mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-19 18:17:48 +01:00
feat!: Add support for Outposts, remove node security group, add support for addon preserve and most_recent configurations (#2250)
Co-authored-by: Anton Babenko <anton@antonbabenko.com> Resolves undefined
This commit is contained in:
224
node_groups.tf
224
node_groups.tf
@@ -4,6 +4,19 @@ locals {
|
||||
http_tokens = "required"
|
||||
http_put_response_hop_limit = 2
|
||||
}
|
||||
|
||||
# EKS managed node group
|
||||
default_update_config = {
|
||||
max_unavailable_percentage = 33
|
||||
}
|
||||
|
||||
# Self-managed node group
|
||||
default_instance_refresh = {
|
||||
strategy = "Rolling"
|
||||
preferences = {
|
||||
min_healthy_percentage = 66
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
################################################################################
|
||||
@@ -59,14 +72,6 @@ locals {
|
||||
node_security_group_id = local.create_node_sg ? aws_security_group.node[0].id : var.node_security_group_id
|
||||
|
||||
node_security_group_rules = {
|
||||
egress_cluster_443 = {
|
||||
description = "Node groups to cluster API"
|
||||
protocol = "tcp"
|
||||
from_port = 443
|
||||
to_port = 443
|
||||
type = "egress"
|
||||
source_cluster_security_group = true
|
||||
}
|
||||
ingress_cluster_443 = {
|
||||
description = "Cluster API to node groups"
|
||||
protocol = "tcp"
|
||||
@@ -91,58 +96,51 @@ locals {
|
||||
type = "ingress"
|
||||
self = true
|
||||
}
|
||||
egress_self_coredns_tcp = {
|
||||
description = "Node to node CoreDNS"
|
||||
protocol = "tcp"
|
||||
from_port = 53
|
||||
to_port = 53
|
||||
type = "egress"
|
||||
self = true
|
||||
}
|
||||
ingress_self_coredns_udp = {
|
||||
description = "Node to node CoreDNS"
|
||||
description = "Node to node CoreDNS UDP"
|
||||
protocol = "udp"
|
||||
from_port = 53
|
||||
to_port = 53
|
||||
type = "ingress"
|
||||
self = true
|
||||
}
|
||||
egress_self_coredns_udp = {
|
||||
description = "Node to node CoreDNS"
|
||||
protocol = "udp"
|
||||
from_port = 53
|
||||
to_port = 53
|
||||
type = "egress"
|
||||
}
|
||||
|
||||
node_secuirty_group_recommended_rules = { for k, v in {
|
||||
ingress_nodes_ephemeral = {
|
||||
description = "Node to node ingress on ephemeral ports"
|
||||
protocol = "tcp"
|
||||
from_port = 1025
|
||||
to_port = 65535
|
||||
type = "ingress"
|
||||
self = true
|
||||
}
|
||||
egress_https = {
|
||||
description = "Egress all HTTPS to internet"
|
||||
protocol = "tcp"
|
||||
from_port = 443
|
||||
to_port = 443
|
||||
ingress_cluster_8443_webhook = {
|
||||
description = "Cluster API to node 8443/tcp webhook"
|
||||
protocol = "tcp"
|
||||
from_port = 8443
|
||||
to_port = 8443
|
||||
type = "ingress"
|
||||
source_cluster_security_group = true
|
||||
}
|
||||
ingress_cluster_9443_webhook = {
|
||||
description = "Cluster API to node 9443/tcp webhook"
|
||||
protocol = "tcp"
|
||||
from_port = 9443
|
||||
to_port = 9443
|
||||
type = "ingress"
|
||||
source_cluster_security_group = true
|
||||
}
|
||||
egress_all = {
|
||||
description = "Allow all egress"
|
||||
protocol = "-1"
|
||||
from_port = 0
|
||||
to_port = 0
|
||||
type = "egress"
|
||||
cidr_blocks = ["0.0.0.0/0"]
|
||||
ipv6_cidr_blocks = var.cluster_ip_family == "ipv6" ? ["::/0"] : null
|
||||
}
|
||||
egress_ntp_tcp = {
|
||||
description = "Egress NTP/TCP to internet"
|
||||
protocol = "tcp"
|
||||
from_port = 123
|
||||
to_port = 123
|
||||
type = "egress"
|
||||
cidr_blocks = var.node_security_group_ntp_ipv4_cidr_block
|
||||
ipv6_cidr_blocks = var.cluster_ip_family == "ipv6" ? var.node_security_group_ntp_ipv6_cidr_block : null
|
||||
}
|
||||
egress_ntp_udp = {
|
||||
