eks
clouddrove/eks/aws
Terraform module will be created Autoscaling, Workers, EKS.
![Banner][website] Terraform AWS EKS With our comprehensive DevOps toolkit - streamline operations, automate workflows, enhance collaboration and, most importantly, deploy with confidence. We are a group of DevOps engineers & architects, joining hands in this ever evolving digital landscape. With our strong belief in Automation; just like microservices, always on the lookout to split the the infrastructure into smaller connected resources (database, cluster and more) which could be standardized, are manageable, scalable, secure & follow industry best practices. This module includes Terraform open source, examples, and automation tests (for better understanding), which would help you create and improve your infrastructure with minimalistic coding. Prerequisites and Providers This table cont
| Name | Type | Description | Default |
|---|---|---|---|
| cluster_encryption_config_kms_key_deletion_window_in_days | number | Cluster Encryption Config KMS Key Resource argument - key deletion windows in da | 10 |
| openid_connect_audiences | list(string) | List of OpenID Connect audience client IDs to add to the IRSA provider | [] |
| create | bool | Controls if resources should be created (affects nearly all resources) | false |
| managed_node_group | any | Map of eks-managed node group definitions to create | {} |
| name | string | Name (e.g. `app` or `cluster`). | "" |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "" |
| endpoint_private_access | bool | Indicates whether or not the Amazon EKS private API server endpoint is enabled. | true |
| endpoint_public_access | bool | Indicates whether or not the Amazon EKS public API server endpoint is enabled. D | true |
| map_additional_aws_accounts | list(string) | Additional AWS account numbers to add to `config-map-aws-auth` ConfigMap | [] |
| managedby | string | ManagedBy, eg 'CloudDrove' or 'AnmolNagpal'. | "[email protected]" |
| cluster_ip_family | string | The IP family used to assign Kubernetes pod and service addresses. Valid values | null |
| allowed_cidr_blocks | list(string) | List of CIDR blocks to be allowed to connect to the EKS cluster. | [] |
| eks_additional_security_group_ids | list(string) | EKS additional security group id | [] |
| node_iam_role_name | string | Name to use on the EKS Auto node IAM role created | null |
| map_additional_iam_users | list(object({ userarn = s | Additional IAM users to add to `config-map-aws-auth` ConfigMap | [] |
| cluster_compute_config | any | Configuration block for the cluster compute configuration | {} |
| cluster_name | string | Name of eks cluster | "" |
| label_order | list(any) | Label order, e.g. `name`,`application`. | [
"name",
"environment"
] |
| tags | map(any) | Additional tags (e.g. map(`BusinessUnit`,`XYZ`). | {} |
| eks_tags | map(any) | Additional tags for EKS Cluster only. | {} |
| … and 10 more inputs | |||
cluster_id — The name/id of the EKS cluster. Will block on cluster creation until the cluster is really readycluster_platform_version — Platform version for the clusternode_security_group_id — ID of the node shared security groupcluster_iam_role_name — IAM role name of the EKS clustertagscluster_endpoint — Endpoint for your Kubernetes API servernode_group_iam_role_name — IAM role name of the EKS clustercluster_namecluster_arn — The Amazon Resource Name (ARN) of the clustercluster_oidc_issuer_url — The URL on the EKS cluster for the OpenID Connect identity providercluster_primary_security_group_id — Cluster security group that was created by Amazon EKS for the cluster. Managed node groups use defaunode_security_group_arn — Amazon Resource Name (ARN) of the node shared security groupnode_group_iam_role_unique_id — Stable and unique string identifying the IAM rolecluster_certificate_authority_data — Base64 encoded certificate data required to communicate with the clustercluster_status — Status of the EKS cluster. One of `CREATING`, `ACTIVE`, `DELETING`, `FAILED`oidc_provider_arn — The ARN of the OIDC Provider if `enable_irsa = true`cluster_iam_role_arn — IAM role ARN of the EKS clustercluster_iam_role_unique_id — Stable and unique string identifying the IAM rolenode_group_iam_role_arn — IAM role ARN of the EKS clusterAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,