From 450b343a5dd69eda70af145243fa07629917c248 Mon Sep 17 00:00:00 2001 From: "Matthew C. Morgan" Date: Tue, 30 Jul 2024 15:27:21 -0400 Subject: [PATCH] increment version and add notes to changelog --- README.md | 241 ++------------------------------------------------- aws_data.tf | 6 +- outputs.tf | 8 -- variables.tf | 2 +- version.tf | 5 +- 5 files changed, 15 insertions(+), 247 deletions(-) diff --git a/README.md b/README.md index 4d3cf48..2f5aabd 100644 --- a/README.md +++ b/README.md @@ -13,10 +13,15 @@ coredns kube-proxy # CHANGELOG -- created content in the README - - -## Requirements +* 0.0.3 -- 2024-07-30 + - updated to use karpenter + - misc cleanup +* 0.0.2 -- 2024-07-22 + - updated version.tf to 0.0.2 + - add kube.config update after cluster create + - update ami_type to AL2023 + - update upstream cluster module to 20.20.0 + - created changelog | Name | Version | |------|---------| @@ -88,7 +93,6 @@ kube-proxy ## Outputs -<<<<<<< HEAD | Name | Description | |------|-------------| | [cloudwatch\_log\_group\_arn](#output\_cloudwatch\_log\_group\_arn) | Arn of cloudwatch log group created | @@ -133,230 +137,3 @@ kube-proxy | [vpc\_cni\_irsa\_role](#output\_vpc\_cni\_irsa\_role) | The arn/name/unique\_id of the irsa role for the vpc-cni addon | | [vpc\_id](#output\_vpc\_id) | The VPC id where the EKS cluster was deployed. | -======= -### Module information - -**module_name** - -Description: The name of this module. - - -**module_version** - -Description: The version of this module. - -### Networking information - -**vpc_id** - -Description: The VPC id where the EKS cluster was deployed. - - -**vpc_cidr_block** - -Description: The CIDR block associated with the VPC. - - -**subnets** - -Description: The subnets configured for the VPC. - - -**security_group_all_worker_mgmt_id** - -Description: The security group to manage all of the worker nodes. - - -**cluster_fqdn** - -Description: The `cluster_name`.`domain` - - -### IRSA Roles Created - -**vpc_cni_irsa_role** - -Description: The arn/name/unique_id of the irsa role for the vpc-cni addon - - -**ebs_csi_irsa_role** - -Description: The arn/name/unique_id of the irsa role for the ebs-csi-driver addon - - -**efs_csi_irsa_role** - -Description: The arn/name/unique_id of the irsa role for the efs-csi-driver addon - - -**cluster_iam_role** - -Description: The arn/name/unique_id of the iam role for the cluster - - -### Cluster information - -**cluster_arn** - -Description: The Amazon Resource Name (ARN) of the cluster - - -**cluster_certificate_authority_data** - -Description: Base64 encoded certificate data required to communicate with the cluster - - -**cluster_endpoint** - -Description: Endpoint for your Kubernetes API server - - -**cluster_id** - -Description: The ID of the EKS cluster. Note: currently a value is returned only for local EKS clusters created on Outposts - - -**cluster_name** - -Description: The name of the EKS cluster - - -**cluster_version** - -Description: The Kubernetes version for the cluster - - -**cluster_platform_version** - -Description: Platform version for the cluster - - -**cluster_status** - -Description: Status of the EKS cluster. One of `CREATING`, `ACTIVE`, `DELETING`, `FAILED` - - -### KMS Key - -**kms_key_arn** - -Description: The Amazon Resource Name (ARN) of the key - - -**kms_key_id** - -Description: The globally unique identifier for the key - - -**kms_key_policy** - -Description: The IAM resource policy set on the key - - -### Cluster Security Group - -**cluster_security_group_arn** - -Description: Amazon Resource Name (ARN) of the cluster security group - - -**cluster_security_group_id** - -Description: ID of the cluster security group - - -**cluster_primary_security_group_id** - -Description: Cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. Referred to as 'Cluster security group' in the EKS console - - -### Node Security Group - -**node_security_group_arn** - -Description: Amazon Resource Name (ARN) of the node shared security group - - -**node_security_group_id** - -Description: ID of the node shared security group - - -### IRSA - -**oidc_provider** - -Description: The OpenID Connect identity provider (issuer URL without leading `https://`) - - -**oidc_provider_arn** - -Description: The ARN of the OIDC Provider if `enable_irsa = true` - - -**cluster_oidc_issuer_url** - -Description: The URL on the EKS cluster for the OpenID Connect identity provider - - -**cluster_tls_certificate_sha1_fingerprint** - -Description: The SHA1 fingerprint of the public key of the cluster's certificate - - -### EKS Addons - -**cluster_addons** - -Description: Map of attribute maps for all EKS cluster addons enabled - - -### EKS Identity Provider - -**cluster_identity_providers** - -Description: Map of attribute maps for all EKS identity providers enabled - - -### Cloudwatch Log Group - -**cloudwatch_log_group_arn** - -Description: Arn of cloudwatch log group created - - -**cloudwatch_log_group_name** - -Description: Name of cloudwatch log group created - - -### Fargate profile - -**fargate_profiles** - -Description: Map of attribute maps for all EKS Fargate Profiles created - - -### EKS Managed Node Group - -**eks_managed_node_groups** - -Description: Map of attribute maps for all EKS managed node groups created - - -**eks_managed_node_groups_autoscaling_group_names** - -Description: List of the autoscaling group names created by EKS managed node groups - - -### Self Managed Node Group - -**self_managed_node_groups** - -Description: Map of attribute maps for all self managed node groups created - - -**self_managed_node_groups_autoscaling_group_names** - -Description: List of the autoscaling group names created by self-managed node groups ->>>>>>> 225179a (add changelog and update version) diff --git a/aws_data.tf b/aws_data.tf index d3f0127..7dead47 100644 --- a/aws_data.tf +++ b/aws_data.tf @@ -27,9 +27,9 @@ data "aws_subnets" "lb-subnets" { } locals { container_subnets_name = var.subnets_name - lb_subnets_name = "*-private-lb-*" - base_arn = format("arn:%v:%%v:%v:%v:%%v:%%v", data.aws_arn.current.partition, data.aws_region.current.name, data.aws_caller_identity.current.account_id) - iam_arn = format("arn:%v:iam::%v:%%v", data.aws_arn.current.partition, data.aws_caller_identity.current.account_id) + lb_subnets_name = var.lb_subnets_name + base_arn = format("arn:%v:%%v:%v:%v:%%v:%%v", data.aws_arn.current.partition, data.aws_region.current.name, data.aws_caller_identity.current.account_id) + iam_arn = format("arn:%v:iam::%v:%%v", data.aws_arn.current.partition, data.aws_caller_identity.current.account_id) common_arn = format("arn:%v:%%v:%v:%v:%%v", data.aws_arn.current.partition, data.aws_region.current.name, diff --git a/outputs.tf b/outputs.tf index dc00bff..d67e519 100644 --- a/outputs.tf +++ b/outputs.tf @@ -16,11 +16,6 @@ output "module_version" { value = local._module_version } -output "_module_providers" { - description = "The providers used in this module." - value = local._module_providers -} - ################################################################################ # Networking information ################################################################################ @@ -285,6 +280,3 @@ output "self_managed_node_groups_autoscaling_group_names" { # output "cluster_autoscaler_role_name" { # value = module.cluster_autoscaler_irsa_role.iam_role_name # } -output "node_group_name" { - value = local.ng_name -} diff --git a/variables.tf b/variables.tf index 34bb5d4..2481239 100644 --- a/variables.tf +++ b/variables.tf @@ -35,7 +35,7 @@ variable "subnets_name" { variable "lb_subnets_name" { description = "Define the name of the subnets to be used by this cluster" type = string - default = "*-container-*" + default = "*-private-lb-*" } variable "vpc_domain_name" { diff --git a/version.tf b/version.tf index 1223816..04110bc 100644 --- a/version.tf +++ b/version.tf @@ -1,5 +1,4 @@ locals { - _module_name = "tfmod-eks" - _module_version = "0.0.2" - _module_providers = [] + _module_name = "tfmod-eks" + _module_version = "0.0.3" }