Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-alb-ingress
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-alb-ingress
Commits
60efd5e3
Commit
60efd5e3
authored
Oct 27, 2020
by
Nicky White
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Terraform v0.12
parent
27782e63
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
25 additions
and
13 deletions
+25
-13
eks-alb-clusterrolebinding.tf
eks-alb-clusterrolebinding.tf
+1
-0
eks-alb-ingress.tf
eks-alb-ingress.tf
+7
-6
eks-alb-serviceaccount.tf
eks-alb-serviceaccount.tf
+1
-0
iam.tf
iam.tf
+6
-5
variables.tf
variables.tf
+6
-2
versions.tf
versions.tf
+4
-0
No files found.
eks-alb-clusterrolebinding.tf
View file @
60efd5e3
...
...
@@ -35,3 +35,4 @@ resource "kubernetes_cluster_role_binding" "aws_alb_cluster_role_bind" {
api_group
=
"rbac.authorization.k8s.io"
}
}
eks-alb-ingress.tf
View file @
60efd5e3
...
...
@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
replicas
=
1
selector
{
match_labels
{
match_labels
=
{
name
=
"aws-alb-ingress-controller"
}
}
...
...
@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
metadata
{
name
=
"aws-alb-ingress-controller"
annotations
{
annotations
=
{
"iam.amazonaws.com/role"
=
"eks-alb-ingress-controller"
}
labels
{
labels
=
{
name
=
"aws-alb-ingress-controller"
}
}
...
...
@@ -31,10 +31,10 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
termination_grace_period_seconds
=
60
volume
{
name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
secret
{
secret_name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
secret_name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
}
...
...
@@ -46,7 +46,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
volume_mount
{
mount_path
=
"/var/run/secrets/kubernetes.io/serviceaccount"
name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
read_only
=
true
}
...
...
@@ -60,3 +60,4 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
}
}
}
eks-alb-serviceaccount.tf
View file @
60efd5e3
...
...
@@ -4,3 +4,4 @@ resource "kubernetes_service_account" "aws_alb_service_account" {
namespace
=
"kube-system"
}
}
iam.tf
View file @
60efd5e3
...
...
@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" {
principals
{
type
=
"AWS"
identifiers
=
[
"
${
var
.
worker_iam_role_arn
}
"
]
identifiers
=
[
var
.
worker_iam_role_arn
]
}
}
}
...
...
@@ -138,15 +138,16 @@ data "aws_iam_policy_document" "ingress" {
}
resource
"aws_iam_policy"
"this"
{
policy
=
"
${data
.
aws_iam_policy_document
.
ingress
.
json
}
"
policy
=
data
.
aws_iam_policy_document
.
ingress
.
json
}
resource
"aws_iam_role"
"this"
{
name
=
"eks-alb-ingress-controller"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
ec2_assume
.
json
}
"
assume_role_policy
=
data
.
aws_iam_policy_document
.
ec2_assume
.
json
}
resource
"aws_iam_role_policy_attachment"
"this"
{
role
=
"
${
aws_iam_role
.
this
.
name
}
"
policy_arn
=
"
${
aws_iam_policy
.
this
.
arn
}
"
role
=
aws_iam_role
.
this
.
name
policy_arn
=
aws_iam_policy
.
this
.
arn
}
variables.tf
View file @
60efd5e3
variable
"worker_iam_role_arn"
{}
variable
"cluster_name"
{}
\ No newline at end of file
variable
"worker_iam_role_arn"
{
}
variable
"cluster_name"
{
}
versions.tf
0 → 100644
View file @
60efd5e3
terraform
{
required_version
=
">= 0.12"
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment