scenarios/perf-eval/nap/terraform-inputs/aws.tfvars (94 lines of code) (raw):
scenario_type = "perf-eval"
scenario_name = "nap"
deletion_delay = "2h"
owner = "aks"
network_config_list = [
{
role = "nap"
vpc_name = "nap-vpc"
vpc_cidr_block = "10.0.0.0/16"
secondary_ipv4_cidr_blocks = ["10.1.0.0/16"]
subnet = [
{
name = "nap-subnet-1"
cidr_block = "10.0.0.0/16"
zone_suffix = "a"
map_public_ip_on_launch = true
},
{
name = "nap-subnet-2"
cidr_block = "10.1.0.0/17"
zone_suffix = "b"
map_public_ip_on_launch = true
},
{
name = "nap-subnet-3"
cidr_block = "10.1.128.0/17"
zone_suffix = "c"
map_public_ip_on_launch = true
}
]
security_group_name = "nap-sg"
route_tables = [
{
name = "internet-rt"
cidr_block = "0.0.0.0/0"
}
],
route_table_associations = [
{
name = "nap-subnet-rt-assoc"
subnet_name = "nap-subnet-1"
route_table_name = "internet-rt"
},
{
name = "nap-subnet-rt-assoc-2"
subnet_name = "nap-subnet-2"
route_table_name = "internet-rt"
},
{
name = "nap-subnet-rt-assoc-3"
subnet_name = "nap-subnet-3"
route_table_name = "internet-rt"
}
]
sg_rules = {
ingress = []
egress = [
{
from_port = 0
to_port = 0
protocol = "-1"
cidr_block = "0.0.0.0/0"
}
]
}
}
]
eks_config_list = [{
role = "nap"
eks_name = "nap"
enable_karpenter = true
vpc_name = "nap-vpc"
policy_arns = ["AmazonEKSClusterPolicy", "AmazonEKSVPCResourceController", "AmazonEKSWorkerNodePolicy", "AmazonEKS_CNI_Policy", "AmazonEC2ContainerRegistryReadOnly", "AmazonSSMManagedInstanceCore"]
eks_managed_node_groups = [
{
name = "nap-c2n200p200-ng"
ami_type = "AL2_x86_64"
instance_types = ["m5.xlarge"]
min_size = 5
max_size = 5
desired_size = 5
capacity_type = "ON_DEMAND"
taints = [
{
key = "CriticalAddonsOnly"
value = "true"
effect = "NO_SCHEDULE"
}
]
}
]
eks_addons = []
kubernetes_version = "1.31"
}]