· 5 years ago · Jun 16, 2020, 05:06 PM
1[0m# module.staging_k8s_cluster.aws_autoscaling_group.workers[0]:
2resource "aws_autoscaling_group" "workers" {
3 [1m[0marn[0m[0m = "arn:aws:autoscaling:eu-west-1:165419938431:autoScalingGroup:a592f8df-79c5-4f2a-9d42-41564da4d9e6:autoScalingGroupName/k8-cluster-staging-020200527143705568800000012"
4 [1m[0mavailability_zones[0m[0m = [
5 "eu-west-1a",
6 "eu-west-1b",
7 "eu-west-1c",
8 ]
9 [1m[0mdefault_cooldown[0m[0m = 300
10 [1m[0mdesired_capacity[0m[0m = 1
11 [1m[0menabled_metrics[0m[0m = []
12 [1m[0mforce_delete[0m[0m = false
13 [1m[0mhealth_check_grace_period[0m[0m = 300
14 [1m[0mhealth_check_type[0m[0m = "EC2"
15 [1m[0mid[0m[0m = "k8-cluster-staging-020200527143705568800000012"
16 [1m[0mlaunch_configuration[0m[0m = "k8-cluster-staging-020200615084211797200000001"
17 [1m[0mload_balancers[0m[0m = []
18 [1m[0mmax_instance_lifetime[0m[0m = 0
19 [1m[0mmax_size[0m[0m = 4
20 [1m[0mmetrics_granularity[0m[0m = "1Minute"
21 [1m[0mmin_size[0m[0m = 1
22 [1m[0mname[0m[0m = "k8-cluster-staging-020200527143705568800000012"
23 [1m[0mname_prefix[0m[0m = "k8-cluster-staging-0"
24 [1m[0mprotect_from_scale_in[0m[0m = false
25 [1m[0mservice_linked_role_arn[0m[0m = "arn:aws:iam::165419938431:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling"
26 [1m[0msuspended_processes[0m[0m = [
27 "AZRebalance",
28 ]
29 [1m[0mtags[0m[0m = [
30 {
31 "key" = "Name"
32 "propagate_at_launch" = "true"
33 "value" = "k8-cluster-staging-0-eks_asg"
34 },
35 {
36 "key" = "k8s.io/cluster-autoscaler/disabled"
37 "propagate_at_launch" = "false"
38 "value" = "true"
39 },
40 {
41 "key" = "k8s.io/cluster-autoscaler/k8-cluster-staging"
42 "propagate_at_launch" = "false"
43 "value" = "k8-cluster-staging"
44 },
45 {
46 "key" = "k8s.io/cluster-autoscaler/node-template/resources/ephemeral-storage"
47 "propagate_at_launch" = "false"
48 "value" = "100Gi"
49 },
50 {
51 "key" = "kubernetes.io/cluster/k8-cluster-staging"
52 "propagate_at_launch" = "true"
53 "value" = "owned"
54 },
55 ]
56 [1m[0mtarget_group_arns[0m[0m = [
57 "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-http/97907ef2a2f913a7",
58 "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-https/4cc10c108643eea8",
59 ]
60 [1m[0mtermination_policies[0m[0m = []
61 [1m[0mvpc_zone_identifier[0m[0m = [
62 "subnet-911f98cb",
63 "subnet-925b1ef4",
64 "subnet-b4ebbefc",
65 ]
66 [1m[0mwait_for_capacity_timeout[0m[0m = "10m"
67}
68
69# module.staging_k8s_cluster.aws_autoscaling_group.workers[1]:
70resource "aws_autoscaling_group" "workers" {
71 [1m[0marn[0m[0m = "arn:aws:autoscaling:eu-west-1:165419938431:autoScalingGroup:c3924498-6b5d-4a51-85e4-74505a7065b8:autoScalingGroupName/k8-cluster-staging-120200527143705564100000011"
72 [1m[0mavailability_zones[0m[0m = [
73 "eu-west-1a",
74 "eu-west-1b",
75 "eu-west-1c",
76 ]
77 [1m[0mdefault_cooldown[0m[0m = 300
78 [1m[0mdesired_capacity[0m[0m = 1
79 [1m[0menabled_metrics[0m[0m = []
80 [1m[0mforce_delete[0m[0m = false
81 [1m[0mhealth_check_grace_period[0m[0m = 300
82 [1m[0mhealth_check_type[0m[0m = "EC2"
83 [1m[0mid[0m[0m = "k8-cluster-staging-120200527143705564100000011"
84 [1m[0mlaunch_configuration[0m[0m = "k8-cluster-staging-120200615084211798900000002"
85 [1m[0mload_balancers[0m[0m = []
86 [1m[0mmax_instance_lifetime[0m[0m = 0
87 [1m[0mmax_size[0m[0m = 4
88 [1m[0mmetrics_granularity[0m[0m = "1Minute"
89 [1m[0mmin_size[0m[0m = 1
90 [1m[0mname[0m[0m = "k8-cluster-staging-120200527143705564100000011"
91 [1m[0mname_prefix[0m[0m = "k8-cluster-staging-1"
92 [1m[0mprotect_from_scale_in[0m[0m = false
93 [1m[0mservice_linked_role_arn[0m[0m = "arn:aws:iam::165419938431:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling"
94 [1m[0msuspended_processes[0m[0m = [
95 "AZRebalance",
96 ]
97 [1m[0mtags[0m[0m = [
98 {
99 "key" = "Name"
100 "propagate_at_launch" = "true"
101 "value" = "k8-cluster-staging-1-eks_asg"
102 },
103 {
104 "key" = "k8s.io/cluster-autoscaler/disabled"
105 "propagate_at_launch" = "false"
106 "value" = "true"
107 },
108 {
109 "key" = "k8s.io/cluster-autoscaler/k8-cluster-staging"
110 "propagate_at_launch" = "false"
111 "value" = "k8-cluster-staging"
112 },
113 {
114 "key" = "k8s.io/cluster-autoscaler/node-template/resources/ephemeral-storage"
115 "propagate_at_launch" = "false"
116 "value" = "100Gi"
117 },
118 {
119 "key" = "kubernetes.io/cluster/k8-cluster-staging"
120 "propagate_at_launch" = "true"
121 "value" = "owned"
122 },
123 ]
124 [1m[0mtarget_group_arns[0m[0m = [
125 "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-http/97907ef2a2f913a7",
126 "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-https/4cc10c108643eea8",
127 ]
128 [1m[0mtermination_policies[0m[0m = []
129 [1m[0mvpc_zone_identifier[0m[0m = [
130 "subnet-911f98cb",
131 "subnet-925b1ef4",
132 "subnet-b4ebbefc",
133 ]
134 [1m[0mwait_for_capacity_timeout[0m[0m = "10m"
135}
136
137# module.staging_k8s_cluster.aws_eks_cluster.this:
138resource "aws_eks_cluster" "this" {
139 [1m[0marn[0m[0m = "arn:aws:eks:eu-west-1:165419938431:cluster/k8-cluster-staging"
140 [1m[0mcertificate_authority[0m[0m = [
141 {
142 data = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJd01EVXlOekUwTXpNME9Wb1hEVE13TURVeU5URTBNek0wT1Zvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTWxjCjJPNFAwZDhId3pvRVFqUUhHWEducHZKbE1URXZuQ0p3SGZxaXhPcVZNRXhkL3FISEdaU0RuZk9EeGNDanp3cXoKU3JRcFhobmtoZkRMamIvWmJaS2JVU1JLN0NWTlBFTWJnbGpSZmlQcjFoNXI1RERCZnJteEZudk1kRGlJM2kzRgpuRFNFamJzSWVRVUJOL2xEdXd2NXc1blNnWGtCV1Y1Z3JxWmJMcjFicGhoM2x3b0s5T1grZ0ZadVNnMWdGaWRYCnhBek9VL3VSckhvdWpmK2lpQ2o3MzdUci93alR1ajBQdU1EKzl6T01aQW1mdGVxNjNhd29xekRFeWwvY1krZloKNEpwSkJEbU94NUl6OE5pdXkzU0tSUnl3V3dub3ZpTjh2SkttYjhucWlGbGdESDBtT0d2Z0tHb0podVYvZnMzVgpXUGswRUJUczN1azVyNmxidXZNQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFHNXg2WDBIK0Y2SWhwOWtabVVxTlVmQTl3ZkwKTjg4dVg4bmtNOTZNTjVhL0N6aVhsWTVlU1Jaa3JNa2NsamYwckd5aXhzTzVRM0dmck1hd1RSSHBMMGw3Sm5qdApWa1RXcmtEOXgyR1FUMjdYZy9yRUVmb0JqNnQ1cnUxNll6Q2VQOGUzZ3M1S0Y1bjFBTms0dUNSQ0xOMUhrd21ICnVUR0lJaDM3YWpRYy9qSkxhU0lKWHhhQVhuRlAvdEZKaXoyZlBqa3J1K3VzN2pvLzhHUURrYnQ0aG1vOEFBbVQKaitUV0VUenZyM2JUVnVNajVDQ28vYlBTbjVLMFUyVG9nVzd3V3cyUTFEUE1UbW8xeG5iQnRVZ05ZZ0Q1NnFZcwpDNG5TTUl3akxFZU12QldqNFpNM0FJTnhaa3Z1T0dxT2FTWG5NOVNvcnVvNStLQytxQ3JnOFZzT1M4Zz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo="
143 },
144 ]
145 [1m[0mcreated_at[0m[0m = "2020-05-27 14:26:35 +0000 UTC"
146 [1m[0menabled_cluster_log_types[0m[0m = []
147 [1m[0mendpoint[0m[0m = "https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com"
148 [1m[0mid[0m[0m = "k8-cluster-staging"
149 [1m[0midentity[0m[0m = [
150 {
151 oidc = [
152 {
153 issuer = "https://oidc.eks.eu-west-1.amazonaws.com/id/4A79E1824D7DBCF09BECA38EA7393915"
154 },
155 ]
156 },
157 ]
158 [1m[0mname[0m[0m = "k8-cluster-staging"
159 [1m[0mplatform_version[0m[0m = "eks.9"
160 [1m[0mrole_arn[0m[0m = "arn:aws:iam::165419938431:role/k8-cluster-staging20200527142629799000000003"
161 [1m[0mstatus[0m[0m = "ACTIVE"
162 [1m[0mtags[0m[0m = {}
163 [1m[0mversion[0m[0m = "1.14"
164
165 timeouts {
166 [1m[0mcreate[0m[0m = "15m"
167 [1m[0mdelete[0m[0m = "15m"
