Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-kube2iam
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-kube2iam
Commits
d5c14349
Commit
d5c14349
authored
Feb 28, 2019
by
Danny
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
init commit
parent
3a2f038c
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
143 additions
and
15 deletions
+143
-15
eks-kube2iam-clusterrolebinding.tf
eks-kube2iam-clusterrolebinding.tf
+30
-0
eks-kube2iam-serviceaccount.tf
eks-kube2iam-serviceaccount.tf
+8
-0
eks-kube2iam.tf
eks-kube2iam.tf
+56
-12
iam.tf
iam.tf
+47
-0
variables.tf
variables.tf
+2
-3
No files found.
eks-kube2iam-clusterrolebinding.tf
0 → 100644
View file @
d5c14349
resource
"kubernetes_cluster_role"
"kube2iam_cluster_role"
{
metadata
{
name
=
"kube2iam-svc-acc"
}
rule
{
api_groups
=
[
""
]
resources
=
[
"namespaces"
,
"pods"
,
"configmaps"
,
"nodes"
,
"ingresses"
,
"endpoints"
,
"services"
]
verbs
=
[
"get"
,
"list"
,
"watch"
,
"create"
,
"update"
]
}
}
resource
"kubernetes_cluster_role_binding"
"kube2iam_cluster_role_bind"
{
metadata
{
name
=
"kube2iam-svc-acc"
}
role_ref
{
api_group
=
"rbac.authorization.k8s.io"
kind
=
"ClusterRole"
name
=
"kube2iam-svc-acc"
}
subject
{
api_group
=
""
kind
=
"ServiceAccount"
name
=
"kube2iam-svc-acc"
namespace
=
"kube-system"
}
}
eks-kube2iam-serviceaccount.tf
0 → 100644
View file @
d5c14349
resource
"kubernetes_service_account"
"kube2iam_service_account"
{
metadata
{
name
=
"kube2iam-svc-acc"
namespace
=
"kube-system"
}
automount_service_account_token
=
"true"
}
eks-kube2iam.tf
View file @
d5c14349
module
"kubernetes_service"
"kube2iam
"
{
resource
"kubernetes_daemonset"
"kube2iam_daemonset
"
{
metadata
{
name
=
"kube2iam"
name
=
"kube2iam"
namespace
=
"kube-system"
labels
{
App
=
"kube2iam-service
"
app
=
"kube2iam
"
}
}
type
=
"DaemonSet"
spec
{
container
{
image
=
"
${
var
.
kube2iam-container
}
"
name
=
"kube2iam-container"
selector
{
match_labels
{
app
=
"kube2iam"
}
}
}
port
{
port
=
8181
target_port
=
8181
template
{
metadata
{
name
=
"kube2iam"
labels
{
app
=
"kube2iam"
}
}
spec
{
service_account_name
=
"kube2iam-svc-acc"
host_network
=
true
container
{
image
=
"jtblin/kube2iam:0.10.6"
name
=
"kube2iam-container"
image_pull_policy
=
"IfNotPresent"
args
=
[
"--host-interface=eni+"
,
"--default-role=eks-kube2iam-default-role"
,
"--use-regional-sts-endpoint"
,
"--iptables=true"
,
"--auto-discover-base-arn"
,
"--app-port=8181"
,
"--host-ip=
$
(HOST_IP)"
]
security_context
{
privileged
=
"true"
}
env
{
name
=
"HOST_IP"
value_from
=
{
field_ref
=
{
field_path
=
"status.podIP"
}
}
}
resources
{
limits
{
cpu
=
"0.5"
memory
=
"512Mi"
}
requests
{
cpu
=
"250m"
memory
=
"50Mi"
}
}
}
}
}
}
}
iam.tf
0 → 100644
View file @
d5c14349
data
"aws_iam_policy_document"
"eks_worker"
{
statement
{
actions
=
[
"sts:AssumeRole"
,
]
resources
=
[
"*"
]
}
}
resource
"aws_iam_policy"
"eks_worker"
{
policy
=
"
${data
.
aws_iam_policy_document
.
eks_worker
.
json
}
"
}
resource
"aws_iam_role_policy_attachment"
"eks_worker"
{
role
=
"
${
var
.
worker_iam_role_name
}
"
policy_arn
=
"
${
aws_iam_policy
.
eks_worker
.
arn
}
"
}
data
"aws_iam_policy_document"
"default"
{
statement
{
actions
=
[
"sts:AssumeRole"
,
]
principals
{
type
=
"Service"
identifiers
=
[
"ec2.amazonaws.com"
]
}
}
statement
{
actions
=
[
"sts:AssumeRole"
,
]
principals
{
type
=
"AWS"
identifiers
=
[
"
${
var
.
worker_iam_role_arn
}
"
]
}
}
}
resource
"aws_iam_role"
"default"
{
name
=
"eks-kube2iam-default-role"
assume_role_policy
=
"
${data
.
aws_iam_policy_document
.
default
.
json
}
"
}
variables.tf
View file @
d5c14349
variable
"kube2iam-container"
{
default
=
"jtblin/kube2iam:latest"
}
variable
"worker_iam_role_name"
{}
variable
"worker_iam_role_arn"
{}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment