "aws_launch_template" "workers_launch_template" {
|
||||
)
|
||||
}
|
||||
|
||||
instance_market_options {
|
||||
market_type = lookup(
|
||||
var.worker_groups_launch_template[count.index],
|
||||
"market_type",
|
||||
local.workers_group_defaults["market_type"],
|
||||
)
|
||||
}
|
||||
|
||||
block_device_mappings {
|
||||
device_name = lookup(
|
||||
var.worker_groups_launch_template[count.index],
|
||||
@@ -306,4 +298,3 @@ resource "aws_iam_instance_profile" "workers_launch_template" {
|
||||
)
|
||||
path = var.iam_path
|
||||
}
|
||||
|
||||
|
||||
@@ -322,7 +322,7 @@ resource "aws_launch_template" "workers_launch_template_mixed" {
|
||||
tags = merge(
|
||||
{
|
||||
"Name" = "${aws_eks_cluster.this.name}-${lookup(
|
||||
var.worker_groups_launch_template[count.index],
|
||||
var.worker_groups_launch_template_mixed[count.index],
|
||||
"name",
|
||||
count.index,
|
||||
)}-eks_asg"
|
||||
@@ -348,4 +348,3 @@ resource "aws_iam_instance_profile" "workers_launch_template_mixed" {
|
||||
)
|
||||
path = var.iam_path
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user