eks-ecommerce
Devgurusio/eks-ecommerce/aws
AWS Elastic Kubernetes Service starter kit to bootstrap an e-commerce site based on microservices
Elastic Kubernetes Service (EKS) This is an opinionated terraform module to bootstrap an EKS Cluster using Terraform. Features enabled: Logging using Amazon Cloudwatch Firewall security measures, allowing only required control-plane to nodes communication. IAM Accounts for Service Accounts VPC Native cluster Cluster Autoscaler IAM Roles and Helm release installed (configurable) Metrics server configured and fully functional Updatable nodes through AWS Autoscaling instance refreshes Non-default SA for nodes Usage of containerd as runtime (configurable on the example file) aws-auth management Usage You can find a fully functional, production-ready example on the examples/ folder. Requirements | Name | Version | | --------- | ------- | | terraform | >= 1.0 | Important Note This module require
| Name | Type | Description | Default |
|---|---|---|---|
| self_managed_node_groups | any | Object that represents the Node configuration to apply. Taken from the parent mo | required |
| environment | string | The environment name | "devgurus-dev" |
| kubernetes_version | string | The Kubernetes version of the Kubernetes control plane | "1.21" |
| enable_cluster_autoscaler | bool | Whether to create a Helm release installing cluster-autoscaler resources or not | false |
| create_aws_auth_configmap | bool | This option toogles aws-auth creation. It should only be enabled when using self | false |
| map_users | list(object({ userarn = s | Additional IAM users to add to the aws-auth configmap. | [] |
| vpc_cidr | string | VPC's CIDR to be created by the VPC module | "10.0.0.0/16" |
| vpc_private_subnets | list(string) | VPC's private subnets to be created by the VPC module | [
"10.0.1.0/24",
"10.0.2.0/24",
"1 |
| vpc_public_subnets | list(string) | VPC's public subnets to be created by the VPC module | [
"10.0.4.0/24",
"10.0.5.0/24",
"1 |
| manage_aws_auth_configmap | bool | Choose whether the EKS module should manage your aws-auth configmap or not | true |
| map_roles | list(object({ rolearn = s | Additional IAM roles to add to the aws-auth configmap. | [] |
cluster_certificate_authority_data — Base64 encoded certificate data required to communicate with the clustercluster_oidc_issuer_url — The URL on the EKS cluster for the OpenID Connect identity providercloudwatch_log_group_arn — Arn of cloudwatch log group createdcluster_arn — The Amazon Resource Name (ARN) of the clustercluster_id — The name/id of the EKS cluster. Will block on cluster creation until the cluster is really readyoidc_provider_arn — The ARN of the OIDC Providerself_managed_node_groups_autoscaling_group_names — The names of the self managed ASG created by the modulecloudwatch_log_group_name — Name of cloudwatch log group createdcluster_endpoint — Endpoint for your Kubernetes API serverAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,