Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-cluster-autoscaler
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-cluster-autoscaler
Commits
f7260c5d
Commit
f7260c5d
authored
Mar 06, 2019
by
Danny
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
duplicate volume statement for serviceaccunt
parent
091bc8e5
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
101 additions
and
20 deletions
+101
-20
eks-cluster-autoscaler-clusterrolebinding.tf
eks-cluster-autoscaler-clusterrolebinding.tf
+88
-17
eks-cluster-autoscaler.tf
eks-cluster-autoscaler.tf
+13
-3
No files found.
eks-cluster-autoscaler-clusterrolebinding.tf
View file @
f7260c5d
resource
"kubernetes_cluster_role"
"cluster_autoscaler_clusterrole"
{
metadata
{
name
=
"autoscaler-svc-acc"
name
=
"
cluster-
autoscaler-svc-acc"
}
rule
{
api_groups
=
[
""
]
resources
=
[
"events"
,
"endpoints"
]
verbs
=
[
"create"
,
"patch"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"pods/eviction"
]
verbs
=
[
"create"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"pods/status"
]
verbs
=
[
"update"
]
}
api_groups
=
[
""
]
resources
=
[
"endpoints"
]
verbs
=
[
"get"
,
"update"
]
rule
{
api_groups
=
[
""
]
resources
=
[
"endpoints"
]
resource_names
=
[
"cluster-autoscaler"
]
verbs
=
[
"get"
,
"update"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"nodes"
]
verbs
=
[
"watch"
,
"list"
,
"get"
,
"update"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"pods"
,
"services"
,
"replication
C
ontrollers"
,
"persistentvolumeclaims"
,
"persistentvolumes"
]
resources
=
[
"pods"
,
"services"
,
"replication
c
ontrollers"
,
"persistentvolumeclaims"
,
"persistentvolumes"
]
verbs
=
[
"watch"
,
"list"
,
"get"
]
}
rule
{
api_groups
=
[
"batch"
]
resources
=
[
"jobs"
,
"cronjobs"
]
verbs
=
[
"watch"
,
"list"
,
"get"
]
}
rule
{
api_groups
=
[
"extensions"
]
resources
=
[
"replicasets"
,
"daemonsets"
]
verbs
=
[
"watch"
,
"list"
,
"get"
]
}
rule
{
api_groups
=
[
"policy"
]
resources
=
[
"poddis
truptionpolicy
"
]
resources
=
[
"poddis
ruptionbudgets
"
]
verbs
=
[
"watch"
,
"list"
]
}
rule
{
api_groups
=
[
"apps"
]
resources
=
[
"replicasets"
,
"statefulsets"
]
resources
=
[
"replicasets"
,
"statefulsets"
,
"daemonsets"
]
verbs
=
[
"watch"
,
"list"
,
"get"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"configmaps"
]
resource_names
=
[
"cluster-autoscaler-status"
]
verbs
=
[
"get"
,
"delete"
,
"update"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"configmaps"
]
verbs
=
[
"create"
]
}
api_groups
=
[
"storage"
]
resources
=
[
"storageclass"
]
rule
{
api_groups
=
[
"storage.k8s.io"
]
resources
=
[
"storageclasses"
]
verbs
=
[
"watch"
,
"list"
,
"get"
]
}
}
resource
"kubernetes_cluster_role_binding"
"external_dns_role_bind"
{
resource
"kubernetes_role"
"autoscaler_role"
{
metadata
{
name
=
"cluster-autoscaler-svc-acc"
labels
{
"k8s-addon"
=
"cluster-autoscaler.addons.k8s.io"
"k8s-app"
=
"cluster-autoscaler"
}
}
rule
{
api_groups
=
[
""
]
resources
=
[
"configmaps"
]
resource_names
=
[
"cluster-autoscaler-status"
]
verbs
=
[
"get"
,
"delete"
,
"update"
]
}
rule
{
api_groups
=
[
""
]
resources
=
[
"configmaps"
]
verbs
=
[
"create"
]
}
}
resource
"kubernetes_role_binding"
"cluster_autoscaler_role_bind"
{
metadata
{
name
=
"autoscaler-svc-acc"
name
=
"
cluster-
autoscaler-svc-acc"
}
role_ref
{
api_group
=
"rbac.authorization.k8s.io"
kind
=
"
Cluster
Role"
name
=
"cluster-autoscaler"
kind
=
"Role"
name
=
"cluster-autoscaler
-svc-acc
"
}
subject
{
kind
=
"ServiceAccount"
name
=
"autoscaler-svc-acc"
name
=
"
cluster-
autoscaler-svc-acc"
namespace
=
"kube-system"
api_group
=
""
}
}
subject
{
kind
=
"Group"
name
=
"system:serviceaccount"
resource
"kubernetes_cluster_role_binding"
"cluster_autoscaler_clusterrole_bind"
{
metadata
{
name
=
"cluster-autoscaler-svc-acc"
}
role_ref
{
api_group
=
"rbac.authorization.k8s.io"
kind
=
"ClusterRole"
name
=
"cluster-autoscaler-svc-acc"
}
subject
{
kind
=
"ServiceAccount"
name
=
"cluster-autoscaler-svc-acc"
namespace
=
"kube-system"
api_group
=
""
}
}
eks-cluster-autoscaler.tf
View file @
f7260c5d
...
...
@@ -36,15 +36,18 @@ resource "kubernetes_deployment" "aws_cluster_autoscaler_deployment" {
volume
{
name
=
"
${
kubernetes_service_account
.
cluster_autoscaler_service_account
.
default_secret_name
}
"
name
=
"autoscaler-ssl-volume"
secret
{
secret_name
=
"
${
kubernetes_service_account
.
cluster_autoscaler_service_account
.
default_secret_name
}
"
}
}
volume
{
name
=
"autoscaler-ssl-volume"
}
container
{
image
=
"k8s.gcr.io/cluster-autoscaler:v1.
13.1
"
image
=
"k8s.gcr.io/cluster-autoscaler:v1.
3.6
"
name
=
"cluster-autoscaler-container"
image_pull_policy
=
"IfNotPresent"
args
=
[
"./cluster-autoscaler"
,
"--cloud-provider=aws"
,
"--node-group-auto-discovery=asg:tag=k8s.io/cluster-autoscaler/enabled"
,
"--skip-nodes-with-local-storage=false"
,
"--stderrthreshold=info"
,
"--expander=least-waste"
,
"--v=4"
]
...
...
@@ -53,8 +56,10 @@ resource "kubernetes_deployment" "aws_cluster_autoscaler_deployment" {
mount_path
=
"/var/run/secrets/kubernetes.io/serviceaccount"
name
=
"
${
kubernetes_service_account
.
cluster_autoscaler_service_account
.
default_secret_name
}
"
read_only
=
true
}
mount_path
=
"/etc/ssl/certs/"
volume_mount
{
mount_path
=
"/etc/ssl/certs/ca-bundle.crt"
name
=
"autoscaler-ssl-volume"
read_only
=
true
}
...
...
@@ -69,6 +74,11 @@ resource "kubernetes_deployment" "aws_cluster_autoscaler_deployment" {
port
{
container_port
=
8085
}
env
{
name
=
"AWS_REGION"
value
=
"us-east-1"
}
}
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment