You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-3Lines changed: 4 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -77,9 +77,10 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
77
77
| <aname="input_ebs_csi_kms_cmk_ids"></a> [ebs\_csi\_kms\_cmk\_ids](#input\_ebs\_csi\_kms\_cmk\_ids)| List of KMS CMKs to allow EBS CSI to manage encrypted volumes. This is required if EBS encryption is set at the account level with a default KMS CMK. |`list(string)`|`[]`| no |
78
78
| <aname="input_eks_aws_auth_roles"></a> [eks\_aws\_auth\_roles](#input\_eks\_aws\_auth\_roles)| List of IAM Role maps to add to the aws-auth configmap. This is required if you use a different IAM Role for Terraform Plan actions. | <pre>list(object({<br> rolearn = string<br> username = string<br> groups = list(string)<br> }))</pre> |`[]`| no |
79
79
| <aname="input_eks_ng_capacity_type"></a> [eks\_ng\_capacity\_type](#input\_eks\_ng\_capacity\_type)| The capacity type to use for the EKS managed node group. |`string`|`"ON_DEMAND"`| no |
80
-
| <aname="input_eks_ng_desired_size"></a> [eks\_ng\_desired\_size](#input\_eks\_ng\_desired\_size)| The desired size to use for the EKS managed node group. |`number`|`2`| no |
80
+
| <aname="input_eks_ng_desired_size"></a> [eks\_ng\_desired\_size](#input\_eks\_ng\_desired\_size)| The desired size to use for the EKS managed node group. |`number`|`1`| no |
81
81
| <aname="input_eks_ng_instance_types"></a> [eks\_ng\_instance\_types](#input\_eks\_ng\_instance\_types)| The instance types to use for the EKS managed node group. |`list(string)`| <pre>[<br> "t3.xlarge"<br>]</pre> | no |
82
-
| <aname="input_eks_ng_minimum_size"></a> [eks\_ng\_minimum\_size](#input\_eks\_ng\_minimum\_size)| The minimum size to use for the EKS managed node group. |`number`|`2`| no |
82
+
| <aname="input_eks_ng_maximum_size"></a> [eks\_ng\_maximum\_size](#input\_eks\_ng\_maximum\_size)| The maximum size to use for the EKS managed node group. |`number`|`10`| no |
83
+
| <aname="input_eks_ng_minimum_size"></a> [eks\_ng\_minimum\_size](#input\_eks\_ng\_minimum\_size)| The minimum size to use for the EKS managed node group. |`number`|`1`| no |
83
84
| <aname="input_enable_k8s_resources"></a> [enable\_k8s\_resources](#input\_enable\_k8s\_resources)| Whether to enable the creation of Kubernetes resources for Wayfinder (helm and kubectl manifest deployments). |`bool`|`true`| no |
84
85
| <aname="input_enable_wf_cloudaccess"></a> [enable\_wf\_cloudaccess](#input\_enable\_wf\_cloudaccess)| Whether to configure CloudIdentity resource in Wayfinder for the configured AWS IRSA identity once installed (requires enable\_k8s\_resources) |`bool`|`true`| no |
85
86
| <aname="input_enable_wf_costestimates"></a> [enable\_wf\_costestimates](#input\_enable\_wf\_costestimates)| Whether to configure admin CloudAccessConfig for cost estimates in the account Wayfinder is installed in once installed (requires enable\_k8s\_resources and enable\_wf\_cloudaccess) |`bool`|`true`| no |
@@ -88,7 +89,7 @@ The `terraform-docs` utility is used to generate this README. Follow the below s
88
89
| <aname="input_kms_key_administrators"></a> [kms\_key\_administrators](#input\_kms\_key\_administrators)| A list of IAM ARNs for EKS key administrators. If no value is provided, the current caller identity is used to ensure at least one key admin is available. |`list(string)`|`[]`| no |
89
90
| <aname="input_kube_proxy_addon_version"></a> [kube\_proxy\_addon\_version](#input\_kube\_proxy\_addon\_version)| Kube Proxy Addon version to use. |`string`|`"v1.27.8-eksbuild.4"`| no |
90
91
| <aname="input_node_security_group_additional_rules"></a> [node\_security\_group\_additional\_rules](#input\_node\_security\_group\_additional\_rules)| List of additional security group rules to add to the node security group created. Set `source_cluster_security_group = true` inside rules to set the `cluster_security_group` as source. |`any`|`{}`| no |
91
-
| <aname="input_subnet_ids"></a> [subnet\_ids](#input\_subnet\_ids)| A list of private Subnet IDs to launch the Wayfinder EKS Nodes onto. |`list(string)`|n/a|yes|
92
+
| <aname="input_subnet_ids_by_az"></a> [subnet\_ids\_by\_az](#input\_subnet\_ids\_by\_az)| A map of subnet IDs by availability zone. |`map(list(string))`|`{}`|no|
92
93
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources created. |`map(string)`|`{}`| no |
93
94
| <aname="input_vpc_id"></a> [vpc\_id](#input\_vpc\_id)| The VPC ID for the Wayfinder EKS Cluster to be built within. |`string`| n/a | yes |
94
95
| <aname="input_wayfinder_domain_name_api"></a> [wayfinder\_domain\_name\_api](#input\_wayfinder\_domain\_name\_api)| The domain name to use for the Wayfinder API (e.g. api.wayfinder.example.com). |`string`| n/a | yes |
0 commit comments