Commit 813b0a3 1 parent ec9da28 commit 813b0a3 Copy full SHA for 813b0a3
File tree 25 files changed +47
-47
lines changed
chatbot/.workshop/terraform
inferentia/.workshop/terraform
crossplane/.workshop/terraform
gitops/flux/.workshop/terraform
cluster-autoscaler/.workshop/terraform
karpenter/.workshop/terraform
workloads/keda/.workshop/terraform
ingress/.workshop/terraform
load-balancer/.workshop/terraform
network-policies/.workshop/terraform
securitygroups-for-pods/.workshop/terraform/preprovision
vpc-lattice/.workshop/terraform
container-insights/.workshop/terraform
kubecost/.workshop/terraform
oss-metrics/.workshop/terraform
resiliency/.workshop/terraform
eks-pod-identity/.workshop/terraform
secrets-manager/.workshop/terraform
25 files changed +47
-47
lines changed Original file line number Diff line number Diff line change @@ -4,22 +4,22 @@ terraform {
4
4
required_providers {
5
5
aws = {
6
6
source = " hashicorp/aws"
7
- version = " 5.72 .0"
7
+ version = " 5.90 .0"
8
8
}
9
9
kubernetes = {
10
10
source = " hashicorp/kubernetes"
11
- version = " 2.32 .0"
11
+ version = " 2.36 .0"
12
12
}
13
13
helm = {
14
14
source = " hashicorp/helm"
15
- version = " 2.15 .0"
15
+ version = " 2.17 .0"
16
16
}
17
17
kubectl = {
18
18
source = " gavinbunney/kubectl"
19
- version = " 1.14 .0"
19
+ version = " 1.19 .0"
20
20
}
21
21
local = {
22
- version = " 2.5.1 "
22
+ version = " 2.5.2 "
23
23
}
24
24
}
25
25
}
Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ data "aws_ecrpublic_authorization_token" "token" {
24
24
25
25
module "eks_blueprints_addons" {
26
26
source = " aws-ia/eks-blueprints-addons/aws"
27
- version = " 1.19 .0"
27
+ version = " 1.20 .0"
28
28
29
29
enable_aws_load_balancer_controller = true
30
30
aws_load_balancer_controller = {
@@ -71,7 +71,7 @@ resource "aws_eks_addon" "pod_identity" {
71
71
72
72
module "karpenter" {
73
73
source = " terraform-aws-modules/eks/aws//modules/karpenter"
74
- version = " 20.24 "
74
+ version = " 20.34 "
75
75
76
76
cluster_name = var. addon_context . eks_cluster_id
77
77
enable_v1_permissions = true
@@ -104,7 +104,7 @@ resource "helm_release" "karpenter" {
104
104
repository_password = data. aws_ecrpublic_authorization_token . token . password
105
105
chart = " karpenter"
106
106
# renovate: datasource=github-releases depName=aws/karpenter-provider-aws
107
- version = " 1.0.2 "
107
+ version = " 1.3.1 "
108
108
wait = true
109
109
110
110
values = [
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ resource "aws_eks_addon" "pod_identity" {
31
31
32
32
module "karpenter" {
33
33
source = " terraform-aws-modules/eks/aws//modules/karpenter"
34
- version = " 20.24 .0"
34
+ version = " 20.34 .0"
35
35
36
36
cluster_name = var. addon_context . eks_cluster_id
37
37
enable_v1_permissions = true
@@ -106,7 +106,7 @@ resource "aws_s3_bucket" "inference" {
106
106
107
107
module "iam_assumable_role_inference" {
108
108
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
109
- version = " 5.44 .0"
109
+ version = " 5.53 .0"
110
110
create_role = true
111
111
role_name = " ${ var . addon_context . eks_cluster_id } -inference"
112
112
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ data "aws_ecrpublic_authorization_token" "token" {
22
22
23
23
module "iam_assumable_role_carts" {
24
24
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
25
- version = " 5.44 .0"
25
+ version = " 5.53 .0"
26
26
create_role = true
27
27
role_name = " ${ var . addon_context . eks_cluster_id } -carts-ack"
28
28
provider_url = var. addon_context . eks_oidc_issuer_url
82
82
83
83
module "iam_assumable_role_ack" {
84
84
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85
- version = " 5.44 .0"
