You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Breaking:** Removal of autoscaling IAM policy and tags (by @max-rocket-internet)
19
+
- Revert #631. Add back manage security group flags. (by @ryanooi)
20
+
- Changed timeout for creating EKS (by @confiq)
14
21
- Added instructions for how to add Windows nodes (by @ivanguravel)
15
22
-[CI] Switch `Validate` github action to use env vars (by @max-rocket-internet)
16
23
-[CI] Bump pre-commit-terraform version (by @barryib)
17
24
- Added example `examples/irsa` for IAM Roles for Service Accounts (by @max-rocket-internet)
18
-
-**Breaking:** Removal of autoscaling IAM policy and tags (by @max-rocket-internet)
19
25
- Add `iam:{Create,Delete,Get}OpenIDConnectProvider` grants to the list of required IAM permissions in `docs/iam-permissions.md` (by @danielelisi)
20
-
- Add an`name` parameter to be able to manually name EKS Managed Node Groups (by @splieth)
26
+
- Add a`name` parameter to be able to manually name EKS Managed Node Groups (by @splieth)
21
27
- Pinned kubernetes provider version to exactly 1.10.0 across all examples and README.md's (by @andres-de-castro)
22
28
- Change variable default `wait_for_cluster_cmd` from curl to wget (by @daroga0002)
23
29
24
30
#### Important notes
25
31
26
-
Autoscaling policy and tags have been removed from this module. This reduces complexity and increases security as the policy was attached to the node group IAM role. To manage it outside of this module either follow the example in `examples/irsa` to attach an IAM role to the cluster-autoscaler `serviceAccount` or create the policy outside this module and pass it in using the `workers_additional_policies` variable.
27
-
28
-
# History
32
+
Autoscaling policy and tags have been removed from this module. This reduces complexity and increases security as the policy was attached to the node group IAM role. To manage it outside of this module either follow the example in `examples/irsa` to attach an IAM role to the cluster-autoscaler `serviceAccount` or create [the policy](https://github.com/terraform-aws-modules/terraform-aws-eks/blob/v8.2.0/workers.tf#L361-L416) outside this module and pass it in using the `workers_additional_policies` variable.
0 commit comments