eks

codezenith/eks/aws

Terraform Module HCL AWS ⏱ stale 5y 10mo

AWS EKS template

Install

module "eks" {
source = "codezenith/eks/aws"
version = "1.0.1"
}
⭐ Source on GitHub 📦 Registry page

README

EKS Terraform Template This Elastic Kubernetes Service template for AWS will provision a public reachable Kubernetes cluster (API endpoint public) plus some network resources so that Kubernetes can run properly. Which resources will be created? ___Network Stack___: VPC X amount of subnets (subnets will all be public) Internet Gateway Route tables to route 0.0.0.0/0 traffic into the subnets Security Groups for Cluster Node communication ___Kubernetes Infrastructure___: EKS cluster with public API endpoint * X amount of worker nodes with configurable compute size By default the worker nodes have access to the AWS Certificate Manager (ACM) to pull TLS certificates. The EKS cluster is also allowed to generate Route53 ingress to the cluster (setup ingress e.g.: using helm charts).

Inputs (21)

NameTypeDescriptionDefault
security_group_node_namestringName tag of the security group for the node to worker communication"terraform-eks-node-sg"
cluster_namestringEKS Cluster name"eks-cluster"
eks_auto_scaling_group_namestringEKS Worker node auto scaling group name"terraform-eks"
eks_worker_desired_capacitynumberEKS Worker nodes desired count3
subnet_netbitnumberNetbit number of subnets to provision (e.g.: X.X.X.X/24 <-- subnet_netbit)24
security_group_cluster_namestringName tag of the security group for the cluster to worker communication"terraform-eks-cluster-sg"
eks_node_group_namestringEKS Worker node group name"terraform-eks-ng"
eks_worker_min_sizenumberEKS Worker nodes minimum nodes2
eks_worker_max_sizenumberEKS Worker nodes maximum nodes5
vpc_namestringName tag of the VPC"terraform-eks-cluster"
igw_namestringName tag of the internet gateway"terraform-eks"
iam_eks_node_namestringEKS Cluster IAM role name"terraform-eks-node"
eks_worker_instance_typelist(string)EKS Worker node EC2 instance type[ "t3.large" ]
iam_eks_node_policy_arnlist(string)List of Policies to attach to the EKS node role[ "arn:aws:iam::aws:policy/AmazonEKSWo
regionstringAWS region to deploy into"eu-central-1"
subnet_countnumberNumber of subnets to provision2
eks_cluster_log_typeslist(string)EKS Cluster enabled log types to Cloudwatch[ "scheduler", "controllerManager" ]
iam_eks_cluster_namestringEKS Cluster IAM role name"terraform-eks-cluster"
iam_eks_cluster_policy_arnlist(string)List of Policies to attach to the EKS cluster role[ "arn:aws:iam::aws:policy/AmazonEKSCl
cidrmap(number)FQ VPC CIDR block{ "A": 10, "B": 120, "C": 0, "D"

Outputs (2)

config_map_aws_auth
kubeconfig

Resources (11)

aws_eks_clusteraws_eks_node_groupaws_iam_roleaws_iam_role_policy_attachmentaws_internet_gatewayaws_route_tableaws_route_table_associationaws_security_groupaws_security_group_ruleaws_subnetaws_vpc

Details

FrameworkTerraform Module
LanguageHCL
Version1.0.1
Cloud AWS
★ Stars0
Forks0
Total downloads6.5k
Inputs21
Outputs2
Resources11
Namespacecodezenith
Updated