Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-alb-ingress
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-alb-ingress
Commits
f22b0d87
Commit
f22b0d87
authored
Feb 22, 2021
by
Nick White
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
terraform 0.12.30
parent
27782e63
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
12 additions
and
12 deletions
+12
-12
eks-alb-ingress.tf
eks-alb-ingress.tf
+7
-7
iam.tf
iam.tf
+5
-5
No files found.
eks-alb-ingress.tf
View file @
f22b0d87
...
...
@@ -8,7 +8,7 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
replicas
=
1
selector
{
match_labels
{
match_labels
=
{
name
=
"aws-alb-ingress-controller"
}
}
...
...
@@ -17,11 +17,11 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
metadata
{
name
=
"aws-alb-ingress-controller"
annotations
{
annotations
=
{
"iam.amazonaws.com/role"
=
"eks-alb-ingress-controller"
}
labels
{
labels
=
{
name
=
"aws-alb-ingress-controller"
}
}
...
...
@@ -31,22 +31,22 @@ resource "kubernetes_deployment" "aws_alb_ingress_deployment" {
termination_grace_period_seconds
=
60
volume
{
name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
secret
{
secret_name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
secret_name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
}
container
{
image
=
"
amazon/aws-alb-ingress-controller
:v1.1.2"
image
=
"
:v1.1.2"
name
=
"aws-alb-ingress-container"
image_pull_policy
=
"IfNotPresent"
args
=
[
"--cluster-name=
${
var
.
cluster_name
}
"
]
volume_mount
{
mount_path
=
"/var/run/secrets/kubernetes.io/serviceaccount"
name
=
"
${
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
}
"
name
=
kubernetes_service_account
.
aws_alb_service_account
.
default_secret_name
read_only
=
true
}
...
...
iam.tf
View file @
f22b0d87
...
...
@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "ec2_assume" {
principals
{
type
=
"AWS"
identifiers
=
[
"
${
var
.
worker_iam_role_arn
}
"
]
identifiers
=
[
var
.
worker_iam_role_arn
]
}
}
}
...
...
@@ -138,15 +138,15 @@ data "aws_iam_policy_document" "ingress" {
}
resource
"aws_iam_policy"
"this"
{
policy
=
"
${data
.
aws_iam_policy_document
.
ingress
.
json
}
"
policy
=
data
.
aws_iam_policy_document
.
ingress
.
json
}
resource
"aws_iam_role"
"this"
{
name
=
"eks-alb-ingress-controller"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
ec2_assume
.
json
}
"
assume_role_policy
=
data
.
aws_iam_policy_document
.
ec2_assume
.
json
}
resource
"aws_iam_role_policy_attachment"
"this"
{
role
=
"
${
aws_iam_role
.
this
.
name
}
"
policy_arn
=
"
${
aws_iam_policy
.
this
.
arn
}
"
role
=
aws_iam_role
.
this
.
name
policy_arn
=
aws_iam_policy
.
this
.
arn
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment