mirror of
https://github.com/ysoftdevs/terraform-aws-eks.git
synced 2026-01-17 17:22:13 +01:00
* allow creating an IAM role for each worker group * moved change from 'changed' to 'added' * create multiple roles not just profiles * fix config_map_aws_auth generation * don't duplicate worker-role templating * specify ARNs for worker groups individually todo fix aws_auth configmap * fixed AWS auth * fix aws_iam_instance_profile.workers name fix iam_instance_profile fallback * fix outputs * fix iam_instance_profile calculation * hopefully fix aws auth configmap generation * manually fill out remainder of arn * remove depends_on in worker_role_arns template file this was causing resources to be recreated every time * fmt * fix typo, move iam_role_id default to defaults map
66 lines
2.1 KiB
HCL
66 lines
2.1 KiB
HCL
output "cluster_id" {
|
|
description = "The name/id of the EKS cluster."
|
|
value = "${aws_eks_cluster.this.id}"
|
|
}
|
|
|
|
# Though documented, not yet supported
|
|
# output "cluster_arn" {
|
|
# description = "The Amazon Resource Name (ARN) of the cluster."
|
|
# value = "${aws_eks_cluster.this.arn}"
|
|
# }
|
|
|
|
output "cluster_certificate_authority_data" {
|
|
description = "Nested attribute containing certificate-authority-data for your cluster. This is the base64 encoded certificate data required to communicate with your cluster."
|
|
value = "${aws_eks_cluster.this.certificate_authority.0.data}"
|
|
}
|
|
|
|
output "cluster_endpoint" {
|
|
description = "The endpoint for your EKS Kubernetes API."
|
|
value = "${aws_eks_cluster.this.endpoint}"
|
|
}
|
|
|
|
output "cluster_version" {
|
|
description = "The Kubernetes server version for the EKS cluster."
|
|
value = "${aws_eks_cluster.this.version}"
|
|
}
|
|
|
|
output "cluster_security_group_id" {
|
|
description = "Security group ID attached to the EKS cluster."
|
|
value = "${local.cluster_security_group_id}"
|
|
}
|
|
|
|
output "config_map_aws_auth" {
|
|
description = "A kubernetes configuration to authenticate to this EKS cluster."
|
|
value = "${data.template_file.config_map_aws_auth.rendered}"
|
|
}
|
|
|
|
output "kubeconfig" {
|
|
description = "kubectl config file contents for this EKS cluster."
|
|
value = "${data.template_file.kubeconfig.rendered}"
|
|
}
|
|
|
|
output "workers_asg_arns" {
|
|
description = "IDs of the autoscaling groups containing workers."
|
|
value = "${aws_autoscaling_group.workers.*.arn}"
|
|
}
|
|
|
|
output "workers_asg_names" {
|
|
description = "Names of the autoscaling groups containing workers."
|
|
value = "${aws_autoscaling_group.workers.*.id}"
|
|
}
|
|
|
|
output "worker_security_group_id" {
|
|
description = "Security group ID attached to the EKS workers."
|
|
value = "${local.worker_security_group_id}"
|
|
}
|
|
|
|
output "worker_iam_role_name" {
|
|
description = "default IAM role name for EKS worker groups"
|
|
value = "${aws_iam_role.workers.name}"
|
|
}
|
|
|
|
output "worker_iam_role_arn" {
|
|
description = "default IAM role ARN for EKS worker groups"
|
|
value = "${aws_iam_role.workers.arn}"
|
|
}
|