168 }
169
170 vpc_config {
171 [1m[0mcluster_security_group_id[0m[0m = "sg-02b5f427866ab5d2e"
172 [1m[0mendpoint_private_access[0m[0m = false
173 [1m[0mendpoint_public_access[0m[0m = true
174 [1m[0mpublic_access_cidrs[0m[0m = [
175 "0.0.0.0/0",
176 ]
177 [1m[0msecurity_group_ids[0m[0m = [
178 "sg-010e043a4b80fcbbd",
179 ]
180 [1m[0msubnet_ids[0m[0m = [
181 "subnet-911f98cb",
182 "subnet-925b1ef4",
183 "subnet-b4ebbefc",
184 ]
185 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
186 }
187}
188
189# module.staging_k8s_cluster.aws_iam_instance_profile.workers[1]:
190resource "aws_iam_instance_profile" "workers" {
191 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:instance-profile/k8-cluster-staging20200527143649655200000009"
192 [1m[0mcreate_date[0m[0m = "2020-05-27T14:36:50Z"
193 [1m[0mid[0m[0m = "k8-cluster-staging20200527143649655200000009"
194 [1m[0mname[0m[0m = "k8-cluster-staging20200527143649655200000009"
195 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
196 [1m[0mpath[0m[0m = "/"
197 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
198 [1m[0mroles[0m[0m = [
199 "k8-cluster-staging20200527143647472000000007",
200 ]
201 [1m[0munique_id[0m[0m = "AIPASNA6L6J724ZTAS5ZH"
202}
203
204# module.staging_k8s_cluster.aws_iam_instance_profile.workers[0]:
205resource "aws_iam_instance_profile" "workers" {
206 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:instance-profile/k8-cluster-staging2020052714364970570000000a"
207 [1m[0mcreate_date[0m[0m = "2020-05-27T14:36:50Z"
208 [1m[0mid[0m[0m = "k8-cluster-staging2020052714364970570000000a"
209 [1m[0mname[0m[0m = "k8-cluster-staging2020052714364970570000000a"
210 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
211 [1m[0mpath[0m[0m = "/"
212 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
213 [1m[0mroles[0m[0m = [
214 "k8-cluster-staging20200527143647472000000007",
215 ]
216 [1m[0munique_id[0m[0m = "AIPASNA6L6J74A4Y2SQN4"
217}
218
219# module.staging_k8s_cluster.aws_iam_policy.worker_autoscaling[0]:
220resource "aws_iam_policy" "worker_autoscaling" {
221 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:policy/eks-worker-autoscaling-k8-cluster-staging20200527143647476100000008"
222 [1m[0mdescription[0m[0m = "EKS worker node autoscaling policy for cluster k8-cluster-staging"
223 [1m[0mid[0m[0m = "arn:aws:iam::165419938431:policy/eks-worker-autoscaling-k8-cluster-staging20200527143647476100000008"
224 [1m[0mname[0m[0m = "eks-worker-autoscaling-k8-cluster-staging20200527143647476100000008"
225 [1m[0mname_prefix[0m[0m = "eks-worker-autoscaling-k8-cluster-staging"
226 [1m[0mpath[0m[0m = "/"
227 [1m[0mpolicy[0m[0m = jsonencode(
228 {
229 Statement = [
230 {
231 Action = [
232 "ec2:DescribeLaunchTemplateVersions",
233 "autoscaling:DescribeTags",
234 "autoscaling:DescribeLaunchConfigurations",
235 "autoscaling:DescribeAutoScalingInstances",
236 "autoscaling:DescribeAutoScalingGroups",
237 ]
238 Effect = "Allow"
239 Resource = "*"
240 Sid = "eksWorkerAutoscalingAll"
241 },
242 {
243 Action = [
244 "autoscaling:UpdateAutoScalingGroup",
245 "autoscaling:TerminateInstanceInAutoScalingGroup",
246 "autoscaling:SetDesiredCapacity",
247 ]
248 Condition = {
249 StringEquals = {
250 autoscaling:ResourceTag/k8s.io/cluster-autoscaler/enabled = "true"
251 autoscaling:ResourceTag/kubernetes.io/cluster/k8-cluster-staging = "owned"
252 }
253 }
254 Effect = "Allow"
255 Resource = "*"
256 Sid = "eksWorkerAutoscalingOwn"
257 },
258 ]
259 Version = "2012-10-17"
260 }
261 )
262}
263
264# module.staging_k8s_cluster.aws_iam_role.cluster[0]:
265resource "aws_iam_role" "cluster" {
266 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:role/k8-cluster-staging20200527142629799000000003"
267 [1m[0massume_role_policy[0m[0m = jsonencode(
268 {
269 Statement = [
270 {
271 Action = "sts:AssumeRole"
272 Effect = "Allow"
273 Principal = {
274 Service = "eks.amazonaws.com"
275 }
276 Sid = "EKSClusterAssumeRole"
277 },
278 ]
279 Version = "2012-10-17"
280 }
281 )
282 [1m[0mcreate_date[0m[0m = "2020-05-27T14:26:30Z"
283 [1m[0mforce_detach_policies[0m[0m = true
284 [1m[0mid[0m[0m = "k8-cluster-staging20200527142629799000000003"
285 [1m[0mmax_session_duration[0m[0m = 3600
286 [1m[0mname[0m[0m = "k8-cluster-staging20200527142629799000000003"
287 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
288 [1m[0mpath[0m[0m = "/"
289 [1m[0mtags[0m[0m = {}
290 [1m[0munique_id[0m[0m = "AROASNA6L6J746ACGTZOI"
291}
292
293# module.staging_k8s_cluster.aws_iam_role.workers[0]:
294resource "aws_iam_role" "workers" {
295 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007"
296 [1m[0massume_role_policy[0m[0m = jsonencode(
297 {
298 Statement = [
299 {
300 Action = "sts:AssumeRole"
301 Effect = "Allow"
302 Principal = {
303 Service = "ec2.amazonaws.com"
304 }
305 Sid = "EKSWorkerAssumeRole"
306 },
307 ]
308 Version = "2012-10-17"
309 }
310 )
311 [1m[0mcreate_date[0m[0m = "2020-05-27T14:36:48Z"
312 [1m[0mforce_detach_policies[0m[0m = true
313 [1m[0mid[0m[0m = "k8-cluster-staging20200527143647472000000007"
314 [1m[0mmax_session_duration[0m[0m = 3600
315 [1m[0mname[0m[0m = "k8-cluster-staging20200527143647472000000007"
316 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
317 [1m[0mpath[0m[0m = "/"
318 [1m[0mtags[0m[0m = {}
319 [1m[0munique_id[0m[0m = "AROASNA6L6J7QPY2J5NRY"
320}
321
322# module.staging_k8s_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0]:
323resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" {
324 [1m[0mid[0m[0m = "k8-cluster-staging20200527142629799000000003-20200527142632660400000005"
325 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
326 [1m[0mrole[0m[0m = "k8-cluster-staging20200527142629799000000003"
327}
328
329# module.staging_k8s_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0]:
330resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSServicePolicy" {
331 [1m[0mid[0m[0m = "k8-cluster-staging20200527142629799000000003-20200527142632658000000004"
332 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::aws:policy/AmazonEKSServicePolicy"
333 [1m[0mrole[0m[0m = "k8-cluster-staging20200527142629799000000003"
334}
335
336# module.staging_k8s_cluster.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0]:
337resource "aws_iam_role_policy_attachment" "workers_AmazonEC2ContainerRegistryReadOnly" {
338 [1m[0mid[0m[0m = "k8-cluster-staging20200527143647472000000007-2020052714365071090000000d"
339 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
340 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
341}
342
343# module.staging_k8s_cluster.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0]:
344resource "aws_iam_role_policy_attachment" "workers_AmazonEKSWorkerNodePolicy" {
345 [1m[0mid[0m[0m = "k8-cluster-staging20200527143647472000000007-2020052714365064080000000b"
346 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"
347 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
348}
349
350# module.staging_k8s_cluster.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0]:
351resource "aws_iam_role_policy_attachment" "workers_AmazonEKS_CNI_Policy" {
352 [1m[0mid[0m[0m = "k8-cluster-staging20200527143647472000000007-2020052714365064510000000c"
353 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
354 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
355}
356
357# module.staging_k8s_cluster.aws_iam_role_policy_attachment.workers_autoscaling[0]:
358resource "aws_iam_role_policy_attachment" "workers_autoscaling" {
359 [1m[0mid[0m[0m = "k8-cluster-staging20200527143647472000000007-2020052714365164740000000e"
360 [1m[0mpolicy_arn[0m[0m = "arn:aws:iam::165419938431:policy/eks-worker-autoscaling-k8-cluster-staging20200527143647476100000008"
361 [1m[0mrole[0m[0m = "k8-cluster-staging20200527143647472000000007"
362}
363
364# module.staging_k8s_cluster.aws_launch_configuration.workers[0]:
365resource "aws_launch_configuration" "workers" {
366 [1m[0marn[0m[0m = "arn:aws:autoscaling:eu-west-1:165419938431:launchConfiguration:cb0861c5-8872-4775-a6f7-2981a0499e13:launchConfigurationName/k8-cluster-staging-020200615084211797200000001"
367 [1m[0massociate_public_ip_address[0m[0m = false
368 [1m[0mebs_optimized[0m[0m = true
369 [1m[0menable_monitoring[0m[0m = true
370 [1m[0miam_instance_profile[0m[0m = "k8-cluster-staging2020052714364970570000000a"
371 [1m[0mid[0m[0m = "k8-cluster-staging-020200615084211797200000001"
372 [1m[0mimage_id[0m[0m = "ami-060184dfafb3d8108"
373 [1m[0minstance_type[0m[0m = "m5.xlarge"
374 [1m[0mname[0m[0m = "k8-cluster-staging-020200615084211797200000001"
375 [1m[0mname_prefix[0m[0m = "k8-cluster-staging-0"
376 [1m[0msecurity_groups[0m[0m = [
377 "sg-030cfa281d8feb134",
378 "sg-04198c60f527b57ea",
379 ]
380 [1m[0muser_data_base64[0m[0m = "IyEvYmluL2Jhc2ggLXhlCgojIEFsbG93IHVzZXIgc3VwcGxpZWQgcHJlIHVzZXJkYXRhIGNvZGUKCgojIEJvb3RzdHJhcCBhbmQgam9pbiB0aGUgY2x1c3RlcgovZXRjL2Vrcy9ib290c3RyYXAuc2ggLS1iNjQtY2x1c3Rlci1jYSAnTFMwdExTMUNSVWRKVGlCRFJWSlVTVVpKUTBGVVJTMHRMUzB0Q2sxSlNVTjVSRU5EUVdKRFowRjNTVUpCWjBsQ1FVUkJUa0puYTNGb2EybEhPWGN3UWtGUmMwWkJSRUZXVFZKTmQwVlJXVVJXVVZGRVJYZHdjbVJYU213S1kyMDFiR1JIVm5wTlFqUllSRlJKZDAxRVZYbE9la1V3VFhwTk1FOVdiMWhFVkUxM1RVUlZlVTVVUlRCTmVrMHdUMVp2ZDBaVVJWUk5Ra1ZIUVRGVlJRcEJlRTFMWVROV2FWcFlTblZhV0ZKc1kzcERRMEZUU1hkRVVWbEtTMjlhU1doMlkwNUJVVVZDUWxGQlJHZG5SVkJCUkVORFFWRnZRMmRuUlVKQlRXeGpDakpQTkZBd1pEaElkM3B2UlZGcVVVaEhXRWR1Y0haS2JFMVVSWFp1UTBwM1NHWnhhWGhQY1ZaTlJYaGtMM0ZJU0VkYVUwUnVaazlFZUdORGFucDNjWG9LVTNKUmNGaG9ibXRvWmtSTWFtSXZXbUphUzJKVlUxSkxOME5XVGxCRlRXSm5iR3BTWm1sUWNqRm9OWEkxUkVSQ1puSnRlRVp1ZGsxa1JHbEpNMmt6UmdwdVJGTkZhbUp6U1dWUlZVSk9MMnhFZFhkMk5YYzFibE5uV0d0Q1YxWTFaM0p4V21KTWNqRmljR2hvTTJ4M2IwczVUMWdyWjBaYWRWTm5NV2RHYVdSWUNuaEJlazlWTDNWU2NraHZkV3BtSzJscFEybzNNemRVY2k5M2FsUjFhakJRZFUxRUt6bDZUMDFhUVcxbWRHVnhOak5oZDI5eGVrUkZlV3d2WTFrclpsb0tORXB3U2tKRWJVOTROVWw2T0U1cGRYa3pVMHRTVW5sM1YzZHViM1pwVGpoMlNrdHRZamh1Y1dsR2JHZEVTREJ0VDBkMlowdEhiMHBvZFZZdlpuTXpWZ3BYVUdzd1JVSlVjek4xYXpWeU5teGlkWFpOUTBGM1JVRkJZVTFxVFVORmQwUm5XVVJXVWpCUVFWRklMMEpCVVVSQlowdHJUVUU0UjBFeFZXUkZkMFZDQ2k5M1VVWk5RVTFDUVdZNGQwUlJXVXBMYjFwSmFIWmpUa0ZSUlV4Q1VVRkVaMmRGUWtGSE5YZzJXREJJSzBZMlNXaHdPV3RhYlZWeFRsVm1RVGwzWmt3S1RqZzRkVmc0Ym10Tk9UWk5UalZoTDBONmFWaHNXVFZsVTFKYWEzSk5hMk5zYW1Zd2NrZDVhWGh6VHpWUk0wZG1jazFoZDFSU1NIQk1NR3czU201cWRBcFdhMVJYY210RU9YZ3lSMUZVTWpkWVp5OXlSVVZtYjBKcU5uUTFjblV4TmxsNlEyVlFPR1V6WjNNMVMwWTFiakZCVG1zMGRVTlNRMHhPTVVocmQyMUlDblZVUjBsSmFETTNZV3BSWXk5cVNreGhVMGxLV0hoaFFWaHVSbEF2ZEVaS2FYb3labEJxYTNKMUszVnpOMnB2THpoSFVVUnJZblEwYUcxdk9FRkJiVlFLYWl0VVYwVlVlblp5TTJKVVZuVk5halZEUTI4dllsQlRialZMTUZVeVZHOW5WemQzVjNjeVVURkVVRTFVYlc4eGVHNWlRblJWWjA1WlowUTFObkZaY3dwRE5HNVRUVWwzYWt4RlpVMTJRbGRxTkZwTk0wRkpUbmhhYTNaMVQwZHhUMkZUV0c1Tk9WTnZjblZ2TlN0TFF5dHhRM0puT0ZaelQxTTRaejBLTFMwdExTMUZUa1FnUTBWU1ZFbEdTVU5CVkVVdExTMHRMUW89JyAtLWFwaXNlcnZlci1lbmRwb2ludCAnaHR0cHM6Ly80QTc5RTE4MjREN0RCQ0YwOUJFQ0EzOEVBNzM5MzkxNS5zazEuZXUtd2VzdC0xLmVrcy5hbWF6b25hd3MuY29tJyAgLS1rdWJlbGV0LWV4dHJhLWFyZ3MgJy0tbm9kZS1sYWJlbHM9dHlwZT1kZWZhdWx0JyAnazgtY2x1c3Rlci1zdGFnaW5nJwoKIyBBbGxvdyB1c2VyIHN1cHBsaWVkIHVzZXJkYXRhIGNvZGUKCg=="
381 [1m[0mvpc_classic_link_security_groups[0m[0m = []
382
383 root_block_device {
384 [1m[0mdelete_on_termination[0m[0m = true
385 [1m[0mencrypted[0m[0m = false
386 [1m[0miops[0m[0m = 0
387 [1m[0mvolume_size[0m[0m = 100
388 [1m[0mvolume_type[0m[0m = "gp2"
389 }
390}
391
392# module.staging_k8s_cluster.aws_launch_configuration.workers[1]:
393resource "aws_launch_configuration" "workers" {
394 [1m[0marn[0m[0m = "arn:aws:autoscaling:eu-west-1:165419938431:launchConfiguration:e2c2111e-8525-4d2d-94bb-febff7a4254c:launchConfigurationName/k8-cluster-staging-120200615084211798900000002"
395 [1m[0massociate_public_ip_address[0m[0m = false
396 [1m[0mebs_optimized[0m[0m = true
397 [1m[0menable_monitoring[0m[0m = true
398 [1m[0miam_instance_profile[0m[0m = "k8-cluster-staging20200527143649655200000009"
399 [1m[0mid[0m[0m = "k8-cluster-staging-120200615084211798900000002"
400 [1m[0mimage_id[0m[0m = "ami-060184dfafb3d8108"
401 [1m[0minstance_type[0m[0m = "m5.large"
402 [1m[0mname[0m[0m = "k8-cluster-staging-120200615084211798900000002"
403 [1m[0mname_prefix[0m[0m = "k8-cluster-staging-1"
404 [1m[0msecurity_groups[0m[0m = [
405 "sg-030cfa281d8feb134",
406 "sg-04198c60f527b57ea",
407 ]
408 [1m[0muser_data_base64[0m[0m = "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"
409 [1m[0mvpc_classic_link_security_groups[0m[0m = []
410
411 root_block_device {
412 [1m[0mdelete_on_termination[0m[0m = true
413 [1m[0mencrypted[0m[0m = false
414 [1m[0miops[0m[0m = 0
415 [1m[0mvolume_size[0m[0m = 100
416 [1m[0mvolume_type[0m[0m = "gp2"
417 }
418}
419
420# module.staging_k8s_cluster.aws_security_group.cluster[0]:
421resource "aws_security_group" "cluster" {
422 [1m[0marn[0m[0m = "arn:aws:ec2:eu-west-1:165419938431:security-group/sg-010e043a4b80fcbbd"
423 [1m[0mdescription[0m[0m = "EKS cluster security group."
424 [1m[0megress[0m[0m = [
425 {
426 cidr_blocks = [
427 "0.0.0.0/0",
428 ]
429 description = "Allow cluster egress access to the Internet."
430 from_port = 0
431 ipv6_cidr_blocks = []
432 prefix_list_ids = []
433 protocol = "-1"
434 security_groups = []
435 self = false
436 to_port = 0
437 },
438 ]
439 [1m[0mid[0m[0m = "sg-010e043a4b80fcbbd"
440 [1m[0mingress[0m[0m = [
441 {
442 cidr_blocks = []
443 description = "Allow pods to communicate with the EKS cluster API."
444 from_port = 443
445 ipv6_cidr_blocks = []
446 prefix_list_ids = []
447 protocol = "tcp"
448 security_groups = [
449 "sg-030cfa281d8feb134",
450 ]
451 self = false
452 to_port = 443
453 },
454 ]
455 [1m[0mname[0m[0m = "k8-cluster-staging20200527142629797100000002"
456 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
457 [1m[0mowner_id[0m[0m = "165419938431"
458 [1m[0mrevoke_rules_on_delete[0m[0m = false
459 [1m[0mtags[0m[0m = {
460 "Name" = "k8-cluster-staging-eks_cluster_sg"
461 }
462 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
463}
464
465# module.staging_k8s_cluster.aws_security_group.workers[0]:
466resource "aws_security_group" "workers" {
467 [1m[0marn[0m[0m = "arn:aws:ec2:eu-west-1:165419938431:security-group/sg-030cfa281d8feb134"
468 [1m[0mdescription[0m[0m = "Security group for all nodes in the cluster."
469 [1m[0megress[0m[0m = [
470 {
471 cidr_blocks = [
472 "0.0.0.0/0",
473 ]
474 description = "Allow nodes all egress to the Internet."
475 from_port = 0
476 ipv6_cidr_blocks = []
477 prefix_list_ids = []
478 protocol = "-1"
479 security_groups = []
480 self = false
481 to_port = 0
482 },
483 ]
484 [1m[0mid[0m[0m = "sg-030cfa281d8feb134"
485 [1m[0mingress[0m[0m = [
486 {
487 cidr_blocks = []
488 description = "Allow node to communicate with each other."
489 from_port = 0
490 ipv6_cidr_blocks = []
491 prefix_list_ids = []
492 protocol = "-1"
493 security_groups = []
494 self = true
495 to_port = 0
496 },
497 {
498 cidr_blocks = []
499 description = "Allow pods running extension API servers on port 443 to receive communication from cluster control plane."
500 from_port = 443
501 ipv6_cidr_blocks = []
502 prefix_list_ids = []
503 protocol = "tcp"
504 security_groups = [
505 "sg-010e043a4b80fcbbd",
506 ]
507 self = false
508 to_port = 443
509 },
510 {
511 cidr_blocks = []
512 description = "Allow workers pods to receive communication from the cluster control plane."
513 from_port = 1025
514 ipv6_cidr_blocks = []
515 prefix_list_ids = []
516 protocol = "tcp"
517 security_groups = [
518 "sg-010e043a4b80fcbbd",
519 ]
520 self = false
521 to_port = 65535
522 },
523 ]
524 [1m[0mname[0m[0m = "k8-cluster-staging20200527143647465500000006"
525 [1m[0mname_prefix[0m[0m = "k8-cluster-staging"
526 [1m[0mowner_id[0m[0m = "165419938431"
527 [1m[0mrevoke_rules_on_delete[0m[0m = false
528 [1m[0mtags[0m[0m = {
529 "Name" = "k8-cluster-staging-eks_worker_sg"
530 "kubernetes.io/cluster/k8-cluster-staging" = "owned"
531 }
532 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
533}
534
535# module.staging_k8s_cluster.aws_security_group_rule.cluster_egress_internet[0]:
536resource "aws_security_group_rule" "cluster_egress_internet" {
537 [1m[0mcidr_blocks[0m[0m = [
538 "0.0.0.0/0",
539 ]
540 [1m[0mdescription[0m[0m = "Allow cluster egress access to the Internet."
541 [1m[0mfrom_port[0m[0m = 0
542 [1m[0mid[0m[0m = "sgrule-3860132813"
543 [1m[0mipv6_cidr_blocks[0m[0m = []
544 [1m[0mprefix_list_ids[0m[0m = []
545 [1m[0mprotocol[0m[0m = "-1"
546 [1m[0msecurity_group_id[0m[0m = "sg-010e043a4b80fcbbd"
547 [1m[0mself[0m[0m = false
548 [1m[0mto_port[0m[0m = 0
549 [1m[0mtype[0m[0m = "egress"
550}
551
552# module.staging_k8s_cluster.aws_security_group_rule.cluster_https_worker_ingress[0]:
553resource "aws_security_group_rule" "cluster_https_worker_ingress" {
554 [1m[0mcidr_blocks[0m[0m = []
555 [1m[0mdescription[0m[0m = "Allow pods to communicate with the EKS cluster API."
556 [1m[0mfrom_port[0m[0m = 443
557 [1m[0mid[0m[0m = "sgrule-2298195119"
558 [1m[0mipv6_cidr_blocks[0m[0m = []
559 [1m[0mprefix_list_ids[0m[0m = []
560 [1m[0mprotocol[0m[0m = "tcp"
561 [1m[0msecurity_group_id[0m[0m = "sg-010e043a4b80fcbbd"
562 [1m[0mself[0m[0m = false
563 [1m[0msource_security_group_id[0m[0m = "sg-030cfa281d8feb134"
564 [1m[0mto_port[0m[0m = 443
565 [1m[0mtype[0m[0m = "ingress"
566}
567
568# module.staging_k8s_cluster.aws_security_group_rule.workers_egress_internet[0]:
569resource "aws_security_group_rule" "workers_egress_internet" {
570 [1m[0mcidr_blocks[0m[0m = [
571 "0.0.0.0/0",
572 ]
573 [1m[0mdescription[0m[0m = "Allow nodes all egress to the Internet."
574 [1m[0mfrom_port[0m[0m = 0
575 [1m[0mid[0m[0m = "sgrule-2724420594"
576 [1m[0mipv6_cidr_blocks[0m[0m = []
577 [1m[0mprefix_list_ids[0m[0m = []
578 [1m[0mprotocol[0m[0m = "-1"
579 [1m[0msecurity_group_id[0m[0m = "sg-030cfa281d8feb134"
580 [1m[0mself[0m[0m = false
581 [1m[0mto_port[0m[0m = 0
582 [1m[0mtype[0m[0m = "egress"
583}
584
585# module.staging_k8s_cluster.aws_security_group_rule.workers_ingress_cluster[0]:
586resource "aws_security_group_rule" "workers_ingress_cluster" {
587 [1m[0mcidr_blocks[0m[0m = []
588 [1m[0mdescription[0m[0m = "Allow workers pods to receive communication from the cluster control plane."
589 [1m[0mfrom_port[0m[0m = 1025
590 [1m[0mid[0m[0m = "sgrule-401952641"
591 [1m[0mipv6_cidr_blocks[0m[0m = []
592 [1m[0mprefix_list_ids[0m[0m = []
593 [1m[0mprotocol[0m[0m = "tcp"
594 [1m[0msecurity_group_id[0m[0m = "sg-030cfa281d8feb134"
595 [1m[0mself[0m[0m = false
596 [1m[0msource_security_group_id[0m[0m = "sg-010e043a4b80fcbbd"
597 [1m[0mto_port[0m[0m = 65535
598 [1m[0mtype[0m[0m = "ingress"
599}
600
601# module.staging_k8s_cluster.aws_security_group_rule.workers_ingress_cluster_https[0]:
602resource "aws_security_group_rule" "workers_ingress_cluster_https" {
603 [1m[0mcidr_blocks[0m[0m = []
604 [1m[0mdescription[0m[0m = "Allow pods running extension API servers on port 443 to receive communication from cluster control plane."
605 [1m[0mfrom_port[0m[0m = 443
606 [1m[0mid[0m[0m = "sgrule-799470430"
607 [1m[0mipv6_cidr_blocks[0m[0m = []
608 [1m[0mprefix_list_ids[0m[0m = []
609 [1m[0mprotocol[0m[0m = "tcp"
610 [1m[0msecurity_group_id[0m[0m = "sg-030cfa281d8feb134"
611 [1m[0mself[0m[0m = false
612 [1m[0msource_security_group_id[0m[0m = "sg-010e043a4b80fcbbd"
613 [1m[0mto_port[0m[0m = 443
614 [1m[0mtype[0m[0m = "ingress"
615}
616
617# module.staging_k8s_cluster.aws_security_group_rule.workers_ingress_self[0]:
618resource "aws_security_group_rule" "workers_ingress_self" {
619 [1m[0mcidr_blocks[0m[0m = []
620 [1m[0mdescription[0m[0m = "Allow node to communicate with each other."
621 [1m[0mfrom_port[0m[0m = 0
622 [1m[0mid[0m[0m = "sgrule-3836037588"
623 [1m[0mipv6_cidr_blocks[0m[0m = []
624 [1m[0mprefix_list_ids[0m[0m = []
625 [1m[0mprotocol[0m[0m = "-1"
626 [1m[0msecurity_group_id[0m[0m = "sg-030cfa281d8feb134"
627 [1m[0mself[0m[0m = false
628 [1m[0msource_security_group_id[0m[0m = "sg-030cfa281d8feb134"
629 [1m[0mto_port[0m[0m = 0
630 [1m[0mtype[0m[0m = "ingress"
631}
632
633# module.staging_k8s_cluster.data.aws_ami.eks_worker:
634data "aws_ami" "eks_worker" {
635 [1m[0marchitecture[0m[0m = "x86_64"
636 [1m[0mblock_device_mappings[0m[0m = [
637 {
638 device_name = "/dev/xvda"
639 ebs = {
640 "delete_on_termination" = "true"
641 "encrypted" = "false"
642 "iops" = "0"
643 "snapshot_id" = "snap-0c5e1f98a66191da6"
644 "volume_size" = "20"
645 "volume_type" = "gp2"
646 }
647 no_device = ""
648 virtual_name = ""
649 },
650 ]
651 [1m[0mcreation_date[0m[0m = "2020-06-09T20:18:10.000Z"
652 [1m[0mdescription[0m[0m = "EKS Kubernetes Worker AMI with AmazonLinux2 image, (k8s: 1.14.9, docker:19.03.6ce-4.amzn2)"
653 [1m[0mhypervisor[0m[0m = "xen"
654 [1m[0mid[0m[0m = "ami-060184dfafb3d8108"
655 [1m[0mimage_id[0m[0m = "ami-060184dfafb3d8108"
656 [1m[0mimage_location[0m[0m = "amazon/amazon-eks-node-1.14-v20200609"
657 [1m[0mimage_owner_alias[0m[0m = "amazon"
658 [1m[0mimage_type[0m[0m = "machine"
659 [1m[0mmost_recent[0m[0m = true
660 [1m[0mname[0m[0m = "amazon-eks-node-1.14-v20200609"
661 [1m[0mowner_id[0m[0m = "602401143452"
662 [1m[0mowners[0m[0m = [
663 "602401143452",
664 ]
665 [1m[0mproduct_codes[0m[0m = []
666 [1m[0mpublic[0m[0m = true
667 [1m[0mroot_device_name[0m[0m = "/dev/xvda"
668 [1m[0mroot_device_type[0m[0m = "ebs"
669 [1m[0mroot_snapshot_id[0m[0m = "snap-0c5e1f98a66191da6"
670 [1m[0msriov_net_support[0m[0m = "simple"
671 [1m[0mstate[0m[0m = "available"
672 [1m[0mstate_reason[0m[0m = {
673 "code" = "UNSET"
674 "message" = "UNSET"
675 }
676 [1m[0mtags[0m[0m = {}
677 [1m[0mvirtualization_type[0m[0m = "hvm"
678
679 filter {
680 [1m[0mname[0m[0m = "name"
681 [1m[0mvalues[0m[0m = [
682 "amazon-eks-node-1.14-v*",
683 ]
684 }
685}
686
687# module.staging_k8s_cluster.data.aws_caller_identity.current:
688data "aws_caller_identity" "current" {
689 [1m[0maccount_id[0m[0m = "165419938431"
690 [1m[0marn[0m[0m = "arn:aws:iam::165419938431:user/celduin-ci"
691 [1m[0mid[0m[0m = "2020-06-16 10:50:48.415304004 +0000 UTC"
692 [1m[0muser_id[0m[0m = "AIDASNA6L6J7RJLRW7IGG"
693}
694
695# module.staging_k8s_cluster.data.aws_iam_policy_document.cluster_assume_role_policy:
696data "aws_iam_policy_document" "cluster_assume_role_policy" {
697 [1m[0mid[0m[0m = "2764486067"
698 [1m[0mjson[0m[0m = jsonencode(
699 {
700 Statement = [
701 {
702 Action = "sts:AssumeRole"
703 Effect = "Allow"
704 Principal = {
705 Service = "eks.amazonaws.com"
706 }
707 Sid = "EKSClusterAssumeRole"
708 },
709 ]
710 Version = "2012-10-17"
711 }
712 )
713 [1m[0mversion[0m[0m = "2012-10-17"
714
715 statement {
716 [1m[0mactions[0m[0m = [
717 "sts:AssumeRole",
718 ]
719 [1m[0meffect[0m[0m = "Allow"
720 [1m[0mnot_actions[0m[0m = []
721 [1m[0mnot_resources[0m[0m = []
722 [1m[0mresources[0m[0m = []
723 [1m[0msid[0m[0m = "EKSClusterAssumeRole"
724
725 principals {
726 [1m[0midentifiers[0m[0m = [
727 "eks.amazonaws.com",
728 ]
729 [1m[0mtype[0m[0m = "Service"
730 }
731 }
732}
733
734# module.staging_k8s_cluster.data.aws_iam_policy_document.worker_autoscaling:
735data "aws_iam_policy_document" "worker_autoscaling" {
736 [1m[0mid[0m[0m = "678705629"
737 [1m[0mjson[0m[0m = jsonencode(
738 {
739 Statement = [
740 {
741 Action = [
742 "ec2:DescribeLaunchTemplateVersions",
743 "autoscaling:DescribeTags",
744 "autoscaling:DescribeLaunchConfigurations",
745 "autoscaling:DescribeAutoScalingInstances",
746 "autoscaling:DescribeAutoScalingGroups",
747 ]
748 Effect = "Allow"
749 Resource = "*"
750 Sid = "eksWorkerAutoscalingAll"
751 },
752 {
753 Action = [
754 "autoscaling:UpdateAutoScalingGroup",
755 "autoscaling:TerminateInstanceInAutoScalingGroup",
756 "autoscaling:SetDesiredCapacity",
757 ]
758 Condition = {
759 StringEquals = {
760 autoscaling:ResourceTag/k8s.io/cluster-autoscaler/enabled = "true"
761 autoscaling:ResourceTag/kubernetes.io/cluster/k8-cluster-staging = "owned"
762 }
763 }
764 Effect = "Allow"
765 Resource = "*"
766 Sid = "eksWorkerAutoscalingOwn"
767 },
768 ]
769 Version = "2012-10-17"
770 }
771 )
772 [1m[0mversion[0m[0m = "2012-10-17"
773
774 statement {
775 [1m[0mactions[0m[0m = [
776 "autoscaling:DescribeAutoScalingGroups",
777 "autoscaling:DescribeAutoScalingInstances",
778 "autoscaling:DescribeLaunchConfigurations",
779 "autoscaling:DescribeTags",
780 "ec2:DescribeLaunchTemplateVersions",
781 ]
782 [1m[0meffect[0m[0m = "Allow"
783 [1m[0mnot_actions[0m[0m = []
784 [1m[0mnot_resources[0m[0m = []
785 [1m[0mresources[0m[0m = [
786 "*",
787 ]
788 [1m[0msid[0m[0m = "eksWorkerAutoscalingAll"
789 }
790 statement {
791 [1m[0mactions[0m[0m = [
792 "autoscaling:SetDesiredCapacity",
793 "autoscaling:TerminateInstanceInAutoScalingGroup",
794 "autoscaling:UpdateAutoScalingGroup",
795 ]
796 [1m[0meffect[0m[0m = "Allow"
797 [1m[0mnot_actions[0m[0m = []
798 [1m[0mnot_resources[0m[0m = []
799 [1m[0mresources[0m[0m = [
800 "*",
801 ]
802 [1m[0msid[0m[0m = "eksWorkerAutoscalingOwn"
803
804 condition {
805 [1m[0mtest[0m[0m = "StringEquals"
806 [1m[0mvalues[0m[0m = [
807 "owned",
808 ]
809 [1m[0mvariable[0m[0m = "autoscaling:ResourceTag/kubernetes.io/cluster/k8-cluster-staging"
810 }
811 condition {
812 [1m[0mtest[0m[0m = "StringEquals"
813 [1m[0mvalues[0m[0m = [
814 "true",
815 ]
816 [1m[0mvariable[0m[0m = "autoscaling:ResourceTag/k8s.io/cluster-autoscaler/enabled"
817 }
818 }
819}
820
821# module.staging_k8s_cluster.data.aws_iam_policy_document.workers_assume_role_policy:
822data "aws_iam_policy_document" "workers_assume_role_policy" {
823 [1m[0mid[0m[0m = "3778018924"
824 [1m[0mjson[0m[0m = jsonencode(
825 {
826 Statement = [
827 {
828 Action = "sts:AssumeRole"
829 Effect = "Allow"
830 Principal = {
831 Service = "ec2.amazonaws.com"
832 }
833 Sid = "EKSWorkerAssumeRole"
834 },
835 ]
836 Version = "2012-10-17"
837 }
838 )
839 [1m[0mversion[0m[0m = "2012-10-17"
840
841 statement {
842 [1m[0mactions[0m[0m = [
843 "sts:AssumeRole",
844 ]
845 [1m[0meffect[0m[0m = "Allow"
846 [1m[0mnot_actions[0m[0m = []
847 [1m[0mnot_resources[0m[0m = []
848 [1m[0mresources[0m[0m = []
849 [1m[0msid[0m[0m = "EKSWorkerAssumeRole"
850
851 principals {
852 [1m[0midentifiers[0m[0m = [
853 "ec2.amazonaws.com",
854 ]
855 [1m[0mtype[0m[0m = "Service"
856 }
857 }
858}
859
860# module.staging_k8s_cluster.data.aws_region.current:
861data "aws_region" "current" {
862 [1m[0mdescription[0m[0m = "Europe (Ireland)"
863 [1m[0mendpoint[0m[0m = "ec2.eu-west-1.amazonaws.com"
864 [1m[0mid[0m[0m = "eu-west-1"
865 [1m[0mname[0m[0m = "eu-west-1"
866}
867
868# module.staging_k8s_cluster.data.template_file.config_map_aws_auth:
869data "template_file" "config_map_aws_auth" {
870 [1m[0mid[0m[0m = "fd6605c114cd51c4b15cb3407c1c07496978a59a55e037ffdd73fad363c6df26"
871 [1m[0mrendered[0m[0m = <<~EOT
872 apiVersion: v1
873 kind: ConfigMap
874 metadata:
875 name: aws-auth
876 namespace: kube-system
877 data:
878 mapRoles: |
879 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
880 username: system:node:{{EC2PrivateDNSName}}
881 groups:
882 - system:bootstrappers
883 - system:nodes
884
885
886 mapUsers: |
887
888 mapAccounts: |
889
890 EOT
891 [1m[0mtemplate[0m[0m = <<~EOT
892 apiVersion: v1
893 kind: ConfigMap
894 metadata:
895 name: aws-auth
896 namespace: kube-system
897 data:
898 mapRoles: |
899 ${worker_role_arn}
900 ${map_roles}
901 mapUsers: |
902 ${map_users}
903 mapAccounts: |
904 ${map_accounts}
905 EOT
906 [1m[0mvars[0m[0m = {
907 "map_accounts" = ""
908 "map_roles" = ""
909 "map_users" = ""
910 "worker_role_arn" = <<~EOT
911 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
912 username: system:node:{{EC2PrivateDNSName}}
913 groups:
914 - system:bootstrappers
915 - system:nodes
916 EOT
917 }
918}
919
920# module.staging_k8s_cluster.data.template_file.kubeconfig:
921data "template_file" "kubeconfig" {
922 [1m[0mid[0m[0m = "e4bd8211e4160bcf95c1734ca0a895917ed1af1768d804a2df6059a9e62722a2"
923 [1m[0mrendered[0m[0m = <<~EOT
924 apiVersion: v1
925 preferences: {}
926 kind: Config
927
928 clusters:
929 - cluster:
930 server: https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com
931 certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJd01EVXlOekUwTXpNME9Wb1hEVE13TURVeU5URTBNek0wT1Zvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTWxjCjJPNFAwZDhId3pvRVFqUUhHWEducHZKbE1URXZuQ0p3SGZxaXhPcVZNRXhkL3FISEdaU0RuZk9EeGNDanp3cXoKU3JRcFhobmtoZkRMamIvWmJaS2JVU1JLN0NWTlBFTWJnbGpSZmlQcjFoNXI1RERCZnJteEZudk1kRGlJM2kzRgpuRFNFamJzSWVRVUJOL2xEdXd2NXc1blNnWGtCV1Y1Z3JxWmJMcjFicGhoM2x3b0s5T1grZ0ZadVNnMWdGaWRYCnhBek9VL3VSckhvdWpmK2lpQ2o3MzdUci93alR1ajBQdU1EKzl6T01aQW1mdGVxNjNhd29xekRFeWwvY1krZloKNEpwSkJEbU94NUl6OE5pdXkzU0tSUnl3V3dub3ZpTjh2SkttYjhucWlGbGdESDBtT0d2Z0tHb0podVYvZnMzVgpXUGswRUJUczN1azVyNmxidXZNQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFHNXg2WDBIK0Y2SWhwOWtabVVxTlVmQTl3ZkwKTjg4dVg4bmtNOTZNTjVhL0N6aVhsWTVlU1Jaa3JNa2NsamYwckd5aXhzTzVRM0dmck1hd1RSSHBMMGw3Sm5qdApWa1RXcmtEOXgyR1FUMjdYZy9yRUVmb0JqNnQ1cnUxNll6Q2VQOGUzZ3M1S0Y1bjFBTms0dUNSQ0xOMUhrd21ICnVUR0lJaDM3YWpRYy9qSkxhU0lKWHhhQVhuRlAvdEZKaXoyZlBqa3J1K3VzN2pvLzhHUURrYnQ0aG1vOEFBbVQKaitUV0VUenZyM2JUVnVNajVDQ28vYlBTbjVLMFUyVG9nVzd3V3cyUTFEUE1UbW8xeG5iQnRVZ05ZZ0Q1NnFZcwpDNG5TTUl3akxFZU12QldqNFpNM0FJTnhaa3Z1T0dxT2FTWG5NOVNvcnVvNStLQytxQ3JnOFZzT1M4Zz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=
932 name: eks_k8-cluster-staging
933
934 contexts:
935 - context:
936 cluster: eks_k8-cluster-staging
937 user: eks_k8-cluster-staging
938 name: eks_k8-cluster-staging
939
940 current-context: eks_k8-cluster-staging
941
942 users:
943 - name: eks_k8-cluster-staging
944 user:
945 exec:
946 apiVersion: client.authentication.k8s.io/v1alpha1
947 command: aws-iam-authenticator
948 args:
949 - "token"
950 - "-i"
951 - "k8-cluster-staging"
952
953
954 EOT
955 [1m[0mtemplate[0m[0m = <<~EOT
956 apiVersion: v1
957 preferences: {}
958 kind: Config
959
960 clusters:
961 - cluster:
962 server: ${endpoint}
963 certificate-authority-data: ${cluster_auth_base64}
964 name: ${kubeconfig_name}
965
966 contexts:
967 - context:
968 cluster: ${kubeconfig_name}
969 user: ${kubeconfig_name}
970 name: ${kubeconfig_name}
971
972 current-context: ${kubeconfig_name}
973
974 users:
975 - name: ${kubeconfig_name}
976 user:
977 exec:
978 apiVersion: client.authentication.k8s.io/v1alpha1
979 command: ${aws_authenticator_command}
980 args:
981 ${aws_authenticator_command_args}
982 ${aws_authenticator_additional_args}
983 ${aws_authenticator_env_variables}
984 EOT
985 [1m[0mvars[0m[0m = {
986 "aws_authenticator_additional_args" = ""
987 "aws_authenticator_command" = "aws-iam-authenticator"
988 "aws_authenticator_command_args" = <<~EOT
989 - "token"
990 - "-i"
991 - "k8-cluster-staging"
992 EOT
993 "aws_authenticator_env_variables" = ""
994 "cluster_auth_base64" = "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"
995 "endpoint" = "https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com"
996 "kubeconfig_name" = "eks_k8-cluster-staging"
997 "region" = "eu-west-1"
998 }
999}
1000
1001# module.staging_k8s_cluster.data.template_file.userdata[0]:
1002data "template_file" "userdata" {
1003 [1m[0mid[0m[0m = "2c08b9d4dcd9792bed328ec0c63bd990e4a89bc363b286b35333359e28105d4e"
1004 [1m[0mrendered[0m[0m = <<~EOT
1005 #!/bin/bash -xe
1006
1007 # Allow user supplied pre userdata code
1008
1009
1010 # Bootstrap and join the cluster
1011 /etc/eks/bootstrap.sh --b64-cluster-ca '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' --apiserver-endpoint 'https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com' --kubelet-extra-args '--node-labels=type=default' 'k8-cluster-staging'
1012
1013 # Allow user supplied userdata code
1014
1015 EOT
1016 [1m[0mtemplate[0m[0m = <<~EOT
1017 #!/bin/bash -xe
1018
1019 # Allow user supplied pre userdata code
1020 ${pre_userdata}
1021
1022 # Bootstrap and join the cluster
1023 /etc/eks/bootstrap.sh --b64-cluster-ca '${cluster_auth_base64}' --apiserver-endpoint '${endpoint}' ${bootstrap_extra_args} --kubelet-extra-args '${kubelet_extra_args}' '${cluster_name}'
1024
1025 # Allow user supplied userdata code
1026 ${additional_userdata}
1027 EOT
1028 [1m[0mvars[0m[0m = {
1029 "additional_userdata" = ""
1030 "bootstrap_extra_args" = ""
1031 "cluster_auth_base64" = "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"
1032 "cluster_name" = "k8-cluster-staging"
1033 "endpoint" = "https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com"
1034 "kubelet_extra_args" = "--node-labels=type=default"
1035 "pre_userdata" = ""
1036 }
1037}
1038
1039# module.staging_k8s_cluster.data.template_file.userdata[1]:
1040data "template_file" "userdata" {
1041 [1m[0mid[0m[0m = "d5d402a60d29a88489b977979a696e02bcc54cf2a5bfb4185175ea18e35ddda1"
1042 [1m[0mrendered[0m[0m = <<~EOT
1043 #!/bin/bash -xe
1044
1045 # Allow user supplied pre userdata code
1046
1047
1048 # Bootstrap and join the cluster
1049 /etc/eks/bootstrap.sh --b64-cluster-ca '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' --apiserver-endpoint 'https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com' --kubelet-extra-args '--node-labels=type=worker' 'k8-cluster-staging'
1050
1051 # Allow user supplied userdata code
1052
1053 EOT
1054 [1m[0mtemplate[0m[0m = <<~EOT
1055 #!/bin/bash -xe
1056
1057 # Allow user supplied pre userdata code
1058 ${pre_userdata}
1059
1060 # Bootstrap and join the cluster
1061 /etc/eks/bootstrap.sh --b64-cluster-ca '${cluster_auth_base64}' --apiserver-endpoint '${endpoint}' ${bootstrap_extra_args} --kubelet-extra-args '${kubelet_extra_args}' '${cluster_name}'
1062
1063 # Allow user supplied userdata code
1064 ${additional_userdata}
1065 EOT
1066 [1m[0mvars[0m[0m = {
1067 "additional_userdata" = ""
1068 "bootstrap_extra_args" = ""
1069 "cluster_auth_base64" = "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"
1070 "cluster_name" = "k8-cluster-staging"
1071 "endpoint" = "https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com"
1072 "kubelet_extra_args" = "--node-labels=type=worker"
1073 "pre_userdata" = ""
1074 }
1075}
1076
1077# module.staging_k8s_cluster.data.template_file.worker_role_arns[0]:
1078data "template_file" "worker_role_arns" {
1079 [1m[0mid[0m[0m = "ba2f2f93c952cca1f52c88f74ae3e56b7a047d87f65344349cc8650dc00c743b"
1080 [1m[0mrendered[0m[0m = <<~EOT
1081 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
1082 username: system:node:{{EC2PrivateDNSName}}
1083 groups:
1084 - system:bootstrappers
1085 - system:nodes
1086 EOT
1087 [1m[0mtemplate[0m[0m = <<~EOT
1088 - rolearn: ${worker_role_arn}
1089 username: system:node:{{EC2PrivateDNSName}}
1090 groups:
1091 - system:bootstrappers
1092 - system:nodes
1093 EOT
1094 [1m[0mvars[0m[0m = {
1095 "worker_role_arn" = "arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007"
1096 }
1097}
1098
1099# module.staging_k8s_cluster.data.template_file.worker_role_arns[1]:
1100data "template_file" "worker_role_arns" {
1101 [1m[0mid[0m[0m = "ba2f2f93c952cca1f52c88f74ae3e56b7a047d87f65344349cc8650dc00c743b"
1102 [1m[0mrendered[0m[0m = <<~EOT
1103 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
1104 username: system:node:{{EC2PrivateDNSName}}
1105 groups:
1106 - system:bootstrappers
1107 - system:nodes
1108 EOT
1109 [1m[0mtemplate[0m[0m = <<~EOT
1110 - rolearn: ${worker_role_arn}
1111 username: system:node:{{EC2PrivateDNSName}}
1112 groups:
1113 - system:bootstrappers
1114 - system:nodes
1115 EOT
1116 [1m[0mvars[0m[0m = {
1117 "worker_role_arn" = "arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007"
1118 }
1119}
1120
1121# module.staging_k8s_cluster.local_file.config_map_aws_auth[0]:
1122resource "local_file" "config_map_aws_auth" {
1123 [1m[0mcontent[0m[0m = <<~EOT
1124 apiVersion: v1
1125 kind: ConfigMap
1126 metadata:
1127 name: aws-auth
1128 namespace: kube-system
1129 data:
1130 mapRoles: |
1131 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
1132 username: system:node:{{EC2PrivateDNSName}}
1133 groups:
1134 - system:bootstrappers
1135 - system:nodes
1136
1137
1138 mapUsers: |
1139
1140 mapAccounts: |
1141
1142 EOT
1143 [1m[0mdirectory_permission[0m[0m = "0777"
1144 [1m[0mfile_permission[0m[0m = "0777"
1145 [1m[0mfilename[0m[0m = "./config-map-aws-auth_k8-cluster-staging.yaml"
1146 [1m[0mid[0m[0m = "b460543c06601c4eb42a975801c9919daabc532f"
1147}
1148
1149# module.staging_k8s_cluster.local_file.kubeconfig[0]:
1150resource "local_file" "kubeconfig" {
1151 [1m[0mcontent[0m[0m = <<~EOT
1152 apiVersion: v1
1153 preferences: {}
1154 kind: Config
1155
1156 clusters:
1157 - cluster:
1158 server: https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com
1159 certificate-authority-data: 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
1160 name: eks_k8-cluster-staging
1161
1162 contexts:
1163 - context:
1164 cluster: eks_k8-cluster-staging
1165 user: eks_k8-cluster-staging
1166 name: eks_k8-cluster-staging
1167
1168 current-context: eks_k8-cluster-staging
1169
1170 users:
1171 - name: eks_k8-cluster-staging
1172 user:
1173 exec:
1174 apiVersion: client.authentication.k8s.io/v1alpha1
1175 command: aws-iam-authenticator
1176 args:
1177 - "token"
1178 - "-i"
1179 - "k8-cluster-staging"
1180
1181
1182 EOT
1183 [1m[0mdirectory_permission[0m[0m = "0777"
1184 [1m[0mfile_permission[0m[0m = "0777"
1185 [1m[0mfilename[0m[0m = "./kubeconfig_k8-cluster-staging"
1186 [1m[0mid[0m[0m = "5a2cb5735def3cb6f077ae5f9c32f83d47e87971"
1187}
1188
1189# module.staging_k8s_cluster.null_resource.update_config_map_aws_auth[0]:
1190resource "null_resource" "update_config_map_aws_auth" {
1191 [1m[0mid[0m[0m = "154544301479565622"
1192 [1m[0mtriggers[0m[0m = {
1193 "config_map_rendered" = <<~EOT
1194 apiVersion: v1
1195 kind: ConfigMap
1196 metadata:
1197 name: aws-auth
1198 namespace: kube-system
1199 data:
1200 mapRoles: |
1201 - rolearn: arn:aws:iam::165419938431:role/k8-cluster-staging20200527143647472000000007
1202 username: system:node:{{EC2PrivateDNSName}}
1203 groups:
1204 - system:bootstrappers
1205 - system:nodes
1206
1207
1208 mapUsers: |
1209
1210 mapAccounts: |
1211
1212 EOT
1213 "endpoint" = "https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com"
1214 "kube_config_map_rendered" = <<~EOT
1215 apiVersion: v1
1216 preferences: {}
1217 kind: Config
1218
1219 clusters:
1220 - cluster:
1221 server: https://4A79E1824D7DBCF09BECA38EA7393915.sk1.eu-west-1.eks.amazonaws.com
1222 certificate-authority-data: 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
1223 name: eks_k8-cluster-staging
1224
1225 contexts:
1226 - context:
1227 cluster: eks_k8-cluster-staging
1228 user: eks_k8-cluster-staging
1229 name: eks_k8-cluster-staging
1230
1231 current-context: eks_k8-cluster-staging
1232
1233 users:
1234 - name: eks_k8-cluster-staging
1235 user:
1236 exec:
1237 apiVersion: client.authentication.k8s.io/v1alpha1
1238 command: aws-iam-authenticator
1239 args:
1240 - "token"
1241 - "-i"
1242 - "k8-cluster-staging"
1243
1244
1245 EOT
1246 }
1247}
1248
1249
1250# module.staging_worker_security_group.aws_security_group.this_name_prefix[0]:
1251resource "aws_security_group" "this_name_prefix" {
1252 [1m[0marn[0m[0m = "arn:aws:ec2:eu-west-1:165419938431:security-group/sg-04198c60f527b57ea"
1253 [1m[0mdescription[0m[0m = "Security group for network traffic into k8-cluster-staging"
1254 [1m[0megress[0m[0m = [
1255 {
1256 cidr_blocks = [
1257 "0.0.0.0/0",
1258 ]
1259 description = "All protocols"
1260 from_port = 0
1261 ipv6_cidr_blocks = [
1262 "::/0",
1263 ]
1264 prefix_list_ids = []
1265 protocol = "-1"
1266 security_groups = []
1267 self = false
1268 to_port = 0
1269 },
1270 ]
1271 [1m[0mid[0m[0m = "sg-04198c60f527b57ea"
1272 [1m[0mingress[0m[0m = [
1273 {
1274 cidr_blocks = [
1275 "0.0.0.0/0",
1276 ]
1277 description = "All TCP ports"
1278 from_port = 0
1279 ipv6_cidr_blocks = []
1280 prefix_list_ids = []
1281 protocol = "tcp"
1282 security_groups = []
1283 self = false
1284 to_port = 65535
1285 },
1286 ]
1287 [1m[0mname[0m[0m = "staging-worker-security-group-20200527142629796200000001"
1288 [1m[0mname_prefix[0m[0m = "staging-worker-security-group-"
1289 [1m[0mowner_id[0m[0m = "165419938431"
1290 [1m[0mrevoke_rules_on_delete[0m[0m = false
1291 [1m[0mtags[0m[0m = {
1292 "Name" = "staging-worker-security-group"
1293 }
1294 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
1295}
1296
1297# module.staging_worker_security_group.aws_security_group_rule.egress_rules[0]:
1298resource "aws_security_group_rule" "egress_rules" {
1299 [1m[0mcidr_blocks[0m[0m = [
1300 "0.0.0.0/0",
1301 ]
1302 [1m[0mdescription[0m[0m = "All protocols"
1303 [1m[0mfrom_port[0m[0m = 0
1304 [1m[0mid[0m[0m = "sgrule-2980275528"
1305 [1m[0mipv6_cidr_blocks[0m[0m = [
1306 "::/0",
1307 ]
1308 [1m[0mprefix_list_ids[0m[0m = []
1309 [1m[0mprotocol[0m[0m = "-1"
1310 [1m[0msecurity_group_id[0m[0m = "sg-04198c60f527b57ea"
1311 [1m[0mself[0m[0m = false
1312 [1m[0mto_port[0m[0m = 0
1313 [1m[0mtype[0m[0m = "egress"
1314}
1315
1316# module.staging_worker_security_group.aws_security_group_rule.ingress_rules[0]:
1317resource "aws_security_group_rule" "ingress_rules" {
1318 [1m[0mcidr_blocks[0m[0m = [
1319 "0.0.0.0/0",
1320 ]
1321 [1m[0mdescription[0m[0m = "All TCP ports"
1322 [1m[0mfrom_port[0m[0m = 0
1323 [1m[0mid[0m[0m = "sgrule-1551958252"
1324 [1m[0mipv6_cidr_blocks[0m[0m = []
1325 [1m[0mprefix_list_ids[0m[0m = []
1326 [1m[0mprotocol[0m[0m = "tcp"
1327 [1m[0msecurity_group_id[0m[0m = "sg-04198c60f527b57ea"
1328 [1m[0mself[0m[0m = false
1329 [1m[0mto_port[0m[0m = 65535
1330 [1m[0mtype[0m[0m = "ingress"
1331}
1332
1333
1334# aws_lb.staging_nlb:
1335resource "aws_lb" "staging_nlb" {
1336 [1m[0marn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:loadbalancer/net/staging-ingress-lb/2def290bba348759"
1337 [1m[0marn_suffix[0m[0m = "net/staging-ingress-lb/2def290bba348759"
1338 [1m[0mdns_name[0m[0m = "staging-ingress-lb-2def290bba348759.elb.eu-west-1.amazonaws.com"
1339 [1m[0menable_cross_zone_load_balancing[0m[0m = false
1340 [1m[0menable_deletion_protection[0m[0m = false
1341 [1m[0mid[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:loadbalancer/net/staging-ingress-lb/2def290bba348759"
1342 [1m[0minternal[0m[0m = false
1343 [1m[0mip_address_type[0m[0m = "ipv4"
1344 [1m[0mload_balancer_type[0m[0m = "network"
1345 [1m[0mname[0m[0m = "staging-ingress-lb"
1346 [1m[0msecurity_groups[0m[0m = []
1347 [1m[0msubnets[0m[0m = [
1348 "subnet-911f98cb",
1349 "subnet-925b1ef4",
1350 "subnet-b4ebbefc",
1351 ]
1352 [1m[0mtags[0m[0m = {}
1353 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
1354 [1m[0mzone_id[0m[0m = "Z2IFOLAFXWLO4F"
1355
1356 access_logs {
1357 [1m[0menabled[0m[0m = false
1358 }
1359
1360 subnet_mapping {
1361 [1m[0msubnet_id[0m[0m = "subnet-911f98cb"
1362 }
1363 subnet_mapping {
1364 [1m[0msubnet_id[0m[0m = "subnet-925b1ef4"
1365 }
1366 subnet_mapping {
1367 [1m[0msubnet_id[0m[0m = "subnet-b4ebbefc"
1368 }
1369}
1370
1371# aws_lb_listener.staging_lb_listener_http:
1372resource "aws_lb_listener" "staging_lb_listener_http" {
1373 [1m[0marn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:listener/net/staging-ingress-lb/2def290bba348759/9ad73962b3db3e0d"
1374 [1m[0mid[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:listener/net/staging-ingress-lb/2def290bba348759/9ad73962b3db3e0d"
1375 [1m[0mload_balancer_arn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:loadbalancer/net/staging-ingress-lb/2def290bba348759"
1376 [1m[0mport[0m[0m = 80
1377 [1m[0mprotocol[0m[0m = "TCP"
1378
1379 default_action {
1380 [1m[0morder[0m[0m = 1
1381 [1m[0mtarget_group_arn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-http/97907ef2a2f913a7"
1382 [1m[0mtype[0m[0m = "forward"
1383 }
1384}
1385
1386# aws_lb_listener.staging_lb_listener_https:
1387resource "aws_lb_listener" "staging_lb_listener_https" {
1388 [1m[0marn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:listener/net/staging-ingress-lb/2def290bba348759/25ae14ca1c459978"
1389 [1m[0mid[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:listener/net/staging-ingress-lb/2def290bba348759/25ae14ca1c459978"
1390 [1m[0mload_balancer_arn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:loadbalancer/net/staging-ingress-lb/2def290bba348759"
1391 [1m[0mport[0m[0m = 443
1392 [1m[0mprotocol[0m[0m = "TCP"
1393
1394 default_action {
1395 [1m[0morder[0m[0m = 1
1396 [1m[0mtarget_group_arn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-https/4cc10c108643eea8"
1397 [1m[0mtype[0m[0m = "forward"
1398 }
1399}
1400
1401# aws_lb_target_group.staging_lb_tg_http:
1402resource "aws_lb_target_group" "staging_lb_tg_http" {
1403 [1m[0marn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-http/97907ef2a2f913a7"
1404 [1m[0marn_suffix[0m[0m = "targetgroup/staging-target-group-http/97907ef2a2f913a7"
1405 [1m[0mderegistration_delay[0m[0m = 300
1406 [1m[0mid[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-http/97907ef2a2f913a7"
1407 [1m[0mlambda_multi_value_headers_enabled[0m[0m = false
1408 [1m[0mname[0m[0m = "staging-target-group-http"
1409 [1m[0mport[0m[0m = 30080
1410 [1m[0mprotocol[0m[0m = "TCP"
1411 [1m[0mproxy_protocol_v2[0m[0m = false
1412 [1m[0mslow_start[0m[0m = 0
1413 [1m[0mtags[0m[0m = {}
1414 [1m[0mtarget_type[0m[0m = "instance"
1415 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
1416
1417 health_check {
1418 [1m[0menabled[0m[0m = true
1419 [1m[0mhealthy_threshold[0m[0m = 3
1420 [1m[0minterval[0m[0m = 30
1421 [1m[0mport[0m[0m = "traffic-port"
1422 [1m[0mprotocol[0m[0m = "TCP"
1423 [1m[0mtimeout[0m[0m = 10
1424 [1m[0munhealthy_threshold[0m[0m = 3
1425 }
1426}
1427
1428# aws_lb_target_group.staging_lb_tg_https:
1429resource "aws_lb_target_group" "staging_lb_tg_https" {
1430 [1m[0marn[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-https/4cc10c108643eea8"
1431 [1m[0marn_suffix[0m[0m = "targetgroup/staging-target-group-https/4cc10c108643eea8"
1432 [1m[0mderegistration_delay[0m[0m = 300
1433 [1m[0mid[0m[0m = "arn:aws:elasticloadbalancing:eu-west-1:165419938431:targetgroup/staging-target-group-https/4cc10c108643eea8"
1434 [1m[0mlambda_multi_value_headers_enabled[0m[0m = false
1435 [1m[0mname[0m[0m = "staging-target-group-https"
1436 [1m[0mport[0m[0m = 30443
1437 [1m[0mprotocol[0m[0m = "TCP"
1438 [1m[0mproxy_protocol_v2[0m[0m = false
1439 [1m[0mslow_start[0m[0m = 0
1440 [1m[0mtags[0m[0m = {}
1441 [1m[0mtarget_type[0m[0m = "instance"
1442 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
1443
1444 health_check {
1445 [1m[0menabled[0m[0m = true
1446 [1m[0mhealthy_threshold[0m[0m = 3
1447 [1m[0minterval[0m[0m = 30
1448 [1m[0mport[0m[0m = "traffic-port"
1449 [1m[0mprotocol[0m[0m = "TCP"
1450 [1m[0mtimeout[0m[0m = 10
1451 [1m[0munhealthy_threshold[0m[0m = 3
1452 }
1453}
1454
1455# aws_route53_record.record_push_staging_aws_celduin_co_uk:
1456resource "aws_route53_record" "record_push_staging_aws_celduin_co_uk" {
1457 [1m[0mfqdn[0m[0m = "push.staging.aws.celduin.co.uk"
1458 [1m[0mid[0m[0m = "Z2P8ID3BEAARC3_push.staging.aws.celduin.co.uk_CNAME"
1459 [1m[0mname[0m[0m = "push.staging.aws.celduin.co.uk"
1460 [1m[0mrecords[0m[0m = [
1461 "staging-ingress-lb-2def290bba348759.elb.eu-west-1.amazonaws.com",
1462 ]
1463 [1m[0mttl[0m[0m = 300
1464 [1m[0mtype[0m[0m = "CNAME"
1465 [1m[0mzone_id[0m[0m = "Z2P8ID3BEAARC3"
1466}
1467
1468# aws_route53_record.record_staging_aws_celduin_co_uk:
1469resource "aws_route53_record" "record_staging_aws_celduin_co_uk" {
1470 [1m[0mfqdn[0m[0m = "staging.aws.celduin.co.uk"
1471 [1m[0mid[0m[0m = "Z2P8ID3BEAARC3_staging.aws.celduin.co.uk_CNAME"
1472 [1m[0mname[0m[0m = "staging.aws.celduin.co.uk"
1473 [1m[0mrecords[0m[0m = [
1474 "staging-ingress-lb-2def290bba348759.elb.eu-west-1.amazonaws.com",
1475 ]
1476 [1m[0mttl[0m[0m = 300
1477 [1m[0mtype[0m[0m = "CNAME"
1478 [1m[0mzone_id[0m[0m = "Z2P8ID3BEAARC3"
1479}
1480
1481# aws_route53_record.record_stats_staging_aws_celduin_co_uk:
1482resource "aws_route53_record" "record_stats_staging_aws_celduin_co_uk" {
1483 [1m[0mfqdn[0m[0m = "stats.staging.aws.celduin.co.uk"
1484 [1m[0mid[0m[0m = "Z2P8ID3BEAARC3_stats.staging.aws.celduin.co.uk_CNAME"
1485 [1m[0mname[0m[0m = "stats.staging.aws.celduin.co.uk"
1486 [1m[0mrecords[0m[0m = [
1487 "staging-ingress-lb-2def290bba348759.elb.eu-west-1.amazonaws.com",
1488 ]
1489 [1m[0mttl[0m[0m = 300
1490 [1m[0mtype[0m[0m = "CNAME"
1491 [1m[0mzone_id[0m[0m = "Z2P8ID3BEAARC3"
1492}
1493
1494# data.aws_route53_zone.hosted_zone_aws_celduin_co_uk:
1495data "aws_route53_zone" "hosted_zone_aws_celduin_co_uk" {
1496 [1m[0mcaller_reference[0m[0m = "terraform-20200225094903127300000001"
1497 [1m[0mcomment[0m[0m = "Managed by Terraform"
1498 [1m[0mid[0m[0m = "Z2P8ID3BEAARC3"
1499 [1m[0mname[0m[0m = "aws.celduin.co.uk."
1500 [1m[0mname_servers[0m[0m = [
1501 "ns-614.awsdns-12.net",
1502 "ns-1042.awsdns-02.org",
1503 "ns-133.awsdns-16.com",
1504 "ns-1742.awsdns-25.co.uk",
1505 ]
1506 [1m[0mprivate_zone[0m[0m = false
1507 [1m[0mresource_record_set_count[0m[0m = 8
1508 [1m[0mtags[0m[0m = {}
1509 [1m[0mzone_id[0m[0m = "Z2P8ID3BEAARC3"
1510}
1511
1512# data.aws_subnet_ids.all_subnets:
1513data "aws_subnet_ids" "all_subnets" {
1514 [1m[0mid[0m[0m = "vpc-368c8450"
1515 [1m[0mids[0m[0m = [
1516 "subnet-911f98cb",
1517 "subnet-925b1ef4",
1518 "subnet-b4ebbefc",
1519 ]
1520 [1m[0mvpc_id[0m[0m = "vpc-368c8450"
1521}
1522
1523# data.aws_vpc.default_vpc:
1524data "aws_vpc" "default_vpc" {
1525 [1m[0marn[0m[0m = "arn:aws:ec2:eu-west-1:165419938431:vpc/vpc-368c8450"
1526 [1m[0mcidr_block[0m[0m = "172.31.0.0/16"
1527 [1m[0mcidr_block_associations[0m[0m = [
1528 {
1529 association_id = "vpc-cidr-assoc-ec023287"
1530 cidr_block = "172.31.0.0/16"
1531 state = "associated"
1532 },
1533 ]
1534 [1m[0mdefault[0m[0m = true
1535 [1m[0mdhcp_options_id[0m[0m = "dopt-efc1ba89"
1536 [1m[0menable_dns_hostnames[0m[0m = true
1537 [1m[0menable_dns_support[0m[0m = true
1538 [1m[0mid[0m[0m = "vpc-368c8450"
1539 [1m[0minstance_tenancy[0m[0m = "default"
1540 [1m[0mmain_route_table_id[0m[0m = "rtb-596d5f20"
1541 [1m[0mowner_id[0m[0m = "165419938431"
1542 [1m[0mstate[0m[0m = "available"
1543 [1m[0mtags[0m[0m = {
1544 "kubernetes.io/cluster/k8-cluster-bb-experiments_0" = "shared"
1545 "kubernetes.io/cluster/k8-cluster-bb_experiments_0" = "shared"
1546 "kubernetes.io/cluster/k8-cluster-public" = "shared"
1547 "kubernetes.io/cluster/k8-cluster-staging" = "shared"
1548 }
1549}
1550
1551
1552Outputs:
1553
1554read_only_domain = "staging.aws.celduin.co.uk"
1555read_write_domain = "push.staging.aws.celduin.co.uk"
1556stats_domain = "stats.staging.aws.celduin.co.uk"[0m[0m