63 lines
1.3 KiB
HCL
63 lines
1.3 KiB
HCL
terraform {
|
|
required_providers {
|
|
aws = {
|
|
source = "hashicorp/aws"
|
|
version = "~> 5.0"
|
|
}
|
|
}
|
|
}
|
|
|
|
provider "aws" {
|
|
region = "us-east-1"
|
|
}
|
|
|
|
resource "aws_vpc" "main" {
|
|
cidr_block = "10.0.0.0/16"
|
|
|
|
tags = {
|
|
Name = "corestate-vpc"
|
|
}
|
|
}
|
|
|
|
resource "aws_eks_cluster" "main" {
|
|
name = "corestate-eks-cluster"
|
|
role_arn = aws_iam_role.eks_cluster.arn
|
|
|
|
vpc_config {
|
|
subnet_ids = aws_subnet.private[*].id
|
|
}
|
|
|
|
depends_on = [
|
|
aws_iam_role_policy_attachment.eks_cluster_policy,
|
|
]
|
|
}
|
|
|
|
# NOTE: This is a simplified placeholder.
|
|
# A real configuration would require definitions for IAM roles,
|
|
# subnets, node groups, etc.
|
|
# The following are placeholders for required resources.
|
|
|
|
resource "aws_iam_role" "eks_cluster" {
|
|
name = "eks-cluster-role"
|
|
assume_role_policy = jsonencode({
|
|
Version = "2012-10-17"
|
|
Statement = [{
|
|
Action = "sts:AssumeRole"
|
|
Effect = "Allow"
|
|
Principal = {
|
|
Service = "eks.amazonaws.com"
|
|
}
|
|
}]
|
|
})
|
|
}
|
|
|
|
resource "aws_iam_role_policy_attachment" "eks_cluster_policy" {
|
|
policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
|
|
role = aws_iam_role.eks_cluster.name
|
|
}
|
|
|
|
resource "aws_subnet" "private" {
|
|
count = 2
|
|
vpc_id = aws_vpc.main.id
|
|
cidr_block = "10.0.${count.index}.0/24"
|
|
} |