-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated the example for the private eks cluster with additional details and individual stacks for vpc, eks cluster and add-ons #388
Merged
Merged
Changes from 1 commit
Commits
Show all changes
166 commits
Select commit
Hold shift + click to select a range
7dd7990
Updates to the fully private eks cluster example
ad1f3dd
Updates based on code review comments
d4d99c3
Updated main README.MD
f2c5253
README updates
b6dc3e0
Fetching latest updates from upstream repo
067cb20
Adding updated README.MD
6f0edea
Updated example based on upstream updates
3e0e314
Updated docs
ef790b4
Updated region for local testing
91100af
Revert "Updated region for local testing"
b832d39
Updated tenant var for local testing
a72fac9
Update docs and var
7ce7089
Updated instructions
81db07b
Updated tf state to be remote
c7fb638
Adding auto.tfvars to aid remote backend
52462ff
Update locals var to fix TF cloud plan error
a5bf3ab
Revert "Update locals var to fix TF cloud plan error"
0d7c73e
Updated vpc remote state var
f9ab53f
Remove cloud block.
6c5dd1b
Update var in auto.tfvars
a5d826f
Added default value to region var
b76e15c
Testing external-dns with TF Cloud
49ee7b9
Updated tenant
d1c98df
Added region var
3987001
Updated region var
da446f9
Updated to use a static region for aws provider
f64fd6d
Revert static region update
2aecd16
TEsting with a static aws region
e5a691a
Remove the alias for region
0aa2011
Revert region updates
442f154
Formatted code
114ffc4
Updated cluster name
8147fcd
Updated stage var to be unique
bd1083c
Cleanup
07c4fd4
Fixed acm cert domain
900bdb7
Adding additional addons
b70d2e5
Adding sample nginx config
e468216
README updated with instructions for Terraform Cloud
9daf319
rebase with main
f2f935b
Cleanup
47c7382
Updates to run the private eks cluster from bastion
ddb3296
Updated EKS version
cb34a34
Updated VPC stack
20651c1
Updated VPC stack with TF Cloud
a3c22cd
Updated stack for TF Cloud
3ff1686
Updates to read vpc id and subnet ids from vars
fe36a28
Updated vars
a015294
Updated addons
49f80bc
Updated terraform cloud provider for state
be60b82
bug fixes
d6b2776
Updated CSI driver add-on config
f8ff102
Disable EBS driver
4a84824
Remove nginx
59dc9d3
disable external dns
f62b587
cleanup
32b1dc6
Updates to the VPC stack
3268262
Updated public and private VPC config
e35b023
Updated region
77bd7b8
Updated all stacks for us-east-1
2f3063e
Updated cluster name
12e3cd0
Updated cluster name
7d43cc3
Updated eks cluster domain
531ddc3
Updated cert domain
6fc301b
Cleanup
7b98fa1
Adding other add-ons
3fb876a
Updated stacks for prometheus related updates
2eb71ac
Fixed typo
00787d6
Updated base.tfvars with prometheus endpoint
14db282
Updated CSI driver version
8178240
Updated CNI version
1d59232
Updated EKS stack with Bottle rocket details
bfa7aa0
Added tags
7258ae6
Enable LB controller
69ea284
Updates to add-ons for testing fixes
d170797
Disable argocd workloads
84d6636
Disable AMP to test
e2b437e
Revert earlier commit and test AMP
e2686df
disable AMP
a287413
disable prometheus and lb controller
2b4e323
Testing external dns issue
8021cda
Enable external_dns
d7e8f2b
Switched to the original repo for addons
c080268
Disable add-ons
d853c73
Revert "Disable add-ons"
0f73ec4
Rolling back addons
8ad286f
Disable external-dns
44d121c
Updating addon repo config
d8f8b4a
Updating addon repo config
b667906
enable externaldns
7373eed
disable nginx and external_dns
b972904
Updated eks cluster domain
c07e1a9
Rebase
fb1b147
fmt
1531e1d
Test removing CSI driver
5782327
Restore addons
f5bfdf8
rebased
fe38ef3
Updated README
859fe78
Switching to 1.21
c123109
Disable AMP
7c2ef7b
Revert "Disable AMP"
fe30fc0
rebase
c3cfd73
rebase
00be50f
Temp disable AMP
1748c15
Enable KEDA
58a6a82
Update EKS version nodegroups and managed addon
f4bbc1e
Remove unused var
940033b
Merge remote-tracking branch 'upstream/main' into khurpas-useast1
d5f2d8b
Fixes to get cluster name
11916de
Testing external dns
15e2f03
Updated acm_cert var
ded5a49
Updated cluster name
60cab81
Add Keda
87e35ce
Updated EKS version
099136c
multitenancy stack updates
1c2e457
rebase
343dc0b
Rebased from origin
785d77b
Updated region
dc548e3
Updated the eks stack.
97161c2
Fixed module name
e380d2e
Fixed errors
6d2e718
cleanup
28f1ae5
Updated private vpc subnet CIDR block range
0c744f2
cleanup
e5ee4f7
Updates
59946ea
cleanup
531d4e8
Updates
878169d
updates
b97b717
disable argocd
f7e3fad
updates
5a142c9
updates
b11548f
Cleanup
a7b7c99
Rebase from main repo
33683d0
Rebase and cleanup
6e6a10c
Updated README.MD
a5ad24b
Updates to provision the VPC, peer, Cloud9 instance
3904a67
Updated base.tfvars for the eks stack
4ee3107
Updated TF Cloud workspace details
83cba93
Updated docs
00b4da5
Updated docs
fe9dd12
Adding the add-ons module
fbd2a6b
Updates to add-ons
b4f04cf
Doc updates
14ee9d3
Disable VPC CNI as it is getting stuck in creating state
f292bc6
Updates to create an IAM instance profile for the Cloud9 instance
56d8a8a
Cleanup
40f2d26
Cleanup
678845e
Updated the IAM vars with empty default values
cff2a4d
Enable VPC CNI managed add-on
b08dc5d
Updated IRSA condition to include aud:sts.amazonaws.com
8cf867c
bug fix IRSA
c22188f
Updated IRSA module for missing condition
d26f626
Updates to get latest version of addons
9c22f58
Precommit updates
5d82c85
Doc updates
6991cd7
Updates to the OIDC provider for the addons module
03ea0f8
TF Format
c6095f8
Removed TF Cloud State management config
32129ef
Create base.auto.tfvars
satveerkhurpa 89f356e
Updated VPC names
satveerkhurpa 9223b05
Delete base.auto.tfvars
satveerkhurpa bc7d0fb
Cleanup
8f37c38
Merge branch 'main' of https://github.com/satveerkhurpa/aws-eks-accel…
9fa12fd
Rebase from upstream
4a52e66
Terraform fmt
6cbfa16
Merge remote-tracking branch 'upstream/main'
e870d1f
Updates based on PR comments
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,139 +1,45 @@ | ||
# Fully Private EKS Cluster with VPC and Endpoints deployment | ||
# Fully Private EKS Cluster with VPC and VPC Endpoints deployment | ||
|
||
This example deploys a fully private EKS Cluster into a new VPC. | ||
- Creates a new VPC and 3 Private Subnets | ||
- VPC Endpoints for various services and S3 VPC Endpoint gateway | ||
- Creates EKS Cluster Control plane with one Managed node group | ||
- EKS Cluster API endpoint that can be set to public and private, and then into private only. | ||
- Creates EKS Cluster Control plane with a private endpoint and with one Managed node group | ||
|
||
Please see this [document](https://docs.aws.amazon.com/eks/latest/userguide/private-clusters.html) for more details on configuring fully private EKS Clusters | ||
|
||
## How to Deploy | ||
### Prerequisites: | ||
Ensure that you have installed the following tools in your Mac or Windows Laptop before start working with this module and run Terraform Plan and Apply | ||
1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html) | ||
3. [Kubectl](https://Kubernetes.io/docs/tasks/tools/) | ||
4. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli) | ||
|
||
### Deployment Steps | ||
#### Step1: Clone the repo using the command below | ||
|
||
```shell script | ||
git clone https://github.com/aws-samples/aws-eks-accelerator-for-terraform.git | ||
``` | ||
|
||
#### Step2: Run Terraform INIT | ||
Initialize a working directory with configuration files | ||
|
||
```shell script | ||
cd examples/fully-private-eks-cluster/ | ||
terraform init | ||
``` | ||
|
||
#### Step3: Run Terraform PLAN | ||
Verify the resources created by this execution | ||
|
||
```shell script | ||
export AWS_REGION=<ENTER YOUR REGION> # Select your own region | ||
terraform plan | ||
``` | ||
|
||
#### Step4: Terraform APPLY | ||
to create resources | ||
|
||
```shell script | ||
terraform apply | ||
``` | ||
|
||
Enter `yes` to apply | ||
|
||
### Configure `kubectl` and test cluster | ||
EKS Cluster details can be extracted from terraform output or from AWS Console to get the name of cluster. | ||
This following command used to update the `kubeconfig` in your local machine where you run kubectl commands to interact with your EKS Cluster. | ||
|
||
