Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-kubernetes-dashboard
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-kubernetes-dashboard
Commits
a8b0176d
Commit
a8b0176d
authored
Mar 08, 2019
by
Danny
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
add name to resource
parent
0efbc2d2
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
28 additions
and
28 deletions
+28
-28
eks-kube-dashboard-clusterrole.tf
eks-kube-dashboard-clusterrole.tf
+22
-22
eks-kube-dashboard-secret.tf
eks-kube-dashboard-secret.tf
+1
-1
eks-kube-dashboard-serviceaccount.tf
eks-kube-dashboard-serviceaccount.tf
+1
-1
eks-kube-dashboard.tf
eks-kube-dashboard.tf
+4
-4
No files found.
eks-kube-dashboard-clusterrole.tf
View file @
a8b0176d
...
...
@@ -5,42 +5,42 @@ resource "kubernetes_role" "kubernetes_dashboard_role" {
}
rule
{
api_group
=
[
""
]
resources
=
[
"secrets"
]
verbs
=
[
"create"
]
api_group
s
=
[
""
]
resources
=
[
"secrets"
]
verbs
=
[
"create"
]
}
rule
{
api_group
=
[
""
]
resources
=
[
"configmaps"
]
verbs
=
[
"create"
]
api_group
s
=
[
""
]
resources
=
[
"configmaps"
]
verbs
=
[
"create"
]
}
rule
{
api_group
=
[
""
]
resources
=
[
"kubernetes-dashboard-key-holder"
,
"kubernetes-dashboard-certs"
]
verbs
=
[
"get"
,
"update"
,
"delete"
]
api_group
s
=
[
""
]
resources
=
[
"kubernetes-dashboard-key-holder"
,
"kubernetes-dashboard-certs"
]
verbs
=
[
"get"
,
"update"
,
"delete"
]
}
rule
{
api_group
=
[
""
]
api_group
s
=
[
""
]
resources
=
[
"configmaps"
]
resource_names
=
[
"kubernetes-dashboard-settings"
]
verbs
=
[
"get"
,
"update"
]
}
rule
{
api_group
=
[
""
]
resources
=
[
"services"
]
resource
N
ames
=
[
"heapster"
]
verbs
=
[
"proxy"
]
api_group
s
=
[
""
]
resources
=
[
"services"
]
resource
_n
ames
=
[
"heapster"
]
verbs
=
[
"proxy"
]
}
rule
{
api_group
=
[
""
]
resources
=
[
"services/proxy"
]
resource
N
ames
=
[
"heapster"
,
"http:heapster:"
,
"http:heaptser:"
]
verbs
=
[
"get"
]
api_group
s
=
[
""
]
resources
=
[
"services/proxy"
]
resource
_n
ames
=
[
"heapster"
,
"http:heapster:"
,
"http:heaptser:"
]
verbs
=
[
"get"
]
}
}
...
...
@@ -51,12 +51,12 @@ resource "kubernetes_role_binding" "kubernetes_dashboard_role_bind" {
}
role_ref
{
api_group
=
[
"rbac.authorization.k8s.io"
]
kind
=
"Role"
name
=
"kubernetes-dashboard-minimal"
api_group
s
=
"rbac.authorization.k8s.io"
kind
=
"Role"
name
=
"kubernetes-dashboard-minimal"
}
subject
s
{
subject
{
kind
=
"ServiceAccount"
name
=
"kubernetes-dashboard"
}
...
...
eks-kube-dashboard-secret.tf
View file @
a8b0176d
resource
"kubernetes_secret"
{
resource
"kubernetes_secret"
"kubernetes_dashboard_secret"
{
metadata
{
labels
{
app
=
"kubernetes-dashboard"
...
...
eks-kube-dashboard-serviceaccount.tf
View file @
a8b0176d
resource
"kubernetes_service_account"
"kubernetes_dashboard_serviceaccount"
{
metadata
{
app
=
"kubernetes-dashboard"
name
=
"kubernetes-dashboard"
namespace
=
"kube-system"
}
}
eks-kube-dashboard.tf
View file @
a8b0176d
...
...
@@ -28,10 +28,10 @@ resource "kubernetes_deployment" "kubernetes_dashboard_deployment" {
termination_grace_period_seconds
=
60
volume
{
name
=
"
${
kubernetes_service_account
.
kube
_dash_service_
account
.
default_secret_name
}
"
name
=
"
${
kubernetes_service_account
.
kube
rnetes_dashboard_service
account
.
default_secret_name
}
"
secret
{
secret_name
=
"
${
kubernetes_service_account
.
kube
_dash_service_
account
.
default_secret_name
}
"
secret_name
=
"
${
kubernetes_service_account
.
kube
rnetes_dashboard_service
account
.
default_secret_name
}
"
}
}
...
...
@@ -45,7 +45,7 @@ resource "kubernetes_deployment" "kubernetes_dashboard_deployment" {
volume
{
name
=
"tmp-volume"
empty_dir
=
""
empty_dir
{}
}
container
{
...
...
@@ -55,7 +55,7 @@ resource "kubernetes_deployment" "kubernetes_dashboard_deployment" {
volume_mount
{
mount_path
=
"/var/run/secrets/kubernetes.io/serviceaccount"
name
=
"
${
kubernetes_service_account
.
aws_alb_service_
account
.
default_secret_name
}
"
name
=
"
${
kubernetes_service_account
.
kubernetes_dashboard_service
account
.
default_secret_name
}
"
read_only
=
true
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment