@@ -93,11 +93,11 @@ module "eks" {
9393 cidr_blocks = [" 0.0.0.0/0" ]
9494 },
9595 istio_injection_webhook = {
96- description = " Allow istio injection"
97- protocol = " tcp"
98- from_port = " 15017"
99- to_port = " 15017"
100- type = " ingress"
96+ description = " Allow istio injection"
97+ protocol = " tcp"
98+ from_port = " 15017"
99+ to_port = " 15017"
100+ type = " ingress"
101101 source_cluster_security_group = true
102102 }
103103 }
@@ -116,8 +116,8 @@ provider "kubernetes" {
116116 host = module. eks . cluster_endpoint
117117 cluster_ca_certificate = base64decode (module. eks . cluster_certificate_authority_data )
118118 exec {
119- command = " aws"
120- api_version = " client.authentication.k8s.io/v1beta1"
119+ command = " aws"
120+ api_version = " client.authentication.k8s.io/v1beta1"
121121 args = [
122122 " --region" ,
123123 var . aws_region ,
@@ -127,7 +127,7 @@ provider "kubernetes" {
127127 module . eks . cluster_name
128128 ]
129129 env = {
130- name = " AWS_PROFILE"
130+ name = " AWS_PROFILE"
131131 value = var.aws_profile
132132 }
133133 }
@@ -138,8 +138,8 @@ provider "helm" {
138138 host = module. eks . cluster_endpoint
139139 cluster_ca_certificate = base64decode (module. eks . cluster_certificate_authority_data )
140140 exec {
141- command = " aws"
142- api_version = " client.authentication.k8s.io/v1beta1"
141+ command = " aws"
142+ api_version = " client.authentication.k8s.io/v1beta1"
143143 args = [
144144 " --region" ,
145145 var . aws_region ,
@@ -149,7 +149,7 @@ provider "helm" {
149149 module . eks . cluster_name
150150 ]
151151 env = {
152- name = " AWS_PROFILE"
152+ name = " AWS_PROFILE"
153153 value = var.aws_profile
154154 }
155155 }
@@ -161,9 +161,9 @@ provider "kustomization" {
161161}
162162
163163module "iam_eks_role" {
164- source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
165- version = " 5.34.0"
166- role_name = " ebs-csi"
164+ source = " terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
165+ version = " 5.34.0"
166+ role_name = " ebs-csi"
167167 attach_ebs_csi_policy = true
168168 oidc_providers = {
169169 main = {
@@ -186,12 +186,12 @@ resource "kubernetes_annotations" "default-storageclass" {
186186 }
187187}
188188
189- resource helm_release ebs_csi_driver {
190- name = " aws-ebs-csi-driver"
191- chart = " aws-ebs-csi-driver"
189+ resource " helm_release" " ebs_csi_driver" {
190+ name = " aws-ebs-csi-driver"
191+ chart = " aws-ebs-csi-driver"
192192 repository = " https://kubernetes-sigs.github.io/aws-ebs-csi-driver"
193- namespace = " kube-system"
194- version = " 2.28.1"
193+ namespace = " kube-system"
194+ version = " 2.28.1"
195195 values = [
196196 << EOF
197197controller:
@@ -206,25 +206,11 @@ storageClasses:
206206 ]
207207}
208208
209- # module "eks_blueprints_addons" {
210- # source = "aws-ia/eks-blueprints-addons/aws"
211- # version = "~> 1.0" #ensure to update this to the latest/desired version
212-
213- # cluster_name = module.eks.cluster_name
214- # cluster_endpoint = module.eks.cluster_endpoint
215- # cluster_version = module.eks.cluster_version
216- # oidc_provider_arn = module.eks.oidc_provider_arn
217-
218- # eks_addons = {
219-
220- # }
221- # }
222-
223209module "treebeardkf" {
224- source = " ../.."
225- hostname = " kf.example.com"
226- protocol = " https://"
227- port = " "
228- enable_kuberay = false
229- enable_mlflow = false
210+ source = " ../.."
211+ hostname = " kf.example.com"
212+ protocol = " https://"
213+ port = " "
214+ enable_kuberay = false
215+ enable_mlflow = false
230216}
0 commit comments