description = "Egress NTP/UDP to internet"
|
||||
protocol = "udp"
|
||||
from_port = 123
|
||||
to_port = 123
|
||||
type = "egress"
|
||||
cidr_blocks = var.node_security_group_ntp_ipv4_cidr_block
|
||||
ipv6_cidr_blocks = var.cluster_ip_family == "ipv6" ? var.node_security_group_ntp_ipv6_cidr_block : null
|
||||
}
|
||||
}
|
||||
} : k => v if var.node_security_group_enable_recommended_rules }
|
||||
}
|
||||
|
||||
resource "aws_security_group" "node" {
|
||||
@@ -168,7 +166,11 @@ resource "aws_security_group" "node" {
|
||||
}
|
||||
|
||||
resource "aws_security_group_rule" "node" {
|
||||
for_each = { for k, v in merge(local.node_security_group_rules, var.node_security_group_additional_rules) : k => v if local.create_node_sg }
|
||||
for_each = { for k, v in merge(
|
||||
local.node_security_group_rules,
|
||||
local.node_secuirty_group_recommended_rules,
|
||||
var.node_security_group_additional_rules,
|
||||
) : k => v if local.create_node_sg }
|
||||
|
||||
# Required
|
||||
security_group_id = aws_security_group.node[0].id
|
||||
@@ -178,15 +180,13 @@ resource "aws_security_group_rule" "node" {
|
||||
type = each.value.type
|
||||
|
||||
# Optional
|
||||
description = try(each.value.description, null)
|
||||
cidr_blocks = try(each.value.cidr_blocks, null)
|
||||
ipv6_cidr_blocks = try(each.value.ipv6_cidr_blocks, null)
|
||||
prefix_list_ids = try(each.value.prefix_list_ids, [])
|
||||
self = try(each.value.self, null)
|
||||
source_security_group_id = try(
|
||||
each.value.source_security_group_id,
|
||||
try(each.value.source_cluster_security_group, false) ? local.cluster_security_group_id : null
|
||||
)
|
||||
description = lookup(each.value, "description", null)
|
||||
cidr_blocks = lookup(each.value, "cidr_blocks", null)
|
||||
ipv6_cidr_blocks = lookup(each.value, "ipv6_cidr_blocks", null)
|
||||
prefix_list_ids = lookup(each.value, "prefix_list_ids", [])
|
||||
self = lookup(each.value, "self", null)
|
||||
source_security_group_id = lookup(each.value, "source_security_group_id",
|
||||
lookup(each.value, "source_cluster_security_group", false)) ? local.cluster_security_group_id : null
|
||||
}
|
||||
|
||||
################################################################################
|
||||
@@ -196,7 +196,7 @@ resource "aws_security_group_rule" "node" {
|
||||
module "fargate_profile" {
|
||||
source = "./modules/fargate-profile"
|
||||
|
||||
for_each = { for k, v in var.fargate_profiles : k => v if var.create }
|
||||
for_each = { for k, v in var.fargate_profiles : k => v if var.create && !local.create_outposts_local_cluster }
|
||||
|
||||
create = try(each.value.create, true)
|
||||
|
||||
@@ -218,7 +218,9 @@ module "fargate_profile" {
|
||||
iam_role_permissions_boundary = try(each.value.iam_role_permissions_boundary, var.fargate_profile_defaults.iam_role_permissions_boundary, null)
|
||||
iam_role_tags = try(each.value.iam_role_tags, var.fargate_profile_defaults.iam_role_tags, {})
|
||||
iam_role_attach_cni_policy = try(each.value.iam_role_attach_cni_policy, var.fargate_profile_defaults.iam_role_attach_cni_policy, true)
|
||||
iam_role_additional_policies = try(each.value.iam_role_additional_policies, var.fargate_profile_defaults.iam_role_additional_policies, [])
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.fargate_profile_defaults, "iam_role_additional_policies", {}))
|
||||
|
||||
tags = merge(var.tags, try(each.value.tags, var.fargate_profile_defaults.tags, {}))
|
||||
}
|
||||
@@ -230,14 +232,13 @@ module "fargate_profile" {
|
||||
module "eks_managed_node_group" {
|
||||
source = "./modules/eks-managed-node-group"
|
||||
|
||||
for_each = { for k, v in var.eks_managed_node_groups : k => v if var.create }
