@@ -16,17 +16,17 @@ resource "aws_iam_role" "eks_cluster" {
1616
1717 assume_role_policy = jsonencode (
1818 {
19- Version = " 2012-10-17"
20- Statement = [
21- {
22- Action = " sts:AssumeRole"
23- Effect = " Allow"
24- Principal = {
25- Service = " eks.amazonaws.com"
19+ Version = " 2012-10-17"
20+ Statement = [
21+ {
22+ Action = " sts:AssumeRole"
23+ Effect = " Allow"
24+ Principal = {
25+ Service = " eks.amazonaws.com"
26+ }
2627 }
27- }
28- ]
29- }
28+ ]
29+ }
3030 )
3131}
3232
@@ -36,8 +36,8 @@ resource "aws_iam_role_policy_attachment" "AmazonEKSClusterPolicy" {
3636}
3737
3838resource "aws_iam_role_policy_attachment" "AmazonEC2ContainerRegistryReadOnly-EKS" {
39- policy_arn = " arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
40- role = aws_iam_role. eks_cluster . name
39+ policy_arn = " arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
40+ role = aws_iam_role. eks_cluster . name
4141}
4242
4343
@@ -46,17 +46,17 @@ resource "aws_iam_role" "eks_node_group" {
4646
4747 assume_role_policy = jsonencode (
4848 {
49- Version = " 2012-10-17"
50- Statement = [
51- {
52- Action = " sts:AssumeRole"
53- Effect = " Allow"
54- Principal = {
55- Service = " ec2.amazonaws.com"
49+ Version = " 2012-10-17"
50+ Statement = [
51+ {
52+ Action = " sts:AssumeRole"
53+ Effect = " Allow"
54+ Principal = {
55+ Service = " ec2.amazonaws.com"
56+ }
5657 }
57- }
58- ]
59- }
58+ ]
59+ }
6060 )
6161}
6262
@@ -65,20 +65,20 @@ resource "aws_iam_role_policy_attachment" "AmazonEKSWorkerNodePolicy" {
6565 role = aws_iam_role. eks_node_group . name
6666}
6767
68- resource "aws_iam_role_policy_attachment" "AmazonEKS_CNI_Policy" {
68+ resource "aws_iam_role_policy_attachment" "AmazonEKS_CNI_Policy" {
6969 policy_arn = " arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
70- role = aws_iam_role. eks_node_group . name
71- }
72-
73- resource "aws_iam_role_policy_attachment" "EC2InstanceProfileForImageBuilderECRContainerBuilds" {
70+ role = aws_iam_role. eks_node_group . name
71+ }
72+
73+ resource "aws_iam_role_policy_attachment" "EC2InstanceProfileForImageBuilderECRContainerBuilds" {
7474 policy_arn = " arn:aws:iam::aws:policy/EC2InstanceProfileForImageBuilderECRContainerBuilds"
75- role = aws_iam_role. eks_node_group . name
76- }
77-
78- resource "aws_iam_role_policy_attachment" "AmazonEC2ContainerRegistryReadOnly" {
75+ role = aws_iam_role. eks_node_group . name
76+ }
77+
78+ resource "aws_iam_role_policy_attachment" "AmazonEC2ContainerRegistryReadOnly" {
7979 policy_arn = " arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
80- role = aws_iam_role. eks_node_group . name
81- }
80+ role = aws_iam_role. eks_node_group . name
81+ }
8282
8383resource "aws_security_group" "eks_control_plane_sg" {
8484 name_prefix = " eks-control-plane-sg"
@@ -119,31 +119,31 @@ resource "aws_security_group" "worker_nodes_sg" {
119119}
120120
121121resource "aws_eks_node_group" "ondemand_group" {
122- cluster_name = aws_eks_cluster. eks_cluster . name
122+ cluster_name = aws_eks_cluster. eks_cluster . name
123123 node_group_name = " ondemand-group"
124124 node_role_arn = aws_iam_role. eks_node_group . arn
125125 subnet_ids = [var . subnet_id_1 , var . subnet_id_2 ]
126126 scaling_config {
127127 desired_size = 2
128- max_size = 2
129- min_size = 2
128+ max_size = 2
129+ min_size = 2
130130 }
131131 instance_types = [" t2.medium" ]
132- capacity_type = " ON_DEMAND"
132+ capacity_type = " ON_DEMAND"
133133}
134134
135135resource "aws_eks_node_group" "spot_group" {
136- cluster_name = aws_eks_cluster. eks_cluster . name
136+ cluster_name = aws_eks_cluster. eks_cluster . name
137137 node_role_arn = aws_iam_role. eks_node_group . arn
138138 subnet_ids = [var . subnet_id_1 , var . subnet_id_2 ]
139139 node_group_name = " spot-group"
140140 scaling_config {
141141 desired_size = 2
142- max_size = 2
143- min_size = 2
142+ max_size = 2
143+ min_size = 2
144144 }
145145 instance_types = [" t2.medium" ]
146- capacity_type = " SPOT"
146+ capacity_type = " SPOT"
147147
148148 depends_on = [
149149 aws_iam_role_policy_attachment . AmazonEKSWorkerNodePolicy ,
@@ -152,7 +152,7 @@ resource "aws_eks_node_group" "spot_group" {
152152 ]
153153
154154 remote_access {
155- ec2_ssh_key = var. key-name
155+ ec2_ssh_key = var. key-name
156156 source_security_group_ids = [aws_security_group . worker_nodes_sg . id ]
157157 }
158158}
0 commit comments