To provision the provided configurations you need to execute:
$ terraform init
$ terraform plan
$ terraform apply --auto-approve
Note that this example may create resources which cost money. Run terraform destroy
when you don't need these resources.
Name | Version |
---|---|
terraform | >= 1.3.2 |
aws | >= 5.95 |
tls | >= 4.0 |
Name | Version |
---|---|
tls | >= 4.0 |
Name | Source | Version |
---|---|---|
disabled_eks_hybrid_node_role | ../../modules/hybrid-node-role | n/a |
eks_hybrid_node_role | ../../modules/hybrid-node-role | n/a |
ira_eks_hybrid_node_role | ../../modules/hybrid-node-role | n/a |
Name | Type |
---|---|
tls_private_key.example | resource |
tls_self_signed_cert.example | resource |
No inputs.
Name | Description |
---|---|
arn | The Amazon Resource Name (ARN) specifying the node IAM role |
intermediate_role_arn | The Amazon Resource Name (ARN) specifying the node IAM role |
intermediate_role_name | The name of the node IAM role |
intermediate_role_unique_id | Stable and unique string identifying the node IAM role |
ira_arn | The Amazon Resource Name (ARN) specifying the node IAM role |
ira_intermediate_role_arn | The Amazon Resource Name (ARN) specifying the node IAM role |
ira_intermediate_role_name | The name of the node IAM role |
ira_intermediate_role_unique_id | Stable and unique string identifying the node IAM role |
ira_name | The name of the node IAM role |
ira_unique_id | Stable and unique string identifying the node IAM role |
name | The name of the node IAM role |
unique_id | Stable and unique string identifying the node IAM role |