You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -452,13 +452,13 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
452
452
| <aname="input_tags"></a> [tags](#input\_tags)| Tags to apply to all resources |`map(string)`| n/a | yes |
453
453
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| ID of the VPC where the EKS cluster will be created |`string`| n/a | yes |
454
454
| <aname="input_access_entries"></a> [access\_entries](#input\_access\_entries)| Map of access entries to add to the cluster. This is required if you use a different IAM Role for Terraform Plan actions. | <pre>map(object({<br/> ## The list of kubernetes groups to associate the principal with<br/> kubernetes_groups = optional(list(string))<br/> ## The list of kubernetes users to associate the principal with<br/> principal_arn = string<br/> ## The list of kubernetes users to associate the principal with<br/> policy_associations = optional(map(object({<br/> ## The policy arn to associate with the principal<br/> policy_arn = string<br/> ## The access scope for the policy i.e. cluster or namespace<br/> access_scope = object({<br/> ## The namespaces to apply the policy to<br/> namespaces = optional(list(string))<br/> ## The type of access scope i.e. cluster or namespace<br/> type = string<br/> })<br/> })))<br/> }))</pre> |`null`| no |
455
+
| <a name="input_addons"></a> [addons](#input\_addons) | Map of EKS addons to enable | <pre>map(object({<br/> ## The name of the EKS addon<br/> name = optional(string)<br/> ## Indicates if we should deploy the EKS addon before the compute nodes<br/> before_compute = optional(bool, false)<br/> ## Indicates if we should use the most recent version of the EKS addon<br/> most_recent = optional(bool, true)<br/> ## The version of the EKS addon<br/> addon_version = optional(string)<br/> ## The configuration values for the EKS addon<br/> configuration_values = optional(string)<br/> ## The pod identity association for the EKS addon<br/> pod_identity_association = optional(list(object({<br/> ## The role ARN for the EKS addon pod identity association<br/> role_arn = string<br/> ## The service account for the EKS addon<br/> service_account = string<br/> })))<br/> ## Indicates if we should preserve the EKS addon<br/> preserve = optional(bool, true)<br/> ## The resolve conflicts on create for the EKS addon<br/> resolve_conflicts_on_create = optional(string, "NONE")<br/> ## The resolve conflicts on update for the EKS addon<br/> resolve_conflicts_on_update = optional(string, "OVERWRITE")<br/> ## The service account role ARN for the EKS addon<br/> service_account_role_arn = optional(string)<br/> ## The timeouts for the EKS addon<br/> timeouts = optional(object({<br/> ## The timeout for the EKS addon create<br/> create = optional(string)<br/> ## The timeout for the EKS addon update<br/> update = optional(string)<br/> ## The timeout for the EKS addon delete<br/> delete = optional(string)<br/> }), {})<br/> ## The tags for the EKS addon<br/> tags = optional(map(string), {})<br/> }))</pre> | `null` | no |
455
456
| <aname="input_argocd"></a> [argocd](#input\_argocd)| The ArgoCD configuration | <pre>object({<br/> ## Indicates if we should enable the ArgoCD platform<br/> enabled = optional(bool, false)<br/> ## The namespace to deploy the ArgoCD platform to<br/> namespace = optional(string, "argocd")<br/> ## The service account to deploy the ArgoCD platform to<br/> service_account = optional(string, "argocd")<br/> })</pre> |`{}`| no |
456
457
| <aname="input_aws_ack_iam"></a> [aws\_ack\_iam](#input\_aws\_ack\_iam)| The AWS ACK IAM configuration | <pre>object({<br/> ## Indicates if we should enable the AWS ACK IAM platform<br/> enabled = optional(bool, false)<br/> ## The namespace to deploy the AWS ACK IAM platform to<br/> namespace = optional(string, "ack-system")<br/> ## The service account to deploy the AWS ACK IAM platform to<br/> service_account = optional(string, "ack-iam-controller")<br/> ## Managed policies to attach to the AWS ACK IAM platform<br/> managed_policy_arns = optional(map(string), {})<br/> })</pre> |`{}`| no |
457
458
| <aname="input_cert_manager"></a> [cert\_manager](#input\_cert\_manager)| The cert-manager configuration | <pre>object({<br/> ## Indicates if we should enable the cert-manager platform<br/> enabled = optional(bool, false)<br/> ## The namespace to deploy the cert-manager platform to<br/> namespace = optional(string, "cert-manager")<br/> ## The service account to deploy the cert-manager platform to<br/> service_account = optional(string, "cert-manager")<br/> ## Route53 zone id to use for the cert-manager platform<br/> hosted_zone_arns = optional(list(string), [])<br/> })</pre> |`{}`| no |
458
459
| <aname="input_cloudwatch_observability"></a> [cloudwatch\_observability](#input\_cloudwatch\_observability)| The CloudWatch Observability configuration | <pre>object({<br/> ## Indicates if we should enable the CloudWatch Observability platform<br/> enabled = optional(bool, false)<br/> ## The namespace to deploy the CloudWatch Observability platform to<br/> namespace = optional(string, "cloudwatch-observability")<br/> ## The service account to deploy the CloudWatch Observability platform to<br/> service_account = optional(string, "cloudwatch-observability")<br/> })</pre> |`{}`| no |
459
460
| <aname="input_cluster_enabled_log_types"></a> [cluster\_enabled\_log\_types](#input\_cluster\_enabled\_log\_types)| List of log types to enable for the EKS cluster. |`list(string)`| <pre>[<br/> "api",<br/> "audit",<br/> "authenticator",<br/> "controllerManager",<br/> "scheduler"<br/>]</pre> | no |
460
461
| <aname="input_create_kms_key"></a> [create\_kms\_key](#input\_create\_kms\_key)| Whether to create a KMS key for the EKS cluster. |`bool`|`true`| no |
461
-
| <a name="input_eks_addons"></a> [eks\_addons](#input\_eks\_addons) | Map of EKS addons to enable | <pre>map(object({<br/> ## The name of the EKS addon<br/> name = optional(string)<br/> ## Indicates if we should deploy the EKS addon before the compute nodes<br/> before_compute = optional(bool, false)<br/> ## Indicates if we should use the most recent version of the EKS addon<br/> most_recent = optional(bool, true)<br/> ## The version of the EKS addon<br/> addon_version = optional(string)<br/> ## The configuration values for the EKS addon<br/> configuration_values = optional(string)<br/> ## The pod identity association for the EKS addon<br/> pod_identity_association = optional(list(object({<br/> ## The role ARN for the EKS addon pod identity association<br/> role_arn = string<br/> ## The service account for the EKS addon<br/> service_account = string<br/> })))<br/> ## Indicates if we should preserve the EKS addon<br/> preserve = optional(bool, true)<br/> ## The resolve conflicts on create for the EKS addon<br/> resolve_conflicts_on_create = optional(string, "NONE")<br/> ## The resolve conflicts on update for the EKS addon<br/> resolve_conflicts_on_update = optional(string, "OVERWRITE")<br/> ## The service account role ARN for the EKS addon<br/> service_account_role_arn = optional(string)<br/> ## The timeouts for the EKS addon<br/> timeouts = optional(object({<br/> ## The timeout for the EKS addon create<br/> create = optional(string)<br/> ## The timeout for the EKS addon update<br/> update = optional(string)<br/> ## The timeout for the EKS addon delete<br/> delete = optional(string)<br/> }), {})<br/> ## The tags for the EKS addon<br/> tags = optional(map(string), {})<br/> }))</pre> | `null` | no |
462
462
| <aname="input_enable_cluster_creator_admin_permissions"></a> [enable\_cluster\_creator\_admin\_permissions](#input\_enable\_cluster\_creator\_admin\_permissions)| Whether to enable cluster creator admin permissions (else create access entries for the cluster creator) |`bool`|`false`| no |
463
463
| <aname="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa)| Whether to enable IRSA for the EKS cluster. |`bool`|`true`| no |
464
464
| <aname="input_enable_private_access"></a> [enable\_private\_access](#input\_enable\_private\_access)| Whether to enable private access to the EKS API server endpoint. |`bool`|`true`| no |
0 commit comments