Kubernetes Service
Deploy your application containers as a Kubernetes Service and Deployment following best practices.
View on GitHubReference
- Inputs
- Outputs
alb_acm_certificate_arns
— A list of ACM certificate ARNs to attach to the ALB. The first certificate in the list will be added as default certificate.
alb_health_check_healthy_threshold
— The number of consecutive health check successes required before considering an unhealthy target healthy.
alb_health_check_interval
— Interval between ALB health checks in seconds.
alb_health_check_path
— URL path for the endpoint that the ALB health check should ping. Defaults to /.
alb_health_check_port
— String value specifying the port that the ALB health check should probe. By default, this will be set to the traffic port.
alb_health_check_protocol
— Protocol (HTTP or HTTPS) that the ALB health check should use to connect to the application container.
alb_health_check_success_codes
— The HTTP status code that should be expected when doing health checks against the specified health check path. Accepts a single value (200), multiple values (200,201), or a range of values (200-300).
alb_health_check_timeout
— The timeout, in seconds, during which no response from a target means a failed health check.
application_name
— The name of the application (e.g. my-service-stage). Used for labeling Kubernetes resources.
canary_image
— The Docker image to use for the canary. Required ifdesired_number_of_canary_pods
is greater than 0.
configmaps_as_env_vars
— Kubernetes ConfigMaps to be injected into the container. Each entry in the map represents a ConfigMap to be injected, with the key representing the name of the ConfigMap. The value is also a map, with each entry corresponding to an entry in the ConfigMap, with the key corresponding to the ConfigMap entry key and the value corresponding to the environment variable name.
configmaps_as_volumes
— Kubernetes ConfigMaps to be injected into the container as volume mounts. Each entry in the map represents a ConfigMap to be mounted, with the key representing the name of the ConfigMap and the value representing a file path on the container to mount the ConfigMap to.
container_image
— The Docker image to run.
container_port
— The port number on which this service's Docker container accepts incoming traffic.
container_protocol
— The protocol on which this service's Docker container accepts traffic. Must be one of the supported protocols: https://kubernetes.io/docs/concepts/services-networking/service/#protocol-support.
custom_resources
— The map that lets you define Kubernetes resources you want installed and configured as part of the chart.
desired_number_of_canary_pods
— The number of canary Pods to run on the Kubernetes cluster for this service. If greater than 0, you must providecanary_image
.
desired_number_of_pods
— The number of Pods to run on the Kubernetes cluster for this service.
domain_name
— The domain name for the DNS A record to bind to the Ingress resource for this service (e.g. service.foo.com). Depending on your external-dns configuration, this will also create the DNS record in the configured DNS service (e.g., Route53).
domain_propagation_ttl
— The TTL value of the DNS A record that is bound to the Ingress resource. Only used ifdomain_name
is set and external-dns is deployed.
eks_iam_role_for_service_accounts_config
— Configuration for using the IAM role with Service Accounts feature to provide permissions to the applications. This expects a map with two properties: `openid_connect_provider_arn
and [``openid_connect_provider_url
](#openid_connect_provider_url)
. The `openid_connect_provider_arn
is the ARN of the OpenID Connect Provider for EKS to retrieve IAM credentials, while [``openid_connect_provider_url
](#openid_connect_provider_url)
is the URL. Leave as an empty string if you do not wish to use IAM role with Service Accounts.
enable_liveness_probe
— Whether or not to enable liveness probe. Liveness checks indicate whether or not the container is alive. When these checks fail, the cluster will automatically rotate the Pod.
enable_readiness_probe
— Whether or not to enable readiness probe. Readiness checks indicate whether or not the container can accept traffic. When these checks fail, the Pods are automatically removed from the Service (and added back in when they pass).
env_vars
— A map of environment variable name to environment variable value that should be made available to the Docker container.
expose_type
— How the service will be exposed in the cluster. Must be one ofexternal
(accessible over the public Internet),internal
(only accessible from within the same VPC as the cluster),cluster-internal
(only accessible within the Kubernetes network).
force_destroy_ingress_access_logs
— A boolean that indicates whether the access logs bucket should be destroyed, even if there are files in it, when you run Terraform destroy. Unless you are using this bucket only for test purposes, you'll want to leave this variable set to false.
horizontal_pod_autoscaler
— Configure the Horizontal Pod Autoscaler information for the associated Deployment. HPA is disabled when this variable is set to null.
iam_policy
— An object defining the policy to attach to `iam_role_name
if the IAM role is going to be created. Accepts a map of objects, where the map keys are sids for IAM policy statements, and the object fields are the resources, actions, and the effect ("Allow" or "Deny") of the statement. Ignored if [``iam_role_arn
](#iam_role_arn)
is provided. Leave as null if you do not wish to use IAM role with Service Accounts.
iam_role_exists
— Whether or not the IAM role passed in `iam_role_name
` already exists. Set to true if it exists, or false if it needs to be created. Defaults to false.
iam_role_name
— The name of an IAM role that will be used by the pod to access the AWS API. If `iam_role_exists
` is set to false, this role will be created. Leave as an empty string if you do not wish to use IAM role with Service Accounts.
ingress_access_logs_s3_bucket_already_exists
— Set to true if the S3 bucket to store the Ingress access logs is managed external to this module.
ingress_access_logs_s3_bucket_name
— The name to use for the S3 bucket where the Ingress access logs will be stored. If you leave this blank, a name will be generated automatically based onapplication_name
.
ingress_access_logs_s3_prefix
— The prefix to use for ingress access logs associated with the ALB. All logs will be stored in a key with this prefix. If null, the application name will be used.
