43 | > Watch demo of using Atmos with Terraform
44 | > 
45 | > Example of running atmos to manage infrastructure from our Quick Start tutorial.
46 | >
47 |
48 |
49 | ## Introduction
50 |
51 | By default, this module will provision an [AWS Fargate Profile](https://docs.aws.amazon.com/eks/latest/userguide/fargate-profile.html)
52 | and Fargate Pod Execution Role for [EKS](https://aws.amazon.com/eks/).
53 |
54 | Note that in general, you only need one Fargate Pod Execution Role per AWS account,
55 | and it can be shared across regions. So if you are creating multiple Faragte Profiles,
56 | you can reuse the role created by the first one, or instantiate this module with
57 | `fargate_profile_enabled = false` to create the role separate from the profile.
58 |
59 |
60 |
61 |
62 | ## Usage
63 |
64 |
65 | For a complete example, see [examples/complete](examples/complete).
66 |
67 | For automated tests of the complete example using [bats](https://github.com/bats-core/bats-core) and [Terratest](https://github.com/gruntwork-io/terratest)
68 | (which tests and deploys the example on AWS), see [test](test).
69 |
70 | ```hcl
71 | module "label" {
72 | source = "cloudposse/label/null"
73 | version = "0.25.0"
74 |
75 | # This is the preferred way to add attributes. It will put "cluster" last
76 | # after any attributes set in `var.attributes` or `context.attributes`.
77 | # In this case, we do not care, because we are only using this instance
78 | # of this module to create tags.
79 | attributes = ["cluster"]
80 |
81 | context = module.this.context
82 | }
83 |
84 | locals {
85 | tags = try(merge(module.label.tags, tomap("kubernetes.io/cluster/${module.label.id}", "shared")), null)
86 |
87 | eks_worker_ami_name_filter = "amazon-eks-node-${var.kubernetes_version}*"
88 |
89 | allow_all_ingress_rule = {
90 | key = "allow_all_ingress"
91 | type = "ingress"
92 | from_port = 0
93 | to_port = 0 # [sic] from and to port ignored when protocol is "-1", warning if not zero
94 | protocol = "-1"
95 | description = "Allow all ingress"
96 | cidr_blocks = ["0.0.0.0/0"]
97 | ipv6_cidr_blocks = ["::/0"]
98 | }
99 |
100 | allow_http_ingress_rule = {
101 | key = "http"
102 | type = "ingress"
103 | from_port = 80
104 | to_port = 80
105 | protocol = "tcp"
106 | description = "Allow HTTP ingress"
107 | cidr_blocks = ["0.0.0.0/0"]
108 | ipv6_cidr_blocks = ["::/0"]
109 | }
110 |
111 | extra_policy_arn = "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess"
112 | }
113 |
114 | module "vpc" {
115 | source = "cloudposse/vpc/aws"
116 | version = "1.1.0"
117 |
118 | cidr_block = var.vpc_cidr_block
119 | tags = local.tags
120 |
121 | context = module.this.context
122 | }
123 |
124 | module "subnets" {
125 | source = "cloudposse/dynamic-subnets/aws"
126 | version = "1.0.0"
127 |
128 | availability_zones = var.availability_zones
129 | vpc_id = module.vpc.vpc_id
130 | igw_id = module.vpc.igw_id
131 | cidr_block = module.vpc.vpc_cidr_block
132 | nat_gateway_enabled = true
133 | nat_instance_enabled = false
134 | tags = local.tags
135 |
136 | context = module.this.context
137 | }
138 |
139 | module "ssh_source_access" {
140 | source = "cloudposse/security-group/aws"
141 | version = "1.0.1"
142 |
143 | attributes = ["ssh", "source"]
144 | security_group_description = "Test source security group ssh access only"
145 | create_before_destroy = true
146 | allow_all_egress = true
147 |
148 | rules = [local.allow_all_ingress_rule]
149 |
150 | vpc_id = module.vpc.vpc_id
151 |
152 | context = module.label.context
153 | }
154 |
155 | module "https_sg" {
156 | source = "cloudposse/security-group/aws"
157 | version = "1.0.1"
158 |
159 | attributes = ["http"]
160 | security_group_description = "Allow http access"
161 | create_before_destroy = true
162 | allow_all_egress = true
163 |
164 | rules = [local.allow_http_ingress_rule]
165 |
166 | vpc_id = module.vpc.vpc_id
167 |
168 | context = module.label.context
169 | }
170 |
171 | module "eks_cluster" {
172 | source = "cloudposse/eks-cluster/aws"
173 | version = "2.2.0"
174 |
175 | region = var.region
176 | vpc_id = module.vpc.vpc_id
177 | subnet_ids = module.subnets.public_subnet_ids
178 | kubernetes_version = var.kubernetes_version
179 | local_exec_interpreter = var.local_exec_interpreter
180 | oidc_provider_enabled = var.oidc_provider_enabled
181 | enabled_cluster_log_types = var.enabled_cluster_log_types
182 | cluster_log_retention_period = var.cluster_log_retention_period
183 |
184 | # data auth has problems destroying the auth-map
185 | kube_data_auth_enabled = false
186 | kube_exec_auth_enabled = true
187 |
188 | context = module.this.context
189 | }
190 |
191 | module "eks_node_group" {
192 | source = "cloudposse/eks-node-group/aws"
193 | version = "2.4.0"
194 |
195 | subnet_ids = module.subnets.public_subnet_ids
196 | cluster_name = module.eks_cluster.eks_cluster_id
197 | instance_types = var.instance_types
198 | desired_size = var.desired_size
199 | min_size = var.min_size
200 | max_size = var.max_size
201 | kubernetes_version = [var.kubernetes_version]
202 | kubernetes_labels = merge(var.kubernetes_labels, { attributes = coalesce(join(module.this.delimiter, module.this.attributes), "none") })
203 | kubernetes_taints = var.kubernetes_taints
204 | ec2_ssh_key_name = var.ec2_ssh_key_name
205 | ssh_access_security_group_ids = [module.ssh_source_access.id]
206 | associated_security_group_ids = [module.ssh_source_access.id, module.https_sg.id]
207 | node_role_policy_arns = [local.extra_policy_arn]
208 | update_config = var.update_config
209 |
210 | after_cluster_joining_userdata = var.after_cluster_joining_userdata
211 |
212 | ami_type = var.ami_type
213 | ami_release_version = var.ami_release_version
214 |
215 | before_cluster_joining_userdata = [var.before_cluster_joining_userdata]
216 |
217 | context = module.this.context
218 |
219 | # Ensure ordering of resource creation to eliminate the race conditions when applying the Kubernetes Auth ConfigMap.
220 | # Do not create Node Group before the EKS cluster is created and the `aws-auth` Kubernetes ConfigMap is applied.
221 | depends_on = [module.eks_cluster, module.eks_cluster.kubernetes_config_map_id]
222 |
223 | create_before_destroy = true
224 |
225 | node_group_terraform_timeouts = [{
226 | create = "40m"
227 | update = null
228 | delete = "20m"
229 | }]
230 | }
231 |
232 | module "eks_fargate_profile" {
233 | source = "cloudposse/eks-fargate-profile/aws"
234 | version = "x.x.x"
235 |
236 | subnet_ids = module.subnets.public_subnet_ids
237 | cluster_name = module.eks_cluster.eks_cluster_id
238 | kubernetes_namespace = var.kubernetes_namespace
239 | kubernetes_labels = var.kubernetes_labels
240 | iam_role_kubernetes_namespace_delimiter = var.iam_role_kubernetes_namespace_delimiter
241 |
242 | context = module.this.context
243 | }
244 |
245 | ```
246 |
247 | > [!IMPORTANT]
248 | > In Cloud Posse's examples, we avoid pinning modules to specific versions to prevent discrepancies between the documentation
249 | > and the latest released versions. However, for your own projects, we strongly advise pinning each module to the exact version
250 | > you're using. This practice ensures the stability of your infrastructure. Additionally, we recommend implementing a systematic
251 | > approach for updating versions to avoid unexpected changes.
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 | ## Requirements
262 |
263 | | Name | Version |
264 | |------|---------|
265 | | [terraform](#requirement\_terraform) | >= 1.0.0 |
266 | | [aws](#requirement\_aws) | >= 5.0.0 |
267 |
268 | ## Providers
269 |
270 | | Name | Version |
271 | |------|---------|
272 | | [aws](#provider\_aws) | >= 5.0.0 |
273 |
274 | ## Modules
275 |
276 | | Name | Source | Version |
277 | |------|--------|---------|
278 | | [fargate\_profile\_label](#module\_fargate\_profile\_label) | cloudposse/label/null | 0.25.0 |
279 | | [role\_label](#module\_role\_label) | cloudposse/label/null | 0.25.0 |
280 | | [this](#module\_this) | cloudposse/label/null | 0.25.0 |
281 |
282 | ## Resources
283 |
284 | | Name | Type |
285 | |------|------|
286 | | [aws_eks_fargate_profile.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_fargate_profile) | resource |
287 | | [aws_iam_role.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
288 | | [aws_iam_role_policy_attachment.amazon_eks_fargate_pod_execution_role_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
289 | | [aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
290 | | [aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition) | data source |
291 |
292 | ## Inputs
293 |
294 | | Name | Description | Type | Default | Required |
295 | |------|-------------|------|---------|:--------:|
296 | | [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no |
297 | | [attributes](#input\_attributes) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the `delimiter`
and treated as a single ID element. | `list(string)` | `[]` | no |
298 | | [cluster\_name](#input\_cluster\_name) | The name of the EKS cluster | `string` | `""` | no |
299 | | [context](#input\_context) | Single object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as `null` to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional\_tag\_map, which are merged. | `any` | {
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
} | no |
300 | | [delimiter](#input\_delimiter) | Delimiter to be used between ID elements.
Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. | `string` | `null` | no |
301 | | [descriptor\_formats](#input\_descriptor\_formats) | Describe additional descriptors to be output in the `descriptors` output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
`{
format = string
labels = list(string)
}`
(Type is `any` so the map values can later be enhanced to provide additional options.)
`format` is a Terraform format string to be passed to the `format()` function.
`labels` is a list of labels, in order, to pass to `format()` function.
Label values will be normalized before being passed to `format()` so they will be
identical to how they appear in `id`.
Default is `{}` (`descriptors` output will be empty). | `any` | `{}` | no |
302 | | [enabled](#input\_enabled) | Set to false to prevent the module from creating any resources | `bool` | `null` | no |
303 | | [environment](#input\_environment) | ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' | `string` | `null` | no |
304 | | [fargate\_pod\_execution\_role\_arn](#input\_fargate\_pod\_execution\_role\_arn) | ARN of the Fargate Pod Execution Role. Required if `fargate_pod_execution_role_enabled` is `false`, otherwise ignored. | `string` | `null` | no |
305 | | [fargate\_pod\_execution\_role\_enabled](#input\_fargate\_pod\_execution\_role\_enabled) | Set false to disable the Fargate Pod Execution Role creation | `bool` | `true` | no |
306 | | [fargate\_pod\_execution\_role\_name](#input\_fargate\_pod\_execution\_role\_name) | Fargate Pod Execution Role name. If not provided, will be derived from the context | `string` | `null` | no |
307 | | [fargate\_profile\_enabled](#input\_fargate\_profile\_enabled) | Set false to disable the Fargate Profile creation | `bool` | `true` | no |
308 | | [fargate\_profile\_iam\_role\_name](#input\_fargate\_profile\_iam\_role\_name) | DEPRECATED (use `fargate_pod_execution_role_name` instead): Fargate profile IAM role name. If not provided, will be derived from the context | `string` | `null` | no |
309 | | [fargate\_profile\_name](#input\_fargate\_profile\_name) | Fargate profile name. If not provided, will be derived from the context | `string` | `null` | no |
310 | | [iam\_role\_kubernetes\_namespace\_delimiter](#input\_iam\_role\_kubernetes\_namespace\_delimiter) | Delimiter for the Kubernetes namespace in the IAM Role name | `string` | `"-"` | no |
311 | | [id\_length\_limit](#input\_id\_length\_limit) | Limit `id` to this many characters (minimum 6).
Set to `0` for unlimited length.
Set to `null` for keep the existing setting, which defaults to `0`.
Does not affect `id_full`. | `number` | `null` | no |
312 | | [kubernetes\_labels](#input\_kubernetes\_labels) | Key-value mapping of Kubernetes labels for selection | `map(string)` | `{}` | no |
313 | | [kubernetes\_namespace](#input\_kubernetes\_namespace) | Kubernetes namespace for selection | `string` | `""` | no |
314 | | [label\_key\_case](#input\_label\_key\_case) | Controls the letter case of the `tags` keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper`.
Default value: `title`. | `string` | `null` | no |
315 | | [label\_order](#input\_label\_order) | The order in which the labels (ID elements) appear in the `id`.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. | `list(string)` | `null` | no |
316 | | [label\_value\_case](#input\_label\_value\_case) | Controls the letter case of ID elements (labels) as included in `id`,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper` and `none` (no transformation).
Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.
Default value: `lower`. | `string` | `null` | no |
317 | | [labels\_as\_tags](#input\_labels\_as\_tags) | Set of labels (ID elements) to include as tags in the `tags` output.
Default is to include all labels.
Tags with empty values will not be included in the `tags` output.
Set to `[]` to suppress all generated tags.
**Notes:**
The value of the `name` tag, if included, will be the `id`, not the `name`.
Unlike other `null-label` inputs, the initial setting of `labels_as_tags` cannot be
changed in later chained modules. Attempts to change it will be silently ignored. | `set(string)` | [
"default"
]
| no |
318 | | [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no |
319 | | [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no |
320 | | [permissions\_boundary](#input\_permissions\_boundary) | If provided, all IAM roles will be created with this permissions boundary attached | `string` | `null` | no |
321 | | [regex\_replace\_chars](#input\_regex\_replace\_chars) | Terraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. | `string` | `null` | no |
322 | | [stage](#input\_stage) | ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no |
323 | | [subnet\_ids](#input\_subnet\_ids) | Identifiers of private EC2 Subnets to associate with the EKS Fargate Profile. These subnets must have the following resource tag: kubernetes.io/cluster/CLUSTER\_NAME (where CLUSTER\_NAME is replaced with the name of the EKS Cluster) | `list(string)` | `[]` | no |
324 | | [tags](#input\_tags) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).
Neither the tag keys nor the tag values will be modified by this module. | `map(string)` | `{}` | no |
325 | | [tenant](#input\_tenant) | ID element \_(Rarely used, not included by default)\_. A customer identifier, indicating who this instance of a resource is for | `string` | `null` | no |
326 |
327 | ## Outputs
328 |
329 | | Name | Description |
330 | |------|-------------|
331 | | [eks\_fargate\_pod\_execution\_role\_arn](#output\_eks\_fargate\_pod\_execution\_role\_arn) | ARN of the EKS Fargate Pod Execution role |
332 | | [eks\_fargate\_pod\_execution\_role\_name](#output\_eks\_fargate\_pod\_execution\_role\_name) | Name of the EKS Fargate Pod Execution role |
333 | | [eks\_fargate\_profile\_arn](#output\_eks\_fargate\_profile\_arn) | Amazon Resource Name (ARN) of the EKS Fargate Profile |
334 | | [eks\_fargate\_profile\_id](#output\_eks\_fargate\_profile\_id) | EKS Cluster name and EKS Fargate Profile name separated by a colon |
335 | | [eks\_fargate\_profile\_role\_arn](#output\_eks\_fargate\_profile\_role\_arn) | DEPRECATED (use `eks_fargate_pod_execution_role_arn` instead): ARN of the EKS Fargate Profile IAM role |
336 | | [eks\_fargate\_profile\_role\_name](#output\_eks\_fargate\_profile\_role\_name) | DEPRECATED (use `eks_fargate_pod_execution_role_name` instead): Name of the EKS Fargate Profile IAM role |
337 | | [eks\_fargate\_profile\_status](#output\_eks\_fargate\_profile\_status) | Status of the EKS Fargate Profile |
338 |
339 |
340 |
341 |
342 |
343 |
344 |
345 |
346 | ## Related Projects
347 |
348 | Check out these related projects.
349 |
350 | - [terraform-aws-eks-cluster](https://github.com/cloudposse/terraform-aws-eks-cluster) - Terraform module to provision an EKS cluster on AWS
351 | - [terraform-aws-eks-node-group](https://github.com/cloudposse/terraform-aws-eks-node-group) - Terraform module to provision an EKS Node Group
352 | - [terraform-aws-eks-workers](https://github.com/cloudposse/terraform-aws-eks-workers) - Terraform module to provision an AWS AutoScaling Group, IAM Role, and Security Group for EKS Workers
353 | - [terraform-aws-ec2-autoscale-group](https://github.com/cloudposse/terraform-aws-ec2-autoscale-group) - Terraform module to provision Auto Scaling Group and Launch Template on AWS
354 | - [terraform-aws-ecs-container-definition](https://github.com/cloudposse/terraform-aws-ecs-container-definition) - Terraform module to generate well-formed JSON documents (container definitions) that are passed to the aws_ecs_task_definition Terraform resource
355 | - [terraform-aws-ecs-alb-service-task](https://github.com/cloudposse/terraform-aws-ecs-alb-service-task) - Terraform module which implements an ECS service which exposes a web service via ALB
356 | - [terraform-aws-ecs-web-app](https://github.com/cloudposse/terraform-aws-ecs-web-app) - Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more
357 | - [terraform-aws-ecs-codepipeline](https://github.com/cloudposse/terraform-aws-ecs-codepipeline) - Terraform module for CI/CD with AWS Code Pipeline and Code Build for ECS
358 | - [terraform-aws-ecs-cloudwatch-autoscaling](https://github.com/cloudposse/terraform-aws-ecs-cloudwatch-autoscaling) - Terraform module to autoscale ECS Service based on CloudWatch metrics
359 | - [terraform-aws-ecs-cloudwatch-sns-alarms](https://github.com/cloudposse/terraform-aws-ecs-cloudwatch-sns-alarms) - Terraform module to create CloudWatch Alarms on ECS Service level metrics
360 | - [terraform-aws-ec2-instance](https://github.com/cloudposse/terraform-aws-ec2-instance) - Terraform module for providing a general purpose EC2 instance
361 | - [terraform-aws-ec2-instance-group](https://github.com/cloudposse/terraform-aws-ec2-instance-group) - Terraform module for provisioning multiple general purpose EC2 hosts for stateful applications
362 |
363 |
364 | > [!TIP]
365 | > #### Use Terraform Reference Architectures for AWS
366 | >
367 | > Use Cloud Posse's ready-to-go [terraform architecture blueprints](https://cloudposse.com/reference-architecture/) for AWS to get up and running quickly.
368 | >
369 | > ✅ We build it together with your team.
370 | > ✅ Your team owns everything.
371 | > ✅ 100% Open Source and backed by fanatical support.
372 | >
373 | >
374 | > 📚 Learn More
375 | >
376 | >
377 | >
378 | > Cloud Posse is the leading [**DevOps Accelerator**](https://cpco.io/commercial-support?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-eks-fargate-profile&utm_content=commercial_support) for funded startups and enterprises.
379 | >
380 | > *Your team can operate like a pro today.*
381 | >
382 | > Ensure that your team succeeds by using Cloud Posse's proven process and turnkey blueprints. Plus, we stick around until you succeed.
383 | > #### Day-0: Your Foundation for Success
384 | > - **Reference Architecture.** You'll get everything you need from the ground up built using 100% infrastructure as code.
385 | > - **Deployment Strategy.** Adopt a proven deployment strategy with GitHub Actions, enabling automated, repeatable, and reliable software releases.
386 | > - **Site Reliability Engineering.** Gain total visibility into your applications and services with Datadog, ensuring high availability and performance.
387 | > - **Security Baseline.** Establish a secure environment from the start, with built-in governance, accountability, and comprehensive audit logs, safeguarding your operations.
388 | > - **GitOps.** Empower your team to manage infrastructure changes confidently and efficiently through Pull Requests, leveraging the full power of GitHub Actions.
389 | >
390 | >
391 | >
392 | > #### Day-2: Your Operational Mastery
393 | > - **Training.** Equip your team with the knowledge and skills to confidently manage the infrastructure, ensuring long-term success and self-sufficiency.
394 | > - **Support.** Benefit from a seamless communication over Slack with our experts, ensuring you have the support you need, whenever you need it.
395 | > - **Troubleshooting.** Access expert assistance to quickly resolve any operational challenges, minimizing downtime and maintaining business continuity.
396 | > - **Code Reviews.** Enhance your team’s code quality with our expert feedback, fostering continuous improvement and collaboration.
397 | > - **Bug Fixes.** Rely on our team to troubleshoot and resolve any issues, ensuring your systems run smoothly.
398 | > - **Migration Assistance.** Accelerate your migration process with our dedicated support, minimizing disruption and speeding up time-to-value.
399 | > - **Customer Workshops.** Engage with our team in weekly workshops, gaining insights and strategies to continuously improve and innovate.
400 | >
401 | >
402 | >
403 |
404 |
405 | ## ✨ Contributing
406 |
407 | This project is under active development, and we encourage contributions from our community.
408 |
409 |
410 |
411 | Many thanks to our outstanding contributors:
412 |
413 |
414 |
415 |
416 |
417 | For 🐛 bug reports & feature requests, please use the [issue tracker](https://github.com/cloudposse/terraform-aws-eks-fargate-profile/issues).
418 |
419 | In general, PRs are welcome. We follow the typical "fork-and-pull" Git workflow.
420 | 1. Review our [Code of Conduct](https://github.com/cloudposse/terraform-aws-eks-fargate-profile/?tab=coc-ov-file#code-of-conduct) and [Contributor Guidelines](https://github.com/cloudposse/.github/blob/main/CONTRIBUTING.md).
421 | 2. **Fork** the repo on GitHub
422 | 3. **Clone** the project to your own machine
423 | 4. **Commit** changes to your own branch
424 | 5. **Push** your work back up to your fork
425 | 6. Submit a **Pull Request** so that we can review your changes
426 |
427 | **NOTE:** Be sure to merge the latest changes from "upstream" before making a pull request!
428 |
429 |
430 | ## Running Terraform Tests
431 |
432 | We use [Atmos](https://atmos.tools) to streamline how Terraform tests are run. It centralizes configuration and wraps common test workflows with easy-to-use commands.
433 |
434 | All tests are located in the [`test/`](test) folder.
435 |
436 | Under the hood, tests are powered by Terratest together with our internal [Test Helpers](https://github.com/cloudposse/test-helpers) library, providing robust infrastructure validation.
437 |
438 | Setup dependencies:
439 | - Install Atmos ([installation guide](https://atmos.tools/install/))
440 | - Install Go [1.24+ or newer](https://go.dev/doc/install)
441 | - Install Terraform or OpenTofu
442 |
443 | To run tests:
444 |
445 | - Run all tests:
446 | ```sh
447 | atmos test run
448 | ```
449 | - Clean up test artifacts:
450 | ```sh
451 | atmos test clean
452 | ```
453 | - Explore additional test options:
454 | ```sh
455 | atmos test --help
456 | ```
457 | The configuration for test commands is centrally managed. To review what's being imported, see the [`atmos.yaml`](https://raw.githubusercontent.com/cloudposse/.github/refs/heads/main/.github/atmos/terraform-module.yaml) file.
458 |
459 | Learn more about our [automated testing in our documentation](https://docs.cloudposse.com/community/contribute/automated-testing/) or implementing [custom commands](https://atmos.tools/core-concepts/custom-commands/) with atmos.
460 |
461 | ### 🌎 Slack Community
462 |
463 | Join our [Open Source Community](https://cpco.io/slack?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-eks-fargate-profile&utm_content=slack) on Slack. It's **FREE** for everyone! Our "SweetOps" community is where you get to talk with others who share a similar vision for how to rollout and manage infrastructure. This is the best place to talk shop, ask questions, solicit feedback, and work together as a community to build totally *sweet* infrastructure.
464 |
465 | ### 📰 Newsletter
466 |
467 | Sign up for [our newsletter](https://cpco.io/newsletter?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-eks-fargate-profile&utm_content=newsletter) and join 3,000+ DevOps engineers, CTOs, and founders who get insider access to the latest DevOps trends, so you can always stay in the know.
468 | Dropped straight into your Inbox every week — and usually a 5-minute read.
469 |
470 | ### 📆 Office Hours
471 |
472 | [Join us every Wednesday via Zoom](https://cloudposse.com/office-hours?utm_source=github&utm_medium=readme&utm_campaign=cloudposse/terraform-aws-eks-fargate-profile&utm_content=office_hours) for your weekly dose of insider DevOps trends, AWS news and Terraform insights, all sourced from our SweetOps community, plus a _live Q&A_ that you can’t find anywhere else.
473 | It's **FREE** for everyone!
474 | ## License
475 |
476 |
477 |
478 |
479 | Preamble to the Apache License, Version 2.0
480 |
481 |
482 |
483 | Complete license is available in the [`LICENSE`](LICENSE) file.
484 |
485 | ```text
486 | Licensed to the Apache Software Foundation (ASF) under one
487 | or more contributor license agreements. See the NOTICE file
488 | distributed with this work for additional information
489 | regarding copyright ownership. The ASF licenses this file
490 | to you under the Apache License, Version 2.0 (the
491 | "License"); you may not use this file except in compliance
492 | with the License. You may obtain a copy of the License at
493 |
494 | https://www.apache.org/licenses/LICENSE-2.0
495 |
496 | Unless required by applicable law or agreed to in writing,
497 | software distributed under the License is distributed on an
498 | "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
499 | KIND, either express or implied. See the License for the
500 | specific language governing permissions and limitations
501 | under the License.
502 | ```
503 |
504 |
505 | ## Trademarks
506 |
507 | All other trademarks referenced herein are the property of their respective owners.
508 |
509 |
510 | ---
511 | Copyright © 2017-2025 [Cloud Posse, LLC](https://cpco.io/copyright)
512 |
513 |
514 |
515 |
516 |
517 |
--------------------------------------------------------------------------------