Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove EFS CSI Driver as it is an EKS add-on now #279

Open
askulkarni2 opened this issue Oct 24, 2023 · 8 comments
Open

Remove EFS CSI Driver as it is an EKS add-on now #279

askulkarni2 opened this issue Oct 24, 2023 · 8 comments
Labels
Milestone

Comments

@askulkarni2
Copy link
Contributor

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

What is the outcome that you are trying to reach?

Now that EFS CSI driver is an EKS add-on we should remove it from blueprints. https://docs.aws.amazon.com/eks/latest/userguide/eks-add-ons.html#workloads-add-ons-available-eks

Describe the solution you would like

Remove it from main.tf.

Describe alternatives you have considered

Additional context

@bryantbiggs bryantbiggs added this to the v2.0 milestone Oct 31, 2023
@github-actions github-actions bot added the stale label Dec 1, 2023
@aws-ia aws-ia deleted a comment from github-actions bot Dec 1, 2023
@bryantbiggs bryantbiggs removed the stale label Dec 1, 2023
Copy link

github-actions bot commented Jan 1, 2024

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label Jan 1, 2024
Copy link

Issue closed due to inactivity.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Jan 12, 2024
@bryantbiggs bryantbiggs reopened this Jan 23, 2024
@bryantbiggs bryantbiggs removed the stale label Jan 23, 2024
Copy link

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label Feb 23, 2024
Copy link

github-actions bot commented Mar 4, 2024

Issue closed due to inactivity.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Mar 4, 2024
@askulkarni2 askulkarni2 removed the stale label Mar 4, 2024
@askulkarni2 askulkarni2 reopened this Mar 4, 2024
@askulkarni2 askulkarni2 added the enhancement New feature or request label Mar 4, 2024
@ahoehma
Copy link

ahoehma commented Mar 17, 2024

@askulkarni2 do you have more details about the "how to use" the addon with eks module directly?

@bryantbiggs
Copy link
Contributor

The implementation is the same between the EKS module and this module; any EKS addon listed here can be enabled by specifying the addon configuration under cluster_addons in the EKS module, or eks_addons for this module, with the name as the key to addons respective configuration map. To enable the addon with the default values/settings, just simply specify an empty map as the value:

module "eks" {
  source  = "terraform-aws-modules/eks/aws"
  version = "~> 20.0"

  # Truncated for brevity ...

  cluster_addons = {
    coredns = {
      most_recent = true
    }
    kube-proxy = {
      most_recent = true
    }
    vpc-cni = {
      most_recent = true
    }
    aws-efs-csi-driver = {}
  }
}
module "eks_blueprints_addons" {
  source  = "aws-ia/eks-blueprints-addons/aws"
  version = "~> 1.0"

  # Truncated for brevity ...

  eks_addons = {
    coredns = {
      most_recent = true
    }
    kube-proxy = {
      most_recent = true
    }
    vpc-cni = {
      most_recent = true
    }
    aws-efs-csi-driver = {}
  }
}

@ahoehma
Copy link

ahoehma commented Mar 18, 2024

@bryantbiggs aha ... nice to know ... I struggled little bit with the 2 locations :-) What is the "best practice"?

@bryantbiggs
Copy link
Contributor

The EKS module has the ability to let users specify before_compute = true to ensure the addon is provisioned before any dataplane compute resources which is helpful for configuring the VPC CNI daemonset. Otherwise, the implementations are identical so its really up to how users and how they wish to manage their addons

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: No status
Development

No branches or pull requests

3 participants