· 6 years ago · Dec 16, 2019, 06:56 PM
1random_string.suffix: Refreshing state... [id=none]
2module.eks.data.template_file.aws_authenticator_env_variables[0]: Refreshing state...
3data.terraform_remote_state.vpc: Refreshing state...
4module.eks.data.aws_caller_identity.current: Refreshing state...
5module.eks.data.aws_iam_policy_document.workers_assume_role_policy: Refreshing state...
6module.eks.data.aws_iam_policy_document.cluster_assume_role_policy: Refreshing state...
7module.eks.data.aws_region.current: Refreshing state...
8module.eks.data.aws_ami.eks_worker: Refreshing state...
9module.eks.data.aws_iam_policy_document.worker_autoscaling: Refreshing state...
10
11An execution plan has been generated and is shown below.
12Resource actions are indicated with the following symbols:
13 + create
14 <= read (data resources)
15
16Terraform will perform the following actions:
17
18 # aws_iam_role_policy_attachment.eks-ExternalDNS-Route53-Kubernetes will be created
19 + resource "aws_iam_role_policy_attachment" "eks-ExternalDNS-Route53-Kubernetes" {
20 + id = (known after apply)
21 + policy_arn = "arn:aws:iam::057653682278:policy/ExternalDNS-Route53-Kubernetes"
22 + role = (known after apply)
23 }
24
25 # aws_iam_role_policy_attachment.eks-enote-s3-staging will be created
26 + resource "aws_iam_role_policy_attachment" "eks-enote-s3-staging" {
27 + id = (known after apply)
28 + policy_arn = "arn:aws:iam::057653682278:policy/enote-s3-staging"
29 + role = (known after apply)
30 }
31
32 # aws_iam_role_policy_attachment.eks-events-subscribers-sqs-stage will be created
33 + resource "aws_iam_role_policy_attachment" "eks-events-subscribers-sqs-stage" {
34 + id = (known after apply)
35 + policy_arn = "arn:aws:iam::057653682278:policy/events-subscribers-sqs-stage"
36 + role = (known after apply)
37 }
38
39 # module.eks.data.aws_iam_policy_document.worker_autoscaling will be read during apply
40 # (config refers to values not yet known)
41 <= data "aws_iam_policy_document" "worker_autoscaling" {
42 + id = (known after apply)
43 + json = (known after apply)
44
45 + statement {
46 + actions = [
47 + "autoscaling:DescribeAutoScalingGroups",
48 + "autoscaling:DescribeAutoScalingInstances",
49 + "autoscaling:DescribeLaunchConfigurations",
50 + "autoscaling:DescribeTags",
51 + "ec2:DescribeLaunchTemplateVersions",
52 ]
53 + effect = "Allow"
54 + resources = [
55 + "*",
56 ]
57 + sid = "eksWorkerAutoscalingAll"
58 }
59 + statement {
60 + actions = [
61 + "autoscaling:SetDesiredCapacity",
62 + "autoscaling:TerminateInstanceInAutoScalingGroup",
63 + "autoscaling:UpdateAutoScalingGroup",
64 ]
65 + effect = "Allow"
66 + resources = [
67 + "*",
68 ]
69 + sid = "eksWorkerAutoscalingOwn"
70
71 + condition {
72 + test = "StringEquals"
73 + values = [
74 + "owned",
75 ]
76 + variable = "autoscaling:ResourceTag/kubernetes.io/cluster/uat-h4U1j9AU"
77 }
78 + condition {
79 + test = "StringEquals"
80 + values = [
81 + "true",
82 ]
83 + variable = "autoscaling:ResourceTag/k8s.io/cluster-autoscaler/enabled"
84 }
85 }
86 }
87
88 # module.eks.data.template_file.config_map_aws_auth will be read during apply
89 # (config refers to values not yet known)
90 <= data "template_file" "config_map_aws_auth" {
91 + id = (known after apply)
92 + rendered = (known after apply)
93 + template = "apiVersion: v1\nkind: ConfigMap\nmetadata:\n name: aws-auth\n namespace: kube-system\ndata:\n mapRoles: |\n${worker_role_arn}\n %{if chomp(map_roles) != \"[]\" }\n ${indent(4, map_roles)}\n %{ endif }\n %{if chomp(map_users) != \"[]\" }\n mapUsers: |\n ${indent(4, map_users)}\n %{ endif }\n %{if chomp(map_accounts) != \"[]\" }\n mapAccounts: |\n ${indent(4, map_accounts)}\n %{ endif }\n"
94 + vars = {
95 + "map_accounts" = jsonencode([])
