/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: MIT-0 * * Permission is hereby granted, free of charge, to any person obtaining a copy of this * software and associated documentation files (the "Software"), to deal in the Software * without restriction, including without limitation the rights to use, copy, modify, * merge, publish, distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, * INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A * PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT * HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ output "cluster_oidc_url" { description = "The URL on the EKS cluster OIDC Issuer" value = var.create_eks ? split("//", module.eks.cluster_oidc_issuer_url)[1] : "EKS Cluster not enabled" } output "oidc_provider_arn" { description = "The ARN of the OIDC Provider if `enable_irsa = true`." value = var.create_eks ? module.eks.oidc_provider_arn : "EKS Cluster not enabled" } output "cluster_name" { description = "Kubernetes Cluster Name" value = var.create_eks ? module.eks-label.id : "EKS Cluster not enabled" } output "configure_kubectl" { description = "Configure kubectl: make sure you're logged in with the correct AWS profile and run the following command to update your kubeconfig" value = var.create_eks ? "aws eks --region ${data.aws_region.current.id} update-kubeconfig --name ${module.eks.cluster_id}" : "EKS Cluster not enabled" } output "amp_work_id" { value = var.prometheus_enable ? module.aws_managed_prometheus[0].amp_workspace_id : "AMP not enabled" } output "amp_work_arn" { value = var.prometheus_enable ? module.aws_managed_prometheus[0].service_account_amp_ingest_role_arn : "AMP not enabled" } output "self_managed_node_group_iam_role_arns" { description = "IAM role arn's of self managed node groups" value = var.create_eks && var.enable_self_managed_nodegroups ? { for nodes in sort(keys(var.self_managed_node_groups)) : nodes => module.aws-eks-self-managed-node-groups[nodes].self_managed_node_group_iam_role_arns } : null } output "managed_node_group_iam_role_arns" { description = "IAM role arn's of self managed node groups" value = var.create_eks && var.enable_managed_nodegroups ? { for nodes in sort(keys(var.managed_node_groups)) : nodes => module.managed-node-groups[nodes].manage_ng_iam_role_arn } : null } output "managed_node_groups" { description = "Outputs from EKS node groups " value = var.create_eks && var.enable_managed_nodegroups ? module.managed-node-groups.* : [] } output "fargate_profiles" { description = "Outputs from EKS node groups " value = var.create_eks && var.enable_fargate ? module.fargate-profiles.* : [] } output "self_managed_node_group_aws_auth_config_map" { value = local.self_managed_node_group_aws_auth_config_map.* } output "windows_node_group_aws_auth_config_map" { value = local.windows_node_group_aws_auth_config_map.* } output "managed_node_group_aws_auth_config_map" { value = local.managed_node_group_aws_auth_config_map.* } output "fargate_profiles_aws_auth_config_map" { value = local.fargate_profiles_aws_auth_config_map.* } output "cluster_security_group_id" { value = module.eks.cluster_security_group_id } output "cluster_primary_security_group_id" { value = module.eks.cluster_primary_security_group_id } output "security_group_rule_cluster_https_worker_ingress" { value = module.eks.security_group_rule_cluster_https_worker_ingress } output "worker_security_group_id" { value = module.eks.worker_security_group_id } //output "self_managed_node_group_iam_roles" { // description = "IAM role arn's of self managed node groups" //// value = var.create_eks && var.enable_managed_nodegroups ? {for node in sort(keys(var.managed_node_groups)) : node => lookup(var.self_managed_node_groups[node],"node_group_name")} : null // value = var.create_eks && var.enable_self_managed_nodegroups ? { // for_each = { // for key, node_values in var.self_managed_node_groups: key => lookup(node_values, "node_group_name") } // } : null // //} //${lookup(var.var["firstchoice"],"firstAChoice")}