85
+ version = " 5.53 .0"
86
86
create_role = true
87
87
role_name = " ${ var . addon_context . eks_cluster_id } -ack-controller"
88
88
provider_url = var. addon_context . eks_oidc_issuer_url
@@ -94,7 +94,7 @@ module "iam_assumable_role_ack" {
94
94
95
95
module "eks_blueprints_addons" {
96
96
source = " aws-ia/eks-blueprints-addons/aws"
97
- version = " 1.19 .0"
97
+ version = " 1.20 .0"
98
98
99
99
enable_aws_load_balancer_controller = true
100
100
aws_load_balancer_controller = {
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ locals {
42
42
43
43
module "upbound_irsa_aws" {
44
44
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45
- version = " 5.44 .0"
45
+ version = " 5.53 .0"
46
46
47
47
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
48
48
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ddb-upbound-"
@@ -102,7 +102,7 @@ resource "kubectl_manifest" "upbound_aws_provider_config" {
102
102
103
103
module "iam_assumable_role_carts" {
104
104
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
105
- version = " 5.44 .0"
105
+ version = " 5.53 .0"
106
106
create_role = true
107
107
role_name = " ${ var . addon_context . eks_cluster_id } -carts-crossplane"
108
108
provider_url = var. addon_context . eks_oidc_issuer_url
137
137
138
138
module "eks_blueprints_addons" {
139
139
source = " aws-ia/eks-blueprints-addons/aws"
140
- version = " 1.19 .0"
140
+ version = " 1.20 .0"
141
141
142
142
enable_aws_load_balancer_controller = true
143
143
aws_load_balancer_controller = {
Original file line number Diff line number Diff line change @@ -511,7 +511,7 @@ resource "aws_codepipeline" "codepipeline" {
511
511
512
512
module "iam_assumable_role_ui" {
513
513
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
514
- version = " 5.44 .0"
514
+ version = " 5.53 .0"
515
515
create_role = true
516
516
role_name = " ${ var . addon_context . eks_cluster_id } -ecr-ui"
517
517
provider_url = var. addon_context . eks_oidc_issuer_url
541
541
542
542
module "eks_blueprints_addons" {
543
543
source = " aws-ia/eks-blueprints-addons/aws"
544
- version = " 1.19 .0"
544
+ version = " 1.20 .0"
545
545
546
546
enable_aws_load_balancer_controller = true
547
547
aws_load_balancer_controller = {
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
cluster_name = var. addon_context . eks_cluster_id
6
6
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ resource "aws_eks_addon" "pod_identity" {
7
7
8
8
module "karpenter" {
9
9
source = " terraform-aws-modules/eks/aws//modules/karpenter"
10
- version = " 20.24 .0"
10
+ version = " 20.34 .0"
11
11
12
12
cluster_name = var. addon_context . eks_cluster_id
13
13
enable_pod_identity = true
Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ data "aws_partition" "current" {}
2
2
3
3
module "eks_blueprints_addons" {
4
4
source = " aws-ia/eks-blueprints-addons/aws"
5
- version = " 1.19 .0"
5
+ version = " 1.20 .0"
6
6
7
7
cluster_name = var. addon_context . eks_cluster_id
8
8
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
@@ -20,7 +20,7 @@ module "eks_blueprints_addons" {
20
20
21
21
module "iam_assumable_role_keda" {
22
22
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
23
- version = " 5.44 .0"
23
+ version = " 5.53 .0"
24
24
create_role = true
25
25
role_name = " ${ var . addon_context . eks_cluster_id } -keda"
26
26
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
cluster_name = var. addon_context . eks_cluster_id
6
6
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
cluster_name = var. addon_context . eks_cluster_id
6
6
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
Original file line number Diff line number Diff line change 1
1
module "ebs_csi_driver_irsa" {
2
2
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3
- version = " 5.44 .0"
3
+ version = " 5.53 .0"
4
4
5
5
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
6
6
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 1
1
module "efs_csi_driver_irsa" {
2
2
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3
- version = " 5.44 .0"
3
+ version = " 5.53 .0"
4
4
5
5
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -efs-csi-"
6
6
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
Original file line number Diff line number Diff line change 1
1
# Create FSxZ OIDC providers
2
2
module "fsxz_oidc_providers" {
3
3
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
4
- version = " 5.39.1 "
4
+ version = " 5.53.0 "
5
5
6
6
# Create prefixes
7
7
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -fsxz-csi-"
@@ -130,7 +130,7 @@ resource "aws_security_group_rule" "fsxz_egress" {
130
130
131
131
module "iam_assumable_role_fsx" {
132
132
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
133
- version = " 5.44 .0"
133
+ version = " 5.53 .0"
134
134
create_role = true
135
135
role_name = " ${ var . addon_context . eks_cluster_id } -fsxz"
136
136
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ resource "aws_s3_bucket" "mountpoint_s3" {
8
8
# Create S3 CSI Driver IAM Role and associated policy
9
9
module "mountpoint_s3_csi_driver_irsa" {
10
10
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
11
- version = " 5.39.1 "
11
+ version = " 5.53.0 "
12
12
13
13
# Create prefixes
14
14
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -s3-csi-"
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
enable_aws_load_balancer_controller = true
6
6
aws_load_balancer_controller = {
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ data "aws_subnets" "private_sg_rds" {
19
19
20
20
module "catalog_mysql" {
21
21
source = " terraform-aws-modules/rds/aws"
22
- version = " 6.9 .0"
22
+ version = " 6.10 .0"
23
23
24
24
identifier = " ${ var . eks_cluster_id } -catalog"
25
25
@@ -61,7 +61,7 @@ resource "random_string" "catalog_db_master" {
61
61
62
62
module "catalog_rds_ingress" {
63
63
source = " terraform-aws-modules/security-group/aws"
64
- version = " 5.2 .0"
64
+ version = " 5.3 .0"
65
65
66
66
name = " ${ var . eks_cluster_id } -catalog-rds"
67
67
description = " Catalog RDS security group"
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
enable_aws_load_balancer_controller = true
6
6
aws_load_balancer_controller = {
@@ -19,7 +19,7 @@ module "eks_blueprints_addons" {
19
19
20
20
module "iam_assumable_role_lattice" {
21
21
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
22
- version = " 5.44 .0"
22
+ version = " 5.53 .0"
23
23
create_role = true
24
24
role_name = " ${ var . addon_context . eks_cluster_id } -lattice"
25
25
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -3,7 +3,7 @@ data "aws_region" "current" {}
3
3
4
4
module "eks_blueprints_addons" {
5
5
source = " aws-ia/eks-blueprints-addons/aws"
6
- version = " 1.19 .0"
6
+ version = " 1.20 .0"
7
7
8
8
cluster_name = var. addon_context . eks_cluster_id
9
9
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
@@ -82,7 +82,7 @@ module "opentelemetry_operator" {
82
82
83
83
module "iam_assumable_role_adot_ci" {
84
84
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
85
- version = " 5.44 .0"
85
+ version = " 5.53 .0"
86
86
create_role = true
87
87
role_name = " ${ var . addon_context . eks_cluster_id } -adot-collector-ci"
88
88
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change 1
1
module "ebs_csi_driver_irsa" {
2
2
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
3
- version = " 5.44 .0"
3
+ version = " 5.53 .0"
4
4
5
5
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
6
6
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
@@ -19,7 +19,7 @@ module "ebs_csi_driver_irsa" {
19
19
20
20
module "eks_blueprints_addons" {
21
21
source = " aws-ia/eks-blueprints-addons/aws"
22
- version = " 1.19 .0"
22
+ version = " 1.20 .0"
23
23
24
24
cluster_name = var. addon_context . eks_cluster_id
25
25
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
Original file line number Diff line number Diff line change @@ -2,7 +2,7 @@ data "aws_partition" "current" {}
2
2
3
3
module "ebs_csi_driver_irsa" {
4
4
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
5
- version = " 5.44 .0"
5
+ version = " 5.53 .0"
6
6
7
7
role_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
8
8
policy_name_prefix = " ${ var . addon_context . eks_cluster_id } -ebs-csi-"
@@ -21,7 +21,7 @@ module "ebs_csi_driver_irsa" {
21
21
22
22
module "eks_blueprints_addons" {
23
23
source = " aws-ia/eks-blueprints-addons/aws"
24
- version = " 1.19 .0"
24
+ version = " 1.20 .0"
25
25
26
26
cluster_name = var. addon_context . eks_cluster_id
27
27
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
@@ -115,7 +115,7 @@ resource "aws_prometheus_workspace" "this" {
115
115
116
116
module "iam_assumable_role_adot" {
117
117
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
118
- version = " 5.44 .0"
118
+ version = " 5.53 .0"
119
119
120
120
create_role = true
121
121
role_name = " ${ var . addon_context . eks_cluster_id } -adot-collector"
Original file line number Diff line number Diff line change 1
1
module "eks_blueprints_addons" {
2
2
source = " aws-ia/eks-blueprints-addons/aws"
3
- version = " 1.19 .0"
3
+ version = " 1.20 .0"
4
4
5
5
cluster_name = var. addon_context . eks_cluster_id
6
6
cluster_endpoint = var. addon_context . aws_eks_cluster_endpoint
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ data "aws_partition" "current" {}
4
4
5
5
module "eks_blueprints_addons" {
6
6
source = " aws-ia/eks-blueprints-addons/aws"
7
- version = " 1.19 .0"
7
+ version = " 1.20 .0"
8
8
9
9
enable_aws_load_balancer_controller = true
10
10
aws_load_balancer_controller = {
@@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" {
92
92
93
93
module "iam_assumable_role_carts" {
94
94
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role"
95
- version = " 5.44 .0"
95
+ version = " 5.53 .0"
96
96
create_role = true
97
97
role_requires_mfa = false
98
98
role_name = " ${ var . addon_context . eks_cluster_id } -carts-dynamo"
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ data "aws_region" "current" {}
4
4
5
5
module "eks_blueprints_addons" {
6
6
source = " aws-ia/eks-blueprints-addons/aws"
7
- version = " 1.19 .0"
7
+ version = " 1.20 .0"
8
8
9
9
enable_aws_load_balancer_controller = true
10
10
aws_load_balancer_controller = {
@@ -92,7 +92,7 @@ resource "aws_dynamodb_table" "carts" {
92
92
93
93
module "iam_assumable_role_carts" {
94
94
source = " terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
95
- version = " 5.44 .0"
95
+ version = " 5.53 .0"
96
96
create_role = true
97
97
role_name = " ${ var . addon_context . eks_cluster_id } -carts-dynamo"
98
98
provider_url = var. addon_context . eks_oidc_issuer_url
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ module "external_secrets" {
42
42
43
43
module "secrets_manager_role" {
44
44
source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
45
- version = " 5.44 .0"
45
+ version = " 5.53 .0"
46
46
47
47
role_name_prefix = " ${ var . eks_cluster_id } -secrets-"
48
48
policy_name_prefix = " ${ var . eks_cluster_id } -secrets-"
You can’t perform that action at this time.
0 commit comments