You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
220
224
|[aws_iam_policy_document.cni_ipv6_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
221
225
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
@@ -226,6 +230,12 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
226
230
| Name | Description | Type | Default | Required |
| <aname="input_attach_cluster_encryption_policy"></a> [attach\_cluster\_encryption\_policy](#input\_attach\_cluster\_encryption\_policy)| Indicates whether or not to attach an additional policy for the cluster IAM role to utilize the encryption key provided |`bool`|`true`| no |
233
+
| <aname="input_aws_auth_accounts"></a> [aws\_auth\_accounts](#input\_aws\_auth\_accounts)| List of account maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
234
+
| <aname="input_aws_auth_fargate_profile_pod_execution_role_arns"></a> [aws\_auth\_fargate\_profile\_pod\_execution\_role\_arns](#input\_aws\_auth\_fargate\_profile\_pod\_execution\_role\_arns)| List of Fargate profile pod execution role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
235
+
| <aname="input_aws_auth_node_iam_role_arns_non_windows"></a> [aws\_auth\_node\_iam\_role\_arns\_non\_windows](#input\_aws\_auth\_node\_iam\_role\_arns\_non\_windows)| List of non-Windows based node IAM role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
236
+
| <aname="input_aws_auth_node_iam_role_arns_windows"></a> [aws\_auth\_node\_iam\_role\_arns\_windows](#input\_aws\_auth\_node\_iam\_role\_arns\_windows)| List of Windows based node IAM role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
237
+
| <aname="input_aws_auth_roles"></a> [aws\_auth\_roles](#input\_aws\_auth\_roles)| List of role maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
238
+
| <aname="input_aws_auth_users"></a> [aws\_auth\_users](#input\_aws\_auth\_users)| List of user maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
229
239
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
230
240
| <aname="input_cloudwatch_log_group_retention_in_days"></a> [cloudwatch\_log\_group\_retention\_in\_days](#input\_cloudwatch\_log\_group\_retention\_in\_days)| Number of days to retain log events. Default retention - 90 days |`number`|`90`| no |
231
241
| <aname="input_cluster_additional_security_group_ids"></a> [cluster\_additional\_security\_group\_ids](#input\_cluster\_additional\_security\_group\_ids)| List of additional, externally created security group IDs to attach to the cluster control plane |`list(string)`|`[]`| no |
@@ -255,6 +265,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
255
265
| <aname="input_cluster_timeouts"></a> [cluster\_timeouts](#input\_cluster\_timeouts)| Create, update, and delete timeout configurations for the cluster |`map(string)`|`{}`| no |
256
266
| <aname="input_cluster_version"></a> [cluster\_version](#input\_cluster\_version)| Kubernetes `<major>.<minor>` version to use for the EKS cluster (i.e.: `1.21`) |`string`|`null`| no |
257
267
| <aname="input_create"></a> [create](#input\_create)| Controls if EKS resources should be created (affects nearly all resources) |`bool`|`true`| no |
268
+
| <aname="input_create_aws_auth_configmap"></a> [create\_aws\_auth\_configmap](#input\_create\_aws\_auth\_configmap)| Determines whether to create the aws-auth configmap. NOTE - this is only intended for scenarios where the confgimap does not exist (i.e. - when using only self-managed node groups). Most users should use `manage_aws_auth_configmap`|`bool`|`false`| no |
258
269
| <aname="input_create_cloudwatch_log_group"></a> [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group)| Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled |`bool`|`true`| no |
259
270
| <aname="input_create_cluster_security_group"></a> [create\_cluster\_security\_group](#input\_create\_cluster\_security\_group)| Determines if a security group is created for the cluster or use the existing `cluster_security_group_id`|`bool`|`true`| no |
260
271
| <aname="input_create_cni_ipv6_iam_policy"></a> [create\_cni\_ipv6\_iam\_policy](#input\_create\_cni\_ipv6\_iam\_policy)| Determines whether to create an [`AmazonEKS_CNI_IPv6_Policy`](https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html#cni-iam-role-create-ipv6-policy)|`bool`|`false`| no |
@@ -274,6 +285,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
274
285
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
275
286
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
276
287
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`string`|`true`| no |
288
+
| <aname="input_manage_aws_auth_configmap"></a> [manage\_aws\_auth\_configmap](#input\_manage\_aws\_auth\_configmap)| Determines whether to manage the aws-auth configmap |`bool`|`false`| no |
277
289
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source |`any`|`{}`| no |
278
290
| <aname="input_node_security_group_description"></a> [node\_security\_group\_description](#input\_node\_security\_group\_description)| Description of the node security group created |`string`|`"EKS node shared security group"`| no |
279
291
| <aname="input_node_security_group_id"></a> [node\_security\_group\_id](#input\_node\_security\_group\_id)| ID of an existing security group to attach to the node groups created |`string`|`""`| no |
@@ -293,7 +305,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
293
305
294
306
| Name | Description |
295
307
|------|-------------|
296
-
| <aname="output_aws_auth_configmap_yaml"></a> [aws\_auth\_configmap\_yaml](#output\_aws\_auth\_configmap\_yaml)| Formatted yaml output for base aws-auth configmap containing roles used in cluster node groups/fargate profiles |
308
+
| <aname="output_aws_auth_configmap_yaml"></a> [aws\_auth\_configmap\_yaml](#output\_aws\_auth\_configmap\_yaml)|[DEPRECATED - use `var.manage_aws_auth_configmap`]Formatted yaml output for base aws-auth configmap containing roles used in cluster node groups/fargate profiles |
297
309
| <aname="output_cloudwatch_log_group_arn"></a> [cloudwatch\_log\_group\_arn](#output\_cloudwatch\_log\_group\_arn)| Arn of cloudwatch log group created |
298
310
| <aname="output_cloudwatch_log_group_name"></a> [cloudwatch\_log\_group\_name](#output\_cloudwatch\_log\_group\_name)| Name of cloudwatch log group created |
299
311
| <aname="output_cluster_addons"></a> [cluster\_addons](#output\_cluster\_addons)| Map of attribute maps for all EKS cluster addons enabled |
0 commit comments