Skip to content

infrable-io/infrable-infrastructure

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Infrable Infrastructure

MIT License Maintained by Infrable

Core AWS infrastructure for Infrable

Chicken and Egg Problem

Where does one store the Terraform state of the infrastructure for storing Terraform state? Answer: locally. Before using the Amazon S3 bucket and DynamoDB table created by this module to store its own state, you must first store state on the local filesystem. Thereafter, state can be stored using the S3 backend.

Terraform Module Documentation

Modules

Name Source Version
terraform_aws_eks git@github.com:infrable-io/terraform-aws-eks n/a
terraform_aws_s3_backend git@github.com:infrable-io/terraform-aws-s3-backend n/a

Resources

No resources.

Inputs

No inputs.

Outputs

Name Description
aws_auth_configmap_yaml Formatted YAML output of the aws-auth ConfigMap
cloudwatch_log_group_arn ARN of CloudWatch log group
cloudwatch_log_group_name Name of CloudWatch log group
cluster_addons Map of attribute maps for all enabled EKS cluster add-ons.

For a list of available Amazon EKS add-ons, see the following documentation:
* https://docs.aws.amazon.com/eks/latest/userguide/eks-add-ons.html
cluster_arn ARN of the EKS cluster
cluster_certificate_authority_data Base64-encoded certificate data required to communicate with your cluster
cluster_endpoint Endpoint for the Kubernetes API server
cluster_iam_role_arn ARN of the EKS cluster IAM role
cluster_iam_role_name EKS cluster IAM role.

This role is used by the Kubernetes cluster managed by Amazon EKS to make
calls to other AWS services on your behalf to manage the resources that you
use with the service.
cluster_iam_role_unique_id Stable and unique string identifying the IAM role
cluster_id Name of the cluster
cluster_identity_providers Map of attribute maps for all enabled EKS identity providers
cluster_oidc_issuer_url Issuer URL for the OpenID Connect identity provider
cluster_platform_version Platform version for the EKS cluster
cluster_security_group_arn ARN of the EKS cluster security group
cluster_security_group_id EKS cluster security group that is created by Amazon EKS for the cluster.

Managed node groups use this security group for control-plane-to-data-plane
communication.

This security group is referred to as the 'Cluster security group' in the
Amazon EKS console.
cluster_status Status of the EKS cluster. One of CREATING, ACTIVE, DELETING, FAILED
dynamodb_table The name of the DynamoDB table for storing Terraform state lock
eks_managed_node_groups Map of attribute maps for EKS managed node groups
oidc_provider_arn The ARN of the OIDC provider if enable_irsa = true
s3_bucket The name of the S3 bucket for storing Terraform state

About

Core AWS infrastructure for Infrable

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages