diff --git a/README.md b/README.md index 4432cc5..b19d167 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,7 @@ No resources. | [cluster\_endpoint\_public\_access\_cidrs](#input\_cluster\_endpoint\_public\_access\_cidrs) | List of CIDR blocks which can access the Amazon EKS public API server endpoint | `list(string)` |
[| no | | [cluster\_name](#input\_cluster\_name) | Name of the EKS cluster | `string` | n/a | yes | | [cluster\_security\_group\_additional\_rules](#input\_cluster\_security\_group\_additional\_rules) | List of additional security group rules to add to the cluster security group created. Set `source_node_security_group = true` inside rules to set the `node_security_group` as source | `any` | `{}` | no | -| [cluster\_version](#input\_cluster\_version) | EKS cluster version | `string` | `"1.28"` | no | +| [cluster\_version](#input\_cluster\_version) | EKS cluster version | `string` | `"1.29"` | no | | [create\_cloudwatch\_log\_group](#input\_create\_cloudwatch\_log\_group) | Determines whether a log group is created by this module for the cluster logs. If not, AWS will automatically create one if logging is enabled | `bool` | `true` | no | | [eks\_managed\_node\_group\_defaults](#input\_eks\_managed\_node\_group\_defaults) | Managed node group defaults | `any` | `{}` | no | | [eks\_managed\_node\_groups](#input\_eks\_managed\_node\_groups) | Map of EKS managed node group definitions to create | `any` | `{}` | no | diff --git a/variables.tf b/variables.tf index a9f06a1..62cb77c 100644 --- a/variables.tf +++ b/variables.tf @@ -48,7 +48,7 @@ variable "cluster_endpoint_public_access_cidrs" { variable "cluster_version" { description = "EKS cluster version" type = string - default = "1.28" + default = "1.29" } ################################################################################
"0.0.0.0/0"
]