You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: terraform/layer1-aws/README.md
+13-6
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@
3
3
| Name | Version |
4
4
|------|---------|
5
5
| terraform | 0.15.1 |
6
-
| aws | 3.38.0 |
7
-
| kubernetes | 2.1.0|
6
+
| aws | 3.53.0 |
7
+
| kubernetes | 2.4.1|
8
8
9
9
## Providers
10
10
11
11
| Name | Version |
12
12
|------|---------|
13
-
| aws | 3.38.0 |
13
+
| aws | 3.53.0 |
14
14
15
15
## Inputs
16
16
@@ -25,15 +25,22 @@
25
25
| domain\_name | Main public domain name |`any`| n/a | yes |
26
26
| ecr\_repo\_retention\_count | number of images to store in ECR |`number`|`50`| no |
27
27
| ecr\_repos | List of docker repositories |`list(any)`| <pre>[<br> "demo"<br>]</pre> | no |
28
-
| eks\_cluster\_version | Version of the EKS K8S cluster |`string`|`"1.18"`| no |
28
+
| eks\_cluster\_enabled\_log\_types | A list of the desired control plane logging to enable. For more information, see Amazon EKS Control Plane Logging documentation (https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html). Possible values: api, audit, authenticator, controllerManager, scheduler |`list(string)`| <pre>[<br> "audit"<br>]</pre> | no |
29
+
| eks\_cluster\_encryption\_config\_enable | Enable or not encryption for k8s secrets with aws-kms |`bool`|`false`| no |
30
+
| eks\_cluster\_log\_retention\_in\_days | Number of days to retain log events. Default retention - 90 days. |`number`|`90`| no |
31
+
| eks\_cluster\_version | Version of the EKS K8S cluster |`string`|`"1.21"`| no |
29
32
| eks\_map\_roles | Additional IAM roles to add to the aws-auth configmap. | <pre>list(object({<br> rolearn = string<br> username = string<br> groups = list(string)<br> }))</pre> |`[]`| no |
| eks\_workers\_additional\_policies|Additional IAM policy attached to EKS worker nodes |`list(any)`| <pre>[<br> "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"<br>]</pre> | no |
31
34
| eks\_write\_kubeconfig | Flag for eks module to write kubeconfig |`bool`|`false`| no |
32
35
| environment | Env name in case workspace wasn't used |`string`|`"demo"`| no |
33
-
| name | Project name, required to form unique resource names |`any`| n/a | yes |
36
+
| name | Project name, required to create unique resource names |`any`| n/a | yes |
0 commit comments