forked from cloudposse/terraform-aws-eks-cluster
-
Notifications
You must be signed in to change notification settings - Fork 0
/
outputs.tf
94 lines (76 loc) · 3.39 KB
/
outputs.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
output "security_group_id" {
description = "ID of the created Security Group for the EKS cluster"
value = join("", aws_security_group.default.*.id)
}
output "security_group_arn" {
description = "ARN of the created Security Group for the EKS cluster"
value = join("", aws_security_group.default.*.arn)
}
output "security_group_name" {
description = "Name of the created Security Group for the EKS cluster"
value = join("", aws_security_group.default.*.name)
}
output "eks_cluster_id" {
description = "The name of the cluster"
value = join("", aws_eks_cluster.default.*.id)
}
output "eks_cluster_arn" {
description = "The Amazon Resource Name (ARN) of the cluster"
value = join("", aws_eks_cluster.default.*.arn)
}
output "eks_cluster_endpoint" {
description = "The endpoint for the Kubernetes API server"
value = join("", aws_eks_cluster.default.*.endpoint)
}
output "eks_cluster_version" {
description = "The Kubernetes server version of the cluster"
value = join("", aws_eks_cluster.default.*.version)
}
output "eks_cluster_identity_oidc_issuer" {
description = "The OIDC Identity issuer for the cluster"
value = join("", aws_eks_cluster.default.*.identity.0.oidc.0.issuer)
}
output "eks_cluster_identity_oidc_issuer_arn" {
description = "The OIDC Identity issuer ARN for the cluster that can be used to associate IAM roles with a service account"
value = join("", aws_iam_openid_connect_provider.default.*.arn)
}
output "eks_cluster_certificate_authority_data" {
description = "The Kubernetes cluster certificate authority data"
value = local.certificate_authority_data
}
output "eks_cluster_managed_security_group_id" {
description = "Security Group ID that was created by EKS for the cluster. EKS creates a Security Group and applies it to ENI that is attached to EKS Control Plane master nodes and to any managed workloads"
value = join("", aws_eks_cluster.default.*.vpc_config.0.cluster_security_group_id)
}
output "eks_cluster_role_arn" {
description = "ARN of the EKS cluster IAM role"
value = local.eks_service_role_arn
}
output "kubernetes_config_map_id" {
description = "ID of `aws-auth` Kubernetes ConfigMap"
value = var.kubernetes_config_map_ignore_role_changes ? join("", kubernetes_config_map.aws_auth_ignore_changes.*.id) : join("", kubernetes_config_map.aws_auth.*.id)
}
output "cluster_encryption_config_enabled" {
description = "If true, Cluster Encryption Configuration is enabled"
value = var.cluster_encryption_config_enabled
}
output "cluster_encryption_config_resources" {
description = "Cluster Encryption Config Resources"
value = var.cluster_encryption_config_resources
}
output "cluster_encryption_config_provider_key_arn" {
description = "Cluster Encryption Config KMS Key ARN"
value = local.cluster_encryption_config.provider_key_arn
}
output "cluster_encryption_config_provider_key_alias" {
description = "Cluster Encryption Config KMS Key Alias ARN"
value = join("", aws_kms_alias.cluster.*.arn)
}
output "cloudwatch_log_group_name" {
description = "The name of the log group created in cloudwatch where cluster logs are forwarded to if enabled"
value = local.cloudwatch_log_group_name
}
output "cloudwatch_log_group_kms_key_id" {
description = "KMS Key ID to encrypt AWS CloudWatch logs"
value = var.cloudwatch_log_group_kms_key_id
}