Core AWS infrastructure for Infrable
Where does one store the Terraform state of the infrastructure for storing Terraform state? Answer: locally. Before using the Amazon S3 bucket and DynamoDB table created by this module to store its own state, you must first store state on the local filesystem. Thereafter, state can be stored using the S3 backend.
Name | Source | Version |
---|---|---|
terraform_aws_eks | git@github.com:infrable-io/terraform-aws-eks | n/a |
terraform_aws_s3_backend | git@github.com:infrable-io/terraform-aws-s3-backend | n/a |
No resources.
No inputs.
Name | Description |
---|---|
aws_auth_configmap_yaml | Formatted YAML output of the aws-auth ConfigMap |
cloudwatch_log_group_arn | ARN of CloudWatch log group |
cloudwatch_log_group_name | Name of CloudWatch log group |
cluster_addons | Map of attribute maps for all enabled EKS cluster add-ons. For a list of available Amazon EKS add-ons, see the following documentation: * https://docs.aws.amazon.com/eks/latest/userguide/eks-add-ons.html |
cluster_arn | ARN of the EKS cluster |
cluster_certificate_authority_data | Base64-encoded certificate data required to communicate with your cluster |
cluster_endpoint | Endpoint for the Kubernetes API server |
cluster_iam_role_arn | ARN of the EKS cluster IAM role |
cluster_iam_role_name | EKS cluster IAM role. This role is used by the Kubernetes cluster managed by Amazon EKS to make calls to other AWS services on your behalf to manage the resources that you use with the service. |
cluster_iam_role_unique_id | Stable and unique string identifying the IAM role |
cluster_id | Name of the cluster |
cluster_identity_providers | Map of attribute maps for all enabled EKS identity providers |
cluster_oidc_issuer_url | Issuer URL for the OpenID Connect identity provider |
cluster_platform_version | Platform version for the EKS cluster |
cluster_security_group_arn | ARN of the EKS cluster security group |
cluster_security_group_id | EKS cluster security group that is created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. This security group is referred to as the 'Cluster security group' in the Amazon EKS console. |
cluster_status | Status of the EKS cluster. One of CREATING , ACTIVE , DELETING , FAILED |
dynamodb_table | The name of the DynamoDB table for storing Terraform state lock |
eks_managed_node_groups | Map of attribute maps for EKS managed node groups |
oidc_provider_arn | The ARN of the OIDC provider if enable_irsa = true |
s3_bucket | The name of the S3 bucket for storing Terraform state |