Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updated the example for the private eks cluster with additional details and individual stacks for vpc, eks cluster and add-ons #388

Merged
merged 166 commits into from
Jun 28, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
166 commits
Select commit Hold shift + click to select a range
7dd7990
Updates to the fully private eks cluster example
Apr 5, 2022
ad1f3dd
Updates based on code review comments
Apr 13, 2022
d4d99c3
Updated main README.MD
Apr 13, 2022
f2c5253
README updates
Apr 13, 2022
b6dc3e0
Fetching latest updates from upstream repo
Apr 21, 2022
067cb20
Adding updated README.MD
Apr 21, 2022
6f0edea
Updated example based on upstream updates
Apr 21, 2022
3e0e314
Updated docs
Apr 21, 2022
ef790b4
Updated region for local testing
Apr 21, 2022
91100af
Revert "Updated region for local testing"
Apr 21, 2022
b832d39
Updated tenant var for local testing
Apr 21, 2022
a72fac9
Update docs and var
Apr 21, 2022
7ce7089
Updated instructions
Apr 21, 2022
81db07b
Updated tf state to be remote
Apr 25, 2022
c7fb638
Adding auto.tfvars to aid remote backend
Apr 25, 2022
52462ff
Update locals var to fix TF cloud plan error
Apr 26, 2022
a5bf3ab
Revert "Update locals var to fix TF cloud plan error"
Apr 26, 2022
0d7c73e
Updated vpc remote state var
Apr 26, 2022
f9ab53f
Remove cloud block.
Apr 26, 2022
6c5dd1b
Update var in auto.tfvars
Apr 26, 2022
a5d826f
Added default value to region var
Apr 26, 2022
b76e15c
Testing external-dns with TF Cloud
Apr 27, 2022
49ee7b9
Updated tenant
Apr 28, 2022
d1c98df
Added region var
Apr 28, 2022
3987001
Updated region var
Apr 28, 2022
da446f9
Updated to use a static region for aws provider
Apr 28, 2022
f64fd6d
Revert static region update
Apr 28, 2022
2aecd16
TEsting with a static aws region
Apr 28, 2022
e5a691a
Remove the alias for region
Apr 28, 2022
0aa2011
Revert region updates
Apr 28, 2022
442f154
Formatted code
Apr 28, 2022
114ffc4
Updated cluster name
Apr 28, 2022
8147fcd
Updated stage var to be unique
Apr 28, 2022
bd1083c
Cleanup
Apr 28, 2022
07c4fd4
Fixed acm cert domain
Apr 28, 2022
900bdb7
Adding additional addons
May 2, 2022
b70d2e5
Adding sample nginx config
May 9, 2022
e468216
README updated with instructions for Terraform Cloud
May 9, 2022
9daf319
rebase with main
May 9, 2022
f2f935b
Cleanup
May 9, 2022
47c7382
Updates to run the private eks cluster from bastion
May 9, 2022
ddb3296
Updated EKS version
May 9, 2022
cb34a34
Updated VPC stack
May 9, 2022
20651c1
Updated VPC stack with TF Cloud
May 9, 2022
a3c22cd
Updated stack for TF Cloud
May 9, 2022
3ff1686
Updates to read vpc id and subnet ids from vars
May 9, 2022
fe36a28
Updated vars
May 9, 2022
a015294
Updated addons
May 9, 2022
49f80bc
Updated terraform cloud provider for state
May 9, 2022
be60b82
bug fixes
May 10, 2022
d6b2776
Updated CSI driver add-on config
May 10, 2022
f8ff102
Disable EBS driver
May 10, 2022
4a84824
Remove nginx
May 10, 2022
59dc9d3
disable external dns
May 10, 2022
f62b587
cleanup
May 10, 2022
32b1dc6
Updates to the VPC stack
May 10, 2022
3268262
Updated public and private VPC config
May 10, 2022
e35b023
Updated region
May 10, 2022
77bd7b8
Updated all stacks for us-east-1
May 10, 2022
2f3063e
Updated cluster name
May 10, 2022
12e3cd0
Updated cluster name
May 10, 2022
7d43cc3
Updated eks cluster domain
May 10, 2022
531ddc3
Updated cert domain
May 10, 2022
6fc301b
Cleanup
May 10, 2022
7b98fa1
Adding other add-ons
May 10, 2022
3fb876a
Updated stacks for prometheus related updates
May 10, 2022
2eb71ac
Fixed typo
May 10, 2022
00787d6
Updated base.tfvars with prometheus endpoint
May 10, 2022
14db282
Updated CSI driver version
May 10, 2022
8178240
Updated CNI version
May 10, 2022
1d59232
Updated EKS stack with Bottle rocket details
May 10, 2022
bfa7aa0
Added tags
May 10, 2022
7258ae6
Enable LB controller
May 11, 2022
69ea284
Updates to add-ons for testing fixes
May 11, 2022
d170797
Disable argocd workloads
May 11, 2022
84d6636
Disable AMP to test
May 11, 2022
e2b437e
Revert earlier commit and test AMP
May 11, 2022
e2686df
disable AMP
May 11, 2022
a287413
disable prometheus and lb controller
May 11, 2022
2b4e323
Testing external dns issue
