You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+5
Original file line number
Diff line number
Diff line change
@@ -855,6 +855,11 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
855
855
| <aname="input_cluster_addons"></a> [cluster\_addons](#input\_cluster\_addons)| Map of cluster addon configurations to enable for the cluster. Addon name can be the map keys or set with `name`|`any`|`{}`| no |
856
856
| <aname="input_cluster_enabled_log_types"></a> [cluster\_enabled\_log\_types](#input\_cluster\_enabled\_log\_types)| A list of the desired control plane logs to enable. For more information, see Amazon EKS Control Plane Logging documentation (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html)|`list(string)`| <pre>[<br> "audit",<br> "api",<br> "authenticator"<br>]</pre> | no |
857
857
| <aname="input_cluster_encryption_config"></a> [cluster\_encryption\_config](#input\_cluster\_encryption\_config)| Configuration block with encryption configuration for the cluster | <pre>list(object({<br> provider_key_arn = string<br> resources = list(string)<br> }))</pre> |`[]`| no |
858
+
| <aname="input_cluster_encryption_policy_description"></a> [cluster\_encryption\_policy\_description](#input\_cluster\_encryption\_policy\_description)| Description of the cluster encryption policy created |`string`|`"Cluster encryption policy to allow cluster role to utilize CMK provided"`| no |
859
+
| <aname="input_cluster_encryption_policy_name"></a> [cluster\_encryption\_policy\_name](#input\_cluster\_encryption\_policy\_name)| Name to use on cluster encryption policy created |`string`|`null`| no |
860
+
| <aname="input_cluster_encryption_policy_path"></a> [cluster\_encryption\_policy\_path](#input\_cluster\_encryption\_policy\_path)| Cluster encryption policy path |`string`|`null`| no |
861
+
| <aname="input_cluster_encryption_policy_tags"></a> [cluster\_encryption\_policy\_tags](#input\_cluster\_encryption\_policy\_tags)| A map of additional tags to add to the cluster encryption policy created |`map(string)`|`{}`| no |
862
+
| <aname="input_cluster_encryption_policy_use_name_prefix"></a> [cluster\_encryption\_policy\_use\_name\_prefix](#input\_cluster\_encryption\_policy\_use\_name\_prefix)| Determines whether cluster encryption policy name (`cluster_encryption_policy_name`) is used as a prefix |`string`|`true`| no |
858
863
| <aname="input_cluster_endpoint_private_access"></a> [cluster\_endpoint\_private\_access](#input\_cluster\_endpoint\_private\_access)| Indicates whether or not the Amazon EKS private API server endpoint is enabled |`bool`|`false`| no |
859
864
| <aname="input_cluster_endpoint_public_access"></a> [cluster\_endpoint\_public\_access](#input\_cluster\_endpoint\_public\_access)| Indicates whether or not the Amazon EKS public API server endpoint is enabled |`bool`|`true`| no |
860
865
| <aname="input_cluster_endpoint_public_access_cidrs"></a> [cluster\_endpoint\_public\_access\_cidrs](#input\_cluster\_endpoint\_public\_access\_cidrs)| List of CIDR blocks which can access the Amazon EKS public API server endpoint |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
0 commit comments