eks
foss-cafe/eks/aws
Terraform module for AWS EKS
!Static security analysis for Terraform Terraform module for AWS EKS Available features - IAM Roles and permissions - Security Groups for Control plane and Worker Nodes - Cloud-watch Log Group for EKS logs Usage ``hcl module "eks" { source = "git::https://github.com/foss-cafe/terraform-aws-eks-module.git" create_eks = true cluster_name = "Example" k8s_version = 1.16 enabled_cluster_log_types = ["api"] endpoint_private_access = true endpoint_public_access = true public_access_cidrs = ["192.168.1.1/24"] vpc_id = "vpc-xxxx" cluster_security_group_ids = ["sg-xxxx", "sg-yyyy"] worker_security_group_ids = ["sg-xxxx"] subnet_ids = ["subnet-xxxx", "subnet-yyyy", "subnet-zzzz"] additional_tags = { Environment = "dev" } } ` Requirements | Name | Version | |------|---------| | terraform | ~> 0.12.24
| Name | Type | Description | Default |
|---|---|---|---|
| vpc_id | string | The VPC associated with your cluster. | required |
| worker_security_group_ids | list | Security Group ID for Allowing pods to communicate with the EKS cluster API. onl | [] |
| subnet_ids | list | List of subnet IDs. Must be in at least two different availability zones. Amazon | [] |
| cluster_name | string | Name of the cluster | "example-dev" |
| k8s_version | string | Desired Kubernetes master version. | "1.18" |
| cluster_log_retention_in_days | number | Specifies the number of days you want to retain log events in the specified log | 90 |
| endpoint_private_access | bool | Indicates whether or not the Amazon EKS private API server endpoint is enabled. | true |
| endpoint_public_access | bool | Indicates whether or not the Amazon EKS public API server endpoint is enabled. D | false |
| public_access_cidrs | list | List of CIDR blocks. Indicates which CIDR blocks can access the Amazon EKS publi | [] |
| cluster_security_group_ids | list | List of security group IDs for the cross-account elastic network interfaces that | [] |
| tags | map(string) | {} | |
| create_eks | bool | Do you want to create EKS | true |
| enabled_cluster_log_types | list | A list of the desired control plane logging to enable | [
"api",
"audit",
"authenticator", |
master_role_name — The name of the roleworker_nodes_sg_id — The ID of the security groupeks_id — The name of the clustermaster_role_create_date — The creation date of the IAM rolenodes_role_arn — The Amazon Resource Name (ARN) specifying the rolenodes_role_id — The name of the roleeks_status — The status of the EKS cluster. One of CREATING, ACTIVE, DELETING, FAILEDmaster_role_unique_id — The stable and unique string identifying the roleeks_platform_version — The platform version for the clustermaster_sg_id — The ID of the security groupworker_nodes_sg_ingress_rules — The ingress ruleseks_vpc_config — The cluster security group that was created by Amazon EKS for the cluster.nodes_role_unique_id — The stable and unique string identifying the rolemaster_sg_egress_rules — The egress ruleseks_version — The Kubernetes server version for the cluster.master_role_arn — The Amazon Resource Name (ARN) specifying the rolemaster_role_id — The name of the rolenodes_role_name — The name of the rolemaster_sg_arn — The ARN of the security groupworker_nodes_sg_arn — The ARN of the security groupeks_endpoint — The endpoint for your Kubernetes API server.eks_arn — The Amazon Resource Name (ARN) of the cluster.eks_certificate_authority — The base64 encoded certificate data required to communicate with your cluster.master_sg_ingress_rules — The ingress rulesworker_nodes_sg_egress_rules — The egress ruleseks_clg_arn — The Amazon Resource Name (ARN) specifying the log groupnodes_role_create_date — The creation date of the IAM roleAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,