May 12, 2022
8021cda
Enable external_dns
May 12, 2022
d7e8f2b
Switched to the original repo for addons
May 12, 2022
c080268
Disable add-ons
May 12, 2022
d853c73
Revert "Disable add-ons"
May 12, 2022
0f73ec4
Rolling back addons
May 12, 2022
8ad286f
Disable external-dns
May 12, 2022
44d121c
Updating addon repo config
May 12, 2022
d8f8b4a
Updating addon repo config
May 12, 2022
b667906
enable externaldns
May 12, 2022
7373eed
disable nginx and external_dns
May 12, 2022
b972904
Updated eks cluster domain
May 12, 2022
c07e1a9
Rebase
May 13, 2022
fb1b147
fmt
May 13, 2022
1531e1d
Test removing CSI driver
May 13, 2022
5782327
Restore addons
May 13, 2022
f5bfdf8
rebased
May 13, 2022
fe38ef3
Updated README
May 13, 2022
859fe78
Switching to 1.21
May 13, 2022
c123109
Disable AMP
May 13, 2022
7c2ef7b
Revert "Disable AMP"
May 13, 2022
fe30fc0
rebase
May 27, 2022
c3cfd73
rebase
May 27, 2022
00be50f
Temp disable AMP
May 27, 2022
1748c15
Enable KEDA
May 27, 2022
58a6a82
Update EKS version nodegroups and managed addon
May 31, 2022
f4bbc1e
Remove unused var
May 31, 2022
940033b
Merge remote-tracking branch 'upstream/main' into khurpas-useast1
May 31, 2022
d5f2d8b
Fixes to get cluster name
May 31, 2022
11916de
Testing external dns
May 31, 2022
15e2f03
Updated acm_cert var
May 31, 2022
ded5a49
Updated cluster name
May 31, 2022
60cab81
Add Keda
May 31, 2022
87e35ce
Updated EKS version
Jun 1, 2022
099136c
multitenancy stack updates
Jun 2, 2022
1c2e457
rebase
Jun 4, 2022
343dc0b
Rebased from origin
Jun 4, 2022
785d77b
Updated region
Jun 4, 2022
dc548e3
Updated the eks stack.
Jun 4, 2022
97161c2
Fixed module name
Jun 4, 2022
e380d2e
Fixed errors
Jun 4, 2022
6d2e718
cleanup
Jun 4, 2022
28f1ae5
Updated private vpc subnet CIDR block range
Jun 4, 2022
0c744f2
cleanup
Jun 4, 2022
e5ee4f7
Updates
Jun 4, 2022
59946ea
cleanup
Jun 4, 2022
531d4e8
Updates
Jun 4, 2022
878169d
updates
Jun 4, 2022
b97b717
disable argocd
Jun 4, 2022
f7e3fad
updates
Jun 4, 2022
5a142c9
updates
Jun 4, 2022
b11548f
Cleanup
Jun 5, 2022
a7b7c99
Rebase from main repo
Jun 5, 2022
33683d0
Rebase and cleanup
Jun 5, 2022
6e6a10c
Updated README.MD
Jun 5, 2022
a5ad24b
Updates to provision the VPC, peer, Cloud9 instance
Jun 14, 2022
3904a67
Updated base.tfvars for the eks stack
Jun 14, 2022
4ee3107
Updated TF Cloud workspace details
Jun 14, 2022
83cba93
Updated docs
Jun 14, 2022
00b4da5
Updated docs
Jun 15, 2022
fe9dd12
Adding the add-ons module
Jun 15, 2022
fbd2a6b
Updates to add-ons
Jun 15, 2022
b4f04cf
Doc updates
Jun 15, 2022
14ee9d3
Disable VPC CNI as it is getting stuck in creating state
Jun 15, 2022
f292bc6
Updates to create an IAM instance profile for the Cloud9 instance
Jun 15, 2022
56d8a8a
Cleanup
Jun 15, 2022
40f2d26
Cleanup
Jun 15, 2022
678845e
Updated the IAM vars with empty default values
Jun 15, 2022
cff2a4d
Enable VPC CNI managed add-on
Jun 15, 2022
b08dc5d
Updated IRSA condition to include aud:sts.amazonaws.com
Jun 16, 2022
8cf867c
bug fix IRSA
Jun 16, 2022
c22188f
Updated IRSA module for missing condition
Jun 16, 2022
d26f626
Updates to get latest version of addons
Jun 16, 2022
9c22f58
Precommit updates
Jun 17, 2022
5d82c85
Doc updates
Jun 17, 2022
6991cd7
Updates to the OIDC provider for the addons module
Jun 17, 2022
03ea0f8
TF Format
Jun 17, 2022
c6095f8
Removed TF Cloud State management config
Jun 17, 2022
32129ef
Create base.auto.tfvars
satveerkhurpa Jun 22, 2022
89f356e
Updated VPC names
satveerkhurpa Jun 22, 2022
9223b05
Delete base.auto.tfvars
satveerkhurpa Jun 22, 2022
bc7d0fb
Cleanup
Jun 22, 2022
8f37c38
Merge branch 'main' of https://github.com/satveerkhurpa/aws-eks-accel…
Jun 22, 2022
9fa12fd
Rebase from upstream
Jun 24, 2022
4a52e66
Terraform fmt
Jun 24, 2022
6cbfa16
Merge remote-tracking branch 'upstream/main'
Jun 28, 2022
e870d1f
Updates based on PR comments
Jun 28, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
138 changes: 22 additions & 116 deletions examples/fully-private-eks-cluster/README.md
Original file line number Diff line number Diff line change
@@ -1,139 +1,45 @@
# Fully Private EKS Cluster with VPC and Endpoints deployment
# Fully Private EKS Cluster with VPC and VPC Endpoints deployment

