Skip to content
6 changes: 4 additions & 2 deletions cluster.tf
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,6 @@ resource "aws_eks_cluster" "this" {
public_access_cidrs = var.cluster_endpoint_public_access_cidrs
}



dynamic "encryption_config" {
for_each = var.encryption ? [1] : []
content {
Expand All @@ -48,6 +46,10 @@ resource "aws_eks_cluster" "this" {
aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy,
aws_cloudwatch_log_group.this
]

lifecycle {
ignore_changes = [vpc_config[0].subnet_ids]
}
}

resource "null_resource" "wait_for_cluster" {
Expand Down
7 changes: 7 additions & 0 deletions modules/eks-cloudwatch-alarms/main.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,10 @@
terraform {
required_version = ">= 1.0"
required_providers {
aws = "~> 5.0"
}
}

data "aws_caller_identity" "default" {
}

Expand Down
7 changes: 7 additions & 0 deletions modules/iam-service-account/main.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,10 @@
terraform {
required_version = ">= 1.0"
required_providers {
aws = "~> 5.0"
}
}

locals {
aws_account_id = data.aws_caller_identity.current.account_id
}
Expand Down
6 changes: 6 additions & 0 deletions modules/node_groups/main.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
terraform {
required_version = ">= 1.0"
required_providers {
aws = "~> 5.0"
}
}
4 changes: 2 additions & 2 deletions versions.tf
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
terraform {
required_version = ">= 0.12.9"
required_version = ">= 1.0"

required_providers {
aws = ">= 5.13.0"
aws = "~> 5.0"
local = ">= 1.2"
null = ">= 2.1"
template = ">= 2.1"
Expand Down
Loading