-
Notifications
You must be signed in to change notification settings - Fork 24
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* [CLD-7969]Initial commit for eks-customer module * [CLD-7969]change source reference * [CLD-7969]refactoring eks customer module * [CLD-7969]wip: deploy utility * CLD-7696: add utilities module * [CLD-7696]Initial commit for eks-customer module * [CLD-7696]remove unused line * [CLd-7697]Adding utillites scripts * [CLd-7697]Unify utilities in a single module to handle destroy order * [CLD-7696]Add destroy functions * [CLD-7696]Ignore terraform-lock * [CLD-7696]Fix lint * [CLD-7696]Remove argocd-utility module * [CLD-7696]Remove argocd-utility module * [CLD-7696]Add wait function to prevent git conflict * [CLD-7696]update readme * [CLD-7696]Fix dependencies * [CLD-7696]Fix data dependency * [CLD-7696]Fix EOL * [CLD-7696]remove old block * [CLD-7696]fix lint * [CLD-7696]update readme * [CLD-7696]use module outout instead of variable for cluster name * [CLD-7696]Add provisioner role for cluster access * [CLD-7696]adding random id for cluster name * [CLD-7696]use module outout instead of variable for cluster name * [CLD-7696]check if gitops repo exists; get repo latest changes * [CLD-7696]change tf version to match with atlantis * [CLD-7696]add git host keys to know_hosts * [CLD-7696]fix git_host var when destroy * [CLD-7696]fix git_host var * [CLD-7696]add timeout to sshkeyscan * [CLD-7696]change git clone method * [CLD-7696]fix triggers var names * [CLD-7696]config git user and email * [CLD-7696]Fix sed command to work with gnu * [CLD-7696]Fix remove-utilities triggers * [CLD-7696]prevent mkdir cmd return error * [CLD-7696]fix git variables validation * [CLD-7696]remove sshkey-scane * [CLD-7696]check utility healthy in argocd * [CLD-7696]remove variable argocd token * [CLD-7696]update docs * [CLD-7696]deploy utility 1 by 1 * [CLD-7696]fix utility deploy order * [CLD-7696]fix utility app name * [CLD-7696]consider Degraded status as healthy for the utilities script * [CLD-7696]Fix timeouts * [CLD-7696]Remove unused blocks * [CLD-7696]Update readme * [CLD-7696]Add example folder * [CLD-7696]Update readme * [CLD-7696]Make hardcoded values as variables * [CLD-7696]Fix git url variable name * [CLD-7696]Fix hardcoded envrionments * [CLD-7696]Remove unused provider * [CLD-7696]Minor improvements to bash scripts * [CLD-7696]Fix modules variables * [CLD-7696]Remove duplicated variable * [CLD-7696]Fix sed cmd * [CLD-7696]Fix example
- Loading branch information
Showing
26 changed files
with
1,694 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,6 @@ | ||
# Local .terraform directories | ||
**/.terraform/* | ||
.terraform* | ||
|
||
# .tfstate files | ||
*.tfstate | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,125 @@ | ||
<!-- BEGIN_TF_DOCS --> | ||
## Requirements | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.6 | | ||
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.41.0 | | ||
| <a name="requirement_local"></a> [local](#requirement\_local) | >= 2.5.1 | | ||
| <a name="requirement_null"></a> [null](#requirement\_null) | >= 3.2.2 | | ||
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 3.6.2 | | ||
| <a name="requirement_time"></a> [time](#requirement\_time) | >= 0.12.0 | | ||
|
||
## Providers | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.41.0 | | ||
| <a name="provider_local"></a> [local](#provider\_local) | >= 2.5.1 | | ||
| <a name="provider_null"></a> [null](#provider\_null) | >= 3.2.2 | | ||
| <a name="provider_random"></a> [random](#provider\_random) | >= 3.6.2 | | ||
| <a name="provider_time"></a> [time](#provider\_time) | >= 0.12.0 | | ||
|
||
## Modules | ||
|
||
| Name | Source | Version | | ||
|------|--------|---------| | ||
| <a name="module_eks"></a> [eks](#module\_eks) | terraform-aws-modules/eks/aws | 20.14.0 | | ||
| <a name="module_irsa"></a> [irsa](#module\_irsa) | terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks | 5.44.0 | | ||
| <a name="module_managed_node_group"></a> [managed\_node\_group](#module\_managed\_node\_group) | terraform-aws-modules/eks/aws//modules/eks-managed-node-group | 20.20.0 | | ||
|
||
## Resources | ||
|
||
| Name | Type | | ||
|------|------| | ||
| [aws_ec2_tag.subnet](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ec2_tag) | resource | | ||
| [aws_ec2_tag.vpc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ec2_tag) | resource | | ||
| [aws_eks_addon.coredns](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource | | ||
| [aws_eks_addon.ebs_csi_driver](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource | | ||
| [aws_eks_addon.kube_proxy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource | | ||
| [aws_eks_addon.snapshot-controller](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource | | ||
| [aws_iam_policy.bifrost](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | | ||
| [aws_iam_policy.velero](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource | | ||
| [aws_route53_record.internal](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | resource | | ||
| [aws_secretsmanager_secret.kubeconfig_secret](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/secretsmanager_secret) | resource | | ||
| [aws_secretsmanager_secret_version.kubeconfig_secret_version](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/secretsmanager_secret_version) | resource | | ||
| [local_file.kubeconfig](https://registry.terraform.io/providers/hashicorp/local/latest/docs/resources/file) | resource | | ||
| [null_resource.bifrost_annotate_sa](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.bifrost_config](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.calico_operator_configuration](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.delete_aws_node](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.deploy-utilites](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.install_calico_operator](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [null_resource.remove-utilities](https://registry.terraform.io/providers/hashicorp/null/latest/docs/resources/resource) | resource | | ||
| [random_id.cluster](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/id) | resource | | ||
| [time_sleep.wait_for_cluster](https://registry.terraform.io/providers/hashicorp/time/latest/docs/resources/sleep) | resource | | ||
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source | | ||
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source | | ||
| [aws_lb.internal](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/lb) | data source | | ||
| [aws_route53_zone.internal](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/route53_zone) | data source | | ||
| [aws_security_groups.calls](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_groups) | data source | | ||
| [aws_security_groups.control-plane](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_groups) | data source | | ||
| [aws_security_groups.nodes](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_groups) | data source | | ||
| [aws_subnets.private](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets) | data source | | ||
| [aws_subnets.private-a](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets) | data source | | ||
| [aws_subnets.public](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets) | data source | | ||
|
||
## Inputs | ||
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|------|---------|:--------:| | ||
| <a name="input_allow_list_cidr_range"></a> [allow\_list\_cidr\_range](#input\_allow\_list\_cidr\_range) | The list of CIDRs to allow communication with the private ingress. | `string` | n/a | yes | | ||
| <a name="input_argocd_role_arn"></a> [argocd\_role\_arn](#input\_argocd\_role\_arn) | The argocd role arn | `string` | n/a | yes | | ||
| <a name="input_argocd_server"></a> [argocd\_server](#input\_argocd\_server) | The argocd server | `string` | n/a | yes | | ||
| <a name="input_attach_cluster_encryption_policy"></a> [attach\_cluster\_encryption\_policy](#input\_attach\_cluster\_encryption\_policy) | Indicates whether or not to attach an additional policy for the cluster IAM role to utilize the encryption key provided | `bool` | `false` | no | | ||
| <a name="input_calico_operator_version"></a> [calico\_operator\_version](#input\_calico\_operator\_version) | The version of the Calico operator | `string` | n/a | yes | | ||
| <a name="input_cloud_provisioning_node_policy_arn"></a> [cloud\_provisioning\_node\_policy\_arn](#input\_cloud\_provisioning\_node\_policy\_arn) | The cloud provisioning node policy arn | `string` | n/a | yes | | ||
| <a name="input_cluster_enabled_log_types"></a> [cluster\_enabled\_log\_types](#input\_cluster\_enabled\_log\_types) | The list of log types to enable | `list(string)` | n/a | yes | | ||
| <a name="input_cluster_encryption_config"></a> [cluster\_encryption\_config](#input\_cluster\_encryption\_config) | Configuration block with encryption configuration for the cluster. To disable secret encryption, set this value to `{}` | `any` | `{}` | no | | ||
| <a name="input_cluster_endpoint_private_access"></a> [cluster\_endpoint\_private\_access](#input\_cluster\_endpoint\_private\_access) | Indicates whether or not the Amazon EKS private API server endpoint is enabled | `bool` | n/a | yes | | ||
| <a name="input_cluster_endpoint_public_access"></a> [cluster\_endpoint\_public\_access](#input\_cluster\_endpoint\_public\_access) | Indicates whether or not the Amazon EKS public API server endpoint is enabled | `bool` | n/a | yes | | ||
| <a name="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name) | The cluster name | `string` | n/a | yes | | ||
| <a name="input_cluster_security_group_additional_rules"></a> [cluster\_security\_group\_additional\_rules](#input\_cluster\_security\_group\_additional\_rules) | The list of additional security group rules for the EKS cluster | <pre>map(object({<br> from_port = number<br> to_port = number<br> protocol = string<br> cidr_blocks = list(string)<br> type = string<br> }))</pre> | n/a | yes | | ||
| <a name="input_cluster_tags"></a> [cluster\_tags](#input\_cluster\_tags) | A map of tags to add to all resources | `map(string)` | `{}` | no | | ||
| <a name="input_cluster_version"></a> [cluster\_version](#input\_cluster\_version) | The Kubernetes version for the EKS cluster | `string` | n/a | yes | | ||
| <a name="input_coredns_version"></a> [coredns\_version](#input\_coredns\_version) | The version of the CoreDNS addon | `string` | n/a | yes | | ||
| <a name="input_create_cluster_security_group"></a> [create\_cluster\_security\_group](#input\_create\_cluster\_security\_group) | Indicates whether or not to create a security group for the EKS cluster | `bool` | `true` | no | | ||
| <a name="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role) | Determines whether an IAM role is created or to use an existing IAM role | `bool` | `true` | no | | ||
| <a name="input_create_kms_key"></a> [create\_kms\_key](#input\_create\_kms\_key) | Controls if a KMS key for cluster encryption should be created | `bool` | `false` | no | | ||
| <a name="input_create_node_security_group"></a> [create\_node\_security\_group](#input\_create\_node\_security\_group) | Indicates whether or not to create a security group for the EKS nodes | `bool` | `false` | no | | ||
| <a name="input_ebs_csi_driver_version"></a> [ebs\_csi\_driver\_version](#input\_ebs\_csi\_driver\_version) | The version of the EBS CSI driver addon | `string` | n/a | yes | | ||
| <a name="input_eks_cluster_admin_policy_arn"></a> [eks\_cluster\_admin\_policy\_arn](#input\_eks\_cluster\_admin\_policy\_arn) | The ARN of the AmazonEKSClusterAdminPolicy | `string` | `"arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"` | no | | ||
| <a name="input_environment"></a> [environment](#input\_environment) | The environment | `string` | n/a | yes | | ||
| <a name="input_gitops_repo_path"></a> [gitops\_repo\_path](#input\_gitops\_repo\_path) | The git repo url | `string` | n/a | yes | | ||
| <a name="input_gitops_repo_url"></a> [gitops\_repo\_url](#input\_gitops\_repo\_url) | The git repo url | `string` | n/a | yes | | ||
| <a name="input_gitops_repo_username"></a> [gitops\_repo\_username](#input\_gitops\_repo\_username) | The git repo username for executing git commands | `string` | n/a | yes | | ||
| <a name="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix) | Determines whether the IAM role name (`iam_role_name`) is used as a prefix | `bool` | `false` | no | | ||
| <a name="input_kube_proxy_version"></a> [kube\_proxy\_version](#input\_kube\_proxy\_version) | The version of the kube-proxy addon | `string` | n/a | yes | | ||
| <a name="input_launch_template_use_name_prefix"></a> [launch\_template\_use\_name\_prefix](#input\_launch\_template\_use\_name\_prefix) | Determines whether to use `launch_template_name` as is or create a unique name beginning with the `launch_template_name` as the prefix | `bool` | `false` | no | | ||
| <a name="input_lb_certificate_arn"></a> [lb\_certificate\_arn](#input\_lb\_certificate\_arn) | The certificate arn | `string` | n/a | yes | | ||
| <a name="input_lb_private_certificate_arn"></a> [lb\_private\_certificate\_arn](#input\_lb\_private\_certificate\_arn) | The private certificate arn | `string` | n/a | yes | | ||
| <a name="input_node_groups"></a> [node\_groups](#input\_node\_groups) | The list of node groups | `any` | `{}` | no | | ||
| <a name="input_private_domain"></a> [private\_domain](#input\_private\_domain) | The private domain | `string` | n/a | yes | | ||
| <a name="input_provisioner_role_arn"></a> [provisioner\_role\_arn](#input\_provisioner\_role\_arn) | The provisioner role arn | `string` | n/a | yes | | ||
| <a name="input_region"></a> [region](#input\_region) | The region for the EKS cluster | `string` | `"us-east-1"` | no | | ||
| <a name="input_snapshot_controller_version"></a> [snapshot\_controller\_version](#input\_snapshot\_controller\_version) | n/a | `string` | n/a | yes | | ||
| <a name="input_staff_role_arn"></a> [staff\_role\_arn](#input\_staff\_role\_arn) | The staff role arn | `string` | n/a | yes | | ||
| <a name="input_use_name_prefix"></a> [use\_name\_prefix](#input\_use\_name\_prefix) | Determines whether to use `name` as is or create a unique name beginning with the `name` as the prefix | `bool` | `false` | no | | ||
| <a name="input_utilities"></a> [utilities](#input\_utilities) | The list of utilities | <pre>list(object({<br> name = string<br> enable_irsa = bool<br> internal_dns = any<br> service_account = string<br> cluster_label_type = string<br> }))</pre> | n/a | yes | | ||
| <a name="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id) | The VPC ID for the EKS cluster | `string` | n/a | yes | | ||
| <a name="input_wait_for_cluster_timeout"></a> [wait\_for\_cluster\_timeout](#input\_wait\_for\_cluster\_timeout) | The timeout to wait for the EKS cluster to be ready | `string` | `"5m"` | no | | ||
|
||
## Outputs | ||
|
||
| Name | Description | | ||
|------|-------------| | ||
| <a name="output_cluster_arn"></a> [cluster\_arn](#output\_cluster\_arn) | n/a | | ||
| <a name="output_cluster_certificate_authority_data"></a> [cluster\_certificate\_authority\_data](#output\_cluster\_certificate\_authority\_data) | n/a | | ||
| <a name="output_cluster_endpoint"></a> [cluster\_endpoint](#output\_cluster\_endpoint) | n/a | | ||
| <a name="output_cluster_name"></a> [cluster\_name](#output\_cluster\_name) | n/a | | ||
| <a name="output_cluster_primary_security_group_id"></a> [cluster\_primary\_security\_group\_id](#output\_cluster\_primary\_security\_group\_id) | n/a | | ||
| <a name="output_cluster_service_cidr"></a> [cluster\_service\_cidr](#output\_cluster\_service\_cidr) | n/a | | ||
| <a name="output_cluster_version"></a> [cluster\_version](#output\_cluster\_version) | n/a | | ||
| <a name="output_node_security_group_id"></a> [node\_security\_group\_id](#output\_node\_security\_group\_id) | n/a | | ||
| <a name="output_private_subnet_ids"></a> [private\_subnet\_ids](#output\_private\_subnet\_ids) | n/a | | ||
<!-- END_TF_DOCS --> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
resource "null_resource" "delete_aws_node" { | ||
provisioner "local-exec" { | ||
command = "KUBECONFIG=${path.root}/kubeconfig-${module.eks.cluster_name} kubectl delete daemonset aws-node -n kube-system" | ||
} | ||
|
||
depends_on = [module.eks, time_sleep.wait_for_cluster, resource.local_file.kubeconfig] | ||
} | ||
|
||
resource "null_resource" "install_calico_operator" { | ||
provisioner "local-exec" { | ||
command = "KUBECONFIG=${path.root}/kubeconfig-${module.eks.cluster_name} kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/${var.calico_operator_version}/manifests/tigera-operator.yaml" | ||
} | ||
|
||
depends_on = [module.eks, time_sleep.wait_for_cluster, resource.local_file.kubeconfig] | ||
} | ||
|
||
resource "null_resource" "calico_operator_configuration" { | ||
provisioner "local-exec" { | ||
command = <<EOF | ||
KUBECONFIG=${path.root}/kubeconfig-${module.eks.cluster_name} kubectl apply -f ${path.module}/calico_config | ||
EOF | ||
} | ||
|
||
depends_on = [null_resource.install_calico_operator] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
kind: Installation | ||
apiVersion: operator.tigera.io/v1 | ||
metadata: | ||
name: default | ||
spec: | ||
kubernetesProvider: EKS | ||
cni: | ||
type: Calico | ||
calicoNetwork: | ||
bgp: Disabled |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
apiVersion: crd.projectcalico.org/v1 | ||
kind: FelixConfiguration | ||
metadata: | ||
name: default | ||
spec: | ||
interfacePrefix: eni |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,120 @@ | ||
data "aws_caller_identity" "current" {} | ||
|
||
data "aws_availability_zones" "available" {} | ||
|
||
data "aws_route53_zone" "internal" { | ||
name = "internal.${var.environment}.${var.private_domain}" | ||
private_zone = true | ||
} | ||
|
||
data "aws_subnets" "private" { | ||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "availability-zone" | ||
values = [for az in data.aws_availability_zones.available.names : az if az != "us-east-1e"] | ||
} | ||
|
||
tags = { | ||
SubnetType = "private" | ||
} | ||
} | ||
|
||
data "aws_subnets" "public" { | ||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "availability-zone" | ||
values = [for az in data.aws_availability_zones.available.names : az if az != "us-east-1e"] | ||
} | ||
|
||
tags = { | ||
SubnetType = "public" | ||
} | ||
} | ||
|
||
data "aws_subnets" "private-a" { | ||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "availability-zone" | ||
values = [for az in data.aws_availability_zones.available.names : az if az == "us-east-1a"] | ||
} | ||
|
||
tags = { | ||
SubnetType = "private" | ||
} | ||
} | ||
|
||
data "aws_security_groups" "nodes" { | ||
filter { | ||
name = "tag:Purpose" | ||
values = ["provisioning"] | ||
} | ||
|
||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "tag:NodeType" | ||
values = ["worker"] | ||
} | ||
} | ||
|
||
data "aws_security_groups" "calls" { | ||
filter { | ||
name = "tag:Purpose" | ||
values = ["provisioning"] | ||
} | ||
|
||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "tag:NodeType" | ||
values = ["calls"] | ||
} | ||
} | ||
|
||
data "aws_security_groups" "control-plane" { | ||
filter { | ||
name = "tag:Purpose" | ||
values = ["provisioning"] | ||
} | ||
|
||
filter { | ||
name = "vpc-id" | ||
values = [var.vpc_id] | ||
} | ||
|
||
filter { | ||
name = "tag:NodeType" | ||
values = ["master"] | ||
} | ||
} | ||
|
||
data "aws_lb" "internal" { | ||
tags = { | ||
"kubernetes.io/cluster/${module.eks.cluster_name}" = "owned" | ||
"kubernetes.io/service-name" = "nginx-internal/nginx-internal-ingress-nginx-controller" | ||
} | ||
|
||
timeouts { | ||
read = "20m" | ||
} | ||
|
||
depends_on = [null_resource.deploy-utilites] | ||
} |
Oops, something went wrong.