You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/_user_data/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,8 +39,8 @@ No modules.
39
39
| <aname="input_additional_cluster_dns_ips"></a> [additional\_cluster\_dns\_ips](#input\_additional\_cluster\_dns\_ips)| Additional DNS IP addresses to use for the cluster. Only used when `ami_type` = `BOTTLEROCKET_*`|`list(string)`|`[]`| no |
40
40
| <aname="input_ami_type"></a> [ami\_type](#input\_ami\_type)| Type of Amazon Machine Image (AMI) associated with the EKS Node Group. See the [AWS documentation](https://docs.aws.amazon.com/eks/latest/APIReference/API_Nodegroup.html#AmazonEKS-Type-Nodegroup-amiType) for valid values |`string`|`"AL2023_x86_64_STANDARD"`| no |
41
41
| <aname="input_bootstrap_extra_args"></a> [bootstrap\_extra\_args](#input\_bootstrap\_extra\_args)| Additional arguments passed to the bootstrap script. When `ami_type` = `BOTTLEROCKET_*`; these are additional [settings](https://github.com/bottlerocket-os/bottlerocket#settings) that are provided to the Bottlerocket user data |`string`|`""`| no |
42
-
| <aname="input_cloudinit_post_nodeadm"></a> [cloudinit\_post\_nodeadm](#input\_cloudinit\_post\_nodeadm)| Array of cloud-init document parts that are created after the nodeadm document part | <pre>list(object({<br/> content = string<br/> content_type = optional(string)<br/> filename = optional(string)<br/> merge_type = optional(string)<br/> }))</pre> |`[]`| no |
43
-
| <aname="input_cloudinit_pre_nodeadm"></a> [cloudinit\_pre\_nodeadm](#input\_cloudinit\_pre\_nodeadm)| Array of cloud-init document parts that are created before the nodeadm document part | <pre>list(object({<br/> content = string<br/> content_type = optional(string)<br/> filename = optional(string)<br/> merge_type = optional(string)<br/> }))</pre> |`[]`| no |
42
+
| <aname="input_cloudinit_post_nodeadm"></a> [cloudinit\_post\_nodeadm](#input\_cloudinit\_post\_nodeadm)| Array of cloud-init document parts that are created after the nodeadm document part | <pre>list(object({<br> content = string<br> content_type = optional(string)<br> filename = optional(string)<br> merge_type = optional(string)<br> }))</pre> |`[]`| no |
43
+
| <aname="input_cloudinit_pre_nodeadm"></a> [cloudinit\_pre\_nodeadm](#input\_cloudinit\_pre\_nodeadm)| Array of cloud-init document parts that are created before the nodeadm document part | <pre>list(object({<br> content = string<br> content_type = optional(string)<br> filename = optional(string)<br> merge_type = optional(string)<br> }))</pre> |`[]`| no |
44
44
| <aname="input_cluster_auth_base64"></a> [cluster\_auth\_base64](#input\_cluster\_auth\_base64)| Base64 encoded CA of associated EKS cluster |`string`|`""`| no |
45
45
| <aname="input_cluster_endpoint"></a> [cluster\_endpoint](#input\_cluster\_endpoint)| Endpoint of associated EKS cluster |`string`|`""`| no |
46
46
| <aname="input_cluster_ip_family"></a> [cluster\_ip\_family](#input\_cluster\_ip\_family)| The IP family used to assign Kubernetes pod and service addresses. Valid values are `ipv4` (default) and `ipv6`|`string`|`"ipv4"`| no |
Copy file name to clipboardExpand all lines: modules/fargate-profile/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,16 +73,16 @@ No modules.
