eks-ecommerce

Devgurusio/eks-ecommerce/aws

Terraform Module HCL AWS

AWS Elastic Kubernetes Service starter kit to bootstrap an e-commerce site based on microservices

Install
module "eks-ecommerce" {
source = "Devgurusio/eks-ecommerce/aws"
version = "1.3.1"
}
plain text: /constructs/tfmod-devgurusio-eks-ecommerce-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

Elastic Kubernetes Service (EKS) This is an opinionated terraform module to bootstrap an EKS Cluster using Terraform. Features enabled: Logging using Amazon Cloudwatch Firewall security measures, allowing only required control-plane to nodes communication. IAM Accounts for Service Accounts VPC Native cluster Cluster Autoscaler IAM Roles and Helm release installed (configurable) Metrics server configured and fully functional Updatable nodes through AWS Autoscaling instance refreshes Non-default SA for nodes Usage of containerd as runtime (configurable on the example file) aws-auth management Usage You can find a fully functional, production-ready example on the examples/ folder. Requirements | Name | Version | | --------- | ------- | | terraform | >= 1.0 | Important Note This module require

Inputs (11)
NameTypeDescriptionDefault
self_managed_node_groupsanyObject that represents the Node configuration to apply. Taken from the parent mo required
environmentstringThe environment name"devgurus-dev"
kubernetes_versionstringThe Kubernetes version of the Kubernetes control plane"1.21"
enable_cluster_autoscalerboolWhether to create a Helm release installing cluster-autoscaler resources or notfalse
create_aws_auth_configmapboolThis option toogles aws-auth creation. It should only be enabled when using selffalse
map_userslist(object({ userarn = sAdditional IAM users to add to the aws-auth configmap.[]
vpc_cidrstringVPC's CIDR to be created by the VPC module"10.0.0.0/16"
vpc_private_subnetslist(string)VPC's private subnets to be created by the VPC module[ "10.0.1.0/24", "10.0.2.0/24", "1
vpc_public_subnetslist(string)VPC's public subnets to be created by the VPC module[ "10.0.4.0/24", "10.0.5.0/24", "1
manage_aws_auth_configmapboolChoose whether the EKS module should manage your aws-auth configmap or nottrue
map_roleslist(object({ rolearn = sAdditional IAM roles to add to the aws-auth configmap.[]
Outputs (9)
cluster_certificate_authority_data — Base64 encoded certificate data required to communicate with the cluster
cluster_oidc_issuer_url — The URL on the EKS cluster for the OpenID Connect identity provider
cloudwatch_log_group_arn — Arn of cloudwatch log group created
cluster_arn — The Amazon Resource Name (ARN) of the cluster
cluster_id — The name/id of the EKS cluster. Will block on cluster creation until the cluster is really ready
oidc_provider_arn — The ARN of the OIDC Provider
self_managed_node_groups_autoscaling_group_names — The names of the self managed ASG created by the module
cloudwatch_log_group_name — Name of cloudwatch log group created
cluster_endpoint — Endpoint for your Kubernetes API server
Resources (5)
aws_iam_policyaws_iam_roleaws_iam_role_policy_attachmentaws_kms_keyhelm_release
Details
FrameworkTerraform Module
LanguageHCL
Version1.3.1
Cloud AWS
★ Stars7
Forks1
Total downloads4.7k
Inputs11
Outputs9
Resources5
NamespaceDevgurusio
Updated