#### Step5: Run `update-kubeconfig` command | ||
Here is the high level design of the solution. The solution has been split into 3 different TerraForm stacks for simplicity. | ||
1. VPC | ||
2. EKS | ||
3. ADD-ONS | ||
|
||
`~/.kube/config` file gets updated with cluster details and certificate from the below command | ||
![High Level Design](./images/EKS_private_cluster.jpg) | ||
|
||
$ aws eks --region <enter-your-region> update-kubeconfig --name <cluster-name> | ||
|
||
#### Step6: List all the worker nodes by running the command below | ||
|
||
$ kubectl get nodes | ||
|
||
#### Step7: List all the pods running in `kube-system` namespace | ||
|
||
$ kubectl get pods -n kube-system | ||
|
||
### Setting up private only API endpoint and accessing the cluster | ||
|
||
- To set the API endpoint to private only, on the `main.tf` file under the SSP module: | ||
- Set `eks_cluster_api_endpoint_public = false` | ||
- Set `eks_cluster_api_endpoint_private = true` | ||
|
||
- To access the private cluster, you need to access it from a machine that can access the VPC and the private subnets. Few ways to do this are: | ||
- Create a bastion host in the VPC and then access the cluster from the bastion host | ||
- Create a cloud9 instance in the VPC and then access the cluster from the cloud9 instance | ||
These examples assume you do not have any other network infrastructure in place (e.g. direct connect(DX), VPN etc.). | ||
|
||
Learn more about private EKS clusters [here](https://docs.aws.amazon.com/eks/latest/userguide/private-clusters.html) | ||
|
||
## How to Destroy | ||
The following command destroys the resources created by `terraform apply` | ||
|
||
```shell script | ||
cd examples/fully-private-eks-cluster | ||
terraform destroy --auto-approve | ||
``` | ||
## How to Deploy | ||
### Prerequisites: | ||
|
||
<!--- BEGIN_TF_DOCS ---> | ||
## Requirements | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0.1 | | ||
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.66.0 | | ||
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | >= 2.4.1 | | ||
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.6.1 | | ||
### Environment Set up. | ||
|
||
## Providers | ||
Pre-requisites | ||
1. This examples assumes that you have a default VPC in your AWS account. | ||
2. An EC2 instance running in the default VPC that is running Jekins OR having the pre-requisite tools mentioned below. For simplicity this EC2 instance is running in the public VPC. | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.66.0 | | ||
2.1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html) | ||
|
||
## Modules | ||
2.2. [Kubectl](https://Kubernetes.io/docs/tasks/tools/) | ||
|
||
| Name | Source | Version | | ||
|------|--------|---------| | ||
| <a name="module_aws-eks-accelerator-for-terraform"></a> [aws-eks-accelerator-for-terraform](#module\_aws-eks-accelerator-for-terraform) | ../.. | n/a | | ||
| <a name="module_aws_vpc"></a> [aws\_vpc](#module\_aws\_vpc) | terraform-aws-modules/vpc/aws | v3.2.0 | | ||
| <a name="module_vpc_endpoint_gateway"></a> [vpc\_endpoint\_gateway](#module\_vpc\_endpoint\_gateway) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | v3.2.0 | | ||
| <a name="module_vpc_endpoints"></a> [vpc\_endpoints](#module\_vpc\_endpoints) | terraform-aws-modules/vpc/aws//modules/vpc-endpoints | v3.2.0 | | ||
2.3. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli) | ||
|
||
## Resources | ||
3. You can SSH into the EC2 instance to run Terraform commands OR access the Jenkins server running on this EC2 instance. Please note that setting up Jenkins on the EC2 instance is out of scope from this example. | ||
4. Deploy the individual stacks from each of the sub folders. i.e. | ||
|
||
| Name | Type | | ||
|------|------| | ||
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source | | ||
| [aws_eks_cluster.cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster) | data source | | ||
| [aws_eks_cluster_auth.cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster_auth) | data source | | ||
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source | | ||
| [aws_security_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/security_group) | data source | | ||
4.1 VPC | ||
|
||
## Inputs | ||
4.2 EKS | ||
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|------|---------|:--------:| | ||
| <a name="input_cluster_version"></a> [cluster\_version](#input\_cluster\_version) | Kubernetes Version | `string` | `"1.21"` | no | | ||
| <a name="input_environment"></a> [environment](#input\_environment) | Environment area, e.g. prod or preprod | `string` | `"preprod"` | no | | ||
| <a name="input_tenant"></a> [tenant](#input\_tenant) | Account Name or unique account unique id e.g., apps or management or aws007 | `string` | `"aws001"` | no | | ||
| <a name="input_zone"></a> [zone](#input\_zone) | zone, e.g. dev or qa or load or ops etc... | `string` | `"dev"` | no | | ||
4.3 Add-ons | ||
|
||
## Outputs | ||
|
||
| Name | Description | | ||
|------|-------------| | ||
| <a name="output_configure_kubectl"></a> [configure\_kubectl](#output\_configure\_kubectl) | Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig | | ||
Please refer to the README.MD in the individual sub folders for the deployment instructions. | ||
|
||
<!--- END_TF_DOCS ---> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,116 @@ | ||
## How to deploy the example | ||
|
||
This example deploys the following : | ||
- Install ArgoCD as the GitOps tool | ||
- Deploys some add-ons using ArgoCD | ||
- Deploys a sample application using ArgoCD | ||
|
||
|
||
### Prerequisites: | ||
We will deploy the EKS cluster from the bastion host/Jenkins server that is running on the default VPC. | ||
Ensure that you have installed the following tools in the bastion host/Jenkins server before start working with this module and run Terraform Plan and Apply | ||
1. [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html) | ||
3. [Kubectl](https://Kubernetes.io/docs/tasks/tools/) | ||
4. [Terraform](https://learn.hashicorp.com/tutorials/terraform/install-cli) | ||
|
||
### Deployment Steps | ||
#### Step1: Clone the repo using the command below | ||
|
||
```shell script | ||
git clone https://github.com/aws-samples/aws-eks-accelerator-for-terraform.git | ||
``` | ||
|
||
#### Step2: Run Terraform INIT | ||
Initialize a working directory with configuration files | ||
|
||
```shell script | ||
cd examples/fully-private-eks-cluster/add-ons | ||
terraform init -backend-config backend.conf | ||
``` | ||
|
||
#### Step3: Run Terraform PLAN | ||
Verify the resources created by this execution | ||
|
||
```shell script | ||
export AWS_REGION=<ENTER YOUR REGION> # Select your own region | ||
terraform plan -var-file base.tfvars | ||
``` | ||
|
||
#### Step4: Terraform APPLY | ||
to create resources | ||
|
||
```shell script | ||
terraform apply -var-file base.tfvars | ||
``` | ||
|
||
Enter `yes` to apply | ||
|
||
## Verify the add-ons are deployed. | ||
Pre-requisite : kubectl installed on the bastion host/Jenkins Server. | ||
|
||
$ kubectl get pods -A | ||
|
||
You can see a list of all the add-ons running as pods on the EKS cluster. This also includes argocd runnings in its own namespace. | ||
|
||
|
||
## How to Destroy | ||
The following command destroys the resources created by `terraform apply` | ||
|
||
```shell script | ||
cd examples/fully-private-eks-cluster/vpc | ||
terraform destroy -var-file base.tfvars -auto-approve | ||
``` | ||
|
||
|
||
<!--- BEGIN_TF_DOCS ---> | ||
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
SPDX-License-Identifier: MIT-0 | ||
|
||
Permission is hereby granted, free of charge, to any person obtaining a copy of this | ||
software and associated documentation files (the "Software"), to deal in the Software | ||
without restriction, including without limitation the rights to use, copy, modify, | ||
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to | ||
permit persons to whom the Software is furnished to do so. | ||
|
||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, | ||
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A | ||
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT | ||
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION | ||
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE | ||
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. | ||
satveerkhurpa marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
## Requirements | ||
|
||
No requirements. | ||
|
||
## Providers | ||
|
||
No providers. | ||
|
||
## Modules | ||
|
||
| Name | Source | Version | | ||
|------|--------|---------| | ||
| <a name="module_eks-cluster-with-import-vpc"></a> [eks-cluster-with-import-vpc](#module\_eks-cluster-with-import-vpc) | ../../../examples/eks-cluster-with-import-vpc/eks | n/a | | ||
|
||
## Resources | ||
|
||
No resources. | ||
|
||
## Inputs | ||
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|------|---------|:--------:| | ||
| <a name="input_environment"></a> [environment](#input\_environment) | Environment area, e.g. prod or preprod | `string` | n/a | yes | | ||
| <a name="input_kubernetes_version"></a> [kubernetes\_version](#input\_kubernetes\_version) | Kubernetes Version | `string` | `"1.21"` | no | | ||
| <a name="input_region"></a> [region](#input\_region) | AWS region | `string` | n/a | yes | | ||
| <a name="input_tenant"></a> [tenant](#input\_tenant) | Account Name or unique account unique id e.g., apps or management or aws007 | `string` | n/a | yes | | ||
| <a name="input_tf_state_vpc_s3_bucket"></a> [tf\_state\_vpc\_s3\_bucket](#input\_tf\_state\_vpc\_s3\_bucket) | Terraform state S3 Bucket Name | `string` | n/a | yes | | ||
| <a name="input_tf_state_vpc_s3_key"></a> [tf\_state\_vpc\_s3\_key](#input\_tf\_state\_vpc\_s3\_key) | Terraform state S3 Key path | `string` | n/a | yes | | ||
| <a name="input_zone"></a> [zone](#input\_zone) | zone, e.g. dev or qa or load or ops etc... | `string` | n/a | yes | | ||
|
||
## Outputs | ||
|
||
No outputs. | ||
|
||
<!--- END_TF_DOCS ---> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
bucket = "terraform-ssp-github-actions-state" | ||
region = "us-west-2" | ||
key = "private/addons/terraform-main.tfstate" | ||
satveerkhurpa marked this conversation as resolved.
Show resolved
Hide resolved
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
region = "us-west-2" | ||
satveerkhurpa marked this conversation as resolved.
Show resolved
Hide resolved
|
||
eks_cluster_id = "aws001-preprod-test-eks" | ||
satveerkhurpa marked this conversation as resolved.
Show resolved
Hide resolved
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
/* | ||
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. | ||
* SPDX-License-Identifier: MIT-0 | ||
* | ||
* Permission is hereby granted, free of charge, to any person obtaining a copy of this | ||
* software and associated documentation files (the "Software"), to deal in the Software | ||
* without restriction, including without limitation the rights to use, copy, modify, | ||
* merge, publish, distribute, sublicense, and/or sell copies of the Software, and to | ||
* permit persons to whom the Software is furnished to do so. | ||
* | ||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, | ||
* INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A | ||
* PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT | ||
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION | ||
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE | ||
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. | ||
*/ | ||
satveerkhurpa marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
data "aws_availability_zones" "available" {} | ||
|
||
data "aws_eks_cluster" "cluster" { | ||
name = var.eks_cluster_id | ||
} | ||
|
||
data "aws_eks_cluster_auth" "cluster" { | ||
name = var.eks_cluster_id | ||
} |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Terraform