73
73
| <aname="input_iam_role_name"></a> [iam\_role\_name](#input\_iam\_role\_name)| Name to use on IAM role created |`string`|`""`| no |
74
74
| <aname="input_iam_role_path"></a> [iam\_role\_path](#input\_iam\_role\_path)| IAM role path |`string`|`null`| no |
75
75
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
76
-
| <a name="input_iam_role_policy_statements"></a> [iam\_role\_policy\_statements](#input\_iam\_role\_policy\_statements) | A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> | `null` | no |
76
+
| <aname="input_iam_role_policy_statements"></a> [iam\_role\_policy\_statements](#input\_iam\_role\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br> sid = optional(string)<br> actions = optional(list(string))<br> not_actions = optional(list(string))<br> effect = optional(string)<br> resources = optional(list(string))<br> not_resources = optional(list(string))<br> principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> not_principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> condition = optional(list(object({<br> test = string<br> values = list(string)<br> variable = string<br> })))<br> }))</pre> |`null`| no |
77
77
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
78
78
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
79
79
| <aname="input_name"></a> [name](#input\_name)| Name of the EKS Fargate Profile |`string`|`""`| no |
80
80
| <aname="input_partition"></a> [partition](#input\_partition)| The AWS partition - pass through value to reduce number of GET requests from data sources |`string`|`""`| no |
81
81
| <aname="input_region"></a> [region](#input\_region)| Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration |`string`|`null`| no |
82
-
| <aname="input_selectors"></a> [selectors](#input\_selectors)| Configuration block(s) for selecting Kubernetes Pods to execute with this Fargate Profile | <pre>list(object({<br/> labels = optional(map(string))<br/> namespace = string<br/> }))</pre> |`null`| no |
82
+
| <aname="input_selectors"></a> [selectors](#input\_selectors)| Configuration block(s) for selecting Kubernetes Pods to execute with this Fargate Profile | <pre>list(object({<br> labels = optional(map(string))<br> namespace = string<br> }))</pre> |`null`| no |
83
83
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| A list of subnet IDs for the EKS Fargate Profile |`list(string)`|`[]`| no |
84
84
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
85
-
| <aname="input_timeouts"></a> [timeouts](#input\_timeouts)| Create and delete timeout configurations for the Fargate Profile | <pre>object({<br/> create = optional(string)<br/> delete = optional(string)<br/> })</pre> |`null`| no |
85
+
| <aname="input_timeouts"></a> [timeouts](#input\_timeouts)| Create and delete timeout configurations for the Fargate Profile | <pre>object({<br> create = optional(string)<br> delete = optional(string)<br> })</pre> |`null`| no |
| <aname="input_cluster_arns"></a> [cluster\_arns](#input\_cluster\_arns)| List of EKS cluster ARNs to allow the node to describe |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
112
+
| <aname="input_cluster_arns"></a> [cluster\_arns](#input\_cluster\_arns)| List of EKS cluster ARNs to allow the node to describe |`list(string)`| <pre>[<br> "*"<br>]</pre> | no |
113
113
| <aname="input_create"></a> [create](#input\_create)| Controls if resources should be created (affects nearly all resources) |`bool`|`true`| no |
114
114
| <aname="input_description"></a> [description](#input\_description)| IAM role description |`string`|`"EKS Hybrid Node IAM role"`| no |
115
115
| <aname="input_enable_ira"></a> [enable\_ira](#input\_enable\_ira)| Enables IAM Roles Anywhere based IAM permissions on the node |`bool`|`false`| no |
116
116
| <aname="input_enable_pod_identity"></a> [enable\_pod\_identity](#input\_enable\_pod\_identity)| Enables EKS Pod Identity based IAM permissions on the node |`bool`|`true`| no |
117
117
| <aname="input_intermediate_policy_name"></a> [intermediate\_policy\_name](#input\_intermediate\_policy\_name)| Name of the IAM policy |`string`|`null`| no |
118
-
| <a name="input_intermediate_policy_statements"></a> [intermediate\_policy\_statements](#input\_intermediate\_policy\_statements) | A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> | `null` | no |
118
+
| <a name="input_intermediate_policy_statements"></a> [intermediate\_policy\_statements](#input\_intermediate\_policy\_statements) | A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br> sid = optional(string)<br> actions = optional(list(string))<br> not_actions = optional(list(string))<br> effect = optional(string)<br> resources = optional(list(string))<br> not_resources = optional(list(string))<br> principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> not_principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> condition = optional(list(object({<br> test = string<br> values = list(string)<br> variable = string<br> })))<br> }))</pre> | `null` | no |
119
119
| <aname="input_intermediate_policy_use_name_prefix"></a> [intermediate\_policy\_use\_name\_prefix](#input\_intermediate\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`intermediate_policy_name`) is used as a prefix |`bool`|`true`| no |
120
120
| <aname="input_intermediate_role_description"></a> [intermediate\_role\_description](#input\_intermediate\_role\_description)| IAM role description |`string`|`"EKS Hybrid Node IAM Roles Anywhere intermediate IAM role"`| no |
121
121
| <aname="input_intermediate_role_name"></a> [intermediate\_role\_name](#input\_intermediate\_role\_name)| Name of the IAM role |`string`|`null`| no |
@@ -129,7 +129,7 @@ No modules.
129
129
| <aname="input_ira_profile_session_policy"></a> [ira\_profile\_session\_policy](#input\_ira\_profile\_session\_policy)| A session policy that applies to the trust boundary of the vended session credentials |`string`|`null`| no |
130
130
| <aname="input_ira_trust_anchor_acm_pca_arn"></a> [ira\_trust\_anchor\_acm\_pca\_arn](#input\_ira\_trust\_anchor\_acm\_pca\_arn)| The ARN of the ACM PCA that issued the trust anchor certificate |`string`|`null`| no |
131
131
| <aname="input_ira_trust_anchor_name"></a> [ira\_trust\_anchor\_name](#input\_ira\_trust\_anchor\_name)| Name of the Roles Anywhere trust anchor |`string`|`null`| no |
132
-
| <aname="input_ira_trust_anchor_notification_settings"></a> [ira\_trust\_anchor\_notification\_settings](#input\_ira\_trust\_anchor\_notification\_settings)| Notification settings for the trust anchor | <pre>list(object({<br/> channel = optional(string)<br/> enabled = optional(bool)<br/> event = optional(string)<br/> threshold = optional(number)<br/> }))</pre> |`null`| no |
132
+
| <aname="input_ira_trust_anchor_notification_settings"></a> [ira\_trust\_anchor\_notification\_settings](#input\_ira\_trust\_anchor\_notification\_settings)| Notification settings for the trust anchor | <pre>list(object({<br> channel = optional(string)<br> enabled = optional(bool)<br> event = optional(string)<br> threshold = optional(number)<br> }))</pre> |`null`| no |
133
133
| <aname="input_ira_trust_anchor_source_type"></a> [ira\_trust\_anchor\_source\_type](#input\_ira\_trust\_anchor\_source\_type)| The source type of the trust anchor |`string`|`null`| no |
134
134
| <aname="input_ira_trust_anchor_x509_certificate_data"></a> [ira\_trust\_anchor\_x509\_certificate\_data](#input\_ira\_trust\_anchor\_x509\_certificate\_data)| The X.509 certificate data of the trust anchor |`string`|`null`| no |
135
135
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
@@ -140,7 +140,7 @@ No modules.