ingress_annotations
— A list of custom ingress annotations, such as health checks and TLS certificates, to add to the Helm chart. See: https://kubernetes-sigs.github.io/aws-alb-ingress-controller/guide/ingress/annotation/
ingress_backend_protocol
— The protocol used by the Ingress ALB resource to communicate with the Service. Must be one of HTTP or HTTPS.
ingress_configure_ssl_redirect
— When true, HTTP requests will automatically be redirected to use SSL (HTTPS). Used only whenexpose_type
is either external or internal.
ingress_group
— Assign the ingress resource to an IngressGroup. All Ingress rules of the group will be collapsed to a single ALB. The rules will be collapsed in priority order, with lower numbers being evaluated first.
ingress_listener_protocol_ports
— A list of maps of protocols and ports that the ALB should listen on.
ingress_path
— Path prefix that should be matched to route to the service. Use /* to match all paths.
ingress_ssl_redirect_rule_already_exists
— Set to true if the Ingress SSL redirect rule is managed externally. This is useful when configuring Ingress grouping and you only want one service to be managing the SSL redirect rules. Only used ifingress_configure_ssl_redirect
is true.
ingress_target_type
— Controls how the ALB routes traffic to the Pods. Supports 'instance' mode (route traffic to NodePort and load balance across all worker nodes, relying on Kubernetes Service networking to route to the pods), or 'ip' mode (route traffic directly to the pod IP - only works with AWS VPC CNI). Must be set to 'ip' if using Fargate. Only used ifexpose_type
is not cluster-internal.
liveness_probe_grace_period_seconds
— Seconds to wait after Pod creation before liveness probe has any effect. Any failures during this period are ignored.
liveness_probe_interval_seconds
— The approximate amount of time, in seconds, between liveness checks of an individual Target.
liveness_probe_path
— URL path for the endpoint that the liveness probe should ping.
liveness_probe_port
— Port that the liveness probe should use to connect to the application container.
liveness_probe_protocol
— Protocol (HTTP or HTTPS) that the liveness probe should use to connect to the application container.
min_number_of_pods_available
— The minimum number of pods that should be available at any given point in time. This is used to configure a PodDisruptionBudget for the service, allowing you to achieve a graceful rollout. See https://blog.gruntwork.io/avoiding-outages-in-your-kubernetes-cluster-using-poddisruptionbudgets-ef6a4baa5085 for an introduction to PodDisruptionBudgets.
namespace
— The Kubernetes Namespace to deploy the application into.
num_days_after_which_archive_ingress_log_data
— After this number of days, Ingress log files should be transitioned from S3 to Glacier. Set to 0 to never archive logs.
num_days_after_which_delete_ingress_log_data
— After this number of days, Ingress log files should be deleted from S3. Set to 0 to never delete logs.
override_chart_inputs
— Override any computed chart inputs with this map. This map is shallow merged to the computed chart inputs prior to passing on to the Helm Release. This is provided as a workaround while the terraform module does not support a particular input value that is exposed in the underlying chart. Please always file a GitHub issue to request exposing additional underlying input values prior to using this variable.
readiness_probe_grace_period_seconds
— Seconds to wait after Pod creation before liveness probe has any effect. Any failures during this period are ignored.
readiness_probe_interval_seconds
— The approximate amount of time, in seconds, between liveness checks of an individual Target.
readiness_probe_path
— URL path for the endpoint that the readiness probe should ping.
readiness_probe_port
— Port that the readiness probe should use to connect to the application container.
readiness_probe_protocol
— Protocol (HTTP or HTTPS) that the readiness probe should use to connect to the application container.
scratch_paths
— Paths that should be allocated as tmpfs volumes in the Deployment container. Each entry in the map is a key value pair where the key is an arbitrary name to bind to the volume, and the value is the path in the container to mount the tmpfs volume.
secrets_as_env_vars
— Kubernetes Secrets to be injected into the container. Each entry in the map represents a Secret to be injected, with the key representing the name of the Secret. The value is also a map, with each entry corresponding to an entry in the Secret, with the key corresponding to the Secret entry key and the value corresponding to the environment variable name.
secrets_as_volumes
— Kubernetes Secrets to be injected into the container as volume mounts. Each entry in the map represents a Secret to be mounted, with the key representing the name of the Secret and the value representing a file path on the container to mount the Secret to.
service_account_exists
— When true, andservice_account_name
is not blank, lookup and assign an existing ServiceAccount in the Namespace to the Pods.
service_account_name
— The name of a service account to create for use with the Pods. This service account will be mapped to the IAM role defined in `var.iam_role_name
` to give the pod permissions to access the AWS API. Must be unique in this namespace. Leave as an empty string if you do not wish to assign a Service Account to the Pods.
service_port
— The port to expose on the Service. This is most useful when addressing the Service internally to the cluster, as it is ignored when connecting from the Ingress resource.
sidecar_containers
— Map of keys to container definitions that allow you to manage additional side car containers that should be included in the Pod. Note that the values are injected directly into the container list for the Pod Spec.
termination_grace_period_seconds
— Grace period in seconds that Kubernetes will wait before terminating the pod. The timeout happens in parallel to preStop hook and the SIGTERM signal, Kubernetes does not wait for preStop to finish before beginning the grace period.
values_file_path
— A local file path where the helm chart values will be emitted. Use to debug issues with the helm chart values. Set to null to prevent creation of the file.
wait
— When true, wait until Pods are up and healthy orwait_timeout
seconds before exiting terraform.
wait_timeout
— Number of seconds to wait for Pods to become healthy before marking the deployment as a failure.