You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.additional](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
690
689
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
691
690
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
692
691
|[tls_certificate.this](https://registry.terraform.io/providers/hashicorp/tls/latest/docs/data-sources/certificate)| data source |
@@ -698,7 +697,6 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
698
697
| <aname="input_cloudwatch_log_group_kms_key_id"></a> [cloudwatch\_log\_group\_kms\_key\_id](#input\_cloudwatch\_log\_group\_kms\_key\_id)| If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html)|`string`|`null`| no |
699
698
| <aname="input_cloudwatch_log_group_retention_in_days"></a> [cloudwatch\_log\_group\_retention\_in\_days](#input\_cloudwatch\_log\_group\_retention\_in\_days)| Number of days to retain log events. Default retention - 90 days |`number`|`90`| no |
700
699
| <aname="input_cluster_additional_security_group_ids"></a> [cluster\_additional\_security\_group\_ids](#input\_cluster\_additional\_security\_group\_ids)| List of additional, externally created security group IDs to attach to the cluster control plane |`list(string)`|`[]`| no |
701
-
| <aname="input_cluster_additional_security_group_rules"></a> [cluster\_additional\_security\_group\_rules](#input\_cluster\_additional\_security\_group\_rules)| List of additional security group rules to add to the cluster security group created |`map(any)`|`{}`| no |
702
700
| <aname="input_cluster_addons"></a> [cluster\_addons](#input\_cluster\_addons)| Map of cluster addon configurations to enable for the cluster. Addon name can be the map keys or set with `name`|`any`|`{}`| no |
703
701
| <aname="input_cluster_enabled_log_types"></a> [cluster\_enabled\_log\_types](#input\_cluster\_enabled\_log\_types)| A list of the desired control plane logs to enable. For more information, see Amazon EKS Control Plane Logging documentation (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html)|`list(string)`| <pre>[<br> "audit",<br> "api",<br> "authenticator"<br>]</pre> | no |
704
702
| <aname="input_cluster_encryption_config"></a> [cluster\_encryption\_config](#input\_cluster\_encryption\_config)| Configuration block with encryption configuration for the cluster | <pre>list(object({<br> provider_key_arn = string<br> resources = list(string)<br> }))</pre> |`[]`| no |
@@ -707,6 +705,7 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
707
705
| <aname="input_cluster_endpoint_public_access_cidrs"></a> [cluster\_endpoint\_public\_access\_cidrs](#input\_cluster\_endpoint\_public\_access\_cidrs)| List of CIDR blocks which can access the Amazon EKS public API server endpoint |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
708
706
| <aname="input_cluster_identity_providers"></a> [cluster\_identity\_providers](#input\_cluster\_identity\_providers)| Map of cluster identity provider configurations to enable for the cluster. Note - this is different/separate from IRSA |`any`|`{}`| no |
709
707
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the EKS cluster |`string`|`""`| no |
708
+
| <aname="input_cluster_security_group_additional_rules"></a> [cluster\_security\_group\_additional\_rules](#input\_cluster\_security\_group\_additional\_rules)| List of additional security group rules to add to the cluster security group created |`map(any)`|`{}`| no |
710
709
| <aname="input_cluster_security_group_description"></a> [cluster\_security\_group\_description](#input\_cluster\_security\_group\_description)| Description of the cluster security group created |`string`|`"EKS cluster security group"`| no |
711
710
| <aname="input_cluster_security_group_id"></a> [cluster\_security\_group\_id](#input\_cluster\_security\_group\_id)| Existing security group ID to be attached to the cluster. Required if `create_cluster_security_group` = `false`|`string`|`""`| no |
712
711
| <aname="input_cluster_security_group_name"></a> [cluster\_security\_group\_name](#input\_cluster\_security\_group\_name)| Name to use on cluster security group created |`string`|`null`| no |
@@ -734,7 +733,7 @@ Full contributing [guidelines are covered here](https://github.com/terraform-aws
734
733
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
735
734
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
736
735
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`string`|`true`| no |
737
-
| <aname="input_node_additional_security_group_rules"></a> [node\_additional\_security\_group\_rules](#input\_node\_additional\_security\_group\_rules)| List of additional security group rules to add to the node security group created |`map(any)`|`{}`| no |
736
+
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created |`map(any)`|`{}`| no |
738
737
| <aname="input_node_security_group_description"></a> [node\_security\_group\_description](#input\_node\_security\_group\_description)| Description of the node security group created |`string`|`"EKS node shared security group"`| no |
739
738
| <aname="input_node_security_group_id"></a> [node\_security\_group\_id](#input\_node\_security\_group\_id)| ID of an existing security group to attach to the node groups created |`string`|`""`| no |
740
739
| <aname="input_node_security_group_name"></a> [node\_security\_group\_name](#input\_node\_security\_group\_name)| Name to use on node security group created |`string`|`null`| no |
0 commit comments