96 + "map_roles" = jsonencode([])
97 + "map_users" = "- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/awalia\"\n \"username\": \"awalia\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/ben.longman\"\n \"username\": \"ben.longman\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/bob.stone\"\n \"username\": \"bob.stone\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/cbrotto\"\n \"username\": \"cbrotto\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/cecarrigan\"\n \"username\": \"cecarrigan\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/infra-ops\"\n \"username\": \"infra-ops\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/jason.pratt\"\n \"username\": \"jason.pratt\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/josh.hudson\"\n \"username\": \"josh.hudson\"\n- \"groups\":\n - \"system:masters\"\n \"userarn\": \"arn:aws:iam::057653682278:user/matt.middlesworth\"\n \"username\": \"matt.middlesworth\"\n"
98 + "worker_role_arn" = (known after apply)
99 }
100 }
101
102 # module.eks.data.template_file.kubeconfig will be read during apply
103 # (config refers to values not yet known)
104 <= data "template_file" "kubeconfig" {
105 + id = (known after apply)
106 + rendered = (known after apply)
107 + template = "apiVersion: v1\npreferences: {}\nkind: Config\n\nclusters:\n- cluster:\n server: ${endpoint}\n certificate-authority-data: ${cluster_auth_base64}\n name: ${kubeconfig_name}\n\ncontexts:\n- context:\n cluster: ${kubeconfig_name}\n user: ${kubeconfig_name}\n name: ${kubeconfig_name}\n\ncurrent-context: ${kubeconfig_name}\n\nusers:\n- name: ${kubeconfig_name}\n user:\n exec:\n apiVersion: client.authentication.k8s.io/v1alpha1\n command: ${aws_authenticator_command}\n args:\n${aws_authenticator_command_args}\n${aws_authenticator_additional_args}\n${aws_authenticator_env_variables}\n"
108 + vars = {
109 + "aws_authenticator_additional_args" = ""
110 + "aws_authenticator_command" = "aws-iam-authenticator"
111 + "aws_authenticator_command_args" = " - \"token\"\n - \"-i\"\n - \"uat-h4U1j9AU\""
112 + "aws_authenticator_env_variables" = " env:\n - name: AWS_PROFILE\n value: staging\n"
113 + "cluster_auth_base64" = (known after apply)
114 + "endpoint" = (known after apply)
115 + "kubeconfig_name" = "eks_uat-h4U1j9AU"
116 + "region" = "us-west-2"
117 }
118 }
119
120 # module.eks.data.template_file.userdata[0] will be read during apply
121 # (config refers to values not yet known)
122 <= data "template_file" "userdata" {
123 + id = (known after apply)
124 + rendered = (known after apply)
125 + template = "#!/bin/bash -xe\n\n# Allow user supplied pre userdata code\n${pre_userdata}\n\n# Bootstrap and join the cluster\n/etc/eks/bootstrap.sh --b64-cluster-ca '${cluster_auth_base64}' --apiserver-endpoint '${endpoint}' ${bootstrap_extra_args} --kubelet-extra-args \"${kubelet_extra_args}\" '${cluster_name}'\n\n# Allow user supplied userdata code\n${additional_userdata}\n"
126 + vars = {
127 + "additional_userdata" = ""
128 + "bootstrap_extra_args" = ""
129 + "cluster_auth_base64" = (known after apply)
130 + "cluster_name" = "uat-h4U1j9AU"
131 + "endpoint" = (known after apply)
132 + "kubelet_extra_args" = "--node-labels=env=worker"
133 + "pre_userdata" = ""
134 }
135 }
136
137 # module.eks.data.template_file.worker_role_arns[0] will be read during apply
138 # (config refers to values not yet known)
139 <= data "template_file" "worker_role_arns" {
140 + id = (known after apply)
141 + rendered = (known after apply)
142 + template = " - rolearn: ${worker_role_arn}\n username: system:node:{{EC2PrivateDNSName}}\n groups:\n - system:bootstrappers\n - system:nodes\n"
143 + vars = {
144 + "worker_role_arn" = (known after apply)
145 }
146 }
147
148 # module.eks.aws_autoscaling_group.workers[0] will be created
149 + resource "aws_autoscaling_group" "workers" {
150 + arn = (known after apply)
151 + availability_zones = (known after apply)
152 + default_cooldown = (known after apply)
153 + desired_capacity = 5
154 + force_delete = false
155 + health_check_grace_period = 300
156 + health_check_type = (known after apply)
157 + id = (known after apply)
158 + launch_configuration = (known after apply)
159 + load_balancers = (known after apply)
160 + max_size = 50
161 + metrics_granularity = "1Minute"
162 + min_size = 1
163 + name = (known after apply)
164 + name_prefix = "uat-h4U1j9AU-uat-worker-m5"
165 + protect_from_scale_in = false
166 + service_linked_role_arn = (known after apply)
167 + suspended_processes = [
168 + "AZRebalance",
169 ]
170 + tags = [
171 + {
172 + "key" = "Name"
173 + "propagate_at_launch" = "true"
174 + "value" = "uat-h4U1j9AU-uat-worker-m5-eks_asg"
175 },
176 + {
177 + "key" = "kubernetes.io/cluster/uat-h4U1j9AU"
178 + "propagate_at_launch" = "true"
179 + "value" = "owned"
180 },
181 + {
182 + "key" = "k8s.io/cluster/uat-h4U1j9AU"
183 + "propagate_at_launch" = "true"
184 + "value" = "owned"
185 },
186 + {
187 + "key" = "k8s.io/cluster-autoscaler/disabled"
188 + "propagate_at_launch" = "false"
189 + "value" = "true"
190 },
191 + {
192 + "key" = "k8s.io/cluster-autoscaler/uat-h4U1j9AU"
193 + "propagate_at_launch" = "false"
194 + "value" = "uat-h4U1j9AU"
195 },
196 + {
197 + "key" = "k8s.io/cluster-autoscaler/node-template/resources/ephemeral-storage"
198 + "propagate_at_launch" = "false"
199 + "value" = "250Gi"
200 },
201 + {
202 + "key" = "account"
203 + "propagate_at_launch" = "true"
204 + "value" = "057653682278"
205 },
206 + {
207 + "key" = "costcenter"
208 + "propagate_at_launch" = "true"
209 + "value" = "uat"
210 },
211 + {
212 + "key" = "environment"
213 + "propagate_at_launch" = "true"
214 + "value" = "uat"
215 },
216 + {
217 + "key" = "owner"
218 + "propagate_at_launch" = "true"
219 + "value" = "sre"
220 },
221 + {
222 + "key" = "project"
223 + "propagate_at_launch" = "true"
224 + "value" = "uat"
225 },
226 + {
227 + "key" = "environment"
228 + "propagate_at_launch" = "true"
229 + "value" = "worker"
230 },
231 ]
232 + target_group_arns = (known after apply)
233 + termination_policies = []
234 + vpc_zone_identifier = [
235 + "subnet-021925af4f16050c4",
236 + "subnet-06665e388e9ea9299",
237 ]
238 + wait_for_capacity_timeout = "10m"
239 }
240
241 # module.eks.aws_cloudwatch_log_group.this[0] will be created
242 + resource "aws_cloudwatch_log_group" "this" {
243 + arn = (known after apply)
244 + id = (known after apply)
245 + name = "/aws/eks/uat-h4U1j9AU/cluster"
246 + retention_in_days = 90
247 + tags = {
248 + "account" = "057653682278"
249 + "costcenter" = "uat"
250 + "environment" = "uat"
251 + "owner" = "sre"
252 + "project" = "uat"
253 }
254 }
255
256 # module.eks.aws_eks_cluster.this will be created
257 + resource "aws_eks_cluster" "this" {
258 + arn = (known after apply)
259 + certificate_authority = (known after apply)
260 + created_at = (known after apply)
261 + enabled_cluster_log_types = [
262 + "api",
263 + "audit",
264 + "authenticator",
265 + "controllerManager",
266 + "scheduler",
267 ]
268 + endpoint = (known after apply)
269 + id = (known after apply)
270 + identity = (known after apply)
271 + name = "uat-h4U1j9AU"
272 + platform_version = (known after apply)
273 + role_arn = (known after apply)
274 + status = (known after apply)
275 + tags = {
276 + "account" = "057653682278"
277 + "costcenter" = "uat"
278 + "environment" = "uat"
279 + "owner" = "sre"
280 + "project" = "uat"
281 }
282 + version = "1.14"
283
284 + timeouts {
285 + create = "15m"
286 + delete = "15m"
287 }
288
289 + vpc_config {
290 + cluster_security_group_id = (known after apply)
291 + endpoint_private_access = false
292 + endpoint_public_access = true
293 + security_group_ids = (known after apply)
294 + subnet_ids = [
295 + "subnet-021925af4f16050c4",
296 + "subnet-06665e388e9ea9299",
297 ]
298 + vpc_id = (known after apply)
299 }
300 }
301
302 # module.eks.aws_iam_instance_profile.workers[0] will be created
303 + resource "aws_iam_instance_profile" "workers" {
304 + arn = (known after apply)
305 + create_date = (known after apply)
306 + id = (known after apply)
307 + name = (known after apply)
308 + name_prefix = "uat-h4U1j9AU"
309 + path = "/"
310 + role = (known after apply)
311 + roles = (known after apply)
312 + unique_id = (known after apply)
313 }
314
315 # module.eks.aws_iam_policy.worker_autoscaling[0] will be created
316 + resource "aws_iam_policy" "worker_autoscaling" {
317 + arn = (known after apply)
318 + description = "EKS worker node autoscaling policy for cluster uat-h4U1j9AU"
319 + id = (known after apply)
320 + name = (known after apply)
321 + name_prefix = "eks-worker-autoscaling-uat-h4U1j9AU"
322 + path = "/"
323 + policy = (known after apply)
324 }
325
326 # module.eks.aws_iam_role.cluster[0] will be created
327 + resource "aws_iam_role" "cluster" {
328 + arn = (known after apply)
329 + assume_role_policy = jsonencode(
330 {
331 + Statement = [
332 + {
333 + Action = "sts:AssumeRole"
334 + Effect = "Allow"
335 + Principal = {
336 + Service = "eks.amazonaws.com"
337 }
338 + Sid = "EKSClusterAssumeRole"
339 },
340 ]
341 + Version = "2012-10-17"
342 }
343 )
344 + create_date = (known after apply)
345 + force_detach_policies = true
346 + id = (known after apply)
347 + max_session_duration = 3600
348 + name = (known after apply)
349 + name_prefix = "uat-h4U1j9AU"
350 + path = "/"
351 + tags = {
352 + "account" = "057653682278"
353 + "costcenter" = "uat"
354 + "environment" = "uat"
355 + "owner" = "sre"
356 + "project" = "uat"
357 }
358 + unique_id = (known after apply)
359 }
360
361 # module.eks.aws_iam_role.workers[0] will be created
362 + resource "aws_iam_role" "workers" {
363 + arn = (known after apply)
364 + assume_role_policy = jsonencode(
365 {
366 + Statement = [
367 + {
368 + Action = "sts:AssumeRole"
369 + Effect = "Allow"
370 + Principal = {
371 + Service = "ec2.amazonaws.com"
372 }
373 + Sid = "EKSWorkerAssumeRole"
374 },
375 ]
376 + Version = "2012-10-17"
377 }
378 )
379 + create_date = (known after apply)
380 + force_detach_policies = true
381 + id = (known after apply)
382 + max_session_duration = 3600
383 + name = (known after apply)
384 + name_prefix = "uat-h4U1j9AU"
385 + path = "/"
386 + tags = {
387 + "account" = "057653682278"
388 + "costcenter" = "uat"
389 + "environment" = "uat"
390 + "owner" = "sre"
391 + "project" = "uat"
392 }
393 + unique_id = (known after apply)
394 }
395
396 # module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0] will be created
397 + resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" {
398 + id = (known after apply)
399 + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
400 + role = (known after apply)
401 }
402
403 # module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0] will be created
404 + resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSServicePolicy" {
405 + id = (known after apply)
406 + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
407 + role = (known after apply)
408 }
409
410 # module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0] will be created
411 + resource "aws_iam_role_policy_attachment" "workers_AmazonEC2ContainerRegistryReadOnly" {
412 + id = (known after apply)
413 + policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
414 + role = (known after apply)
415 }
416
417 # module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0] will be created
418 + resource "aws_iam_role_policy_attachment" "workers_AmazonEKSWorkerNodePolicy" {
419 + id = (known after apply)
420 + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"
421 + role = (known after apply)
422 }
423
424 # module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0] will be created
425 + resource "aws_iam_role_policy_attachment" "workers_AmazonEKS_CNI_Policy" {
426 + id = (known after apply)
427 + policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
428 + role = (known after apply)
429 }
430
431 # module.eks.aws_iam_role_policy_attachment.workers_autoscaling[0] will be created
432 + resource "aws_iam_role_policy_attachment" "workers_autoscaling" {
433 + id = (known after apply)
434 + policy_arn = (known after apply)
435 + role = (known after apply)
436 }
437
438 # module.eks.aws_launch_configuration.workers[0] will be created
439 + resource "aws_launch_configuration" "workers" {
440 + associate_public_ip_address = false
441 + ebs_optimized = true
442 + enable_monitoring = true
443 + iam_instance_profile = (known after apply)
444 + id = (known after apply)
445 + image_id = "ami-05d586e6f773f6abf"
446 + instance_type = "m5.xlarge"
447 + key_name = "Snapdocs-2018-03-08"
448 + name = (known after apply)
449 + name_prefix = "uat-h4U1j9AU-uat-worker-m5"
450 + security_groups = (known after apply)
451 + user_data_base64 = (known after apply)
452
453 + ebs_block_device {
454 + delete_on_termination = (known after apply)
455 + device_name = (known after apply)
456 + encrypted = (known after apply)
457 + iops = (known after apply)
458 + no_device = (known after apply)
459 + snapshot_id = (known after apply)
460 + volume_size = (known after apply)
461 + volume_type = (known after apply)
462 }
463
464 + root_block_device {
465 + delete_on_termination = true
466 + encrypted = (known after apply)
467 + iops = 0
468 + volume_size = 250
469 + volume_type = "gp2"
470 }
471 }
472
473 # module.eks.aws_security_group.cluster[0] will be created
474 + resource "aws_security_group" "cluster" {
475 + arn = (known after apply)
476 + description = "EKS cluster security group."
477 + egress = (known after apply)
478 + id = (known after apply)
479 + ingress = (known after apply)
480 + name = (known after apply)
481 + name_prefix = "uat-h4U1j9AU"
482 + owner_id = (known after apply)
483 + revoke_rules_on_delete = false
484 + tags = {
485 + "Name" = "uat-h4U1j9AU-eks_cluster_sg"
486 + "account" = "057653682278"
487 + "costcenter" = "uat"
488 + "environment" = "uat"
489 + "owner" = "sre"
490 + "project" = "uat"
491 }
492 + vpc_id = "vpc-0a6aafd1be6db89a2"
493 }
494
495 # module.eks.aws_security_group.workers[0] will be created
496 + resource "aws_security_group" "workers" {
497 + arn = (known after apply)
498 + description = "Security group for all nodes in the cluster."
499 + egress = (known after apply)
500 + id = (known after apply)
501 + ingress = (known after apply)
502 + name = (known after apply)
503 + name_prefix = "uat-h4U1j9AU"
504 + owner_id = (known after apply)
505 + revoke_rules_on_delete = false
506 + tags = {
507 + "Name" = "uat-h4U1j9AU-eks_worker_sg"
508 + "account" = "057653682278"
509 + "costcenter" = "uat"
510 + "environment" = "uat"
511 + "kubernetes.io/cluster/uat-h4U1j9AU" = "owned"
512 + "owner" = "sre"
513 + "project" = "uat"
514 }
515 + vpc_id = "vpc-0a6aafd1be6db89a2"
516 }
517
518 # module.eks.aws_security_group_rule.cluster_egress_internet[0] will be created
519 + resource "aws_security_group_rule" "cluster_egress_internet" {
520 + cidr_blocks = [
521 + "0.0.0.0/0",
522 ]
523 + description = "Allow cluster egress access to the Internet."
