ℹ️ Only the pertinent attributes are shown below for brevity
Refer to the EKS Managed Node Group documentation documentation for service related details.
- The module creates a custom launch template by default to ensure settings such as tags are propagated to instances. Please note that many of the customization options listed here are only available when a custom launch template is created. To use the default template provided by the AWS EKS managed node group service, disable the launch template creation by setting
use_custom_launch_template
tofalse
:
eks_managed_node_groups = {
default = {
use_custom_launch_template = false
}
}
- Native support for Bottlerocket OS is provided by providing the respective AMI type:
eks_managed_node_groups = {
bottlerocket_default = {
use_custom_launch_template = false
ami_type = "BOTTLEROCKET_x86_64"
}
}
- Bottlerocket OS is supported in a similar manner. However, note that the user data for Bottlerocket OS uses the TOML format:
eks_managed_node_groups = {
bottlerocket_prepend_userdata = {
ami_type = "BOTTLEROCKET_x86_64"
bootstrap_extra_args = <<-EOT
# extra args added
[settings.kernel]
lockdown = "integrity"
EOT
}
}
- When using a custom AMI, the AWS EKS Managed Node Group service will NOT inject the necessary bootstrap script into the supplied user data. Users can elect to provide their own user data to bootstrap and connect or opt in to use the module provided user data:
eks_managed_node_groups = {
custom_ami = {
ami_id = "ami-0caf35bc73450c396"
# By default, EKS managed node groups will not append bootstrap script;
# this adds it back in using the default template provided by the module
# Note: this assumes the AMI provided is an EKS optimized AMI derivative
enable_bootstrap_user_data = true
pre_bootstrap_user_data = <<-EOT
export FOO=bar
EOT
# Because we have full control over the user data supplied, we can also run additional
# scripts/configuration changes after the bootstrap script has been run
post_bootstrap_user_data = <<-EOT
echo "you are free little kubelet!"
EOT
}
}
- There is similar support for Bottlerocket OS:
eks_managed_node_groups = {
bottlerocket_custom_ami = {
ami_id = "ami-0ff61e0bcfc81dc94"
ami_type = "BOTTLEROCKET_x86_64"
# use module user data template to bootstrap
enable_bootstrap_user_data = true
# this will get added to the template
bootstrap_extra_args = <<-EOT
# extra args added
[settings.kernel]
lockdown = "integrity"
[settings.kubernetes.node-labels]
"label1" = "foo"
"label2" = "bar"
[settings.kubernetes.node-taints]
"dedicated" = "experimental:PreferNoSchedule"
"special" = "true:NoSchedule"
EOT
}
}
See the examples/eks-managed-node-group/
example for a working example of various configurations.
Refer to the Self Managed Node Group documentation documentation for service related details.
- The
self-managed-node-group
uses the latest AWS EKS Optimized AMI (Linux) for the given Kubernetes version by default:
cluster_version = "1.31"
# This self managed node group will use the latest AWS EKS Optimized AMI for Kubernetes 1.27
self_managed_node_groups = {
default = {}
}
- To use Bottlerocket, specify the
ami_type
as one of the respective"BOTTLEROCKET_*" types
and supply a Bottlerocket OS AMI:
cluster_version = "1.31"
self_managed_node_groups = {
bottlerocket = {
ami_id = data.aws_ami.bottlerocket_ami.id
ami_type = "BOTTLEROCKET_x86_64"
}
}
See the examples/self-managed-node-group/
example for a working example of various configurations.
Fargate profiles are straightforward to use and therefore no further details are provided here. See the tests/fargate-profile/
tests for a working example of various configurations.
Each type of compute resource (EKS managed node group, self managed node group, or Fargate profile) provides the option for users to specify a default configuration. These default configurations can be overridden from within the compute resource's individual definition. The order of precedence for configurations (from highest to least precedence):
- Compute resource individual configuration
- Compute resource family default configuration (
eks_managed_node_group_defaults
,self_managed_node_group_defaults
,fargate_profile_defaults
)- Module default configuration (see
variables.tf
andnode_groups.tf
)
- Module default configuration (see
- Compute resource family default configuration (
For example, the following creates 4 AWS EKS Managed Node Groups:
eks_managed_node_group_defaults = {
ami_type = "AL2_x86_64"
disk_size = 50
instance_types = ["m6i.large", "m5.large", "m5n.large", "m5zn.large"]
}
eks_managed_node_groups = {
# Uses module default configurations overridden by configuration above
default = {}
# This further overrides the instance types used
compute = {
instance_types = ["c5.large", "c6i.large", "c6d.large"]
}
# This further overrides the instance types and disk size used
persistent = {
disk_size = 1024
instance_types = ["r5.xlarge", "r6i.xlarge", "r5b.xlarge"]
}
# This overrides the OS used
bottlerocket = {
ami_type = "BOTTLEROCKET_x86_64"
}
}