Skip to content

Latest commit

 

History

History

eks-hybrid-nodes

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

EKS Hybrid Node IAM Role

Usage

To provision the provided configurations you need to execute:

$ terraform init
$ terraform plan
$ terraform apply --auto-approve

Note that this example may create resources which cost money. Run terraform destroy when you don't need these resources.

Requirements

Name Version
terraform >= 1.3.2
aws >= 5.95
tls >= 4.0

Providers

Name Version
tls >= 4.0

Modules

Name Source Version
disabled_eks_hybrid_node_role ../../modules/hybrid-node-role n/a
eks_hybrid_node_role ../../modules/hybrid-node-role n/a
ira_eks_hybrid_node_role ../../modules/hybrid-node-role n/a

Resources

Name Type
tls_private_key.example resource
tls_self_signed_cert.example resource

Inputs

No inputs.

Outputs

Name Description
arn The Amazon Resource Name (ARN) specifying the node IAM role
intermediate_role_arn The Amazon Resource Name (ARN) specifying the node IAM role
intermediate_role_name The name of the node IAM role
intermediate_role_unique_id Stable and unique string identifying the node IAM role
ira_arn The Amazon Resource Name (ARN) specifying the node IAM role
ira_intermediate_role_arn The Amazon Resource Name (ARN) specifying the node IAM role
ira_intermediate_role_name The name of the node IAM role
ira_intermediate_role_unique_id Stable and unique string identifying the node IAM role
ira_name The name of the node IAM role
ira_unique_id Stable and unique string identifying the node IAM role
name The name of the node IAM role
unique_id Stable and unique string identifying the node IAM role