You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,7 +208,7 @@ Available targets:
208
208
| delimiter | Delimiter to be used between `namespace`, `environment`, `stage`, `name` and `attributes`.<br>Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. |`string`|`null`| no |
209
209
| desired\_size | Initial desired number of worker nodes (external changes ignored) |`number`| n/a | yes |
210
210
| disk\_size | Disk size in GiB for worker nodes. Defaults to 20. Ignored it `launch_template_id` is supplied.<br>Terraform will only perform drift detection if a configuration value is provided. |`number`|`20`| no |
211
-
| ec2\_ssh\_key | SSH key name that should be used to access the worker nodes |`string`|`null`| no |
211
+
| ec2\_ssh\_key | SSH key pair name to use to access the worker nodes |`string`|`null`| no |
212
212
| enable\_cluster\_autoscaler | Set true to allow Kubernetes Cluster Auto Scaler to scale the node group |`bool`|`false`| no |
213
213
| enabled | Set to false to prevent the module from creating any resources |`bool`|`null`| no |
214
214
| environment | Environment, e.g. 'uw2', 'us-west-2', OR 'prod', 'staging', 'dev', 'UAT' |`string`|`null`| no |
@@ -230,18 +230,19 @@ Available targets:
230
230
| namespace | Namespace, which could be your organization name or abbreviation, e.g. 'eg' or 'cp' |`string`|`null`| no |
231
231
| regex\_replace\_chars | Regex to replace chars with empty string in `namespace`, `environment`, `stage` and `name`.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
232
232
| resources\_to\_tag | List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request". |`list(string)`|`[]`| no |
233
-
| source\_security\_group\_ids | Set of EC2 Security Group IDs to allow SSH access (port 22) from on the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
233
+
| source\_security\_group\_ids | Set of EC2 Security Group IDs to allow SSH access (port 22) to the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
234
234
| stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
235
235
| subnet\_ids | A list of subnet IDs to launch resources in |`list(string)`| n/a | yes |
236
236
| tags | Additional tags (e.g. `map('BusinessUnit','XYZ')`|`map(string)`|`{}`| no |
237
-
| userdata\_override | Many features of this module rely on the `bootstrap.sh` provided with Amazon Linux, and this module<br>may generate "user data" that expects to find that script. If you want to use an AMI that is not<br>compatible with the Amazon Linux `bootstrap.sh` initialization, then use `userdata_override` to provide<br>your own (Base64 encoded) user data. Use "" to prevent any user data from being set.<br><br>Setting `userdata_override` disables `kubernetes_taints`, `kubelet_additional_options`,<br>`before_cluster_joining_userdata`, `after_cluster_joining_userdata`, and `bootstrap_additional_options`. |`string`|`null`| no |
237
+
| userdata\_override\_base64| Many features of this module rely on the `bootstrap.sh` provided with Amazon Linux, and this module<br>may generate "user data" that expects to find that script. If you want to use an AMI that is not<br>compatible with the Amazon Linux `bootstrap.sh` initialization, then use `userdata_override_base64` to provide<br>your own (Base64 encoded) user data. Use "" to prevent any user data from being set.<br><br>Setting `userdata_override_base64` disables `kubernetes_taints`, `kubelet_additional_options`,<br>`before_cluster_joining_userdata`, `after_cluster_joining_userdata`, and `bootstrap_additional_options`. |`string`|`null`| no |
238
238
239
239
## Outputs
240
240
241
241
| Name | Description |
242
242
|------|-------------|
243
243
| eks\_node\_group\_arn | Amazon Resource Name (ARN) of the EKS Node Group |
244
244
| eks\_node\_group\_id | EKS Cluster name and EKS Node Group name separated by a colon |
245
+
| eks\_node\_group\_remote\_access\_security\_group\_id | The ID of the security group generated to allow SSH access to the nodes, if this module generated one |
245
246
| eks\_node\_group\_resources | List of objects containing information about underlying resources of the EKS Node Group |
246
247
| eks\_node\_group\_role\_arn | ARN of the worker nodes IAM role |
247
248
| eks\_node\_group\_role\_name | Name of the worker nodes IAM role |
Copy file name to clipboardExpand all lines: docs/terraform.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@
34
34
| delimiter | Delimiter to be used between `namespace`, `environment`, `stage`, `name` and `attributes`.<br>Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. |`string`|`null`| no |
35
35
| desired\_size | Initial desired number of worker nodes (external changes ignored) |`number`| n/a | yes |
36
36
| disk\_size | Disk size in GiB for worker nodes. Defaults to 20. Ignored it `launch_template_id` is supplied.<br>Terraform will only perform drift detection if a configuration value is provided. |`number`|`20`| no |
37
-
| ec2\_ssh\_key | SSH key name that should be used to access the worker nodes |`string`|`null`| no |
37
+
| ec2\_ssh\_key | SSH key pair name to use to access the worker nodes |`string`|`null`| no |
38
38
| enable\_cluster\_autoscaler | Set true to allow Kubernetes Cluster Auto Scaler to scale the node group |`bool`|`false`| no |
39
39
| enabled | Set to false to prevent the module from creating any resources |`bool`|`null`| no |
40
40
| environment | Environment, e.g. 'uw2', 'us-west-2', OR 'prod', 'staging', 'dev', 'UAT' |`string`|`null`| no |
@@ -56,18 +56,19 @@
56
56
| namespace | Namespace, which could be your organization name or abbreviation, e.g. 'eg' or 'cp' |`string`|`null`| no |
57
57
| regex\_replace\_chars | Regex to replace chars with empty string in `namespace`, `environment`, `stage` and `name`.<br>If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. |`string`|`null`| no |
58
58
| resources\_to\_tag | List of auto-launched resource types to tag. Valid types are "instance", "volume", "elastic-gpu", "spot-instances-request". |`list(string)`|`[]`| no |
59
-
| source\_security\_group\_ids | Set of EC2 Security Group IDs to allow SSH access (port 22) from on the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
59
+
| source\_security\_group\_ids | Set of EC2 Security Group IDs to allow SSH access (port 22) to the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0) |`list(string)`|`[]`| no |
60
60
| stage | Stage, e.g. 'prod', 'staging', 'dev', OR 'source', 'build', 'test', 'deploy', 'release' |`string`|`null`| no |
61
61
| subnet\_ids | A list of subnet IDs to launch resources in |`list(string)`| n/a | yes |
62
62
| tags | Additional tags (e.g. `map('BusinessUnit','XYZ')`|`map(string)`|`{}`| no |
63
-
| userdata\_override | Many features of this module rely on the `bootstrap.sh` provided with Amazon Linux, and this module<br>may generate "user data" that expects to find that script. If you want to use an AMI that is not<br>compatible with the Amazon Linux `bootstrap.sh` initialization, then use `userdata_override` to provide<br>your own (Base64 encoded) user data. Use "" to prevent any user data from being set.<br><br>Setting `userdata_override` disables `kubernetes_taints`, `kubelet_additional_options`,<br>`before_cluster_joining_userdata`, `after_cluster_joining_userdata`, and `bootstrap_additional_options`. |`string`|`null`| no |
63
+
| userdata\_override\_base64| Many features of this module rely on the `bootstrap.sh` provided with Amazon Linux, and this module<br>may generate "user data" that expects to find that script. If you want to use an AMI that is not<br>compatible with the Amazon Linux `bootstrap.sh` initialization, then use `userdata_override_base64` to provide<br>your own (Base64 encoded) user data. Use "" to prevent any user data from being set.<br><br>Setting `userdata_override_base64` disables `kubernetes_taints`, `kubelet_additional_options`,<br>`before_cluster_joining_userdata`, `after_cluster_joining_userdata`, and `bootstrap_additional_options`. |`string`|`null`| no |
64
64
65
65
## Outputs
66
66
67
67
| Name | Description |
68
68
|------|-------------|
69
69
| eks\_node\_group\_arn | Amazon Resource Name (ARN) of the EKS Node Group |
70
70
| eks\_node\_group\_id | EKS Cluster name and EKS Node Group name separated by a colon |
71
+
| eks\_node\_group\_remote\_access\_security\_group\_id | The ID of the security group generated to allow SSH access to the nodes, if this module generated one |
71
72
| eks\_node\_group\_resources | List of objects containing information about underlying resources of the EKS Node Group |
72
73
| eks\_node\_group\_role\_arn | ARN of the worker nodes IAM role |
73
74
| eks\_node\_group\_role\_name | Name of the worker nodes IAM role |
description="SSH key name that should be used to access the worker nodes"
24
+
description="SSH key pair name to use to access the worker nodes"
25
25
default=null
26
26
}
27
27
28
+
variable"source_security_group_ids" {
29
+
type=list(string)
30
+
default=[]
31
+
description="Set of EC2 Security Group IDs to allow SSH access (port 22) to the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0)"
32
+
}
33
+
28
34
variable"desired_size" {
29
35
type=number
30
36
description="Initial desired number of worker nodes (external changes ignored)"
description="Set of EC2 Security Group IDs to allow SSH access (port 22) from on the worker nodes. If you specify `ec2_ssh_key`, but do not specify this configuration when you create an EKS Node Group, port 22 on the worker nodes is opened to the Internet (0.0.0.0/0)"
0 commit comments