forked from cloudposse/terraform-aws-eks-cluster
-
Notifications
You must be signed in to change notification settings - Fork 0
/
outputs.tf
97 lines (79 loc) · 3.46 KB
/
outputs.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
output "security_group_id" {
description = "(Deprecated) ID of the optionally created additional Security Group for the EKS cluster"
value = one(aws_security_group.default[*].id)
}
output "security_group_arn" {
description = "(Deprecated) ARN of the optionally created additional Security Group for the EKS cluster"
value = one(aws_security_group.default[*].arn)
}
output "security_group_name" {
description = "Name of the optionally created additional Security Group for the EKS cluster"
value = one(aws_security_group.default[*].name)
}
output "eks_cluster_id" {
description = "The name of the cluster"
value = one(aws_eks_cluster.default[*].id)
}
output "eks_cluster_arn" {
description = "The Amazon Resource Name (ARN) of the cluster"
value = one(aws_eks_cluster.default[*].arn)
}
output "eks_cluster_endpoint" {
description = "The endpoint for the Kubernetes API server"
value = one(aws_eks_cluster.default[*].endpoint)
}
output "eks_cluster_version" {
description = "The Kubernetes server version of the cluster"
value = one(aws_eks_cluster.default[*].version)
}
output "eks_cluster_identity_oidc_issuer" {
description = "The OIDC Identity issuer for the cluster"
value = one(aws_eks_cluster.default[*].identity[0].oidc[0].issuer)
}
output "eks_cluster_identity_oidc_issuer_arn" {
description = "The OIDC Identity issuer ARN for the cluster that can be used to associate IAM roles with a service account"
value = one(aws_iam_openid_connect_provider.default[*].arn)
}
output "eks_cluster_certificate_authority_data" {
description = "The Kubernetes cluster certificate authority data"
value = local.certificate_authority_data
}
output "eks_cluster_managed_security_group_id" {
description = <<-EOT
Security Group ID that was created by EKS for the cluster.
EKS creates a Security Group and applies it to the ENI that are attached to EKS Control Plane master nodes and to any managed workloads.
EOT
value = one(aws_eks_cluster.default[*].vpc_config[0].cluster_security_group_id)
}
output "eks_cluster_role_arn" {
description = "ARN of the EKS cluster IAM role"
value = local.eks_service_role_arn
}
output "kubernetes_config_map_id" {
description = "ID of `aws-auth` Kubernetes ConfigMap"
value = var.kubernetes_config_map_ignore_role_changes ? one(kubernetes_config_map.aws_auth_ignore_changes[*].id) : one(kubernetes_config_map.aws_auth[*].id)
}
output "cluster_encryption_config_enabled" {
description = "If true, Cluster Encryption Configuration is enabled"
value = var.cluster_encryption_config_enabled
}
output "cluster_encryption_config_resources" {
description = "Cluster Encryption Config Resources"
value = var.cluster_encryption_config_resources
}
output "cluster_encryption_config_provider_key_arn" {
description = "Cluster Encryption Config KMS Key ARN"
value = local.cluster_encryption_config.provider_key_arn
}
output "cluster_encryption_config_provider_key_alias" {
description = "Cluster Encryption Config KMS Key Alias ARN"
value = one(aws_kms_alias.cluster[*].arn)
}
output "cloudwatch_log_group_name" {
description = "The name of the log group created in cloudwatch where cluster logs are forwarded to if enabled"
value = local.cloudwatch_log_group_name
}
output "cloudwatch_log_group_kms_key_id" {
description = "KMS Key ID to encrypt AWS CloudWatch logs"
value = var.cloudwatch_log_group_kms_key_id
}