140
140
| <aname="input_policy_description"></a> [policy\_description](#input\_policy\_description)| IAM policy description |`string`|`"EKS Hybrid Node IAM role policy"`| no |
141
141
| <aname="input_policy_name"></a> [policy\_name](#input\_policy\_name)| Name of the IAM policy |`string`|`"EKSHybridNode"`| no |
142
142
| <aname="input_policy_path"></a> [policy\_path](#input\_policy\_path)| Path of the IAM policy |`string`|`"/"`| no |
143
-
| <aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> |`null`| no |
143
+
| <aname="input_policy_statements"></a> [policy\_statements](#input\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br> sid = optional(string)<br> actions = optional(list(string))<br> not_actions = optional(list(string))<br> effect = optional(string)<br> resources = optional(list(string))<br> not_resources = optional(list(string))<br> principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> not_principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> condition = optional(list(object({<br> test = string<br> values = list(string)<br> variable = string<br> })))<br> }))</pre> |`null`| no |
144
144
| <aname="input_policy_use_name_prefix"></a> [policy\_use\_name\_prefix](#input\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`policy_name`) is used as a prefix |`bool`|`true`| no |
145
145
| <aname="input_tags"></a> [tags](#input\_tags)| A map of additional tags to add the the IAM role |`map(string)`|`{}`| no |
146
146
| <aname="input_trust_anchor_arns"></a> [trust\_anchor\_arns](#input\_trust\_anchor\_arns)| List of IAM Roles Anywhere trust anchor ARNs. Required if `enable_ira` is set to `true`|`list(string)`|`[]`| no |
Copy file name to clipboardExpand all lines: modules/karpenter/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ No modules.
142
142
| <aname="input_iam_policy_description"></a> [iam\_policy\_description](#input\_iam\_policy\_description)| IAM policy description |`string`|`"Karpenter controller IAM policy"`| no |
143
143
| <aname="input_iam_policy_name"></a> [iam\_policy\_name](#input\_iam\_policy\_name)| Name of the IAM policy |`string`|`"KarpenterController"`| no |
144
144
| <aname="input_iam_policy_path"></a> [iam\_policy\_path](#input\_iam\_policy\_path)| Path of the IAM policy |`string`|`"/"`| no |
145
-
| <a name="input_iam_policy_statements"></a> [iam\_policy\_statements](#input\_iam\_policy\_statements) | A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br/> sid = optional(string)<br/> actions = optional(list(string))<br/> not_actions = optional(list(string))<br/> effect = optional(string)<br/> resources = optional(list(string))<br/> not_resources = optional(list(string))<br/> principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> not_principals = optional(list(object({<br/> type = string<br/> identifiers = list(string)<br/> })))<br/> condition = optional(list(object({<br/> test = string<br/> values = list(string)<br/> variable = string<br/> })))<br/> }))</pre> | `null` | no |
145
+
| <aname="input_iam_policy_statements"></a> [iam\_policy\_statements](#input\_iam\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed | <pre>list(object({<br> sid = optional(string)<br> actions = optional(list(string))<br> not_actions = optional(list(string))<br> effect = optional(string)<br> resources = optional(list(string))<br> not_resources = optional(list(string))<br> principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> not_principals = optional(list(object({<br> type = string<br> identifiers = list(string)<br> })))<br> condition = optional(list(object({<br> test = string<br> values = list(string)<br> variable = string<br> })))<br> }))</pre> |`null`| no |
146
146
| <aname="input_iam_policy_use_name_prefix"></a> [iam\_policy\_use\_name\_prefix](#input\_iam\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`iam_policy_name`) is used as a prefix |`bool`|`true`| no |
147
147
| <aname="input_iam_role_description"></a> [iam\_role\_description](#input\_iam\_role\_description)| IAM role description |`string`|`"Karpenter controller IAM role"`| no |
148
148
| <aname="input_iam_role_max_session_duration"></a> [iam\_role\_max\_session\_duration](#input\_iam\_role\_max\_session\_duration)| Maximum API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
0 commit comments