|
||||
for_each = { for k, v in var.eks_managed_node_groups : k => v if var.create && !local.create_outposts_local_cluster }
|
||||
|
||||
create = try(each.value.create, true)
|
||||
|
||||
cluster_name = aws_eks_cluster.this[0].name
|
||||
cluster_version = try(each.value.cluster_version, var.eks_managed_node_group_defaults.cluster_version, aws_eks_cluster.this[0].version)
|
||||
cluster_security_group_id = local.cluster_security_group_id
|
||||
cluster_ip_family = var.cluster_ip_family
|
||||
cluster_name = aws_eks_cluster.this[0].name
|
||||
cluster_version = try(each.value.cluster_version, var.eks_managed_node_group_defaults.cluster_version, aws_eks_cluster.this[0].version)
|
||||
cluster_ip_family = var.cluster_ip_family
|
||||
|
||||
# EKS Managed Node Group
|
||||
name = try(each.value.name, each.key)
|
||||
@@ -261,7 +262,7 @@ module "eks_managed_node_group" {
|
||||
|
||||
remote_access = try(each.value.remote_access, var.eks_managed_node_group_defaults.remote_access, {})
|
||||
taints = try(each.value.taints, var.eks_managed_node_group_defaults.taints, {})
|
||||
update_config = try(each.value.update_config, var.eks_managed_node_group_defaults.update_config, {})
|
||||
update_config = try(each.value.update_config, var.eks_managed_node_group_defaults.update_config, local.default_update_config)
|
||||
timeouts = try(each.value.timeouts, var.eks_managed_node_group_defaults.timeouts, {})
|
||||
|
||||
# User data
|
||||
@@ -276,20 +277,22 @@ module "eks_managed_node_group" {
|
||||
user_data_template_path = try(each.value.user_data_template_path, var.eks_managed_node_group_defaults.user_data_template_path, "")
|
||||
|
||||
# Launch Template
|
||||
create_launch_template = try(each.value.create_launch_template, var.eks_managed_node_group_defaults.create_launch_template, true)
|
||||
launch_template_name = try(each.value.launch_template_name, var.eks_managed_node_group_defaults.launch_template_name, each.key)
|
||||
launch_template_use_name_prefix = try(each.value.launch_template_use_name_prefix, var.eks_managed_node_group_defaults.launch_template_use_name_prefix, true)
|
||||
launch_template_version = try(each.value.launch_template_version, var.eks_managed_node_group_defaults.launch_template_version, null)
|
||||
launch_template_description = try(each.value.launch_template_description, var.eks_managed_node_group_defaults.launch_template_description, "Custom launch template for ${try(each.value.name, each.key)} EKS managed node group")
|
||||
launch_template_tags = try(each.value.launch_template_tags, var.eks_managed_node_group_defaults.launch_template_tags, {})
|
||||
|
||||
ebs_optimized = try(each.value.ebs_optimized, var.eks_managed_node_group_defaults.ebs_optimized, null)
|
||||
key_name = try(each.value.key_name, var.eks_managed_node_group_defaults.key_name, null)
|
||||
create_launch_template = try(each.value.create_launch_template, var.eks_managed_node_group_defaults.create_launch_template, true)
|
||||
use_custom_launch_template = try(each.value.use_custom_launch_template, var.eks_managed_node_group_defaults.use_custom_launch_template, true)
|
||||
launch_template_id = try(each.value.launch_template_id, var.eks_managed_node_group_defaults.launch_template_id, "")
|
||||
launch_template_name = try(each.value.launch_template_name, var.eks_managed_node_group_defaults.launch_template_name, each.key)
|
||||
launch_template_use_name_prefix = try(each.value.launch_template_use_name_prefix, var.eks_managed_node_group_defaults.launch_template_use_name_prefix, true)
|
||||
launch_template_version = try(each.value.launch_template_version, var.eks_managed_node_group_defaults.launch_template_version, null)
|
||||
