You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
220
223
|[aws_iam_policy_document.cni_ipv6_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
221
224
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
@@ -226,6 +229,12 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
226
229
| Name | Description | Type | Default | Required |
| <aname="input_attach_cluster_encryption_policy"></a> [attach\_cluster\_encryption\_policy](#input\_attach\_cluster\_encryption\_policy)| Indicates whether or not to attach an additional policy for the cluster IAM role to utilize the encryption key provided |`bool`|`true`| no |
232
+
| <aname="input_aws_auth_accounts"></a> [aws\_auth\_accounts](#input\_aws\_auth\_accounts)| List of account maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
233
+
| <aname="input_aws_auth_fargate_profile_pod_execution_role_arns"></a> [aws\_auth\_fargate\_profile\_pod\_execution\_role\_arns](#input\_aws\_auth\_fargate\_profile\_pod\_execution\_role\_arns)| List of Fargate profile pod execution role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
234
+
| <aname="input_aws_auth_node_iam_role_arns_non_windows"></a> [aws\_auth\_node\_iam\_role\_arns\_non\_windows](#input\_aws\_auth\_node\_iam\_role\_arns\_non\_windows)| List of non-Windows based node IAM role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
235
+
| <aname="input_aws_auth_node_iam_role_arns_windows"></a> [aws\_auth\_node\_iam\_role\_arns\_windows](#input\_aws\_auth\_node\_iam\_role\_arns\_windows)| List of Windows based node IAM role ARNs to add to the aws-auth configmap |`list(string)`|`[]`| no |
236
+
| <aname="input_aws_auth_roles"></a> [aws\_auth\_roles](#input\_aws\_auth\_roles)| List of role maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
237
+
| <aname="input_aws_auth_users"></a> [aws\_auth\_users](#input\_aws\_auth\_users)| List of user maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
229
238
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
230
239
| <aname="input_cloudwatch_log_group_retention_in_days"></a> [cloudwatch\_log\_group\_retention\_in\_days](#input\_cloudwatch\_log\_group\_retention\_in\_days)| Number of days to retain log events. Default retention - 90 days |`number`|`90`| no |
231
240
| <aname="input_cluster_additional_security_group_ids"></a> [cluster\_additional\_security\_group\_ids](#input\_cluster\_additional\_security\_group\_ids)| List of additional, externally created security group IDs to attach to the cluster control plane |`list(string)`|`[]`| no |
@@ -274,6 +283,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
274
283
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
275
284
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
276
285
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`string`|`true`| no |
286
+
| <aname="input_manage_aws_auth_configmap"></a> [manage\_aws\_auth\_configmap](#input\_manage\_aws\_auth\_configmap)| Determines whether to manage the aws-auth configmap |`bool`|`false`| no |
277
287
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source |`any`|`{}`| no |
278
288
| <aname="input_node_security_group_description"></a> [node\_security\_group\_description](#input\_node\_security\_group\_description)| Description of the node security group created |`string`|`"EKS node shared security group"`| no |
279
289
| <aname="input_node_security_group_id"></a> [node\_security\_group\_id](#input\_node\_security\_group\_id)| ID of an existing security group to attach to the node groups created |`string`|`""`| no |
@@ -293,7 +303,7 @@ We are grateful to the community for contributing bugfixes and improvements! Ple
293
303
294
304
| Name | Description |
295
305
|------|-------------|
296
-
| <aname="output_aws_auth_configmap_yaml"></a> [aws\_auth\_configmap\_yaml](#output\_aws\_auth\_configmap\_yaml)| Formatted yaml output for base aws-auth configmap containing roles used in cluster node groups/fargate profiles |
306
+
| <aname="output_aws_auth_configmap_yaml"></a> [aws\_auth\_configmap\_yaml](#output\_aws\_auth\_configmap\_yaml)|[DEPRECATED - use `var.manage_aws_auth_configmap`]Formatted yaml output for base aws-auth configmap containing roles used in cluster node groups/fargate profiles |
297
307
| <aname="output_cloudwatch_log_group_arn"></a> [cloudwatch\_log\_group\_arn](#output\_cloudwatch\_log\_group\_arn)| Arn of cloudwatch log group created |
298
308
| <aname="output_cloudwatch_log_group_name"></a> [cloudwatch\_log\_group\_name](#output\_cloudwatch\_log\_group\_name)| Name of cloudwatch log group created |
299
309
| <aname="output_cluster_addons"></a> [cluster\_addons](#output\_cluster\_addons)| Map of attribute maps for all EKS cluster addons enabled |
0 commit comments