You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
252
254
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
253
255
|[aws_iam_policy_document.cni_ipv6_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
254
256
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
@@ -270,7 +272,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
270
272
| <aname="input_cluster_additional_security_group_ids"></a> [cluster\_additional\_security\_group\_ids](#input\_cluster\_additional\_security\_group\_ids)| List of additional, externally created security group IDs to attach to the cluster control plane |`list(string)`|`[]`| no |
271
273
| <aname="input_cluster_addons"></a> [cluster\_addons](#input\_cluster\_addons)| Map of cluster addon configurations to enable for the cluster. Addon name can be the map keys or set with `name`|`any`|`{}`| no |
272
274
| <aname="input_cluster_enabled_log_types"></a> [cluster\_enabled\_log\_types](#input\_cluster\_enabled\_log\_types)| A list of the desired control plane logs to enable. For more information, see Amazon EKS Control Plane Logging documentation (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html)|`list(string)`| <pre>[<br> "audit",<br> "api",<br> "authenticator"<br>]</pre> | no |
273
-
| <aname="input_cluster_encryption_config"></a> [cluster\_encryption\_config](#input\_cluster\_encryption\_config)| Configuration block with encryption configuration for the cluster |<pre>list(object({<br> provider_key_arn = string<br> resources = list(string)<br> }))</pre>|`[]`| no |
275
+
| <aname="input_cluster_encryption_config"></a> [cluster\_encryption\_config](#input\_cluster\_encryption\_config)| Configuration block with encryption configuration for the cluster |`list(any)`|`[]`| no |
274
276
| <aname="input_cluster_encryption_policy_description"></a> [cluster\_encryption\_policy\_description](#input\_cluster\_encryption\_policy\_description)| Description of the cluster encryption policy created |`string`|`"Cluster encryption policy to allow cluster role to utilize CMK provided"`| no |
275
277
| <aname="input_cluster_encryption_policy_name"></a> [cluster\_encryption\_policy\_name](#input\_cluster\_encryption\_policy\_name)| Name to use on cluster encryption policy created |`string`|`null`| no |
276
278
| <aname="input_cluster_encryption_policy_path"></a> [cluster\_encryption\_policy\_path](#input\_cluster\_encryption\_policy\_path)| Cluster encryption policy path |`string`|`null`| no |
@@ -301,11 +303,13 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
301
303
| <aname="input_create_cluster_security_group"></a> [create\_cluster\_security\_group](#input\_create\_cluster\_security\_group)| Determines if a security group is created for the cluster or use the existing `cluster_security_group_id`|`bool`|`true`| no |
302
304
| <aname="input_create_cni_ipv6_iam_policy"></a> [create\_cni\_ipv6\_iam\_policy](#input\_create\_cni\_ipv6\_iam\_policy)| Determines whether to create an [`AmazonEKS_CNI_IPv6_Policy`](https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html#cni-iam-role-create-ipv6-policy)|`bool`|`false`| no |
303
305
| <aname="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role)| Determines whether a an IAM role is created or to use an existing IAM role |`bool`|`true`| no |
306
+
| <aname="input_create_kms_key"></a> [create\_kms\_key](#input\_create\_kms\_key)| Controls if a KMS key for cluster encryption should be created |`bool`|`false`| no |
304
307
| <aname="input_create_node_security_group"></a> [create\_node\_security\_group](#input\_create\_node\_security\_group)| Determines whether to create a security group for the node groups or use the existing `node_security_group_id`|`bool`|`true`| no |
305
308
| <aname="input_custom_oidc_thumbprints"></a> [custom\_oidc\_thumbprints](#input\_custom\_oidc\_thumbprints)| Additional list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider's server certificate(s) |`list(string)`|`[]`| no |
306
309
| <aname="input_eks_managed_node_group_defaults"></a> [eks\_managed\_node\_group\_defaults](#input\_eks\_managed\_node\_group\_defaults)| Map of EKS managed node group default configurations |`any`|`{}`| no |
307
310
| <aname="input_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#input\_eks\_managed\_node\_groups)| Map of EKS managed node group definitions to create |`any`|`{}`| no |
308
311
| <aname="input_enable_irsa"></a> [enable\_irsa](#input\_enable\_irsa)| Determines whether to create an OpenID Connect Provider for EKS to enable IRSA |`bool`|`true`| no |
312
+
| <aname="input_enable_kms_key_rotation"></a> [enable\_kms\_key\_rotation](#input\_enable\_kms\_key\_rotation)| Specifies whether key rotation is enabled. Defaults to `true`|`bool`|`true`| no |
309
313
| <aname="input_fargate_profile_defaults"></a> [fargate\_profile\_defaults](#input\_fargate\_profile\_defaults)| Map of Fargate Profile default configurations |`any`|`{}`| no |
310
314
| <aname="input_fargate_profiles"></a> [fargate\_profiles](#input\_fargate\_profiles)| Map of Fargate Profile definitions to create |`any`|`{}`| no |
311
315
| <aname="input_iam_role_additional_policies"></a> [iam\_role\_additional\_policies](#input\_iam\_role\_additional\_policies)| Additional policies to be added to the IAM role |`list(string)`|`[]`| no |
@@ -316,6 +320,16 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
316
320
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
317
321
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
318
322
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
323
+
| <aname="input_kms_key_administrators"></a> [kms\_key\_administrators](#input\_kms\_key\_administrators)| A list of IAM ARNs for [key administrators](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-administrators). If no value is provided, the current caller identity is used to ensure at least one key admin is available |`list(string)`|`[]`| no |
324
+
| <aname="input_kms_key_aliases"></a> [kms\_key\_aliases](#input\_kms\_key\_aliases)| A list of aliases to create. Note - due to the use of `toset()`, values must be static strings and not computed values |`list(string)`|`[]`| no |
325
+
| <aname="input_kms_key_deletion_window_in_days"></a> [kms\_key\_deletion\_window\_in\_days](#input\_kms\_key\_deletion\_window\_in\_days)| The waiting period, specified in number of days. After the waiting period ends, AWS KMS deletes the KMS key. If you specify a value, it must be between `7` and `30`, inclusive. If you do not specify a value, it defaults to `30`|`number`|`null`| no |
326
+
| <aname="input_kms_key_description"></a> [kms\_key\_description](#input\_kms\_key\_description)| The description of the key as viewed in AWS console |`string`|`null`| no |
327
+
| <aname="input_kms_key_enable_default_policy"></a> [kms\_key\_enable\_default\_policy](#input\_kms\_key\_enable\_default\_policy)| Specifies whether to enable the default key policy. Defaults to `true`|`bool`|`false`| no |
328
+
| <aname="input_kms_key_override_policy_documents"></a> [kms\_key\_override\_policy\_documents](#input\_kms\_key\_override\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid`|`list(string)`|`[]`| no |
329
+
| <aname="input_kms_key_owners"></a> [kms\_key\_owners](#input\_kms\_key\_owners)| A list of IAM ARNs for those who will have full key permissions (`kms:*`) |`list(string)`|`[]`| no |
330
+
| <aname="input_kms_key_service_users"></a> [kms\_key\_service\_users](#input\_kms\_key\_service\_users)| A list of IAM ARNs for [key service users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-service-integration)|`list(string)`|`[]`| no |
331
+
| <aname="input_kms_key_source_policy_documents"></a> [kms\_key\_source\_policy\_documents](#input\_kms\_key\_source\_policy\_documents)| List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s |`list(string)`|`[]`| no |
332
+
| <aname="input_kms_key_users"></a> [kms\_key\_users](#input\_kms\_key\_users)| A list of IAM ARNs for [key users](https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html#key-policy-default-allow-users)|`list(string)`|`[]`| no |
319
333
| <aname="input_manage_aws_auth_configmap"></a> [manage\_aws\_auth\_configmap](#input\_manage\_aws\_auth\_configmap)| Determines whether to manage the aws-auth configmap |`bool`|`false`| no |
320
334
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source |`any`|`{}`| no |
321
335
| <aname="input_node_security_group_description"></a> [node\_security\_group\_description](#input\_node\_security\_group\_description)| Description of the node security group created |`string`|`"EKS node shared security group"`| no |
@@ -358,6 +372,9 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
358
372
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
359
373
| <aname="output_eks_managed_node_groups_autoscaling_group_names"></a> [eks\_managed\_node\_groups\_autoscaling\_group\_names](#output\_eks\_managed\_node\_groups\_autoscaling\_group\_names)| List of the autoscaling group names created by EKS managed node groups |
360
374
| <aname="output_fargate_profiles"></a> [fargate\_profiles](#output\_fargate\_profiles)| Map of attribute maps for all EKS Fargate Profiles created |
375
+
| <aname="output_kms_key_arn"></a> [kms\_key\_arn](#output\_kms\_key\_arn)| The Amazon Resource Name (ARN) of the key |
376
+
| <aname="output_kms_key_id"></a> [kms\_key\_id](#output\_kms\_key\_id)| The globally unique identifier for the key |
377
+
| <aname="output_kms_key_policy"></a> [kms\_key\_policy](#output\_kms\_key\_policy)| The IAM resource policy set on the key |
361
378
| <aname="output_node_security_group_arn"></a> [node\_security\_group\_arn](#output\_node\_security\_group\_arn)| Amazon Resource Name (ARN) of the node shared security group |
362
379
| <aname="output_node_security_group_id"></a> [node\_security\_group\_id](#output\_node\_security\_group\_id)| ID of the node shared security group |
363
380
| <aname="output_oidc_provider"></a> [oidc\_provider](#output\_oidc\_provider)| The OpenID Connect identity provider (issuer URL without leading `https://`) |
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
93
92
| <aname="output_eks_managed_node_groups_autoscaling_group_names"></a> [eks\_managed\_node\_groups\_autoscaling\_group\_names](#output\_eks\_managed\_node\_groups\_autoscaling\_group\_names)| List of the autoscaling group names created by EKS managed node groups |
94
93
| <aname="output_fargate_profiles"></a> [fargate\_profiles](#output\_fargate\_profiles)| Map of attribute maps for all EKS Fargate Profiles created |
94
+
| <aname="output_kms_key_arn"></a> [kms\_key\_arn](#output\_kms\_key\_arn)| The Amazon Resource Name (ARN) of the key |
95
+
| <aname="output_kms_key_id"></a> [kms\_key\_id](#output\_kms\_key\_id)| The globally unique identifier for the key |
96
+
| <aname="output_kms_key_policy"></a> [kms\_key\_policy](#output\_kms\_key\_policy)| The IAM resource policy set on the key |
95
97
| <aname="output_oidc_provider"></a> [oidc\_provider](#output\_oidc\_provider)| The OpenID Connect identity provider (issuer URL without leading `https://`) |
96
98
| <aname="output_oidc_provider_arn"></a> [oidc\_provider\_arn](#output\_oidc\_provider\_arn)| The ARN of the OIDC Provider if `enable_irsa = true`|
97
99
| <aname="output_self_managed_node_groups"></a> [self\_managed\_node\_groups](#output\_self\_managed\_node\_groups)| Map of attribute maps for all self managed node groups created |
Copy file name to clipboardexpand all lines: examples/eks_managed_node_group/README.md
+3
Original file line number
Diff line number
Diff line change
@@ -125,6 +125,9 @@ No inputs.
125
125
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
126
126
| <aname="output_eks_managed_node_groups_autoscaling_group_names"></a> [eks\_managed\_node\_groups\_autoscaling\_group\_names](#output\_eks\_managed\_node\_groups\_autoscaling\_group\_names)| List of the autoscaling group names created by EKS managed node groups |
127
127
| <aname="output_fargate_profiles"></a> [fargate\_profiles](#output\_fargate\_profiles)| Map of attribute maps for all EKS Fargate Profiles created |
128
+
| <aname="output_kms_key_arn"></a> [kms\_key\_arn](#output\_kms\_key\_arn)| The Amazon Resource Name (ARN) of the key |
129
+
| <aname="output_kms_key_id"></a> [kms\_key\_id](#output\_kms\_key\_id)| The globally unique identifier for the key |
130
+
| <aname="output_kms_key_policy"></a> [kms\_key\_policy](#output\_kms\_key\_policy)| The IAM resource policy set on the key |
128
131
| <aname="output_node_security_group_arn"></a> [node\_security\_group\_arn](#output\_node\_security\_group\_arn)| Amazon Resource Name (ARN) of the node shared security group |
129
132
| <aname="output_node_security_group_id"></a> [node\_security\_group\_id](#output\_node\_security\_group\_id)| ID of the node shared security group |
130
133
| <aname="output_oidc_provider"></a> [oidc\_provider](#output\_oidc\_provider)| The OpenID Connect identity provider (issuer URL without leading `https://`) |
0 commit comments