diff --git a/terraform/modules/aws-eks/providers.tf b/terraform/modules/aws-eks/providers.tf index 861c539..3731cab 100644 --- a/terraform/modules/aws-eks/providers.tf +++ b/terraform/modules/aws-eks/providers.tf @@ -7,5 +7,3 @@ provider "kubernetes" { data "aws_eks_cluster_auth" "main" { name = module.eks.cluster_name } - -data "aws_caller_identity" "current" {} diff --git a/terraform/modules/aws-eks/variables.tf b/terraform/modules/aws-eks/variables.tf index 02f9e31..41dd7ce 100644 --- a/terraform/modules/aws-eks/variables.tf +++ b/terraform/modules/aws-eks/variables.tf @@ -3,11 +3,6 @@ variable "name" { description = "Name, required to create unique resource names" } -variable "env" { - type = string - description = "Environment name" -} - variable "region" { type = string description = "Infrastructure region" @@ -28,12 +23,8 @@ variable "private_subnets" { description = "A list of private subnets inside the VPC" } -variable "public_subnets" { - type = list(any) - description = "A list of public subnets inside the VPC" -} - variable "eks_cluster_version" { + type = string default = "1.29" description = "Version of the EKS K8S cluster" } @@ -89,12 +80,6 @@ variable "eks_cloudwatch_log_group_retention_in_days" { description = "Number of days to retain log events. Default retention - 90 days." } -variable "eks_cluster_encryption_config_enable" { - type = bool - default = false - description = "Enable or not encryption for k8s secrets with aws-kms" -} - variable "eks_cluster_endpoint_public_access" { type = bool default = true