You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -205,11 +205,11 @@ Optional policies have the option of being created by default, but are specified
205
205
| <aname="input_ami"></a> [ami](#input\_ami)| Server pool ami |`string`| n/a | yes |
206
206
| <aname="input_associate_public_ip_address"></a> [associate\_public\_ip\_address](#input\_associate\_public\_ip\_address)| n/a |`bool`|`null`| no |
207
207
| <aname="input_awscli_url"></a> [awscli\_url](#input\_awscli\_url)| URL for awscli zip file |`string`|`"https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip"`| no |
208
-
| <aname="input_block_device_mappings"></a> [block\_device\_mappings](#input\_block\_device\_mappings)| Server pool block device mapping configuration |`map(string)`| <pre>{<br> "encrypted": false,<br> "size": 30<br>}</pre> | no |
208
+
| <aname="input_block_device_mappings"></a> [block\_device\_mappings](#input\_block\_device\_mappings)| Server pool block device mapping configuration |`map(string)`| <pre>{<br/> "size": "30"<br/>}</pre> | no |
209
209
| <aname="input_ccm_external"></a> [ccm\_external](#input\_ccm\_external)| Set kubelet arg 'cloud-provider-name' value to 'external'. Requires manual install of CCM. |`bool`|`false`| no |
210
-
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the rkegov cluster to create |`string`| n/a | yes |
210
+
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the rke2 cluster to create |`string`| n/a | yes |
211
211
| <aname="input_controlplane_access_logs_bucket"></a> [controlplane\_access\_logs\_bucket](#input\_controlplane\_access\_logs\_bucket)| Bucket name for logging requests to control plane load balancer |`string`|`"disabled"`| no |
212
-
| <aname="input_controlplane_allowed_cidrs"></a> [controlplane\_allowed\_cidrs](#input\_controlplane\_allowed\_cidrs)| Server pool security group allowed cidr ranges |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
212
+
| <aname="input_controlplane_allowed_cidrs"></a> [controlplane\_allowed\_cidrs](#input\_controlplane\_allowed\_cidrs)| Server pool security group allowed cidr ranges |`list(string)`| <pre>[<br/> "0.0.0.0/0"<br/>]</pre> | no |
213
213
| <aname="input_controlplane_enable_cross_zone_load_balancing"></a> [controlplane\_enable\_cross\_zone\_load\_balancing](#input\_controlplane\_enable\_cross\_zone\_load\_balancing)| Toggle between controlplane cross zone load balancing |`bool`|`true`| no |
214
214
| <aname="input_controlplane_internal"></a> [controlplane\_internal](#input\_controlplane\_internal)| Toggle between public or private control plane load balancer |`bool`|`true`| no |
215
215
| <aname="input_create_acl"></a> [create\_acl](#input\_create\_acl)| Toggle creation of ACL for statestore bucket |`bool`|`true`| no |
@@ -223,7 +223,7 @@ Optional policies have the option of being created by default, but are specified
223
223
| <aname="input_iam_permissions_boundary"></a> [iam\_permissions\_boundary](#input\_iam\_permissions\_boundary)| If provided, the IAM role created for the servers will be created with this permissions boundary attached. |`string`|`null`| no |
224
224
| <aname="input_instance_type"></a> [instance\_type](#input\_instance\_type)| Server pool instance type |`string`|`"t3a.medium"`| no |
225
225
| <aname="input_lb_subnets"></a> [lb\_subnets](#input\_lb\_subnets)| List of subnet IDs to create load balancer in |`list(string)`|`null`| no |
| <aname="input_post_userdata"></a> [post\_userdata](#input\_post\_userdata)| Custom userdata to run immediately after rke2 node attempts to join cluster |`string`|`""`| no |
228
228
| <aname="input_pre_userdata"></a> [pre\_userdata](#input\_pre\_userdata)| Custom userdata to run immediately before rke2 node attempts to join cluster, after required rke2, dependencies are installed |`string`|`""`| no |
229
229
| <aname="input_rke2_channel"></a> [rke2\_channel](#input\_rke2\_channel)| Channel to use for RKE2 server nodepool |`string`|`null`| no |
@@ -238,7 +238,7 @@ Optional policies have the option of being created by default, but are specified
238
238
| <aname="input_subnets"></a> [subnets](#input\_subnets)| List of subnet IDs to create nodes in |`list(string)`| n/a | yes |
239
239
| <aname="input_suspended_processes"></a> [suspended\_processes](#input\_suspended\_processes)| List of processes to suspend in the autoscaling service |`list(string)`|`[]`| no |
240
240
| <aname="input_tags"></a> [tags](#input\_tags)| Map of tags to add to all resources created |`map(string)`|`{}`| no |
241
-
| <aname="input_termination_policies"></a> [termination\_policies](#input\_termination\_policies)| List of policies to decide how the instances in the Auto Scaling Group should be terminated |`list(string)`| <pre>[<br> "Default"<br>]</pre> | no |
241
+
| <aname="input_termination_policies"></a> [termination\_policies](#input\_termination\_policies)| List of policies to decide how the instances in the Auto Scaling Group should be terminated |`list(string)`| <pre>[<br/> "Default"<br/>]</pre> | no |
242
242
| <aname="input_unique_suffix"></a> [unique\_suffix](#input\_unique\_suffix)| Enables/disables generation of a unique suffix to cluster name |`bool`|`true`| no |
243
243
| <aname="input_unzip_rpm_url"></a> [unzip\_rpm\_url](#input\_unzip\_rpm\_url)| URL path to unzip rpm |`string`|`""`| no |
244
244
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| VPC ID to create resources in |`string`| n/a | yes |
Match region to your actual region, but it is `us-gov-west-1` in this example.