launch_template_default_version = try(each.value.launch_template_default_version, var.eks_managed_node_group_defaults.launch_template_default_version, null)
|
||||
update_launch_template_default_version = try(each.value.update_launch_template_default_version, var.eks_managed_node_group_defaults.update_launch_template_default_version, true)
|
||||
disable_api_termination = try(each.value.disable_api_termination, var.eks_managed_node_group_defaults.disable_api_termination, null)
|
||||
kernel_id = try(each.value.kernel_id, var.eks_managed_node_group_defaults.kernel_id, null)
|
||||
ram_disk_id = try(each.value.ram_disk_id, var.eks_managed_node_group_defaults.ram_disk_id, null)
|
||||
launch_template_description = try(each.value.launch_template_description, var.eks_managed_node_group_defaults.launch_template_description, "Custom launch template for ${try(each.value.name, each.key)} EKS managed node group")
|
||||
launch_template_tags = try(each.value.launch_template_tags, var.eks_managed_node_group_defaults.launch_template_tags, {})
|
||||
|
||||
ebs_optimized = try(each.value.ebs_optimized, var.eks_managed_node_group_defaults.ebs_optimized, null)
|
||||
key_name = try(each.value.key_name, var.eks_managed_node_group_defaults.key_name, null)
|
||||
disable_api_termination = try(each.value.disable_api_termination, var.eks_managed_node_group_defaults.disable_api_termination, null)
|
||||
kernel_id = try(each.value.kernel_id, var.eks_managed_node_group_defaults.kernel_id, null)
|
||||
ram_disk_id = try(each.value.ram_disk_id, var.eks_managed_node_group_defaults.ram_disk_id, null)
|
||||
|
||||
block_device_mappings = try(each.value.block_device_mappings, var.eks_managed_node_group_defaults.block_device_mappings, {})
|
||||
capacity_reservation_specification = try(each.value.capacity_reservation_specification, var.eks_managed_node_group_defaults.capacity_reservation_specification, {})
|
||||
@@ -304,6 +307,8 @@ module "eks_managed_node_group" {
|
||||
enable_monitoring = try(each.value.enable_monitoring, var.eks_managed_node_group_defaults.enable_monitoring, true)
|
||||
network_interfaces = try(each.value.network_interfaces, var.eks_managed_node_group_defaults.network_interfaces, [])
|
||||
placement = try(each.value.placement, var.eks_managed_node_group_defaults.placement, {})
|
||||
maintenance_options = try(each.value.maintenance_options, var.eks_managed_node_group_defaults.maintenance_options, {})
|
||||
private_dns_name_options = try(each.value.private_dns_name_options, var.eks_managed_node_group_defaults.private_dns_name_options, {})
|
||||
|
||||
# IAM role
|
||||
create_iam_role = try(each.value.create_iam_role, var.eks_managed_node_group_defaults.create_iam_role, true)
|
||||
@@ -315,18 +320,13 @@ module "eks_managed_node_group" {
|
||||
iam_role_permissions_boundary = try(each.value.iam_role_permissions_boundary, var.eks_managed_node_group_defaults.iam_role_permissions_boundary, null)
|
||||
iam_role_tags = try(each.value.iam_role_tags, var.eks_managed_node_group_defaults.iam_role_tags, {})
|
||||
iam_role_attach_cni_policy = try(each.value.iam_role_attach_cni_policy, var.eks_managed_node_group_defaults.iam_role_attach_cni_policy, true)
|
||||
iam_role_additional_policies = try(each.value.iam_role_additional_policies, var.eks_managed_node_group_defaults.iam_role_additional_policies, [])
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.eks_managed_node_group_defaults, "iam_role_additional_policies", {}))
|
||||
|
||||
# Security group
|
||||
vpc_security_group_ids = compact(concat([local.node_security_group_id], try(each.value.vpc_security_group_ids, var.eks_managed_node_group_defaults.vpc_security_group_ids, [])))
|
||||
