2022-07-12 22:32:18 +02:00
|
|
|
include "root" {
|
|
|
|
path = find_in_parent_folders()
|
|
|
|
}
|
|
|
|
|
|
|
|
terraform {
|
|
|
|
source = "${get_repo_root()}//modules/eks-external-secrets"
|
|
|
|
}
|
|
|
|
|
2022-12-09 18:08:49 +01:00
|
|
|
dependencies {
|
|
|
|
paths = ["../eks-kube-prometheus-stack"]
|
|
|
|
}
|
|
|
|
|
2022-07-12 22:32:18 +02:00
|
|
|
dependency "eks" {
|
|
|
|
config_path = "../eks"
|
|
|
|
|
|
|
|
mock_outputs_allowed_terraform_commands = ["validate", "plan"]
|
|
|
|
mock_outputs = {
|
|
|
|
cluster_id = "fake-cluster-id"
|
|
|
|
cluster_endpoint = "https://fake-cluster-endpoint.eks.amazonaws.com"
|
|
|
|
cluster_certificate_authority_data = "ZmFrZS1jYS1jZXJ0LWRhdGE="
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
locals {
|
|
|
|
config_vars = read_terragrunt_config(find_in_parent_folders("config.hcl"))
|
|
|
|
}
|
|
|
|
|
|
|
|
generate = local.config_vars.generate
|
|
|
|
|
|
|
|
inputs = {
|
|
|
|
cluster_id = dependency.eks.outputs.cluster_id
|
|
|
|
cluster_endpoint = dependency.eks.outputs.cluster_endpoint
|
|
|
|
cluster_certificate_authority_data = dependency.eks.outputs.cluster_certificate_authority_data
|
|
|
|
|
|
|
|
# Enable this only if kube-prometheus-stack is set-up on the cluster.
|
|
|
|
service_monitor = true
|
|
|
|
}
|