You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_ec2_instance_type.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ec2_instance_type)| data source |
94
95
|[aws_ec2_instance_type_offerings.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ec2_instance_type_offerings)| data source |
95
96
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
97
+
|[aws_iam_policy_document.role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
96
98
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
97
99
|[aws_ssm_parameter.ami](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssm_parameter)| data source |
98
100
|[aws_subnets.efa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/subnets)| data source |
| <aname="input_cpu_options"></a> [cpu\_options](#input\_cpu\_options)| The CPU options for the instance |`map(string)`|`{}`| no |
122
124
| <aname="input_create"></a> [create](#input\_create)| Determines whether to create EKS managed node group or not |`bool`|`true`| no |
123
125
| <aname="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role)| Determines whether an IAM role is created or to use an existing IAM role |`bool`|`true`| no |
126
+
| <aname="input_create_iam_role_policy"></a> [create\_iam\_role\_policy](#input\_create\_iam\_role\_policy)| Determines whether an IAM role policy is created or not |`bool`|`true`| no |
124
127
| <aname="input_create_launch_template"></a> [create\_launch\_template](#input\_create\_launch\_template)| Determines whether to create a launch template or not. If set to `false`, EKS will use its own default launch template |`bool`|`true`| no |
125
128
| <aname="input_create_placement_group"></a> [create\_placement\_group](#input\_create\_placement\_group)| Determines whether a placement group is created & used by the node group |`bool`|`false`| no |
126
129
| <aname="input_create_schedule"></a> [create\_schedule](#input\_create\_schedule)| Determines whether to create autoscaling group schedule or not |`bool`|`true`| no |
| <aname="input_iam_role_name"></a> [iam\_role\_name](#input\_iam\_role\_name)| Name to use on IAM role created |`string`|`null`| no |
144
147
| <aname="input_iam_role_path"></a> [iam\_role\_path](#input\_iam\_role\_path)| IAM role path |`string`|`null`| no |
145
148
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
149
+
| <aname="input_iam_role_policy_statements"></a> [iam\_role\_policy\_statements](#input\_iam\_role\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed |`any`|`[]`| no |
146
150
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
147
151
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
148
152
| <aname="input_instance_market_options"></a> [instance\_market\_options](#input\_instance\_market\_options)| The market (purchasing) option for the instance |`any`|`{}`| no |
description="Determines whether an IAM role policy is created or not"
532
+
type=bool
533
+
default=true
534
+
}
535
+
536
+
variable"iam_role_policy_statements" {
537
+
description="A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed"
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
53
54
|[aws_iam_policy_document.assume_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
55
+
|[aws_iam_policy_document.role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
54
56
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
55
57
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
56
58
@@ -62,13 +64,15 @@ No modules.
62
64
| <aname="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name)| Name of the EKS cluster |`string`|`null`| no |
63
65
| <aname="input_create"></a> [create](#input\_create)| Determines whether to create Fargate profile or not |`bool`|`true`| no |
64
66
| <aname="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role)| Determines whether an IAM role is created or to use an existing IAM role |`bool`|`true`| no |
67
+
| <aname="input_create_iam_role_policy"></a> [create\_iam\_role\_policy](#input\_create\_iam\_role\_policy)| Determines whether an IAM role policy is created or not |`bool`|`true`| no |
65
68
| <aname="input_iam_role_additional_policies"></a> [iam\_role\_additional\_policies](#input\_iam\_role\_additional\_policies)| Additional policies to be added to the IAM role |`map(string)`|`{}`| no |
66
69
| <aname="input_iam_role_arn"></a> [iam\_role\_arn](#input\_iam\_role\_arn)| Existing IAM role ARN for the Fargate profile. Required if `create_iam_role` is set to `false`|`string`|`null`| no |
67
70
| <aname="input_iam_role_attach_cni_policy"></a> [iam\_role\_attach\_cni\_policy](#input\_iam\_role\_attach\_cni\_policy)| Whether to attach the `AmazonEKS_CNI_Policy`/`AmazonEKS_CNI_IPv6_Policy` IAM policy to the IAM IAM role. WARNING: If set `false` the permissions must be assigned to the `aws-node` DaemonSet pods via another method or nodes will not be able to join the cluster |`bool`|`true`| no |
68
71
| <aname="input_iam_role_description"></a> [iam\_role\_description](#input\_iam\_role\_description)| Description of the role |`string`|`null`| no |
69
72
| <aname="input_iam_role_name"></a> [iam\_role\_name](#input\_iam\_role\_name)| Name to use on IAM role created |`string`|`""`| no |
70
73
| <aname="input_iam_role_path"></a> [iam\_role\_path](#input\_iam\_role\_path)| IAM role path |`string`|`null`| no |
71
74
| <aname="input_iam_role_permissions_boundary"></a> [iam\_role\_permissions\_boundary](#input\_iam\_role\_permissions\_boundary)| ARN of the policy that is used to set the permissions boundary for the IAM role |`string`|`null`| no |
75
+
| <aname="input_iam_role_policy_statements"></a> [iam\_role\_policy\_statements](#input\_iam\_role\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed |`any`|`[]`| no |
72
76
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of additional tags to add to the IAM role created |`map(string)`|`{}`| no |
73
77
| <aname="input_iam_role_use_name_prefix"></a> [iam\_role\_use\_name\_prefix](#input\_iam\_role\_use\_name\_prefix)| Determines whether the IAM role name (`iam_role_name`) is used as a prefix |`bool`|`true`| no |
74
78
| <aname="input_name"></a> [name](#input\_name)| Name of the EKS Fargate Profile |`string`|`""`| no |
description="Determines whether an IAM role policy is created or not"
89
+
type=bool
90
+
default=true
91
+
}
92
+
93
+
variable"iam_role_policy_statements" {
94
+
description="A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed"
Copy file name to clipboardExpand all lines: modules/karpenter/README.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,6 +144,7 @@ No modules.
144
144
| <aname="input_iam_policy_description"></a> [iam\_policy\_description](#input\_iam\_policy\_description)| IAM policy description |`string`|`"Karpenter controller IAM policy"`| no |
145
145
| <aname="input_iam_policy_name"></a> [iam\_policy\_name](#input\_iam\_policy\_name)| Name of the IAM policy |`string`|`"KarpenterController"`| no |
146
146
| <aname="input_iam_policy_path"></a> [iam\_policy\_path](#input\_iam\_policy\_path)| Path of the IAM policy |`string`|`"/"`| no |
147
+
| <aname="input_iam_policy_statements"></a> [iam\_policy\_statements](#input\_iam\_policy\_statements)| A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed |`any`|`[]`| no |
147
148
| <aname="input_iam_policy_use_name_prefix"></a> [iam\_policy\_use\_name\_prefix](#input\_iam\_policy\_use\_name\_prefix)| Determines whether the name of the IAM policy (`iam_policy_name`) is used as a prefix |`bool`|`true`| no |
148
149
| <aname="input_iam_role_description"></a> [iam\_role\_description](#input\_iam\_role\_description)| IAM role description |`string`|`"Karpenter controller IAM role"`| no |
149
150
| <aname="input_iam_role_max_session_duration"></a> [iam\_role\_max\_session\_duration](#input\_iam\_role\_max\_session\_duration)| Maximum API session duration in seconds between 3600 and 43200 |`number`|`null`| no |
description="A list of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) - used for adding specific IAM permissions as needed"
97
+
type=any
98
+
default=[]
99
+
}
100
+
95
101
variable"iam_role_policies" {
96
102
description="Policies to attach to the IAM role in `{'static_name' = 'policy_arn'}` format"
0 commit comments