Skip to content

Commit 2f4de2a

Browse files
author
vijay-stephen
committed
Merge pull request #117 from sourcefuse/fix/auto-mode-node-pool
Fix/auto mode node pool
1 parent c14a9ca commit 2f4de2a

File tree

1 file changed

+7
-1
lines changed
  • docs/arc-iac-docs/modules/terraform-aws-ref-arch-eks

1 file changed

+7
-1
lines changed

docs/arc-iac-docs/modules/terraform-aws-ref-arch-eks/README.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,9 @@ module "eks_cluster" {
8080

8181
| Name | Type |
8282
|------|------|
83+
| [aws_eks_access_entry.auto_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_access_entry) | resource |
8384
| [aws_eks_access_entry.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_access_entry) | resource |
85+
| [aws_eks_access_policy_association.auto_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_access_policy_association) | resource |
8486
| [aws_eks_access_policy_association.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_access_policy_association) | resource |
8587
| [aws_eks_addon.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource |
8688
| [aws_eks_cluster.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster) | resource |
@@ -96,6 +98,7 @@ module "eks_cluster" {
9698
| [aws_iam_role.karpenter_controller_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
9799
| [aws_iam_role.karpenter_node_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
98100
| [aws_iam_role.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
101+
| [aws_iam_role_policy.ec2_fleet](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
99102
| [aws_iam_role_policy.karpenter_controller](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
100103
| [aws_iam_role_policy_attachment.eks_cluster_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
101104
| [aws_iam_role_policy_attachment.fargate](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
@@ -110,7 +113,9 @@ module "eks_cluster" {
110113
| [kubernetes_config_map.aws_auth](https://registry.terraform.io/providers/hashicorp/kubernetes/2.24.0/docs/resources/config_map) | resource |
111114
| [kubernetes_config_map_v1_data.aws_auth](https://registry.terraform.io/providers/hashicorp/kubernetes/2.24.0/docs/resources/config_map_v1_data) | resource |
112115
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
116+
| [aws_iam_policy_document.ec2_fleet](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
113117
| [aws_iam_policy_document.iam](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
118+
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
114119
| [tls_certificate.this](https://registry.terraform.io/providers/hashicorp/tls/latest/docs/data-sources/certificate) | data source |
115120

116121
## Inputs
@@ -124,7 +129,7 @@ module "eks_cluster" {
124129
| <a name="input_bootstrap_self_managed_addons_enabled"></a> [bootstrap\_self\_managed\_addons\_enabled](#input\_bootstrap\_self\_managed\_addons\_enabled) | (optional) Install default unmanaged add-ons, such as aws-cni, kube-proxy, and CoreDNS during cluster creation. If false, you must manually install desired add-ons. Changing this value will force a new cluster to be created. | `bool` | `true` | no |
125130
| <a name="input_eks_additional_policy_arns"></a> [eks\_additional\_policy\_arns](#input\_eks\_additional\_policy\_arns) | Optional additional policy ARNs that user wants to attach | `list(string)` | `[]` | no |
126131
| <a name="input_eks_addons"></a> [eks\_addons](#input\_eks\_addons) | Map of EKS Add-ons to create | <pre>map(object({<br> addon_version = optional(string)<br> service_account_role_arn = optional(string)<br> resolve_conflicts_on_update = optional(string)<br> resolve_conflicts_on_create = optional(string)<br> }))</pre> | `{}` | no |
127-
| <a name="input_eks_policy_arns"></a> [eks\_policy\_arns](#input\_eks\_policy\_arns) | List of IAM policy ARNs to attach to the EKS role | `list(string)` | <pre>[<br> "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",<br> "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",<br> "arn:aws:iam::aws:policy/AmazonEKSNetworkingPolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSComputePolicy"<br>]</pre> | no |
132+
| <a name="input_eks_policy_arns"></a> [eks\_policy\_arns](#input\_eks\_policy\_arns) | List of IAM policy ARNs to attach to the EKS role | `list(string)` | <pre>[<br> "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",<br> "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",<br> "arn:aws:iam::aws:policy/AmazonEKSNetworkingPolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSComputePolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSBlockStoragePolicy",<br> "arn:aws:iam::aws:policy/AmazonEKSLoadBalancingPolicy"<br>]</pre> | no |
128133
| <a name="input_enable_arc_zonal_shift"></a> [enable\_arc\_zonal\_shift](#input\_enable\_arc\_zonal\_shift) | (optional) Whether to enable ARC Zonal shift , it shift application traffic away from an impaired Availability Zone (AZ) in your EKS cluster. | `bool` | `false` | no |
129134
| <a name="input_enable_oidc_provider"></a> [enable\_oidc\_provider](#input\_enable\_oidc\_provider) | Whether to enable OIDC provider | `bool` | `true` | no |
130135
| <a name="input_enabled_cluster_log_types"></a> [enabled\_cluster\_log\_types](#input\_enabled\_cluster\_log\_types) | A list of the desired control plane logging to enable. Valid values [`api`, `audit`, `authenticator`, `controllerManager`, `scheduler`] | `list(string)` | `[]` | no |
@@ -147,6 +152,7 @@ module "eks_cluster" {
147152
| Name | Description |
148153
|------|-------------|
149154
| <a name="output_arn"></a> [arn](#output\_arn) | The Amazon Resource Name (ARN) of the EKS cluster |
155+
| <a name="output_auto_mode_node_role_arn"></a> [auto\_mode\_node\_role\_arn](#output\_auto\_mode\_node\_role\_arn) | ARN of Auto mode node role |
150156
| <a name="output_certificate_authority_data"></a> [certificate\_authority\_data](#output\_certificate\_authority\_data) | The base64-encoded certificate data required to communicate with the EKS cluster |
151157
| <a name="output_eks_cluster_id"></a> [eks\_cluster\_id](#output\_eks\_cluster\_id) | The unique identifier of the EKS cluster |
152158
| <a name="output_eks_cluster_security_group_id"></a> [eks\_cluster\_security\_group\_id](#output\_eks\_cluster\_security\_group\_id) | The ID of the security group associated with the EKS cluster's control plane |

0 commit comments

Comments
 (0)