This example deploys a fully private EKS Cluster into a new VPC.
- Creates a new VPC and 3 Private Subnets
- VPC Endpoints for various services and S3 VPC Endpoint gateway
- Creates EKS Cluster Control plane with one Managed node group
- EKS Cluster API endpoint that can be set to public and private, and then into private only.
- Creates EKS Cluster Control plane with a private endpoint and with one Managed node group

Please see this [document](https://docs.aws.amazon.com/eks/latest/userguide/private-clusters.html) for more details on configuring fully private EKS Clusters

## How to Deploy
### Prerequisites:
Ensure that you have installed the following tools in your Mac or Windows Laptop before start working with this module and run Terraform Plan and Apply
1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
3. [Kubectl](https://Kubernetes.io/docs/tasks/tools/)
4. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli)

### Deployment Steps
#### Step1: Clone the repo using the command below

```shell script
git clone https://github.com/aws-samples/aws-eks-accelerator-for-terraform.git
```

#### Step2: Run Terraform INIT
Initialize a working directory with configuration files

```shell script
cd examples/fully-private-eks-cluster/
terraform init
```

#### Step3: Run Terraform PLAN
Verify the resources created by this execution

```shell script
export AWS_REGION=<ENTER YOUR REGION> # Select your own region
terraform plan
```

#### Step4: Terraform APPLY
to create resources

```shell script
terraform apply
```

Enter `yes` to apply

### Configure `kubectl` and test cluster
EKS Cluster details can be extracted from terraform output or from AWS Console to get the name of cluster.
This following command used to update the `kubeconfig` in your local machine where you run kubectl commands to interact with your EKS Cluster.

