nanochat/terraform/environments/dev/outputs.tf
Manmohan Sharma b381933c3b
feat(terraform): provision full AWS stack for samosaChaat (issue #4)
Add reusable Terraform modules and per-environment configs (dev/uat/prod)
in us-west-2 covering: VPC (3 AZ public/private), EKS 1.29 with IRSA and
ALB/EBS/EFS CSI add-ons, RDS PostgreSQL 15, four ECR repos, IAM roles
(EKS node, ALB controller IRSA, GitHub Actions OIDC), Route53 + ACM for
samosachaat.art, and EFS for model weights. State backend on S3
(samosachaat-terraform-state) with DynamoDB lock table.

terraform validate passes for dev, uat, and prod.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-04-16 11:11:02 -07:00

71 lines
1.7 KiB
HCL

output "vpc_id" {
description = "VPC identifier."
value = module.vpc.vpc_id
}
output "private_subnet_ids" {
description = "Private subnet identifiers."
value = module.vpc.private_subnet_ids
}
output "public_subnet_ids" {
description = "Public subnet identifiers."
value = module.vpc.public_subnet_ids
}
output "cluster_name" {
description = "EKS cluster name."
value = module.eks.cluster_name
}
output "cluster_endpoint" {
description = "EKS API endpoint."
value = module.eks.cluster_endpoint
}
output "cluster_oidc_provider_arn" {
description = "OIDC provider ARN for IRSA bindings."
value = module.eks.oidc_provider_arn
}
output "rds_endpoint" {
description = "RDS endpoint (host:port)."
value = module.rds.db_instance_endpoint
}
output "rds_password" {
description = "Generated RDS master password."
value = module.rds.db_password
sensitive = true
}
output "ecr_repository_urls" {
description = "ECR repository URLs by name."
value = module.ecr.repository_urls
}
output "efs_file_system_id" {
description = "EFS filesystem ID for model weights."
value = module.efs.file_system_id
}
output "acm_certificate_arn" {
description = "ACM cert ARN for the ALB Ingress."
value = module.acm.certificate_arn
}
output "route53_zone_id" {
description = "Route53 hosted zone ID."
value = module.route53.zone_id
}
output "alb_controller_role_arn" {
description = "IRSA role ARN for the AWS Load Balancer Controller."
value = module.iam.alb_controller_role_arn
}
output "github_actions_role_arn" {
description = "IAM role for GitHub Actions OIDC assumption."
value = module.iam.github_actions_role_arn
}