-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terraform eks #38
Terraform eks #38
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Have resolved the review comments.
Have reused the existing modules and made the required properties configurable by passing variables.
…mations into terraform-eks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Have updated the module as mentioned in the comments in the PR.
Terraform Plan:
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
module.eks.aws_eks_cluster.default will be created
arn = (known after apply)
certificate_authority = (known after apply)
cluster_id = (known after apply)
created_at = (known after apply)
endpoint = (known after apply)
id = (known after apply)
identity = (known after apply)
name = "my-eks-cluster"
platform_version = (known after apply)
role_arn = (known after apply)
status = (known after apply)
tags_all = {
}
version = "1.24"
vpc_config {
}
}
module.eks.aws_eks_node_group.nodes_general will be created
ami_type = "AL2_x86_64"
arn = (known after apply)
capacity_type = "ON_DEMAND"
cluster_name = "my-eks-cluster"
disk_size = 20
force_update_version = false
id = (known after apply)
instance_types = [
]
labels = {
}
node_group_name = "nodes-general"
node_group_name_prefix = (known after apply)
node_role_arn = (known after apply)
release_version = (known after apply)
resources = (known after apply)
status = (known after apply)
subnet_ids = (known after apply)
tags_all = {
}
version = "1.24"
scaling_config {
}
}
module.eks.aws_iam_role.default will be created
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "eks.amazonaws.com"
}
},
]
+ Version = "2012-10-17"
}
)
}
}
module.eks.aws_iam_role.nodes_general will be created
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "ec2.amazonaws.com"
}
},
]
+ Version = "2012-10-17"
}
)
}
}
module.eks.aws_iam_role_policy_attachment.amazon_ec2_container_registry_read_only_policy will be created
}
module.eks.aws_iam_role_policy_attachment.amazon_eks_cni_policy_general will be created
}
module.eks.aws_iam_role_policy_attachment.amazon_eks_worker_node_policy_general will be created
}
module.eks.aws_iam_role_policy_attachment.default_amazon_eks_cluster_policy will be created
}
module.eks.aws_security_group.eks_cluster_sg will be created
]
},
]
]
},
},
},
]
}
}
module.vpc.aws_eip.nat_gw[0] will be created
}
}
}
module.vpc.aws_internet_gateway.default[0] will be created
}
}
}
module.vpc.aws_nat_gateway.default[0] will be created
}
}
}
module.vpc.aws_route.internet_gateway[0] will be created
}
module.vpc.aws_route.internet_gateway[1] will be created
}
module.vpc.aws_route.nat_gateway[0] will be created
}
module.vpc.aws_route.nat_gateway[1] will be created
}
module.vpc.aws_route_table.private[0] will be created
}
}
}
module.vpc.aws_route_table.private[1] will be created
}
}
}
module.vpc.aws_route_table.public[0] will be created
}
}
}
module.vpc.aws_route_table.public[1] will be created
}
}
}
module.vpc.aws_route_table_association.private[0] will be created
}
module.vpc.aws_route_table_association.private[1] will be created
}
module.vpc.aws_route_table_association.public[0] will be created
}
module.vpc.aws_route_table_association.public[1] will be created
}
module.vpc.aws_subnet.private[0] will be created
}
}
}
module.vpc.aws_subnet.private[1] will be created
}
}
}
module.vpc.aws_subnet.public[0] will be created
}
}
}
module.vpc.aws_subnet.public[1] will be created
}
}
}
module.vpc.aws_vpc.default will be created
}
}
}
Plan: 29 to add, 0 to change, 0 to destroy.