From 632646317dd4f361958b05522e6ec6feb48653ca Mon Sep 17 00:00:00 2001 From: clouddrove-ci Date: Thu, 10 Aug 2023 17:03:56 +0000 Subject: [PATCH] update README.md --- README.md | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 520d1c1..16c22d0 100644 --- a/README.md +++ b/README.md @@ -252,7 +252,7 @@ managed_node_group = { | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| -| addons | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources. |
list(object({
addon_name = string
addon_version = string
resolve_conflicts = string
service_account_role_arn = string
}))
| `[]` | no | +| addons | Manages [`aws_eks_addon`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) resources. | `any` |
[
{
"addon_name": "coredns",
"addon_version": "v1.10.1-eksbuild.2",
"resolve_conflicts": "OVERWRITE"
},
{
"addon_name": "kube-proxy",
"addon_version": "v1.27.3-eksbuild.2",
"resolve_conflicts": "OVERWRITE"
},
{
"addon_name": "vpc-cni",
"addon_version": "v1.13.4-eksbuild.1",
"resolve_conflicts": "OVERWRITE"
}
]
| no | | allowed\_cidr\_blocks | List of CIDR blocks to be allowed to connect to the EKS cluster. | `list(string)` | `[]` | no | | allowed\_security\_groups | List of Security Group IDs to be allowed to connect to the EKS cluster. | `list(string)` | `[]` | no | | apply\_config\_map\_aws\_auth | Whether to generate local files from `kubeconfig` and `config_map_aws_auth` and perform `kubectl apply` to apply the ConfigMap to allow the worker nodes to join the EKS cluster. | `bool` | `true` | no | @@ -270,12 +270,15 @@ managed_node_group = { | create\_schedule | Determines whether to create autoscaling group schedule or not | `bool` | `true` | no | | eks\_additional\_security\_group\_ids | EKS additional security group id | `list(string)` | `[]` | no | | enabled | Whether to create the resources. Set to `false` to prevent the module from creating any resources. | `bool` | `true` | no | -| enabled\_cluster\_log\_types | A list of the desired control plane logging to enable. For more information, see https://docs.aws.amazon.com/en_us/eks/latest/userguide/control-plane-logs.html. Possible values [`api`, `audit`, `authenticator`, `controllerManager`, `scheduler`]. | `list(string)` | `[]` | no | -| endpoint\_private\_access | Indicates whether or not the Amazon EKS private API server endpoint is enabled. Default to AWS EKS resource and it is false. | `bool` | `false` | no | +| enabled\_cluster\_log\_types | A list of the desired control plane logging to enable. For more information, see https://docs.aws.amazon.com/en_us/eks/latest/userguide/control-plane-logs.html. Possible values [`api`, `audit`, `authenticator`, `controllerManager`, `scheduler`]. | `list(string)` |
[
"api",
"audit",
"authenticator",
"controllerManager",
"scheduler"
]
| no | +| endpoint\_private\_access | Indicates whether or not the Amazon EKS private API server endpoint is enabled. Default to AWS EKS resource and it is false. | `bool` | `true` | no | | endpoint\_public\_access | Indicates whether or not the Amazon EKS public API server endpoint is enabled. Default to AWS EKS resource and it is true. | `bool` | `true` | no | | environment | Environment (e.g. `prod`, `dev`, `staging`). | `string` | `""` | no | +| fargate\_enabled | Whether fargate profile is enabled or not | `bool` | `false` | no | +| fargate\_profiles | The number of Fargate Profiles that would be created. | `map(any)` | `{}` | no | +| iam\_role\_additional\_policies | Additional policies to be added to the IAM role | `map(string)` | `{}` | no | | kubernetes\_version | Desired Kubernetes master version. If you do not specify a value, the latest available version is used. | `string` | `""` | no | -| label\_order | Label order, e.g. `name`,`application`. | `list(any)` | `[]` | no | +| label\_order | Label order, e.g. `name`,`application`. | `list(any)` |
[
"name",
"environment"
]
| no | | local\_exec\_interpreter | shell to use for local\_exec | `list(string)` |
[
"/bin/sh",
"-c"
]
| no | | managed\_node\_group | Map of eks-managed node group definitions to create | `any` | `{}` | no | | managed\_node\_group\_defaults | Map of eks-managed node group definitions to create | `any` | `{}` | no | @@ -285,7 +288,7 @@ managed_node_group = { | map\_additional\_iam\_users | Additional IAM users to add to `config-map-aws-auth` ConfigMap |
list(object({
userarn = string
username = string
groups = list(string)
}))
| `[]` | no | | name | Name (e.g. `app` or `cluster`). | `string` | `""` | no | | nodes\_additional\_security\_group\_ids | EKS additional node group ids | `list(string)` | `[]` | no | -| oidc\_provider\_enabled | Create an IAM OIDC identity provider for the cluster, then you can create IAM roles to associate with a service account in the cluster, instead of using kiam or kube2iam. For more information, see https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html | `bool` | `false` | no | +| oidc\_provider\_enabled | Create an IAM OIDC identity provider for the cluster, then you can create IAM roles to associate with a service account in the cluster, instead of using kiam or kube2iam. For more information, see https://docs.aws.amazon.com/eks/latest/userguide/enable-iam-roles-for-service-accounts.html | `bool` | `true` | no | | openid\_connect\_audiences | List of OpenID Connect audience client IDs to add to the IRSA provider | `list(string)` | `[]` | no | | outpost\_config | Configuration for the AWS Outpost to provision the cluster on | `any` | `{}` | no | | permissions\_boundary | If provided, all IAM roles will be created with this permissions boundary attached. | `string` | `null` | no |