cluster_primary_security_group_id = try(each.value.attach_cluster_primary_security_group, var.eks_managed_node_group_defaults.attach_cluster_primary_security_group, false) ? aws_eks_cluster.this[0].vpc_config[0].cluster_security_group_id : null
|
||||
create_security_group = try(each.value.create_security_group, var.eks_managed_node_group_defaults.create_security_group, true)
|
||||
security_group_name = try(each.value.security_group_name, var.eks_managed_node_group_defaults.security_group_name, null)
|
||||
security_group_use_name_prefix = try(each.value.security_group_use_name_prefix, var.eks_managed_node_group_defaults.security_group_use_name_prefix, true)
|
||||
security_group_description = try(each.value.security_group_description, var.eks_managed_node_group_defaults.security_group_description, "EKS managed node group security group")
|
||||
vpc_id = try(each.value.vpc_id, var.eks_managed_node_group_defaults.vpc_id, var.vpc_id)
|
||||
security_group_rules = try(each.value.security_group_rules, var.eks_managed_node_group_defaults.security_group_rules, {})
|
||||
security_group_tags = try(each.value.security_group_tags, var.eks_managed_node_group_defaults.security_group_tags, {})
|
||||
|
||||
tags = merge(var.tags, try(each.value.tags, var.eks_managed_node_group_defaults.tags, {}))
|
||||
}
|
||||
@@ -362,24 +362,27 @@ module "self_managed_node_group" {
|
||||
wait_for_elb_capacity = try(each.value.wait_for_elb_capacity, var.self_managed_node_group_defaults.wait_for_elb_capacity, null)
|
||||
wait_for_capacity_timeout = try(each.value.wait_for_capacity_timeout, var.self_managed_node_group_defaults.wait_for_capacity_timeout, null)
|
||||
default_cooldown = try(each.value.default_cooldown, var.self_managed_node_group_defaults.default_cooldown, null)
|
||||
default_instance_warmup = try(each.value.default_instance_warmup, var.self_managed_node_group_defaults.default_instance_warmup, null)
|
||||
protect_from_scale_in = try(each.value.protect_from_scale_in, var.self_managed_node_group_defaults.protect_from_scale_in, null)
|
||||
context = try(each.value.context, var.self_managed_node_group_defaults.context, null)
|
||||
|
||||
target_group_arns = try(each.value.target_group_arns, var.self_managed_node_group_defaults.target_group_arns, [])
|
||||
placement_group = try(each.value.placement_group, var.self_managed_node_group_defaults.placement_group, null)
|
||||
health_check_type = try(each.value.health_check_type, var.self_managed_node_group_defaults.health_check_type, null)
|
||||
health_check_grace_period = try(each.value.health_check_grace_period, var.self_managed_node_group_defaults.health_check_grace_period, null)
|
||||
|
||||
force_delete = try(each.value.force_delete, var.self_managed_node_group_defaults.force_delete, null)
|
||||
termination_policies = try(each.value.termination_policies, var.self_managed_node_group_defaults.termination_policies, [])
|
||||
suspended_processes = try(each.value.suspended_processes, var.self_managed_node_group_defaults.suspended_processes, [])
|
||||
max_instance_lifetime = try(each.value.max_instance_lifetime, var.self_managed_node_group_defaults.max_instance_lifetime, null)
|
||||
force_delete = try(each.value.force_delete, var.self_managed_node_group_defaults.force_delete, null)
|
||||
force_delete_warm_pool = try(each.value.force_delete_warm_pool, var.self_managed_node_group_defaults.force_delete_warm_pool, null)
|
||||
termination_policies = try(each.value.termination_policies, var.self_managed_node_group_defaults.termination_policies, [])
|
||||
suspended_processes = try(each.value.suspended_processes, var.self_managed_node_group_defaults.suspended_processes, [])
|
||||
