Skip to content

Add aws-load-balancer-controller #18

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 8 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 10 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,13 +18,15 @@ No requirements.

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | 5.7.0 |
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | 2.21.1 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | 5.8.0 |
| <a name="provider_helm"></a> [helm](#provider\_helm) | 2.10.1 |
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | 2.22.0 |

## Modules

| Name | Source | Version |
|------|--------|---------|
| <a name="module_aws_load_balancer_controller_role"></a> [aws\_load\_balancer\_controller\_role](#module\_aws\_load\_balancer\_controller\_role) | terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks | 5.24.0 |
| <a name="module_ebs_csi_irsa_role"></a> [ebs\_csi\_irsa\_role](#module\_ebs\_csi\_irsa\_role) | terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks | 5.24.0 |
| <a name="module_eks"></a> [eks](#module\_eks) | terraform-aws-modules/eks/aws | 19.15.3 |
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-aws-modules/vpc/aws | 5.0.0 |
Expand All @@ -33,6 +35,7 @@ No requirements.

| Name | Type |
|------|------|
| [helm_release.aws_load_balancer_controller](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
| [kubernetes_storage_class.storage_class](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/storage_class) | resource |
| [aws_availability_zones.available](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zones) | data source |
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
Expand Down Expand Up @@ -60,8 +63,13 @@ No requirements.
| <a name="input_eks_enable_secret_encryption"></a> [eks\_enable\_secret\_encryption](#input\_eks\_enable\_secret\_encryption) | Should KMS key to encrypt kubernetes secrets be generated | `bool` | `true` | no |
| <a name="input_eks_single_az"></a> [eks\_single\_az](#input\_eks\_single\_az) | Specifies if all node's should be deployed in the same AZ | `bool` | `false` | no |
| <a name="input_eks_storage_classes"></a> [eks\_storage\_classes](#input\_eks\_storage\_classes) | EBS storage class with custom parameters | <pre>list(object({<br> name = string<br> storage_class_provisioner = string<br> parameters = optional(map(string))<br> volume_binding_mode = optional(string)<br> reclaim_policy = optional(string)<br><br> }<br> ))</pre> | `[]` | no |
| <a name="input_enable_aws_load_balancer_controller"></a> [enable\_aws\_load\_balancer\_controller](#input\_enable\_aws\_load\_balancer\_controller) | Specifies if Load Balancer Controller should be enabled | `bool` | `true` | no |
| <a name="input_enable_bastion"></a> [enable\_bastion](#input\_enable\_bastion) | True if bastion host should be created | `bool` | `false` | no |
| <a name="input_enable_certmanager"></a> [enable\_certmanager](#input\_enable\_certmanager) | Specifies if cert-manager should be enabled | `bool` | `false` | no |
| <a name="input_enable_cluster_autoscaler"></a> [enable\_cluster\_autoscaler](#input\_enable\_cluster\_autoscaler) | Specifies if Cluster Autoscaler should be enabled | `bool` | `false` | no |
| <a name="input_enable_ebs_csi_driver"></a> [enable\_ebs\_csi\_driver](#input\_enable\_ebs\_csi\_driver) | Specifies if enable the EBS/CSI driver | `bool` | `true` | no |
| <a name="input_enable_external_dns"></a> [enable\_external\_dns](#input\_enable\_external\_dns) | Specifies if External DNS should be enabled | `bool` | `false` | no |
| <a name="input_enable_velero"></a> [enable\_velero](#input\_enable\_velero) | Specifies if Velero should be enabled | `bool` | `false` | no |
| <a name="input_environment"></a> [environment](#input\_environment) | Environment name | `string` | n/a | yes |
| <a name="input_logs_retention_days"></a> [logs\_retention\_days](#input\_logs\_retention\_days) | Log retention in days | `number` | `14` | no |
| <a name="input_manage_aws_auth_configmap"></a> [manage\_aws\_auth\_configmap](#input\_manage\_aws\_auth\_configmap) | Should Terraform manage aws\_auth ConfigMap used for setting up cluster access | `bool` | `true` | no |
Expand Down
12 changes: 12 additions & 0 deletions examples/complete/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,18 @@ provider "kubernetes" {
args = ["eks", "get-token", "--cluster-name", module.complete.eks_cluster_name]
}
}
provider "helm" {
kubernetes {
host = module.complete.eks_cluster_endpoint
cluster_ca_certificate = base64decode(module.complete.eks_cluster_certificate_authority_data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
command = "aws"
args = ["eks", "get-token", "--cluster-name", module.complete.eks_cluster_name]
}
}
}

module "complete" {
source = "../.."
environment = "example-${var.names_suffix}"
Expand Down
24 changes: 24 additions & 0 deletions helmreleases.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
resource "helm_release" "aws_load_balancer_controller" {
count = var.enable_aws_load_balancer_controller ? 1 : 0
depends_on = [module.eks]
name = "aws-load-balancer-controller"
namespace = "kube-system"
repository = "https://aws.github.io/eks-charts"
chart = "aws-load-balancer-controller"
version = "1.5.4"

set {
name = "clusterName"
value = var.eks_cluster_name
}

set {
name = "serviceAccount.create"
value = false
}

set {
name = "serviceAccount.name"
value = "aws-load-balancer-controller"
}
}
15 changes: 15 additions & 0 deletions irsa.tf
Original file line number Diff line number Diff line change
Expand Up @@ -12,3 +12,18 @@ module "ebs_csi_irsa_role" {
tags = local.tags
count = var.enable_ebs_csi_driver ? 1 : 0
}

module "aws_load_balancer_controller_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.24.0"
role_name = "${var.eks_cluster_name}-aws-load-balancer-controller-${var.region}"
attach_ebs_csi_policy = true
oidc_providers = {
eks = {
provider_arn = module.eks.oidc_provider_arn
namespace_service_accounts = ["kube-system:aws-load-balancer-controller-sa"]
}
}
tags = local.tags
count = var.enable_aws_load_balancer_controller ? 1 : 0
}
30 changes: 30 additions & 0 deletions variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -236,3 +236,33 @@ variable "eks_create" {
type = bool
default = true
}

variable "enable_certmanager" {
description = "Specifies if cert-manager should be enabled"
type = bool
default = false
}

variable "enable_cluster_autoscaler" {
description = "Specifies if Cluster Autoscaler should be enabled"
type = bool
default = false
}

variable "enable_external_dns" {
description = "Specifies if External DNS should be enabled"
type = bool
default = false
}

variable "enable_aws_load_balancer_controller" {
description = "Specifies if Load Balancer Controller should be enabled"
type = bool
default = true
}

variable "enable_velero" {
description = "Specifies if Velero should be enabled"
type = bool
default = false
}