scenarios/perf-eval/nap/terraform-inputs/aws.tfvars (94 lines of code) (raw):

scenario_type = "perf-eval" scenario_name = "nap" deletion_delay = "2h" owner = "aks" network_config_list = [ { role = "nap" vpc_name = "nap-vpc" vpc_cidr_block = "10.0.0.0/16" secondary_ipv4_cidr_blocks = ["10.1.0.0/16"] subnet = [ { name = "nap-subnet-1" cidr_block = "10.0.0.0/16" zone_suffix = "a" map_public_ip_on_launch = true }, { name = "nap-subnet-2" cidr_block = "10.1.0.0/17" zone_suffix = "b" map_public_ip_on_launch = true }, { name = "nap-subnet-3" cidr_block = "10.1.128.0/17" zone_suffix = "c" map_public_ip_on_launch = true } ] security_group_name = "nap-sg" route_tables = [ { name = "internet-rt" cidr_block = "0.0.0.0/0" } ], route_table_associations = [ { name = "nap-subnet-rt-assoc" subnet_name = "nap-subnet-1" route_table_name = "internet-rt" }, { name = "nap-subnet-rt-assoc-2" subnet_name = "nap-subnet-2" route_table_name = "internet-rt" }, { name = "nap-subnet-rt-assoc-3" subnet_name = "nap-subnet-3" route_table_name = "internet-rt" } ] sg_rules = { ingress = [] egress = [ { from_port = 0 to_port = 0 protocol = "-1" cidr_block = "0.0.0.0/0" } ] } } ] eks_config_list = [{ role = "nap" eks_name = "nap" enable_karpenter = true vpc_name = "nap-vpc" policy_arns = ["AmazonEKSClusterPolicy", "AmazonEKSVPCResourceController", "AmazonEKSWorkerNodePolicy", "AmazonEKS_CNI_Policy", "AmazonEC2ContainerRegistryReadOnly", "AmazonSSMManagedInstanceCore"] eks_managed_node_groups = [ { name = "nap-c2n200p200-ng" ami_type = "AL2_x86_64" instance_types = ["m5.xlarge"] min_size = 5 max_size = 5 desired_size = 5 capacity_type = "ON_DEMAND" taints = [ { key = "CriticalAddonsOnly" value = "true" effect = "NO_SCHEDULE" } ] } ] eks_addons = [] kubernetes_version = "1.31" }]