Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add tags to EKS created cluster security group to match rest of module tagging scheme #1957

Conversation

bryantbiggs
Copy link
Member

Description

  • Add tags to EKS created cluster security group to match rest of module tagging scheme

Motivation and Context

Breaking Changes

  • No

How Has This Been Tested?

  • I have tested and validated these changes using one or more of the provided examples/* projects
    • Tested on complete example

@antonbabenko antonbabenko merged commit 9371a29 into terraform-aws-modules:master Mar 24, 2022
antonbabenko pushed a commit that referenced this pull request Mar 24, 2022
## [18.14.0](v18.13.0...v18.14.0) (2022-03-24)

### Features

* Add tags to EKS created cluster security group to match rest of module tagging scheme ([#1957](#1957)) ([9371a29](9371a29))
@antonbabenko
Copy link
Member

This PR is included in version 18.14.0 🎉

@@ -59,6 +59,14 @@ resource "aws_eks_cluster" "this" {
]
}

resource "aws_ec2_tag" "cluster_primary_security_group" {
for_each = { for k, v in merge(var.tags, var.cluster_tags) : k => v if var.create }
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using local.create is better but var.create is ok, too. :)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ah shoot, my bad - I forgot that one. I'll get it on the next change

@bryantbiggs bryantbiggs deleted the feat/cluster-security-group-tags branch March 24, 2022 11:55
spr-mweber3 pushed a commit to spring-media/terraform-aws-eks that referenced this pull request Apr 26, 2022
spr-mweber3 pushed a commit to spring-media/terraform-aws-eks that referenced this pull request Apr 26, 2022
## [18.14.0](terraform-aws-modules/terraform-aws-eks@v18.13.0...v18.14.0) (2022-03-24)

### Features

* Add tags to EKS created cluster security group to match rest of module tagging scheme ([terraform-aws-modules#1957](terraform-aws-modules#1957)) ([9371a29](terraform-aws-modules@9371a29))
it-without-politics pushed a commit to it-without-politics/terraform-aws-eks that referenced this pull request May 23, 2022
it-without-politics pushed a commit to it-without-politics/terraform-aws-eks that referenced this pull request May 23, 2022
## [18.14.0](terraform-aws-modules/terraform-aws-eks@v18.13.0...v18.14.0) (2022-03-24)

### Features

* Add tags to EKS created cluster security group to match rest of module tagging scheme ([terraform-aws-modules#1957](terraform-aws-modules#1957)) ([9371a29](terraform-aws-modules@9371a29))
baibailiha added a commit to baibailiha/terraform-aws-eks that referenced this pull request Sep 13, 2022
## [18.14.0](terraform-aws-modules/terraform-aws-eks@v18.13.0...v18.14.0) (2022-03-24)

### Features

* Add tags to EKS created cluster security group to match rest of module tagging scheme ([#1957](terraform-aws-modules/terraform-aws-eks#1957)) ([eaf4c38](terraform-aws-modules/terraform-aws-eks@eaf4c38))
@github-actions
Copy link

github-actions bot commented Nov 9, 2022

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 9, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants