You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/user_data.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,12 @@ Users can see the various methods of using and providing user data through the [
7
7
- AWS EKS Managed Node Groups
8
8
- By default, any supplied user data is pre-pended to the user data supplied by the EKS Managed Node Group service
9
9
- If users supply an `ami_id`, the service no longers supplies user data to bootstrap nodes; users can enable `enable_bootstrap_user_data` and use the module provided user data template, or provide their own user data template
10
-
-`bottlerocket` platform user data must be in TOML format
11
-
-`windows` platform user data must be in powershell/PS1 script format
10
+
-AMI types of `BOTTLEROCKET_*`, user data must be in TOML format
11
+
-AMI types of `WINDOWS_*`, user data must be in powershell/PS1 script format
12
12
- Self Managed Node Groups
13
-
-`linux` platform (default) -> the user data template (bash/shell script) provided by the module is used as the default; users are able to provide their own user data template
14
-
-`bottlerocket` platform -> the user data template (TOML file) provided by the module is used as the default; users are able to provide their own user data template
15
-
-`windows` platform -> the user data template (powershell/PS1 script) provided by the module is used as the default; users are able to provide their own user data template
13
+
-`AL2_x86_64` AMI type (default) -> the user data template (bash/shell script) provided by the module is used as the default; users are able to provide their own user data template
14
+
-`BOTTLEROCKET_*` AMI types -> the user data template (TOML file) provided by the module is used as the default; users are able to provide their own user data template
15
+
-`WINDOWS_*` AMI types -> the user data template (powershell/PS1 script) provided by the module is used as the default; users are able to provide their own user data template
16
16
17
17
The templates provided by the module can be found under the [templates directory](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/templates)
18
18
@@ -37,7 +37,7 @@ When using an EKS managed node group, users have 2 primary routes for interactin
37
37
bootstrap_extra_args = "..."
38
38
post_bootstrap_user_data = "..."
39
39
```
40
-
- If the AMI is **NOT** an AWS EKS Optimized AMI derivative, or if users wish to have more control over the user data that is supplied to the node when launched, users have the ability to supply their own user data template that will be rendered instead of the module supplied template. Note - only the variables that are supplied to the `templatefile()` for the respective platform/OS are available for use in the supplied template, otherwise users will need to pre-render/pre-populate the template before supplying the final template to the module for rendering as user data.
40
+
- If the AMI is **NOT** an AWS EKS Optimized AMI derivative, or if users wish to have more control over the user data that is supplied to the node when launched, users have the ability to supply their own user data template that will be rendered instead of the module supplied template. Note - only the variables that are supplied to the `templatefile()` for the respective AMI type are available for use in the supplied template, otherwise users will need to pre-render/pre-populate the template before supplying the final template to the module for rendering as user data.
41
41
- Users can use the following variables to facilitate this process:
42
42
```hcl
43
43
user_data_template_path = "./your/user_data.sh" # user supplied bootstrap user data template
@@ -46,12 +46,12 @@ When using an EKS managed node group, users have 2 primary routes for interactin
46
46
post_bootstrap_user_data = "..."
47
47
```
48
48
49
-
| ℹ️ When using bottlerocket as the desired platform, since the user data for bottlerocket is TOML, all configurations are merged in the one file supplied as user data. Therefore, `pre_bootstrap_user_data` and `post_bootstrap_user_data` are not valid since the bottlerocket OS handles when various settings are applied. If you wish to supply additional configuration settings when using bottlerocket, supply them via the `bootstrap_extra_args` variable. For the linux platform, `bootstrap_extra_args` are settings that will be supplied to the [AWS EKS Optimized AMI bootstrap script](https://github.com/awslabs/amazon-eks-ami/blob/master/files/bootstrap.sh#L14) such as kubelet extra args, etc. See the [bottlerocket GitHub repository documentation](https://github.com/bottlerocket-os/bottlerocket#description-of-settings) for more details on what settings can be supplied via the `bootstrap_extra_args` variable. |
49
+
| ℹ️ When using bottlerocket, the supplied user data (TOML format) is merged in with the values supplied by EKS. Therefore, `pre_bootstrap_user_data` and `post_bootstrap_user_data` are not valid since the bottlerocket OS handles when various settings are applied. If you wish to supply additional configuration settings when using bottlerocket, supply them via the `bootstrap_extra_args` variable. For the `AL2_*` AMI types, `bootstrap_extra_args` are settings that will be supplied to the [AWS EKS Optimized AMI bootstrap script](https://github.com/awslabs/amazon-eks-ami/blob/master/files/bootstrap.sh#L14) such as kubelet extra args, etc. See the [bottlerocket GitHub repository documentation](https://github.com/bottlerocket-os/bottlerocket#description-of-settings) for more details on what settings can be supplied via the `bootstrap_extra_args` variable. |
Self managed node groups require users to provide the necessary bootstrap user data. Users can elect to use the user data template provided by the module for their platform/OS or provide their own user data template for rendering by the module.
54
+
Self managed node groups require users to provide the necessary bootstrap user data. Users can elect to use the user data template provided by the module for their respective AMI type or provide their own user data template for rendering by the module.
55
55
56
56
- If the AMI used is a derivative of the [AWS EKS Optimized AMI ](https://github.com/awslabs/amazon-eks-ami), users can opt in to using a template provided by the module that provides the minimum necessary configuration to bootstrap the node when launched:
57
57
- Users can use the following variables to facilitate this process:
@@ -61,7 +61,7 @@ Self managed node groups require users to provide the necessary bootstrap user d
61
61
bootstrap_extra_args = "..."
62
62
post_bootstrap_user_data = "..."
63
63
```
64
-
- If the AMI is **NOT** an AWS EKS Optimized AMI derivative, or if users wish to have more control over the user data that is supplied to the node when launched, users have the ability to supply their own user data template that will be rendered instead of the module supplied template. Note - only the variables that are supplied to the `templatefile()` for the respective platform/OS are available for use in the supplied template, otherwise users will need to pre-render/pre-populate the template before supplying the final template to the module for rendering as user data.
64
+
- If the AMI is **NOT** an AWS EKS Optimized AMI derivative, or if users wish to have more control over the user data that is supplied to the node when launched, users have the ability to supply their own user data template that will be rendered instead of the module supplied template. Note - only the variables that are supplied to the `templatefile()` for the respective AMI type are available for use in the supplied template, otherwise users will need to pre-render/pre-populate the template before supplying the final template to the module for rendering as user data.
65
65
- Users can use the following variables to facilitate this process:
66
66
```hcl
67
67
user_data_template_path = "./your/user_data.sh" # user supplied bootstrap user data template
Copy file name to clipboardExpand all lines: examples/eks_managed_node_group/README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,12 +83,14 @@ No inputs.
83
83
| <aname="output_cluster_iam_role_unique_id"></a> [cluster\_iam\_role\_unique\_id](#output\_cluster\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
84
84
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| The ID of the EKS cluster. Note: currently a value is returned only for local EKS clusters created on Outposts |
85
85
| <aname="output_cluster_identity_providers"></a> [cluster\_identity\_providers](#output\_cluster\_identity\_providers)| Map of attribute maps for all EKS identity providers enabled |
86
+
| <aname="output_cluster_ip_family"></a> [cluster\_ip\_family](#output\_cluster\_ip\_family)| The IP family used by the cluster (e.g. `ipv4` or `ipv6`) |
86
87
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| The name of the EKS cluster |
87
88
| <aname="output_cluster_oidc_issuer_url"></a> [cluster\_oidc\_issuer\_url](#output\_cluster\_oidc\_issuer\_url)| The URL on the EKS cluster for the OpenID Connect identity provider |
88
89
| <aname="output_cluster_platform_version"></a> [cluster\_platform\_version](#output\_cluster\_platform\_version)| Platform version for the cluster |
89
90
| <aname="output_cluster_primary_security_group_id"></a> [cluster\_primary\_security\_group\_id](#output\_cluster\_primary\_security\_group\_id)| Cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. Referred to as 'Cluster security group' in the EKS console |
90
91
| <aname="output_cluster_security_group_arn"></a> [cluster\_security\_group\_arn](#output\_cluster\_security\_group\_arn)| Amazon Resource Name (ARN) of the cluster security group |
91
92
| <aname="output_cluster_security_group_id"></a> [cluster\_security\_group\_id](#output\_cluster\_security\_group\_id)| ID of the cluster security group |
93
+
| <aname="output_cluster_service_cidr"></a> [cluster\_service\_cidr](#output\_cluster\_service\_cidr)| The CIDR block where Kubernetes pod and service IP addresses are assigned from |
92
94
| <aname="output_cluster_status"></a> [cluster\_status](#output\_cluster\_status)| Status of the EKS cluster. One of `CREATING`, `ACTIVE`, `DELETING`, `FAILED`|
93
95
| <aname="output_cluster_tls_certificate_sha1_fingerprint"></a> [cluster\_tls\_certificate\_sha1\_fingerprint](#output\_cluster\_tls\_certificate\_sha1\_fingerprint)| The SHA1 fingerprint of the public key of the cluster's certificate |
94
96
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
Copy file name to clipboardExpand all lines: examples/fargate_profile/README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,12 +64,14 @@ No inputs.
64
64
| <aname="output_cluster_iam_role_unique_id"></a> [cluster\_iam\_role\_unique\_id](#output\_cluster\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
65
65
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| The ID of the EKS cluster. Note: currently a value is returned only for local EKS clusters created on Outposts |
66
66
| <aname="output_cluster_identity_providers"></a> [cluster\_identity\_providers](#output\_cluster\_identity\_providers)| Map of attribute maps for all EKS identity providers enabled |
67
+
| <aname="output_cluster_ip_family"></a> [cluster\_ip\_family](#output\_cluster\_ip\_family)| The IP family used by the cluster (e.g. `ipv4` or `ipv6`) |
67
68
| <aname="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name)| The name of the EKS cluster |
68
69
| <aname="output_cluster_oidc_issuer_url"></a> [cluster\_oidc\_issuer\_url](#output\_cluster\_oidc\_issuer\_url)| The URL on the EKS cluster for the OpenID Connect identity provider |
69
70
| <aname="output_cluster_platform_version"></a> [cluster\_platform\_version](#output\_cluster\_platform\_version)| Platform version for the cluster |
70
71
| <aname="output_cluster_primary_security_group_id"></a> [cluster\_primary\_security\_group\_id](#output\_cluster\_primary\_security\_group\_id)| Cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. Referred to as 'Cluster security group' in the EKS console |
71
72
| <aname="output_cluster_security_group_arn"></a> [cluster\_security\_group\_arn](#output\_cluster\_security\_group\_arn)| Amazon Resource Name (ARN) of the cluster security group |
72
73
| <aname="output_cluster_security_group_id"></a> [cluster\_security\_group\_id](#output\_cluster\_security\_group\_id)| ID of the cluster security group |
74
+
| <aname="output_cluster_service_cidr"></a> [cluster\_service\_cidr](#output\_cluster\_service\_cidr)| The CIDR block where Kubernetes pod and service IP addresses are assigned from |
73
75
| <aname="output_cluster_status"></a> [cluster\_status](#output\_cluster\_status)| Status of the EKS cluster. One of `CREATING`, `ACTIVE`, `DELETING`, `FAILED`|
74
76
| <aname="output_cluster_tls_certificate_sha1_fingerprint"></a> [cluster\_tls\_certificate\_sha1\_fingerprint](#output\_cluster\_tls\_certificate\_sha1\_fingerprint)| The SHA1 fingerprint of the public key of the cluster's certificate |
75
77
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
0 commit comments