Florentio DE SOUZA

Results 14 comments of Florentio DE SOUZA

Hello @askulkarni2 I am going to work on this blueprint. My company is very interested by the feature. I will raise a PR soon

Hello @askulkarni2 In my company, we are are running multiple EKS clusters in different accounts different from from the master payer account. For the blueprint my proposal will be focused...

Looking forward your inputs in order to elaborate it better and raise a PR. thanks

> How does this resolve #816 (or even relate to it)? There is a variable `irsa_iam_role_name` added here : https://github.com/aws-ia/terraform-aws-eks-blueprints/blob/015834f05273cab73310cec68386aebf7d64627b/modules/irsa/variables.tf#L29 by this PR https://github.com/aws-ia/terraform-aws-eks-blueprints/pull/832 in order to be able to...

Hello @jrbeilke you can provide additional policies to the ebs-csi-driver policy by using the using `amazon_eks_aws_ebs_csi_driver_config` https://github.com/aws-ia/terraform-aws-eks-blueprints/blob/f9a7ebdae3454f7997590268166ad519df9f6617/modules/kubernetes-addons/variables.tf#L103 In your use case his can solve the problem, here is the policy...

Hello @gibbonsryan If the namespace already exists, you have to set the `create_namespace` attribute to `false` for your config like this ```hcl enable_prometheus = true prometheus_helm_config = { name =...

Hello @andrewhibbert this PR https://github.com/aws-ia/terraform-aws-eks-blueprints/pull/908 is supposed to let consumers override the role name of IRSA though via the addons once it is merged.

Hello @mikeinton, Regarding addons, IAM Role usage is most for IRSA purpose (addons which need irsa config). So, I guess this issue is about providing the IRSA role to the...

Hello @mikeinton Thank for the reply, looks like the solution is covered by this PR https://github.com/aws-ia/terraform-aws-eks-blueprints/pull/908 related to this issue here https://github.com/aws-ia/terraform-aws-eks-blueprints/issues/816 This PR allows to define the name of...