@@ -5,9 +5,11 @@ locals {
5
5
}
6
6
}
7
7
8
+ /*
8
9
data "aws_eks_cluster_auth" "this" {
9
10
name = module.eks.cluster_name
10
11
}
12
+ */
11
13
12
14
data "aws_iam_policy" "ebs_csi_policy" {
13
15
arn = " arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy"
@@ -39,20 +41,7 @@ module "eks" {
39
41
vpc_id = var. vpc_id
40
42
subnet_ids = var. vpc_private_subnets
41
43
42
- manage_aws_auth_configmap = true
43
-
44
- /* Remove additional IAM configuration for now; Enable later if warranted
45
- aws_auth_roles = [
46
- {
47
- rolearn = aws_iam_role.eks_admin.arn
48
- username = "${aws_iam_role.eks_admin.name}"
49
- groups = [
50
- "system:masters"
51
- ]
52
-
53
- }
54
- ]
55
- */
44
+ # manage_aws_auth_configmap = true
56
45
57
46
eks_managed_node_group_defaults = {
58
47
ami_type = " AL2_x86_64"
@@ -84,6 +73,7 @@ module "irsa-ebs-csi" {
84
73
oidc_fully_qualified_subjects = [" system:serviceaccount:kube-system:ebs-csi-controller-sa" ]
85
74
}
86
75
76
+ /*
87
77
module "eks_blueprints_kubernetes_addons" {
88
78
source = "github.com/aws-ia/terraform-aws-eks-blueprints//modules/kubernetes-addons"
89
79
@@ -98,32 +88,4 @@ module "eks_blueprints_kubernetes_addons" {
98
88
99
89
tags = local.tags
100
90
}
101
-
102
- /* Remove additional IAM configuration for now; Enable later if warranted
103
- resource "aws_iam_role" "eks_admin" {
104
- name = "admin-${var.cluster_name}"
105
-
106
- assume_role_policy = jsonencode({
107
- Version = "2012-10-17"
108
- Statement = [
109
- {
110
- Action = "sts:AssumeRole"
111
- Effect = "Allow"
112
- Sid = ""
113
- Principal = {
114
- "AWS": [
115
- "arn:aws:iam::897196112581:user/martinb"
116
- ]
117
- }
118
- },
119
- ]
120
- })
121
-
122
- tags = local.tags
123
- }
124
-
125
- resource "aws_iam_role_policy_attachment" "eks_adminrole_policy_attach" {
126
- role = "${aws_iam_role.eks_admin.name}"
127
- policy_arn = "${data.aws_iam_policy.administrator_access.arn}"
128
- }
129
91
*/
0 commit comments