max_instance_lifetime = try(each.value.max_instance_lifetime, var.self_managed_node_group_defaults.max_instance_lifetime, null)
|
||||
|
||||
enabled_metrics = try(each.value.enabled_metrics, var.self_managed_node_group_defaults.enabled_metrics, [])
|
||||
metrics_granularity = try(each.value.metrics_granularity, var.self_managed_node_group_defaults.metrics_granularity, null)
|
||||
service_linked_role_arn = try(each.value.service_linked_role_arn, var.self_managed_node_group_defaults.service_linked_role_arn, null)
|
||||
|
||||
initial_lifecycle_hooks = try(each.value.initial_lifecycle_hooks, var.self_managed_node_group_defaults.initial_lifecycle_hooks, [])
|
||||
instance_refresh = try(each.value.instance_refresh, var.self_managed_node_group_defaults.instance_refresh, {})
|
||||
instance_refresh = try(each.value.instance_refresh, var.self_managed_node_group_defaults.instance_refresh, local.default_instance_refresh)
|
||||
use_mixed_instances_policy = try(each.value.use_mixed_instances_policy, var.self_managed_node_group_defaults.use_mixed_instances_policy, false)
|
||||
mixed_instances_policy = try(each.value.mixed_instances_policy, var.self_managed_node_group_defaults.mixed_instances_policy, null)
|
||||
warm_pool = try(each.value.warm_pool, var.self_managed_node_group_defaults.warm_pool, {})
|
||||
@@ -388,7 +391,6 @@ module "self_managed_node_group" {
|
||||
schedules = try(each.value.schedules, var.self_managed_node_group_defaults.schedules, {})
|
||||
|
||||
delete_timeout = try(each.value.delete_timeout, var.self_managed_node_group_defaults.delete_timeout, null)
|
||||
use_default_tags = try(each.value.use_default_tags, var.self_managed_node_group_defaults.use_default_tags, false)
|
||||
autoscaling_group_tags = try(each.value.autoscaling_group_tags, var.self_managed_node_group_defaults.autoscaling_group_tags, {})
|
||||
|
||||
# User data
|
||||
@@ -401,12 +403,15 @@ module "self_managed_node_group" {
|
||||
user_data_template_path = try(each.value.user_data_template_path, var.self_managed_node_group_defaults.user_data_template_path, "")
|
||||
|
||||
# Launch Template
|
||||
create_launch_template = try(each.value.create_launch_template, var.self_managed_node_group_defaults.create_launch_template, true)
|
||||
launch_template_name = try(each.value.launch_template_name, var.self_managed_node_group_defaults.launch_template_name, each.key)
|
||||
launch_template_use_name_prefix = try(each.value.launch_template_use_name_prefix, var.self_managed_node_group_defaults.launch_template_use_name_prefix, true)
|
||||
launch_template_version = try(each.value.launch_template_version, var.self_managed_node_group_defaults.launch_template_version, null)
|
||||
launch_template_description = try(each.value.launch_template_description, var.self_managed_node_group_defaults.launch_template_description, "Custom launch template for ${try(each.value.name, each.key)} self managed node group")
|
||||
launch_template_tags = try(each.value.launch_template_tags, var.self_managed_node_group_defaults.launch_template_tags, {})
|
||||
create_launch_template = try(each.value.create_launch_template, var.self_managed_node_group_defaults.create_launch_template, true)
|
||||
launch_template_id = try(each.value.launch_template_id, var.self_managed_node_group_defaults.launch_template_id, "")
|
||||
launch_template_name = try(each.value.launch_template_name, var.self_managed_node_group_defaults.launch_template_name, each.key)
|
||||
launch_template_use_name_prefix = try(each.value.launch_template_use_name_prefix, var.self_managed_node_group_defaults.launch_template_use_name_prefix, true)
|
||||
launch_template_version = try(each.value.launch_template_version, var.self_managed_node_group_defaults.launch_template_version, null)
