capability sub-module creates the AWS resources required to install an EKS Capability onto an existing cluster. EKS Capabilities are AWS-managed add-ons that integrate popular open-source tools directly into EKS.
Supported capability types
| Type | Description |
|---|---|
ACK | AWS Controllers for Kubernetes — manage AWS services via Kubernetes custom resources |
ARGOCD | Argo CD — GitOps continuous delivery with AWS Identity Center (SSO) integration |
KRO | Kubernetes Resource Orchestrator — compose and deploy complex Kubernetes resource groups |
Usage
- ACK
- ArgoCD
- KRO
Key inputs
The capability type. Valid values:
ACK, ARGOCD, KRO.The name of the EKS cluster to install the capability on.
Controls whether resources are created. Set to
false to disable the module without removing it from configuration.Capability-specific configuration. Currently only used for
ARGOCD type.Name for the capability. Defaults to an empty string (uses module key).
AWS region. Defaults to the provider region.
IAM role inputs
Map of IAM managed policy ARNs to attach to the capability IAM role. Key is a static label; value is the policy ARN.
Map of inline IAM policy statements to create and attach to the capability IAM role.
Override name for the IAM role. Defaults to derived from capability type and cluster name.
Whether to use
iam_role_name as a name prefix.ARN of a permissions boundary policy to attach to the IAM role.
Map of tags to apply to all resources created.
Outputs
The ARN of the EKS Capability.
The version of the installed EKS Capability.
URL of the Argo CD server. Only populated when
type = "ARGOCD".The name of the IAM role created for the capability.
The ARN of the IAM role created for the capability.
Stable and unique string identifying the IAM role.
Notes
The
capability sub-module requires the EKS cluster to be active before installing capabilities. Ensure the root module.eks is created before referencing module.eks.cluster_name in the capability module.For
ARGOCD type, your AWS account must have AWS Identity Center (IAM Identity Center / SSO) enabled. The idc_instance_arn must match the region where your Identity Center is configured (typically us-east-1).