#### Step5: Run `update-kubeconfig` command
Here is the high level design of the solution. The solution has been split into 3 different TerraForm stacks for simplicity.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Terraform

1. VPC
2. EKS
3. ADD-ONS

`~/.kube/config` file gets updated with cluster details and certificate from the below command
![High Level Design](./images/EKS_private_cluster.jpg)

$ aws eks --region <enter-your-region> update-kubeconfig --name <cluster-name>

#### Step6: List all the worker nodes by running the command below

$ kubectl get nodes

#### Step7: List all the pods running in `kube-system` namespace

$ kubectl get pods -n kube-system

### Setting up private only API endpoint and accessing the cluster

- To set the API endpoint to private only, on the `main.tf` file under the SSP module:
- Set `eks_cluster_api_endpoint_public = false`
- Set `eks_cluster_api_endpoint_private = true`

- To access the private cluster, you need to access it from a machine that can access the VPC and the private subnets. Few ways to do this are:
- Create a bastion host in the VPC and then access the cluster from the bastion host
- Create a cloud9 instance in the VPC and then access the cluster from the cloud9 instance
These examples assume you do not have any other network infrastructure in place (e.g. direct connect(DX), VPN etc.).

Learn more about private EKS clusters [here](https://docs.aws.amazon.com/eks/latest/userguide/private-clusters.html)

## How to Destroy
The following command destroys the resources created by `terraform apply`

```shell script
cd examples/fully-private-eks-cluster
terraform destroy --auto-approve
```
## How to Deploy
### Prerequisites:

<!--- BEGIN_TF_DOCS --->
## Requirements

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.66.0 |
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | >= 2.4.1 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.6.1 |
### Environment Set up.

## Providers
Pre-requisites
1. This examples assumes that you have a default VPC in your AWS account.
2. An EC2 instance running in the default VPC that is running Jekins OR having the pre-requisite tools mentioned below. For simplicity this EC2 instance is running in the public VPC.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.66.0 |
2.1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)

## Modules
2.2. [Kubectl](https://Kubernetes.io/docs/tasks/tools/)

| Name | Source | Version |
|------|--------|---------|
| <a name="module_aws-eks-accelerator-for-terraform"></a> [aws-eks-accelerator-for-terraform](#module\_aws-eks-accelerator-for-terraform) | ../.. | n/a |
| <a name="module_aws_vpc"></a> [aws\_vpc](#module\_aws\_vpc) | terraform-aws-modules/vpc/aws | v3.2.0 |
| <a name="module_vpc_endpoint_gateway"></a> [vpc\_endpoint\_gateway](#module\_vpc\_endpoint\_gateway) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | v3.2.0 |
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | v3.2.0 |
2.3. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli)

## Resources
3. You can SSH into the EC2 instance to run Terraform commands OR access the Jenkins server running on this EC2 instance. Please note that setting up Jenkins on the EC2 instance is out of scope from this example.
4. Deploy the individual stacks from each of the sub folders. i.e.

| Name | Type |
|------|------|
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source |
| [aws_eks_cluster.cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster) | data source |
| [aws_eks_cluster_auth.cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster_auth) | data source |
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
| [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source |
4.1 VPC

## Inputs
4.2 EKS

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_cluster_version"></a> [cluster\_version](#input\_cluster\_version) | Kubernetes Version | `string` | `"1.21"` | no |
| <a name="input_environment"></a> [environment](#input\_environment) | Environment area, e.g. prod or preprod | `string` | `"preprod"` | no |
| <a name="input_tenant"></a> [tenant](#input\_tenant) | Account Name or unique account unique id e.g., apps or management or aws007 | `string` | `"aws001"` | no |
| <a name="input_zone"></a> [zone](#input\_zone) | zone, e.g. dev or qa or load or ops etc... | `string` | `"dev"` | no |
4.3 Add-ons

## Outputs

| Name | Description |
|------|-------------|
| <a name="output_configure_kubectl"></a> [configure\_kubectl](#output\_configure\_kubectl) | Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig |
Please refer to the README.MD in the individual sub folders for the deployment instructions.

