-
Vara Bonthu authoredVara Bonthu authored
Code owners
Assign users and groups as approvers for specific file changes. Learn more.
outputs.tf 5.49 KiB
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: MIT-0
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of this
* software and associated documentation files (the "Software"), to deal in the Software
* without restriction, including without limitation the rights to use, copy, modify,
* merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
* INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
* PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
* HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
output "cluster_oidc_url" {
description = "The URL on the EKS cluster OIDC Issuer"
value = var.create_eks ? split("//", module.aws_eks.cluster_oidc_issuer_url)[1] : "EKS Cluster not enabled"
}
output "oidc_provider_arn" {
description = "The ARN of the OIDC Provider if `enable_irsa = true`."
value = var.create_eks ? module.aws_eks.oidc_provider_arn : "EKS Cluster not enabled"
}
output "cluster_name" {
description = "Kubernetes Cluster Name"
value = var.create_eks ? module.aws_eks.cluster_id : "EKS Cluster not enabled"
}
output "configure_kubectl" {
description = "Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig"
value = var.create_eks ? "aws eks --region ${data.aws_region.current.id} update-kubeconfig --name ${module.aws_eks.cluster_id}" : "EKS Cluster not enabled"
}
output "cluster_security_group_id" {
description = "EKS Control Plane Security Group ID"
value = module.aws_eks.cluster_security_group_id
}
output "cluster_primary_security_group_id" {
description = "EKS Cluster Security group ID"
value = module.aws_eks.cluster_primary_security_group_id
}
output "worker_security_group_id" {
description = "EKS Worker Security group ID created by EKS module"
value = module.aws_eks.worker_security_group_id
}
output "amp_work_id" {
description = "AWS Managed Prometheus workspace id"
value = var.aws_managed_prometheus_enable ? module.aws_managed_prometheus[0].amp_workspace_id : "AMP not enabled"
}
output "amp_work_arn" {
description = "AWS Managed Prometheus workspace ARN"
value = var.aws_managed_prometheus_enable ? module.aws_managed_prometheus[0].service_account_amp_ingest_role_arn : "AMP not enabled"
}
output "self_managed_node_group_iam_role_arns" {
description = "IAM role arn's of self managed node groups"
value = var.create_eks && var.enable_self_managed_nodegroups ? values({ for nodes in sort(keys(var.self_managed_node_groups)) : nodes => join(",", module.aws_eks_self_managed_node_groups[nodes].self_managed_node_group_iam_role_arns) }) : []
}
output "managed_node_group_iam_role_arns" {
description = "IAM role arn's of managed node groups"
value = var.create_eks && var.enable_managed_nodegroups ? values({ for nodes in sort(keys(var.managed_node_groups)) : nodes => join(",", module.aws_eks_managed_node_groups[nodes].managed_nodegroup_iam_role_name) }) : []
}
output "fargate_profiles_iam_role_arns" {
description = "IAM role arn's for Fargate Profiles"
value = var.create_eks && var.enable_fargate ? { for nodes in sort(keys(var.fargate_profiles)) : nodes => module.aws_eks_fargate_profiles[nodes].eks_fargate_profile_role_name } : null
}
output "managed_node_groups" {
description = "Outputs from EKS Managed node groups "
value = var.create_eks && var.enable_managed_nodegroups ? module.aws_eks_managed_node_groups.* : []
}
output "self_managed_node_groups" {
description = "Outputs from EKS Self-managed node groups "
value = var.create_eks && var.enable_self_managed_nodegroups ? module.aws_eks_self_managed_node_groups.* : []
}
output "fargate_profiles" {
description = "Outputs from EKS Fargate profiles groups "
value = var.create_eks && var.enable_fargate ? module.aws_eks_fargate_profiles.* : []
}
output "self_managed_node_group_aws_auth_config_map" {
description = "Self managed node groups AWS auth map"
value = local.self_managed_node_group_aws_auth_config_map.*
}
output "windows_node_group_aws_auth_config_map" {
description = "Windows node groups AWS auth map"
value = local.windows_node_group_aws_auth_config_map.*
}
output "managed_node_group_aws_auth_config_map" {
description = "Managed node groups AWS auth map"
value = local.managed_node_group_aws_auth_config_map.*
}
output "fargate_profiles_aws_auth_config_map" {
description = "Fargate profiles AWS auth map"
value = local.fargate_profiles_aws_auth_config_map.*
}
output "emr_on_eks_role_arn" {
description = "IAM execution role ARN for EMR on EKS"
value = var.create_eks && var.enable_emr_on_eks ? values({ for nodes in sort(keys(var.emr_on_eks_teams)) : nodes => join(",", module.emr_on_eks[nodes].emr_on_eks_role_arn) }) : []
}
output "emr_on_eks_role_id" {
description = "IAM execution role ID for EMR on EKS"
value = var.create_eks && var.enable_emr_on_eks ? values({ for nodes in sort(keys(var.emr_on_eks_teams)) : nodes => join(",", module.emr_on_eks[nodes].emr_on_eks_role_id) }) : []
}