You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The EKS cluster can be provisioned with both private and public subnets.
But Fargate only accepts private ones.
This new variable allows to override the subnets to explicitly pass the
private subnets to Fargate and work around that issue.
Copy file name to clipboardexpand all lines: README.md
+1
Original file line number
Diff line number
Diff line change
@@ -192,6 +192,7 @@ MIT Licensed. See [LICENSE](https://github.com/terraform-aws-modules/terraform-a
192
192
| enable\_irsa | Whether to create OpenID Connect Provider for EKS to enable IRSA |`bool`|`false`| no |
193
193
| fargate\_pod\_execution\_role\_name | The IAM Role that provides permissions for the EKS Fargate Profile. |`string`|`null`| no |
194
194
| fargate\_profiles | Fargate profiles to create. See `fargate_profile` keys section in fargate submodule's README.md for more details |`any`|`{}`| no |
195
+
| fargate\_subnets | A list of private subnets to use for Fargate. Defaults to the subnets var if empty. |`list(string)`|`[]`| no |
195
196
| iam\_path | If provided, all IAM roles will be created on this path. |`string`|`"/"`| no |
196
197
| kubeconfig\_aws\_authenticator\_additional\_args | Any additional arguments to pass to the authenticator such as the role to assume. e.g. ["-r", "MyEksRole"]. |`list(string)`|`[]`| no |
197
198
| kubeconfig\_aws\_authenticator\_command | Command to use to fetch AWS EKS credentials. |`string`|`"aws-iam-authenticator"`| no |
0 commit comments