You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/UPGRADE-21.0.md
+258-6Lines changed: 258 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -7,42 +7,196 @@ If you find a bug, please open an issue with supporting configuration to reprodu
7
7
8
8
- Terraform `v1.5.7` is now minimum supported version
9
9
- AWS provider `v6.0.0` is now minimum supported version
10
+
- TLS provider `v4.0.0` is now minimum supported version
11
+
- The `aws-auth` sub-module has been removed. Users who wish to utilize its functionality can continue to do so by specifying a `v20.x` version, or `~> v20.0` version constraint in their module source.
12
+
-`bootstrap_self_managed_addons` is now hardcoded to `false`. This is a legacy setting and instead users should utilize the EKS addons API, which is what this module does by default. In conjunction with this change, the `bootstrap_self_managed_addons` is now ignored by the module to aid in upgrading without disruption (otherwise it would require cluster re-creation).
13
+
- When enabling `enable_efa_support` or creating placement groups within a node group, users must now specify the correct `subnet_ids`; the module no longer tries to automatically select a suitable subnet.
14
+
- EKS managed node group:
15
+
- IMDS now default to a hop limit of 1 (previously was 2)
16
+
-`ami_type` now defaults to `AL2023_x86_64_STANDARD`
17
+
-`enable_monitoring` is now set to `false` by default
18
+
-`enable_efa_only` is now set to `true` by default
19
+
-`use_latest_ami_release_version` is now set to `true` by default
20
+
- Support for autoscaling group schedules has been removed
21
+
- Self-managed node group:
22
+
- IMDS now default to a hop limit of 1 (previously was 2)
23
+
-`ami_type` now defaults to `AL2023_x86_64_STANDARD`
24
+
-`enable_monitoring` is now set to `false` by default
25
+
-`enable_efa_only` is now set to `true` by default
26
+
- Support for autoscaling group schedules has been removed
27
+
- Karpenter:
28
+
- Native support for IAM roles for service accounts (IRSA) has been removed; EKS Pod Identity is now enabled by default
29
+
- Karpenter controller policy for prior to Karpenter `v1` have been removed (i.e. `v0.33`); the `v1` policy is now used by default
30
+
-`create_pod_identity_association` is now set to `true` by default
31
+
-`addons.resolve_conflicts_on_create` is now set to `"NONE"` by default (was `"OVERWRITE"`).
32
+
-`addons.most_recent` is now set to `true` by default (was `false`).
33
+
-`cluster_identity_providers.issuer_url` is now required to be set by users; the prior incorrect default has been removed. See https://github.com/terraform-aws-modules/terraform-aws-eks/pull/3055 and https://github.com/kubernetes/kubernetes/pull/123561 for more details.
10
34
11
35
## Additional changes
12
36
13
37
### Added
14
38
15
39
- Support for `region` parameter to specify the AWS region for the resources created if different from the provider region.
40
+
- Both the EKS managed and self-managed node groups now support creating their own security groups (again). This is primarily motivated by the changes for EFA support; previously users would need to specify `enable_efa_support` both at the cluster level (to add the appropriate security group rules to the shared node security group) as well as the node group level. However, its not always desirable to have these rules across ALL node groups when they are really only required on the node group where EFA is utilized. And similarly for other use cases, users can create custom rules for a specific node group instead of apply across ALL node groups.
16
41
17
42
### Modified
18
43
19
44
- Variable definitions now contain detailed `object` types in place of the previously used any type.
45
+
- The embedded KMS key module definition has been updated to `v4.0` to support the same version requirements as well as the new `region` argument.
20
46
21
47
### Variable and output changes
22
48
23
49
1. Removed variables:
24
50
25
-
-
51
+
-`enable_efa_support` - users only need to set this within the node group configuration, as the module no longer manages EFA support at the cluster level.
52
+
-`enable_security_groups_for_pods` - users can instead attach the `arn:aws:iam::aws:policy/AmazonEKSVPCResourceController` policy via `iam_role_additional_policies` if using security groups for pods.
53
+
-`eks-managed-node-group` sub-module
54
+
-`cluster_service_ipv4_cidr` - users should use `cluster_service_cidr` instead (for either IPv4 or IPv6).
55
+
-`elastic_gpu_specifications`
56
+
-`elastic_inference_accelerator`
57
+
-`platform` - this is superseded by `ami_type`
58
+
-`placement_group_strategy` - set to `cluster` by the module
59
+
-`placement_group_az` - users will need to specify the correct subnet in `subnet_ids`
60
+
-`create_schedule`
61
+
-`schedules`
62
+
-`self-managed-node-group` sub-module
63
+
-`elastic_gpu_specifications`
64
+
-`elastic_inference_accelerator`
65
+
-`platform` - this is superseded by `ami_type`
66
+
-`create_schedule`
67
+
-`schedules`
68
+
-`placement_group_az` - users will need to specify the correct subnet in `subnet_ids`
69
+
-`hibernation_options` - not valid in EKS
70
+
-`min_elb_capacity` - not valid in EKS
71
+
-`wait_for_elb_capacity` - not valid in EKS
72
+
-`wait_for_capacity_timeout` - not valid in EKS
73
+
-`default_cooldown` - not valid in EKS
74
+
-`target_group_arns` - not valid in EKS
75
+
-`service_linked_role_arn` - not valid in EKS
76
+
-`warm_pool` - not valid in EKS
77
+
-`fargate-profile` sub-module
78
+
- None
79
+
-`karpenter` sub-module
80
+
-`enable_v1_permissions` - v1 permissions are now the default
81
+
-`enable_irsa`
82
+
-`irsa_oidc_provider_arn`
83
+
-`irsa_namespace_service_accounts`
84
+
-`irsa_assume_role_condition_test`
26
85
27
86
2. Renamed variables:
28
87
29
-
-
88
+
- Variables prefixed with `cluster_*` have been stripped of the prefix to better match the underlying API:
Copy file name to clipboardExpand all lines: docs/compute_resources.md
-38Lines changed: 0 additions & 38 deletions
Original file line number
Diff line number
Diff line change
@@ -153,41 +153,3 @@ See the [`examples/self-managed-node-group/` example](https://github.com/terrafo
153
153
### Fargate Profiles
154
154
155
155
Fargate profiles are straightforward to use and therefore no further details are provided here. See the [`tests/fargate-profile/` tests](https://github.com/terraform-aws-modules/terraform-aws-eks/tree/master/tests/fargate-profile) for a working example of various configurations.
156
-
157
-
### Default Configurations
158
-
159
-
Each type of compute resource (EKS managed node group, self managed node group, or Fargate profile) provides the option for users to specify a default configuration. These default configurations can be overridden from within the compute resource's individual definition. The order of precedence for configurations (from highest to least precedence):
160
-
161
-
- Compute resource individual configuration
162
-
- Compute resource family default configuration (`eks_managed_node_group_defaults`, `self_managed_node_group_defaults`, `fargate_profile_defaults`)
163
-
- Module default configuration (see `variables.tf` and `node_groups.tf`)
164
-
165
-
For example, the following creates 4 AWS EKS Managed Node Groups:
0 commit comments