|
||||
launch_template_default_version = try(each.value.launch_template_default_version, var.self_managed_node_group_defaults.launch_template_default_version, null)
|
||||
update_launch_template_default_version = try(each.value.update_launch_template_default_version, var.self_managed_node_group_defaults.update_launch_template_default_version, true)
|
||||
launch_template_description = try(each.value.launch_template_description, var.self_managed_node_group_defaults.launch_template_description, "Custom launch template for ${try(each.value.name, each.key)} self managed node group")
|
||||
launch_template_tags = try(each.value.launch_template_tags, var.self_managed_node_group_defaults.launch_template_tags, {})
|
||||
|
||||
ebs_optimized = try(each.value.ebs_optimized, var.self_managed_node_group_defaults.ebs_optimized, null)
|
||||
ami_id = try(each.value.ami_id, var.self_managed_node_group_defaults.ami_id, "")
|
||||
@@ -414,12 +419,10 @@ module "self_managed_node_group" {
|
||||
instance_type = try(each.value.instance_type, var.self_managed_node_group_defaults.instance_type, "m6i.large")
|
||||
key_name = try(each.value.key_name, var.self_managed_node_group_defaults.key_name, null)
|
||||
|
||||
launch_template_default_version = try(each.value.launch_template_default_version, var.self_managed_node_group_defaults.launch_template_default_version, null)
|
||||
update_launch_template_default_version = try(each.value.update_launch_template_default_version, var.self_managed_node_group_defaults.update_launch_template_default_version, true)
|
||||
disable_api_termination = try(each.value.disable_api_termination, var.self_managed_node_group_defaults.disable_api_termination, null)
|
||||
instance_initiated_shutdown_behavior = try(each.value.instance_initiated_shutdown_behavior, var.self_managed_node_group_defaults.instance_initiated_shutdown_behavior, null)
|
||||
kernel_id = try(each.value.kernel_id, var.self_managed_node_group_defaults.kernel_id, null)
|
||||
ram_disk_id = try(each.value.ram_disk_id, var.self_managed_node_group_defaults.ram_disk_id, null)
|
||||
disable_api_termination = try(each.value.disable_api_termination, var.self_managed_node_group_defaults.disable_api_termination, null)
|
||||
instance_initiated_shutdown_behavior = try(each.value.instance_initiated_shutdown_behavior, var.self_managed_node_group_defaults.instance_initiated_shutdown_behavior, null)
|
||||
kernel_id = try(each.value.kernel_id, var.self_managed_node_group_defaults.kernel_id, null)
|
||||
ram_disk_id = try(each.value.ram_disk_id, var.self_managed_node_group_defaults.ram_disk_id, null)
|
||||
|
||||
block_device_mappings = try(each.value.block_device_mappings, var.self_managed_node_group_defaults.block_device_mappings, {})
|
||||
capacity_reservation_specification = try(each.value.capacity_reservation_specification, var.self_managed_node_group_defaults.capacity_reservation_specification, {})
|
||||
@@ -429,12 +432,15 @@ module "self_managed_node_group" {
|
||||
elastic_inference_accelerator = try(each.value.elastic_inference_accelerator, var.self_managed_node_group_defaults.elastic_inference_accelerator, {})
|
||||
enclave_options = try(each.value.enclave_options, var.self_managed_node_group_defaults.enclave_options, {})
|
||||
hibernation_options = try(each.value.hibernation_options, var.self_managed_node_group_defaults.hibernation_options, {})
|
||||
instance_requirements = try(each.value.instance_requirements, var.self_managed_node_group_defaults.instance_requirements, {})
|
||||
instance_market_options = try(each.value.instance_market_options, var.self_managed_node_group_defaults.instance_market_options, {})
