diff --git a/terraform/modules/aws-acm/main.tf b/terraform/modules/aws-acm/main.tf index 9a6070a..b67912c 100644 --- a/terraform/modules/aws-acm/main.tf +++ b/terraform/modules/aws-acm/main.tf @@ -10,7 +10,7 @@ data "aws_acm_certificate" "main" { module "acm" { source = "terraform-aws-modules/acm/aws" - version = "5.0.1" + version = "5.1.1" create_certificate = var.create_acm_certificate diff --git a/terraform/modules/aws-eks/main.tf b/terraform/modules/aws-eks/main.tf index 42f5ebb..4fe7cc5 100644 --- a/terraform/modules/aws-eks/main.tf +++ b/terraform/modules/aws-eks/main.tf @@ -1,7 +1,7 @@ #tfsec:ignore:aws-vpc-no-public-egress-sgr tfsec:ignore:aws-eks-enable-control-plane-logging tfsec:ignore:aws-eks-encrypt-secrets tfsec:ignore:aws-eks-no-public-cluster-access tfsec:ignore:aws-eks-no-public-cluster-access-to-cidr module "eks" { source = "terraform-aws-modules/eks/aws" - version = "20.20.0" + version = "20.31.6" cluster_name = var.name cluster_version = var.eks_cluster_version @@ -131,7 +131,7 @@ module "eks" { module "vpc_cni_irsa" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.39.1" + version = "5.48.0" role_name = "${var.name}-vpc-cni" attach_vpc_cni_policy = true @@ -149,7 +149,7 @@ module "vpc_cni_irsa" { module "aws_ebs_csi_driver" { source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks" - version = "5.39.1" + version = "5.48.0" role_name = "${var.name}-aws-ebs-csi-driver" attach_ebs_csi_policy = true diff --git a/terraform/modules/aws-r53/main.tf b/terraform/modules/aws-r53/main.tf index a544ea0..b360e01 100644 --- a/terraform/modules/aws-r53/main.tf +++ b/terraform/modules/aws-r53/main.tf @@ -7,7 +7,7 @@ data "aws_route53_zone" "main" { module "r53_zone" { source = "terraform-aws-modules/route53/aws//modules/zones" - version = "2.11.1" + version = "4.1.0" create = var.create_r53_zone diff --git a/terraform/modules/aws-vpc/main.tf b/terraform/modules/aws-vpc/main.tf index 8a8d9ec..ed1c9e5 100644 --- a/terraform/modules/aws-vpc/main.tf +++ b/terraform/modules/aws-vpc/main.tf @@ -9,7 +9,7 @@ locals { module "vpc" { source = "terraform-aws-modules/vpc/aws" - version = "5.8.1" + version = "5.17.0" name = var.name cidr = var.cidr @@ -84,7 +84,7 @@ module "vpc" { module "vpc_gateway_endpoints" { source = "terraform-aws-modules/vpc/aws//modules/vpc-endpoints" - version = "5.8.1" + version = "5.17.0" vpc_id = module.vpc.vpc_id diff --git a/terraform/modules/k8s-addons/eks-aws-loadbalancer-controller.tf b/terraform/modules/k8s-addons/eks-aws-loadbalancer-controller.tf index 395451b..813c7ae 100644 --- a/terraform/modules/k8s-addons/eks-aws-loadbalancer-controller.tf +++ b/terraform/modules/k8s-addons/eks-aws-loadbalancer-controller.tf @@ -137,6 +137,7 @@ module "aws_iam_aws_loadbalancer_controller" { "elasticloadbalancing:DescribeLoadBalancerAttributes", "elasticloadbalancing:DescribeListeners", "elasticloadbalancing:DescribeListenerCertificates", + "elasticloadbalancing:DescribeListenerAttributes", "elasticloadbalancing:DescribeSSLPolicies", "elasticloadbalancing:DescribeRules", "elasticloadbalancing:DescribeTargetGroups", @@ -437,7 +438,6 @@ resource "kubernetes_ingress_v1" "default" { metadata { name = "${local.ingress_nginx.name}-controller" annotations = { - "kubernetes.io/ingress.class" = "alb" "alb.ingress.kubernetes.io/scheme" = "internet-facing" "alb.ingress.kubernetes.io/tags" = "Environment=${local.env},Name=${local.name},Cluster=${local.eks_cluster_id}" "alb.ingress.kubernetes.io/certificate-arn" = "${local.ssl_certificate_arn}" @@ -450,6 +450,7 @@ resource "kubernetes_ingress_v1" "default" { namespace = module.ingress_nginx_namespace[count.index].name } spec { + ingress_class_name = "alb" rule { http { path { diff --git a/terraform/modules/k8s-addons/eks-loki-stack.tf b/terraform/modules/k8s-addons/eks-loki-stack.tf index 3c22eb6..b9fb70b 100644 --- a/terraform/modules/k8s-addons/eks-loki-stack.tf +++ b/terraform/modules/k8s-addons/eks-loki-stack.tf @@ -10,6 +10,9 @@ locals { loki_stack_values = <