diff --git a/README.md b/README.md
index 6044a5d..76f4aa7 100644
--- a/README.md
+++ b/README.md
@@ -99,7 +99,7 @@ module "eks" {
| [external\_secrets](#module\_external\_secrets) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
| [gatekeeper](#module\_gatekeeper) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
| [ingress\_nginx](#module\_ingress\_nginx) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
-| [karpenter](#module\_karpenter) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
+| [karpenter](#module\_karpenter) | ../terraform-aws-eks-blueprints-addon | n/a |
| [karpenter\_sqs](#module\_karpenter\_sqs) | terraform-aws-modules/sqs/aws | 4.0.1 |
| [kube\_prometheus\_stack](#module\_kube\_prometheus\_stack) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
| [metrics\_server](#module\_metrics\_server) | aws-ia/eks-blueprints-addon/aws | 1.1.1 |
@@ -120,6 +120,7 @@ module "eks" {
| [aws_cloudwatch_event_target.karpenter](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target) | resource |
| [aws_cloudwatch_log_group.aws_for_fluentbit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group) | resource |
| [aws_cloudwatch_log_group.fargate_fluentbit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group) | resource |
+| [aws_eks_access_entry.node](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_access_entry) | resource |
| [aws_eks_addon.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource |
| [aws_iam_instance_profile.karpenter](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_instance_profile) | resource |
| [aws_iam_policy.fargate_fluentbit](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
@@ -225,6 +226,7 @@ module "eks" {
| [helm\_releases](#input\_helm\_releases) | A map of Helm releases to create. This provides the ability to pass in an arbitrary map of Helm chart definitions to create | `any` | `{}` | no |
| [ingress\_nginx](#input\_ingress\_nginx) | Ingress Nginx add-on configurations | `any` | `{}` | no |
| [karpenter](#input\_karpenter) | Karpenter add-on configuration values | `any` | `{}` | no |
+| [karpenter\_create\_access\_entry](#input\_karpenter\_create\_access\_entry) | Determines whether to create Karpenter Access Entry for Cluster Access Management API. | `bool` | `false` | no |
| [karpenter\_enable\_instance\_profile\_creation](#input\_karpenter\_enable\_instance\_profile\_creation) | Determines whether Karpenter will be allowed to create the IAM instance profile (v1beta1) or if Terraform will (v1alpha1) | `bool` | `true` | no |
| [karpenter\_enable\_spot\_termination](#input\_karpenter\_enable\_spot\_termination) | Determines whether to enable native node termination handling | `bool` | `true` | no |
| [karpenter\_node](#input\_karpenter\_node) | Karpenter IAM role and IAM instance profile configuration values | `any` | `{}` | no |
diff --git a/main.tf b/main.tf
index 6b5a9e3..21400aa 100644
--- a/main.tf
+++ b/main.tf
@@ -3096,14 +3096,14 @@ module "karpenter" {
policy_name_use_prefix = try(var.karpenter.policy_name_use_prefix, true)
policy_path = try(var.karpenter.policy_path, null)
policy_description = try(var.karpenter.policy_description, "IAM Policy for karpenter")
-
+
oidc_providers = {
this = {
provider_arn = local.oidc_provider_arn
# namespace is inherited from chart
service_account = local.karpenter_service_account_name
- }
- }
+ }
+ }
tags = var.tags
}
diff --git a/tests/complete/main.tf b/tests/complete/main.tf
index b79540b..2529fe6 100644
--- a/tests/complete/main.tf
+++ b/tests/complete/main.tf
@@ -81,7 +81,7 @@ module "eks_blueprints_addons" {
vpc-cni = {
most_recent = true
}
- kube-proxy = {}
+ kube-proxy = {}
eks-pod-identity-agent = {}
adot = {
most_recent = true
@@ -164,7 +164,7 @@ module "eks_blueprints_addons" {
enable_karpenter = true
karpenter_enable_instance_profile_creation = true
karpenter_create_access_entry = true
- karpenter = {
+ karpenter = {
enable_pod_identity = true
create_pod_identity_association = true
# ECR login required
@@ -307,7 +307,7 @@ module "vpc" {
private_subnet_tags = {
"kubernetes.io/role/internal-elb" = 1
- "karpenter.sh/discovery" = local.name
+ "karpenter.sh/discovery" = local.name
}
tags = local.tags