|
||||
license_specifications = try(each.value.license_specifications, var.self_managed_node_group_defaults.license_specifications, {})
|
||||
metadata_options = try(each.value.metadata_options, var.self_managed_node_group_defaults.metadata_options, local.metadata_options)
|
||||
enable_monitoring = try(each.value.enable_monitoring, var.self_managed_node_group_defaults.enable_monitoring, true)
|
||||
network_interfaces = try(each.value.network_interfaces, var.self_managed_node_group_defaults.network_interfaces, [])
|
||||
placement = try(each.value.placement, var.self_managed_node_group_defaults.placement, {})
|
||||
maintenance_options = try(each.value.maintenance_options, var.self_managed_node_group_defaults.maintenance_options, {})
|
||||
private_dns_name_options = try(each.value.private_dns_name_options, var.self_managed_node_group_defaults.private_dns_name_options, {})
|
||||
|
||||
# IAM role
|
||||
create_iam_instance_profile = try(each.value.create_iam_instance_profile, var.self_managed_node_group_defaults.create_iam_instance_profile, true)
|
||||
@@ -446,19 +452,13 @@ module "self_managed_node_group" {
|
||||
iam_role_permissions_boundary = try(each.value.iam_role_permissions_boundary, var.self_managed_node_group_defaults.iam_role_permissions_boundary, null)
|
||||
iam_role_tags = try(each.value.iam_role_tags, var.self_managed_node_group_defaults.iam_role_tags, {})
|
||||
iam_role_attach_cni_policy = try(each.value.iam_role_attach_cni_policy, var.self_managed_node_group_defaults.iam_role_attach_cni_policy, true)
|
||||
iam_role_additional_policies = try(each.value.iam_role_additional_policies, var.self_managed_node_group_defaults.iam_role_additional_policies, [])
|
||||
# To better understand why this `lookup()` logic is required, see:
|
||||
# https://github.com/hashicorp/terraform/issues/31646#issuecomment-1217279031
|
||||
iam_role_additional_policies = lookup(each.value, "iam_role_additional_policies", lookup(var.self_managed_node_group_defaults, "iam_role_additional_policies", {}))
|
||||
|
||||
# Security group
|
||||
vpc_security_group_ids = compact(concat([local.node_security_group_id], try(each.value.vpc_security_group_ids, var.self_managed_node_group_defaults.vpc_security_group_ids, [])))
|
||||
cluster_security_group_id = local.cluster_security_group_id
|
||||
cluster_primary_security_group_id = try(each.value.attach_cluster_primary_security_group, var.self_managed_node_group_defaults.attach_cluster_primary_security_group, false) ? aws_eks_cluster.this[0].vpc_config[0].cluster_security_group_id : null
|
||||
create_security_group = try(each.value.create_security_group, var.self_managed_node_group_defaults.create_security_group, true)
|
||||
security_group_name = try(each.value.security_group_name, var.self_managed_node_group_defaults.security_group_name, null)
|
||||
security_group_use_name_prefix = try(each.value.security_group_use_name_prefix, var.self_managed_node_group_defaults.security_group_use_name_prefix, true)
|
||||
security_group_description = try(each.value.security_group_description, var.self_managed_node_group_defaults.security_group_description, "Self managed node group security group")
|
||||
vpc_id = try(each.value.vpc_id, var.self_managed_node_group_defaults.vpc_id, var.vpc_id)
|
||||
security_group_rules = try(each.value.security_group_rules, var.self_managed_node_group_defaults.security_group_rules, {})
|
||||
security_group_tags = try(each.value.security_group_tags, var.self_managed_node_group_defaults.security_group_tags, {})
|
||||
|
||||
tags = merge(var.tags, try(each.value.tags, var.self_managed_node_group_defaults.tags, {}))
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user