Skip to content

Commit

Permalink
feat: Add support for enabling node-repair on worker nodes (#203)
Browse files Browse the repository at this point in the history
  • Loading branch information
ChrisMcKee authored Feb 3, 2025
1 parent dc34d4b commit c631ea6
Show file tree
Hide file tree
Showing 4 changed files with 52 additions and 36 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -411,6 +411,7 @@ https://docs.aws.amazon.com/eks/latest/userguide/windows-support.html
| <a name="input_name"></a> [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.<br/>This is the only ID element not also included as a `tag`.<br/>The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no |
| <a name="input_namespace"></a> [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no |
| <a name="input_node_group_terraform_timeouts"></a> [node\_group\_terraform\_timeouts](#input\_node\_group\_terraform\_timeouts) | Configuration for the Terraform [`timeouts` Configuration Block](https://www.terraform.io/docs/language/resources/syntax.html#operation-timeouts) of the node group resource.<br/>Leave list empty for defaults. Pass list with single object with attributes matching the `timeouts` block to configure it.<br/>Leave attribute values `null` to preserve individual defaults while setting others. | <pre>list(object({<br/> create = optional(string)<br/> update = optional(string)<br/> delete = optional(string)<br/> }))</pre> | `[]` | no |
| <a name="input_node_repair_enabled"></a> [node\_repair\_enabled](#input\_node\_repair\_enabled) | The node auto-repair configuration for the node group will be enabled. Defaults to false | `bool` | `false` | no |
| <a name="input_node_role_arn"></a> [node\_role\_arn](#input\_node\_role\_arn) | If provided, assign workers the given role, which this module will not modify | `list(string)` | `[]` | no |
| <a name="input_node_role_cni_policy_enabled"></a> [node\_role\_cni\_policy\_enabled](#input\_node\_role\_cni\_policy\_enabled) | When true, the `AmazonEKS_CNI_Policy` will be attached to the node IAM role.<br/>This used to be required, but it is [now recommended](https://docs.aws.amazon.com/eks/latest/userguide/create-node-role.html) that this policy be<br/>attached only to the `aws-node` Kubernetes service account. However, that<br/>is difficult to do with Terraform, so this module defaults to the old pattern. | `bool` | `true` | no |
| <a name="input_node_role_permissions_boundary"></a> [node\_role\_permissions\_boundary](#input\_node\_role\_permissions\_boundary) | If provided, all IAM roles will be created with this permissions boundary attached. | `string` | `null` | no |
Expand Down
Loading

0 comments on commit c631ea6

Please sign in to comment.