Skip to content

Commit c631ea6

Browse files
authored

File tree

4 files changed

+52
-36
lines changed

4 files changed

+52
-36
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -411,6 +411,7 @@ https://docs.aws.amazon.com/eks/latest/userguide/windows-support.html
411411
| <a name="input_name"></a> [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.<br/>This is the only ID element not also included as a `tag`.<br/>The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no |
412412
| <a name="input_namespace"></a> [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no |
413413
| <a name="input_node_group_terraform_timeouts"></a> [node\_group\_terraform\_timeouts](#input\_node\_group\_terraform\_timeouts) | Configuration for the Terraform [`timeouts` Configuration Block](https://www.terraform.io/docs/language/resources/syntax.html#operation-timeouts) of the node group resource.<br/>Leave list empty for defaults. Pass list with single object with attributes matching the `timeouts` block to configure it.<br/>Leave attribute values `null` to preserve individual defaults while setting others. | <pre>list(object({<br/> create = optional(string)<br/> update = optional(string)<br/> delete = optional(string)<br/> }))</pre> | `[]` | no |
414+
| <a name="input_node_repair_enabled"></a> [node\_repair\_enabled](#input\_node\_repair\_enabled) | The node auto-repair configuration for the node group will be enabled. Defaults to false | `bool` | `false` | no |
414415
| <a name="input_node_role_arn"></a> [node\_role\_arn](#input\_node\_role\_arn) | If provided, assign workers the given role, which this module will not modify | `list(string)` | `[]` | no |
415416
| <a name="input_node_role_cni_policy_enabled"></a> [node\_role\_cni\_policy\_enabled](#input\_node\_role\_cni\_policy\_enabled) | When true, the `AmazonEKS_CNI_Policy` will be attached to the node IAM role.<br/>This used to be required, but it is [now recommended](https://docs.aws.amazon.com/eks/latest/userguide/create-node-role.html) that this policy be<br/>attached only to the `aws-node` Kubernetes service account. However, that<br/>is difficult to do with Terraform, so this module defaults to the old pattern. | `bool` | `true` | no |
416417
| <a name="input_node_role_permissions_boundary"></a> [node\_role\_permissions\_boundary](#input\_node\_role\_permissions\_boundary) | If provided, all IAM roles will be created with this permissions boundary attached. | `string` | `null` | no |

0 commit comments

Comments
 (0)