28
+
Match region to your actual region, but it is `us-east-2` in this example. The cluster name also includes a UID suffix that will be created by Terraform at apply time, so change that to yours as well. The version here is coupled to the Kubernetes version. You can run `helm search repo -l autoscaler/cluster-autoscaler` to see all charts and the corresponding app version. Here, we grab the chart version that matches app version 1.33.0 because we are using `rke2` 1.33.
| <aname="input_awscli_url"></a> [awscli\_url](#input\_awscli\_url)| URL for awscli zip file |`string`|`"https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip"`| no |
41
-
| <aname="input_block_device_mappings"></a> [block\_device\_mappings](#input\_block\_device\_mappings)| Node pool block device mapping configuration |`map(string)`| <pre>{<br> "size": 30,<br> "type": "gp2"<br>}</pre> | no |
41
+
| <aname="input_block_device_mappings"></a> [block\_device\_mappings](#input\_block\_device\_mappings)| Node pool block device mapping configuration |`map(string)`| <pre>{<br/> "size": "30"<br/>}</pre> | no |
42
42
| <aname="input_ccm_external"></a> [ccm\_external](#input\_ccm\_external)| Set kubelet arg 'cloud-provider-name' value to 'external'. Requires manual install of CCM. |`bool`|`false`| no |
43
-
| <aname="input_cluster_data"></a> [cluster\_data](#input\_cluster\_data)| Required data relevant to joining an existing rke2 cluster, sourced from main rke2 module, do NOT modify | <pre>object({<br> name = string<br> server_url = string<br> cluster_sg = string<br> token = object({<br> bucket = string<br> bucket_arn = string<br> object = string<br> policy_document = string<br> })<br> })</pre> | n/a | yes |
43
+
| <aname="input_cluster_data"></a> [cluster\_data](#input\_cluster\_data)| Required data relevant to joining an existing rke2 cluster, sourced from main rke2 module, do NOT modify | <pre>object({<br/> name = string<br/> server_url = string<br/> cluster_sg = string<br/> token = object({<br/> bucket = string<br/> bucket_arn = string<br/> object = string<br/> policy_document = string<br/> })<br/> })</pre> | n/a | yes |
44
44
| <aname="input_download"></a> [download](#input\_download)| Toggle best effort download of rke2 dependencies (rke2 and aws cli), if disabled, dependencies are assumed to exist in $PATH |`bool`|`true`| no |
45
45
| <aname="input_enable_autoscaler"></a> [enable\_autoscaler](#input\_enable\_autoscaler)| Toggle configure the nodepool for cluster autoscaler, this will ensure the appropriate IAM policies are present, you are still responsible for ensuring cluster autoscaler is installed |`bool`|`false`| no |
46
46
| <aname="input_enable_ccm"></a> [enable\_ccm](#input\_enable\_ccm)| Toggle enabling the cluster as aws aware, this will ensure the appropriate IAM policies are present |`bool`|`false`| no |
@@ -50,7 +50,7 @@
50
50
| <aname="input_iam_instance_profile"></a> [iam\_instance\_profile](#input\_iam\_instance\_profile)| Node pool IAM Instance Profile, created if left blank (default behavior) |`string`|`""`| no |
51
51
| <aname="input_iam_permissions_boundary"></a> [iam\_permissions\_boundary](#input\_iam\_permissions\_boundary)| If provided, the IAM role created for the nodepool will be created with this permissions boundary attached. |`string`|`null`| no |
52
52
| <aname="input_instance_type"></a> [instance\_type](#input\_instance\_type)| Node pool instance type |`string`|`"t3.medium"`| no |
| <aname="input_name"></a> [name](#input\_name)| Nodepool name |`string`| n/a | yes |
55
55
| <aname="input_post_userdata"></a> [post\_userdata](#input\_post\_userdata)| Custom userdata to run immediately after rke2 node attempts to join cluster |`string`|`""`| no |
56
56
| <aname="input_pre_userdata"></a> [pre\_userdata](#input\_pre\_userdata)| Custom userdata to run immediately before rke2 node attempts to join cluster, after required rke2, dependencies are installed |`string`|`""`| no |
0 commit comments