<!--- END_TF_DOCS --->
116 changes: 116 additions & 0 deletions examples/fully-private-eks-cluster/add-ons/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,116 @@
## How to deploy the example

This example deploys the following :
- Install ArgoCD as the GitOps tool
- Deploys some add-ons using ArgoCD
- Deploys a sample application using ArgoCD


### Prerequisites:
We will deploy the EKS cluster from the bastion host/Jenkins server that is running on the default VPC.
Ensure that you have installed the following tools in the bastion host/Jenkins server before start working with this module and run Terraform Plan and Apply
1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
3. [Kubectl](https://Kubernetes.io/docs/tasks/tools/)
4. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli)

### Deployment Steps
#### Step1: Clone the repo using the command below

```shell script
git clone https://github.com/aws-samples/aws-eks-accelerator-for-terraform.git
```

#### Step2: Run Terraform INIT
Initialize a working directory with configuration files

```shell script
cd examples/fully-private-eks-cluster/add-ons
terraform init -backend-config backend.conf
```

#### Step3: Run Terraform PLAN
Verify the resources created by this execution

```shell script
export AWS_REGION=<ENTER YOUR REGION> # Select your own region
terraform plan -var-file base.tfvars
```

#### Step4: Terraform APPLY
to create resources

```shell script
terraform apply -var-file base.tfvars
```

Enter `yes` to apply

## Verify the add-ons are deployed.
Pre-requisite : kubectl installed on the bastion host/Jenkins Server.

$ kubectl get pods -A

You can see a list of all the add-ons running as pods on the EKS cluster. This also includes argocd runnings in its own namespace.


## How to Destroy
The following command destroys the resources created by `terraform apply`

```shell script
cd examples/fully-private-eks-cluster/vpc
terraform destroy -var-file base.tfvars -auto-approve
```


<!--- BEGIN_TF_DOCS --->
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
SPDX-License-Identifier: MIT-0

Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the "Software"), to deal in the Software
without restriction, including without limitation the rights to use, copy, modify,
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
satveerkhurpa marked this conversation as resolved.
Show resolved Hide resolved

## Requirements

No requirements.

## Providers

No providers.

## Modules

| Name | Source | Version |
|------|--------|---------|
| <a name="module_eks-cluster-with-import-vpc"></a> [eks-cluster-with-import-vpc](#module\_eks-cluster-with-import-vpc) | ../../../examples/eks-cluster-with-import-vpc/eks | n/a |

## Resources

No resources.

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_environment"></a> [environment](#input\_environment) | Environment area, e.g. prod or preprod | `string` | n/a | yes |
| <a name="input_kubernetes_version"></a> [kubernetes\_version](#input\_kubernetes\_version) | Kubernetes Version | `string` | `"1.21"` | no |
| <a name="input_region"></a> [region](#input\_region) | AWS region | `string` | n/a | yes |
| <a name="input_tenant"></a> [tenant](#input\_tenant) | Account Name or unique account unique id e.g., apps or management or aws007 | `string` | n/a | yes |
| <a name="input_tf_state_vpc_s3_bucket"></a> [tf\_state\_vpc\_s3\_bucket](#input\_tf\_state\_vpc\_s3\_bucket) | Terraform state S3 Bucket Name | `string` | n/a | yes |
| <a name="input_tf_state_vpc_s3_key"></a> [tf\_state\_vpc\_s3\_key](#input\_tf\_state\_vpc\_s3\_key) | Terraform state S3 Key path | `string` | n/a | yes |
| <a name="input_zone"></a> [zone](#input\_zone) | zone, e.g. dev or qa or load or ops etc... | `string` | n/a | yes |

## Outputs

No outputs.

<!--- END_TF_DOCS --->
3 changes: 3 additions & 0 deletions examples/fully-private-eks-cluster/add-ons/backend.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
bucket = "terraform-ssp-github-actions-state"
region = "us-west-2"
key = "private/addons/terraform-main.tfstate"
satveerkhurpa marked this conversation as resolved.
Show resolved Hide resolved
2 changes: 2 additions & 0 deletions examples/fully-private-eks-cluster/add-ons/base.tfvars
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
region = "us-west-2"
satveerkhurpa marked this conversation as resolved.
Show resolved Hide resolved
eks_cluster_id = "aws001-preprod-test-eks"
satveerkhurpa marked this conversation as resolved.
Show resolved Hide resolved
27 changes: 27 additions & 0 deletions examples/fully-private-eks-cluster/add-ons/data.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: MIT-0
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of this
* software and associated documentation files (the "Software"), to deal in the Software
* without restriction, including without limitation the rights to use, copy, modify,
* merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
* INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
* PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
satveerkhurpa marked this conversation as resolved.
Show resolved Hide resolved

data "aws_availability_zones" "available" {}

data "aws_eks_cluster" "cluster" {
name = var.eks_cluster_id
}

data "aws_eks_cluster_auth" "cluster" {
name = var.eks_cluster_id
}
Loading