Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update module to use the new container insights with CW for EKS #252

Merged
merged 52 commits into from
Jan 19, 2024
Merged
Show file tree
Hide file tree
Changes from 49 commits
Commits
Show all changes
52 commits
Select commit Hold shift + click to select a range
727674c
Adding Module and Example for ECS cluster monitoring with ecs_observer
ruchimo Aug 9, 2023
1900fc8
Adding Module and Example for ECS cluster monitoring with ecs_observer
ruchimo Aug 9, 2023
930721a
Merge branch 'main' into main
bonclay7 Aug 9, 2023
c1ac8b8
Incorporating PR comments
ruchimo Aug 10, 2023
52c14f4
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Aug 10, 2023
5968b45
Merge branch 'main' into main
ruchimo Aug 10, 2023
e2e7af7
Restructuring Examples and modules folder for ECS, Added content in m…
ruchimo Aug 10, 2023
3be9980
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Aug 10, 2023
0ef4294
Fixing path as per PR comments
ruchimo Aug 14, 2023
6071dbd
Parameterzing the config files, incorporated PR review comments
ruchimo Aug 14, 2023
63b1db9
Merge branch 'main' into main
bonclay7 Aug 17, 2023
3ca49bd
Adding condition for AMP WS and fixing AMP endpoint
ruchimo Aug 24, 2023
54a2a28
Merge branch 'main' into main
bonclay7 Aug 25, 2023
ac1058d
Adding Document for ECS Monitoring and parameterized some variables
ruchimo Sep 1, 2023
23c073a
Added sample dashboard
ruchimo Sep 1, 2023
c1d8303
Adding Document for ECS Monitoring and parameterized some variables
ruchimo Sep 1, 2023
47be776
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Sep 1, 2023
c272480
Merge branch 'main' into main
ruchimo Sep 1, 2023
b2ae876
Fixing failures detected by pre-commit
ruchimo Sep 4, 2023
298c7d5
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Sep 4, 2023
a94d212
Merge branch 'main' into main
ruchimo Sep 4, 2023
6170820
Fixing failures detected by pre-commit
ruchimo Sep 4, 2023
f591aff
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Sep 4, 2023
2343c10
Merge branch 'main' into main
ruchimo Sep 5, 2023
47364af
Merge branch 'main' into main
bonclay7 Sep 21, 2023
bf318db
Merge branch 'main' into main
bonclay7 Oct 25, 2023
86ebf4e
Fixing failures detected by pre-commit
ruchimo Oct 27, 2023
70f7e44
Pre-commit fixes
bonclay7 Oct 29, 2023
bdcdc0d
Fixing failures detected by pre-commit
ruchimo Oct 30, 2023
289a01d
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Oct 30, 2023
90ffa83
Fixing failures detected by pre-commit
ruchimo Oct 30, 2023
4440d0c
Pre-commit
bonclay7 Oct 30, 2023
0f126e7
Fixing HIGH security alerts detected by pre-commit
ruchimo Oct 30, 2023
d4d7c8e
Merge branch 'main' of github.com:ruchimo/terraform-aws-observability…
ruchimo Oct 30, 2023
a1c1821
Fixing HIGH security alerts detected by pre-commit
ruchimo Oct 31, 2023
59355d6
Fixing HIGH security alerts detected by pre-commit, 31stOct
ruchimo Oct 31, 2023
8919e6c
Add links after merge
bonclay7 Nov 2, 2023
382987b
2ndNov - Added condiotnal creation for Grafana WS and module versions…
ruchimo Nov 2, 2023
3be1fb8
Merge branch 'aws-observability:main' into main
ruchimo Jan 1, 2024
23f0dd4
Module to use the new container insights with CW for EKS
ruchimo Jan 2, 2024
c35659c
Module to use the new container insights with CW for EKS
ruchimo Jan 10, 2024
44dc712
Fixing precommit error
ruchimo Jan 10, 2024
735ddc7
Updating EKS container insights to replace deamonset with tf resource
ruchimo Jan 16, 2024
34242cb
Updating EKS container insights to replace deamonset with tf resource
ruchimo Jan 16, 2024
2367fee
Updating EKS container insights to replace deamonset with tf resource
ruchimo Jan 16, 2024
4293579
Updating EKS container insights to replace deamonset with tf resource
ruchimo Jan 16, 2024
1bf4f97
Updating EKS container insights- Adding doc and fixing pre-commit errors
ruchimo Jan 17, 2024
c609376
Update Images in the doc
ruchimo Jan 17, 2024
ce8950e
Update data.tf pre-commit error
ruchimo Jan 17, 2024
32ecaf3
Apply suggestions from code review
ruchimo Jan 18, 2024
5ec274b
fixing broken hyperlink
ruchimo Jan 18, 2024
83bad93
EKS Container Insights - updating docs and few varibaleable names, de…
ruchimo Jan 19, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
38 changes: 32 additions & 6 deletions docs/container-insights/eks.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
# Setting Up Container Insights for your EKS Cluster

This example deploys AWS Distro of OpenTelemetry on your EKS cluster as a Daemonset which will enable
Container Insights metrics Dashboard on Amazon CloudWatch.

This example deploys CloudWatch Observability EKS add-on on an exisiting Amazon EKS cluster, wihich has Container Insights enhanced observability for Amazon EKS and CloudWatch Application Signals enabled by default.
ruchimo marked this conversation as resolved.
Show resolved Hide resolved

## Prerequisites

Expand Down Expand Up @@ -42,12 +40,40 @@ Simply run this command to deploy the example
terraform apply
```

## Visualization
## Enabling Application Signals for your services
ruchimo marked this conversation as resolved.
Show resolved Hide resolved
CloudWatch Application Signals is currenlty supported for **Java** applications running on your Amazon EKS cluster.
ruchimo marked this conversation as resolved.
Show resolved Hide resolved

Next, you have to update your Application to `Configure application metrics and trace sampling`. For this, you must add an annotation to a manifest YAML in your cluster. Adding this annotation auto-instruments the application to send metrics, traces, and logs to Application Signals. You have two options for the annotation:

1. **Annotate Workload** auto-instruments a single workload in the cluster.
- Paste the below line into the PodTemplate section of the workload manifest.
```
annotations: instrumentation.opentelemetry.io/inject-java: "true"
```
- In your terminal, enter `kubectl apply -f your_deployment_yaml` to apply the change.

2. **Annotate Namespace** auto-instruments all workloads deployed in the selected namespace.
- Paste the below line into the metadata section of the namespace manifest.
```
annotations: instrumentation.opentelemetry.io/inject-java: "true"
```
- In your terminal, enter `kubectl apply -f your_namespace_yaml` to apply the change.
- In your terminal, enter a command to restart all pods in the namespace. An example command to restart deployment workloads is `kubectl rollout restart deployment -n namespace_name`

## Visualization of Container Insights data

After the terraform apply is successful, open your Amazon CloudWatch console in the same region as your EKS cluster, then from the left hand side choose `Insights -> Container Insights`, there choose the `EKS` from the drop down and you will see the metrics shown on the dashboard:
ruchimo marked this conversation as resolved.
Show resolved Hide resolved

<img width="1345" alt="image" src="https://github.com/ruchimo/terraform-aws-observability-accelerator/assets/106240341/31686b29-8ec2-46ff-a266-ebfa1de9768a">


## Visualization of Application Signal data
ruchimo marked this conversation as resolved.
Show resolved Hide resolved

After apply, open your Amazon CloudWatch console in the same region as your EKS cluster, then from the left hand side choose `Insights -> Container Insights`, there choose the `Performance montoring` from the drop down, choose the `cluster name` and you will see the metrics shown on the dashboard:
After enabling your Application to pass metrics and traces by following [the steps provided above](#enabling-application-signals-for-your-services), open your Amazon CloudWatch console in the same region as your EKS cluster, then from the left hand side choose `Application Signals -> Services` and you will see the metrics shown on the sample dashboard below:

![image](https://github.com/aws-observability/terraform-aws-observability-accelerator/assets/10175027/c5b9b685-5894-4350-b68a-ca86d1128f6f)
<img width="1321" alt="image" src="https://github.com/ruchimo/terraform-aws-observability-accelerator/assets/106240341/2fccf784-6560-45a9-8be0-4e843c9653f1">

<img width="1300" alt="image" src="https://github.com/ruchimo/terraform-aws-observability-accelerator/assets/106240341/69749d78-7c9a-4019-a023-f5412ab3b2de">

## Cleanup

Expand Down
15 changes: 6 additions & 9 deletions examples/eks-container-insights/README.md
Original file line number Diff line number Diff line change
@@ -1,21 +1,17 @@
# Enable Container Insights for EKS cluster

This example deploys ADOT as a daemonset on your EKS cluster which enables Container Insights metrics on CloudWatch.
This example deploys Amazon CloudWatch Application Signal and Container Insights as an EKS add-on on your EKS cluster which enables Container Insights metrics and Application Signals on CloudWatch.
ruchimo marked this conversation as resolved.
Show resolved Hide resolved

Step-by-step instructions available on our [docs site](https://aws-observability.github.io/terraform-aws-observability-accelerator/)
ruchimo marked this conversation as resolved.
Show resolved Hide resolved
under **Amazon CloudWatch Container Insights**
ruchimo marked this conversation as resolved.
Show resolved Hide resolved


<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
## Requirements

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.1.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0.0 |
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | >= 2.4.1 |
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | >= 2.0.3 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |

## Providers

Expand All @@ -42,10 +38,11 @@ under **Amazon CloudWatch Container Insights**

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_aws_region"></a> [aws\_region](#input\_aws\_region) | EKS cluster region | `string` | n/a | yes |
| <a name="input_eks_cluster_id"></a> [eks\_cluster\_id](#input\_eks\_cluster\_id) | EKS cluster name | `string` | n/a | yes |
| <a name="input_irsa_iam_permissions_boundary"></a> [irsa\_iam\_permissions\_boundary](#input\_irsa\_iam\_permissions\_boundary) | IAM permissions boundary for IRSA roles | `string` | `null` | no |
| <a name="input_irsa_iam_role_path"></a> [irsa\_iam\_role\_path](#input\_irsa\_iam\_role\_path) | IAM role path for IRSA roles | `string` | `"/"` | no |
| <a name="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name) | EKS cluster name | `string` | n/a | yes |
| <a name="input_eks_cluster_domain"></a> [eks\_cluster\_domain](#input\_eks\_cluster\_domain) | The domain for the EKS cluster | `string` | `""` | no |
| <a name="input_eks_cluster_version"></a> [eks\_cluster\_version](#input\_eks\_cluster\_version) | The Kubernetes version for the cluster | `string` | `"1.28"` | no |
| <a name="input_eks_oidc_provider"></a> [eks\_oidc\_provider](#input\_eks\_oidc\_provider) | The OpenID Connect identity provider (issuer URL without leading `https://`) | `string` | `null` | no |
| <a name="input_eks_oidc_provider_arn"></a> [eks\_oidc\_provider\_arn](#input\_eks\_oidc\_provider\_arn) | The OpenID Connect identity provider ARN | `string` | `null` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | Additional tags (e.g. `map('BusinessUnit`,`XYZ`) | `map(string)` | `{}` | no |

## Outputs
Expand Down
7 changes: 7 additions & 0 deletions examples/eks-container-insights/data.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
data "aws_partition" "current" {}
data "aws_caller_identity" "current" {}
data "aws_region" "current" {}

data "aws_eks_cluster" "eks_cluster" {
name = var.cluster_name
}
20 changes: 13 additions & 7 deletions examples/eks-container-insights/locals.tf
Original file line number Diff line number Diff line change
@@ -1,9 +1,15 @@
data "aws_partition" "current" {}
locals {
name = "amazon-cloudwatch-observability"
kubernetes_version = var.eks_cluster_version
eks_oidc_issuer_url = replace(data.aws_eks_cluster.eks_cluster.identity[0].oidc[0].issuer, "https://", "")

data "aws_caller_identity" "current" {}

data "aws_region" "current" {}

data "aws_eks_cluster" "eks_cluster" {
name = var.eks_cluster_id
addon_context = {
aws_caller_identity_account_id = data.aws_caller_identity.current.account_id
aws_caller_identity_arn = data.aws_caller_identity.current.arn
aws_partition_id = data.aws_partition.current.partition
aws_region_name = data.aws_region.current.name
eks_oidc_provider_arn = "arn:${data.aws_partition.current.partition}:iam::${data.aws_caller_identity.current.account_id}:oidc-provider/${local.eks_oidc_issuer_url}"
eks_cluster_id = data.aws_eks_cluster.eks_cluster.id
tags = var.tags
}
}
37 changes: 5 additions & 32 deletions examples/eks-container-insights/main.tf
Original file line number Diff line number Diff line change
@@ -1,34 +1,7 @@
provider "aws" {
region = var.aws_region
}

provider "kubernetes" {
host = local.eks_cluster_endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.eks_cluster.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
args = ["eks", "get-token", "--cluster-name", var.eks_cluster_id]
command = "aws"
}
}

provider "helm" {
kubernetes {
host = local.eks_cluster_endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.eks_cluster.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
args = ["eks", "get-token", "--cluster-name", var.eks_cluster_id]
command = "aws"
}
}
}


# Deploy the ADOT Container Insights

module "eks_container_insights" {
source = "../../modules/eks-container-insights"
# source = "github.com/aws-observability/terraform-aws-observability-accelerator//modules/eks-container-insights?ref=v2.5.4"
eks_cluster_id = var.eks_cluster_id
source = "../../modules/eks-container-insights"
cluster_name = var.cluster_name
enable_amazon_eks_cw_observability = true
create_cloudwatch_observability_irsa_role = true
eks_oidc_provider_arn = local.addon_context.eks_oidc_provider_arn
}
23 changes: 15 additions & 8 deletions examples/eks-container-insights/variables.tf
Original file line number Diff line number Diff line change
@@ -1,25 +1,32 @@
variable "eks_cluster_id" {
variable "cluster_name" {
description = "EKS cluster name"
ruchimo marked this conversation as resolved.
Show resolved Hide resolved
type = string
}

variable "aws_region" {
description = "EKS cluster region"
variable "eks_cluster_domain" {
description = "The domain for the EKS cluster"
type = string
default = ""
}

variable "irsa_iam_role_path" {
description = "IAM role path for IRSA roles"
variable "eks_oidc_provider" {
description = "The OpenID Connect identity provider (issuer URL without leading `https://`)"
type = string
default = "/"
default = null
}

variable "irsa_iam_permissions_boundary" {
description = "IAM permissions boundary for IRSA roles"
variable "eks_oidc_provider_arn" {
description = "The OpenID Connect identity provider ARN"
type = string
default = null
}

variable "eks_cluster_version" {
description = "The Kubernetes version for the cluster"
type = string
default = "1.28"
}

variable "tags" {
description = "Additional tags (e.g. `map('BusinessUnit`,`XYZ`)"
type = map(string)
Expand Down
20 changes: 0 additions & 20 deletions examples/eks-container-insights/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,25 +6,5 @@ terraform {
source = "hashicorp/aws"
version = ">= 5.0.0"
}
kubernetes = {
source = "hashicorp/kubernetes"
version = ">= 2.10"
}
kubectl = {
source = "alekc/kubectl"
version = ">= 2.0.3"
}
helm = {
source = "hashicorp/helm"
version = ">= 2.4.1"
}
}

# ## Used for end-to-end testing on project; update to suit your needs
# backend "s3" {
# bucket = "aws-observability-accelerator-terraform-states"
# region = "us-west-2"
# key = "e2e/eks_container_insights/terraform.tfstate"
# }

}
36 changes: 17 additions & 19 deletions modules/eks-container-insights/README.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# Container Insights ADOT implementation for EKS Cluster Observability
# Container Insights CloudWatch implementation for EKS Cluster Observability

This module provides an automated experience around enabling Container Insights for your EKS cluster using ADOT (AWS Distro for OpenTelemetry).
It provides the following resources:
This module configures AWS CloudWatch Agent used for CloudWatch Application signals and Container Insights.

- ADOT Collector Deployment to your EKS cluster
- Enabling Container Insights on CloudWatch
Use CloudWatch Application Signals to automatically instrument your applications on AWS so that you can monitor current application health and track long-term application performance against your business objectives. Application Signals provides you with a unified, application-centric view of your applications, services, and dependencies, and helps you monitor and triage application health.

Use CloudWatch Container Insights to collect, aggregate, and summarize metrics and logs from your containerized applications and microservices. CloudWatch automatically collects metrics for many resources, such as CPU, memory, disk, and network. Container Insights also provides diagnostic information, such as container restart failures, to help you isolate issues and resolve them quickly. You can also set CloudWatch alarms on metrics that Container Insights collects.


<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
Expand All @@ -14,9 +14,6 @@ It provides the following resources:
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.1.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0.0 |
| <a name="requirement_helm"></a> [helm](#requirement\_helm) | >= 2.4.1 |
| <a name="requirement_kubectl"></a> [kubectl](#requirement\_kubectl) | >= 2.0.3 |
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.10 |

## Providers

Expand All @@ -28,31 +25,32 @@ It provides the following resources:

| Name | Source | Version |
|------|--------|---------|
| <a name="module_helm_addon"></a> [helm\_addon](#module\_helm\_addon) | github.com/aws-ia/terraform-aws-eks-blueprints//modules/kubernetes-addons/helm-addon | v4.32.1 |
| <a name="module_cloudwatch_observability_irsa_role"></a> [cloudwatch\_observability\_irsa\_role](#module\_cloudwatch\_observability\_irsa\_role) | terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks | v5.33.0 |

## Resources

| Name | Type |
|------|------|
| [aws_eks_addon.amazon_cloudwatch_observability](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_addon) | resource |
| [aws_iam_service_linked_role.application_signals_cw](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_service_linked_role) | resource |
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
| [aws_eks_addon_version.eks_addon_version](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_addon_version) | data source |
| [aws_eks_cluster.eks_cluster](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/eks_cluster) | data source |
| [aws_iam_policy.irsa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy) | data source |
| [aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition) | data source |
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| <a name="input_adot_otel_helm_chart_verison"></a> [adot\_otel\_helm\_chart\_verison](#input\_adot\_otel\_helm\_chart\_verison) | ADOT collector helm chart version | `string` | `"0.17.0"` | no |
| <a name="input_eks_cluster_id"></a> [eks\_cluster\_id](#input\_eks\_cluster\_id) | EKS Cluster Id | `string` | n/a | yes |
| <a name="input_helm_config"></a> [helm\_config](#input\_helm\_config) | Helm provider config for adot-exporter-for-eks-on-ec2 | `any` | `{}` | no |
| <a name="input_irsa_iam_permissions_boundary"></a> [irsa\_iam\_permissions\_boundary](#input\_irsa\_iam\_permissions\_boundary) | IAM permissions boundary for IRSA roles | `string` | `null` | no |
| <a name="input_irsa_iam_role_path"></a> [irsa\_iam\_role\_path](#input\_irsa\_iam\_role\_path) | IAM role path for IRSA roles | `string` | `"/"` | no |
| <a name="input_irsa_policies"></a> [irsa\_policies](#input\_irsa\_policies) | Additional IAM policies for a IAM role for service accounts | `list(string)` | `[]` | no |
| <a name="input_manage_via_gitops"></a> [manage\_via\_gitops](#input\_manage\_via\_gitops) | Determines if the add-on should be managed via GitOps. | `bool` | `false` | no |
| <a name="input_service_exporters"></a> [service\_exporters](#input\_service\_exporters) | exporter for adot-ci setup | `string` | `"awsemf"` | no |
| <a name="input_service_receivers"></a> [service\_receivers](#input\_service\_receivers) | receiver for adot-ci setup | `string` | `"awscontainerinsightreceiver"` | no |
| <a name="input_addon_config"></a> [addon\_config](#input\_addon\_config) | Amazon EKS Managed CloudWatch Observability Add-on config | `any` | `{}` | no |
| <a name="input_cluster_name"></a> [cluster\_name](#input\_cluster\_name) | Name of the EKS cluster | `string` | `"eks-cw"` | no |
| <a name="input_create_cloudwatch_application_signals_role"></a> [create\_cloudwatch\_application\_signals\_role](#input\_create\_cloudwatch\_application\_signals\_role) | Create a Cloudwatch Application Signals service-linked role | `string` | `true` | no |
| <a name="input_create_cloudwatch_observability_irsa_role"></a> [create\_cloudwatch\_observability\_irsa\_role](#input\_create\_cloudwatch\_observability\_irsa\_role) | Create a Cloudwatch Observability IRSA | `string` | `true` | no |
| <a name="input_eks_oidc_provider_arn"></a> [eks\_oidc\_provider\_arn](#input\_eks\_oidc\_provider\_arn) | The OIDC Provider ARN of AWS EKS cluster | `string` | `""` | no |
| <a name="input_enable_amazon_eks_cw_observability"></a> [enable\_amazon\_eks\_cw\_observability](#input\_enable\_amazon\_eks\_cw\_observability) | Enable Amazon EKS CloudWatch Observability add-on | `bool` | `false` | no |
| <a name="input_kubernetes_version"></a> [kubernetes\_version](#input\_kubernetes\_version) | Kubernetes version | `string` | `"1.28"` | no |
| <a name="input_most_recent"></a> [most\_recent](#input\_most\_recent) | Most Recent | `string` | `"false"` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | Additional tags (e.g. `map('BusinessUnit`,`XYZ`) | `map(string)` | `{}` | no |

## Outputs
Expand Down
7 changes: 7 additions & 0 deletions modules/eks-container-insights/data.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
data "aws_partition" "current" {}
data "aws_caller_identity" "current" {}
data "aws_region" "current" {}

data "aws_eks_cluster" "eks_cluster" {
name = var.cluster_name
}
Loading
Loading