524 + from_port = 0
525 + id = (known after apply)
526 + protocol = "-1"
527 + security_group_id = (known after apply)
528 + self = false
529 + source_security_group_id = (known after apply)
530 + to_port = 0
531 + type = "egress"
532 }
533
534 # module.eks.aws_security_group_rule.cluster_https_worker_ingress[0] will be created
535 + resource "aws_security_group_rule" "cluster_https_worker_ingress" {
536 + description = "Allow pods to communicate with the EKS cluster API."
537 + from_port = 443
538 + id = (known after apply)
539 + protocol = "tcp"
540 + security_group_id = (known after apply)
541 + self = false
542 + source_security_group_id = (known after apply)
543 + to_port = 443
544 + type = "ingress"
545 }
546
547 # module.eks.aws_security_group_rule.workers_egress_internet[0] will be created
548 + resource "aws_security_group_rule" "workers_egress_internet" {
549 + cidr_blocks = [
550 + "0.0.0.0/0",
551 ]
552 + description = "Allow nodes all egress to the Internet."
553 + from_port = 0
554 + id = (known after apply)
555 + protocol = "-1"
556 + security_group_id = (known after apply)
557 + self = false
558 + source_security_group_id = (known after apply)
559 + to_port = 0
560 + type = "egress"
561 }
562
563 # module.eks.aws_security_group_rule.workers_ingress_cluster[0] will be created
564 + resource "aws_security_group_rule" "workers_ingress_cluster" {
565 + description = "Allow workers pods to receive communication from the cluster control plane."
566 + from_port = 1025
567 + id = (known after apply)
568 + protocol = "tcp"
569 + security_group_id = (known after apply)
570 + self = false
571 + source_security_group_id = (known after apply)
572 + to_port = 65535
573 + type = "ingress"
574 }
575
576 # module.eks.aws_security_group_rule.workers_ingress_cluster_https[0] will be created
577 + resource "aws_security_group_rule" "workers_ingress_cluster_https" {
578 + description = "Allow pods running extension API servers on port 443 to receive communication from cluster control plane."
579 + from_port = 443
580 + id = (known after apply)
581 + protocol = "tcp"
582 + security_group_id = (known after apply)
583 + self = false
584 + source_security_group_id = (known after apply)
585 + to_port = 443
586 + type = "ingress"
587 }
588
589 # module.eks.aws_security_group_rule.workers_ingress_self[0] will be created
590 + resource "aws_security_group_rule" "workers_ingress_self" {
591 + description = "Allow node to communicate with each other."
592 + from_port = 0
593 + id = (known after apply)
594 + protocol = "-1"
595 + security_group_id = (known after apply)
596 + self = false
597 + source_security_group_id = (known after apply)
598 + to_port = 65535
599 + type = "ingress"
600 }
601
602 # module.eks.local_file.config_map_aws_auth[0] will be created
603 + resource "local_file" "config_map_aws_auth" {
604 + content = (known after apply)
605 + directory_permission = "0777"
606 + file_permission = "0777"
607 + filename = "./config-map-aws-auth_uat-h4U1j9AU.yaml"
608 + id = (known after apply)
609 }
610
611 # module.eks.local_file.kubeconfig[0] will be created
612 + resource "local_file" "kubeconfig" {
613 + content = (known after apply)
614 + directory_permission = "0777"
615 + file_permission = "0777"
616 + filename = "./kubeconfig_uat-h4U1j9AU"
617 + id = (known after apply)
618 }
619
620 # module.eks.null_resource.update_config_map_aws_auth[0] will be created
621 + resource "null_resource" "update_config_map_aws_auth" {
622 + id = (known after apply)
623 + triggers = (known after apply)
624 }
625
626 # module.eks.random_pet.workers[0] will be created
627 + resource "random_pet" "workers" {
628 + id = (known after apply)
629 + keepers = (known after apply)
630 + length = 2
631 + separator = "-"
632 }
633
634Plan: 29 to add, 0 to change, 0 to destroy.
635
636Do you want to perform these actions?
637 Terraform will perform the actions described above.
638 Only 'yes' will be accepted to approve.
639
640 Enter a value: