You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: examples/outposts/README.md
+24-16
Original file line number
Diff line number
Diff line change
@@ -10,10 +10,25 @@ Note: This example requires an an AWS Outpost to provision.
10
10
11
11
To run this example you need to:
12
12
13
-
1. Copy the `terraform.tfvars.example` to `terraform.tfvars` and fill in the required variables
14
-
2. Execute:
13
+
1. Deploy the remote host where the cluster will be provisioned from. The remote host is required since only private access is permitted to clusters created on Outposts. If you have access to the network where Outposts are provisioned (VPN, etc.), you can skip this step:
15
14
16
15
```bash
16
+
$ cd prerequisites
17
+
$ terraform init
18
+
$ terraform plan
19
+
$ terraform apply
20
+
```
21
+
22
+
2. If provisioning using the remote host deployed in step 1, connect to the remote host using SSM. Note, you will need to have the [SSM plugin for the AWS CLI installed](https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-working-with-install-plugin.html). You can use the output generated by step 1 to connect:
|[aws_outposts_outpost_instance_types.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/outposts_outpost_instance_types)| data source |
50
67
|[aws_outposts_outposts.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/outposts_outposts)| data source |
68
+
|[aws_subnet.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnet)| data source |
69
+
|[aws_subnets.lookup](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets)| data source |
51
70
|[aws_subnets.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets)| data source |
71
+
|[aws_vpc.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/vpc)| data source |
52
72
53
73
## Inputs
54
74
55
75
| Name | Description | Type | Default | Required |
| <aname="input_outpost_instance_type"></a> [outpost\_instance\_type](#input\_outpost\_instance\_type)| Instance type supported by the Outposts instance |`string`|`"m5.large"`| no |
58
-
| <aname="input_region"></a> [region](#input\_region)| The AWS region to deploy into (e.g. us-east-1) |`string`| n/a | yes |
77
+
| <aname="input_region"></a> [region](#input\_region)| The AWS region to deploy into (e.g. us-east-1) |`string`|`"us-west-2"`| no |
59
78
60
79
## Outputs
61
80
@@ -64,32 +83,21 @@ Note that this example may create resources which cost money. Run `terraform des
64
83
| <aname="output_aws_auth_configmap_yaml"></a> [aws\_auth\_configmap\_yaml](#output\_aws\_auth\_configmap\_yaml)| Formatted yaml output for base aws-auth configmap containing roles used in cluster node groups/fargate profiles |
65
84
| <aname="output_cloudwatch_log_group_arn"></a> [cloudwatch\_log\_group\_arn](#output\_cloudwatch\_log\_group\_arn)| Arn of cloudwatch log group created |
66
85
| <aname="output_cloudwatch_log_group_name"></a> [cloudwatch\_log\_group\_name](#output\_cloudwatch\_log\_group\_name)| Name of cloudwatch log group created |
67
-
| <aname="output_cluster_addons"></a> [cluster\_addons](#output\_cluster\_addons)| Map of attribute maps for all EKS cluster addons enabled |
68
86
| <aname="output_cluster_arn"></a> [cluster\_arn](#output\_cluster\_arn)| The Amazon Resource Name (ARN) of the cluster |
69
87
| <aname="output_cluster_certificate_authority_data"></a> [cluster\_certificate\_authority\_data](#output\_cluster\_certificate\_authority\_data)| Base64 encoded certificate data required to communicate with the cluster |
70
88
| <aname="output_cluster_endpoint"></a> [cluster\_endpoint](#output\_cluster\_endpoint)| Endpoint for your Kubernetes API server |
71
89
| <aname="output_cluster_iam_role_arn"></a> [cluster\_iam\_role\_arn](#output\_cluster\_iam\_role\_arn)| IAM role ARN of the EKS cluster |
72
90
| <aname="output_cluster_iam_role_name"></a> [cluster\_iam\_role\_name](#output\_cluster\_iam\_role\_name)| IAM role name of the EKS cluster |
73
91
| <aname="output_cluster_iam_role_unique_id"></a> [cluster\_iam\_role\_unique\_id](#output\_cluster\_iam\_role\_unique\_id)| Stable and unique string identifying the IAM role |
74
92
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| The name/id of the EKS cluster. Will block on cluster creation until the cluster is really ready |
75
-
| <aname="output_cluster_identity_providers"></a> [cluster\_identity\_providers](#output\_cluster\_identity\_providers)| Map of attribute maps for all EKS identity providers enabled |
76
93
| <aname="output_cluster_oidc_issuer_url"></a> [cluster\_oidc\_issuer\_url](#output\_cluster\_oidc\_issuer\_url)| The URL on the EKS cluster for the OpenID Connect identity provider |
77
94
| <aname="output_cluster_platform_version"></a> [cluster\_platform\_version](#output\_cluster\_platform\_version)| Platform version for the cluster |
78
95
| <aname="output_cluster_primary_security_group_id"></a> [cluster\_primary\_security\_group\_id](#output\_cluster\_primary\_security\_group\_id)| Cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. Referred to as 'Cluster security group' in the EKS console |
79
96
| <aname="output_cluster_security_group_arn"></a> [cluster\_security\_group\_arn](#output\_cluster\_security\_group\_arn)| Amazon Resource Name (ARN) of the cluster security group |
80
97
| <aname="output_cluster_security_group_id"></a> [cluster\_security\_group\_id](#output\_cluster\_security\_group\_id)| ID of the cluster security group |
81
98
| <aname="output_cluster_status"></a> [cluster\_status](#output\_cluster\_status)| Status of the EKS cluster. One of `CREATING`, `ACTIVE`, `DELETING`, `FAILED`|
82
-
| <aname="output_cluster_tls_certificate_sha1_fingerprint"></a> [cluster\_tls\_certificate\_sha1\_fingerprint](#output\_cluster\_tls\_certificate\_sha1\_fingerprint)| The SHA1 fingerprint of the public key of the cluster's certificate |
83
-
| <aname="output_eks_managed_node_groups"></a> [eks\_managed\_node\_groups](#output\_eks\_managed\_node\_groups)| Map of attribute maps for all EKS managed node groups created |
84
-
| <aname="output_eks_managed_node_groups_autoscaling_group_names"></a> [eks\_managed\_node\_groups\_autoscaling\_group\_names](#output\_eks\_managed\_node\_groups\_autoscaling\_group\_names)| List of the autoscaling group names created by EKS managed node groups |
85
-
| <aname="output_fargate_profiles"></a> [fargate\_profiles](#output\_fargate\_profiles)| Map of attribute maps for all EKS Fargate Profiles created |
86
-
| <aname="output_kms_key_arn"></a> [kms\_key\_arn](#output\_kms\_key\_arn)| The Amazon Resource Name (ARN) of the key |
87
-
| <aname="output_kms_key_id"></a> [kms\_key\_id](#output\_kms\_key\_id)| The globally unique identifier for the key |
88
-
| <aname="output_kms_key_policy"></a> [kms\_key\_policy](#output\_kms\_key\_policy)| The IAM resource policy set on the key |
89
99
| <aname="output_node_security_group_arn"></a> [node\_security\_group\_arn](#output\_node\_security\_group\_arn)| Amazon Resource Name (ARN) of the node shared security group |
90
100
| <aname="output_node_security_group_id"></a> [node\_security\_group\_id](#output\_node\_security\_group\_id)| ID of the node shared security group |
91
-
| <aname="output_oidc_provider"></a> [oidc\_provider](#output\_oidc\_provider)| The OpenID Connect identity provider (issuer URL without leading `https://`) |
92
-
| <aname="output_oidc_provider_arn"></a> [oidc\_provider\_arn](#output\_oidc\_provider\_arn)| The ARN of the OIDC Provider if `enable_irsa = true`|
93
101
| <aname="output_self_managed_node_groups"></a> [self\_managed\_node\_groups](#output\_self\_managed\_node\_groups)| Map of attribute maps for all self managed node groups created |
94
102
| <aname="output_self_managed_node_groups_autoscaling_group_names"></a> [self\_managed\_node\_groups\_autoscaling\_group\_names](#output\_self\_managed\_node\_groups\_autoscaling\_group\_names)| List of the autoscaling group names created by self-managed node groups |
0 commit comments