-
Notifications
You must be signed in to change notification settings - Fork 0
chore: update new custom AMI for dev environment #3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Ran Plan for project: Show Outputmodule.vpc.data.aws_availability_zones.available: Reading...
module.kms.data.aws_caller_identity.current: Reading...
module.kms.data.aws_caller_identity.current: Read complete after 0s [id=637423494924]
module.vpc.data.aws_availability_zones.available: Read complete after 0s [id=us-east-1]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
<= read (data resources)
Terraform will perform the following actions:
# module.bastion.data.aws_region.current will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_region" "current" {
+ description = (known after apply)
+ endpoint = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
}
# module.bastion.aws_instance.bastion_host will be created
+ resource "aws_instance" "bastion_host" {
+ ami = "ami-05576a079321f21f8"
+ arn = (known after apply)
+ associate_public_ip_address = (known after apply)
+ availability_zone = (known after apply)
+ cpu_core_count = (known after apply)
+ cpu_threads_per_core = (known after apply)
+ disable_api_stop = (known after apply)
+ disable_api_termination = (known after apply)
+ ebs_optimized = true
+ enable_primary_ipv6 = (known after apply)
+ get_password_data = false
+ host_id = (known after apply)
+ host_resource_group_arn = (known after apply)
+ iam_instance_profile = "devopslite_dev_ssm_instance_profile"
+ id = (known after apply)
+ instance_initiated_shutdown_behavior = (known after apply)
+ instance_lifecycle = (known after apply)
+ instance_state = (known after apply)
+ instance_type = "t3.medium"
+ ipv6_address_count = (known after apply)
+ ipv6_addresses = (known after apply)
+ key_name = (known after apply)
+ monitoring = (known after apply)
+ outpost_arn = (known after apply)
+ password_data = (known after apply)
+ placement_group = (known after apply)
+ placement_partition_number = (known after apply)
+ primary_network_interface_id = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ secondary_private_ips = (known after apply)
+ security_groups = (known after apply)
+ source_dest_check = true
+ spot_instance_request_id = (known after apply)
+ subnet_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-bastion-host"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-bastion-host"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tenancy = (known after apply)
+ user_data = (known after apply)
+ user_data_base64 = (known after apply)
+ user_data_replace_on_change = false
+ vpc_security_group_ids = (known after apply)
+ capacity_reservation_specification (known after apply)
+ cpu_options (known after apply)
+ ebs_block_device (known after apply)
+ enclave_options (known after apply)
+ ephemeral_block_device (known after apply)
+ instance_market_options (known after apply)
+ maintenance_options (known after apply)
+ metadata_options {
+ http_endpoint = "enabled"
+ http_protocol_ipv6 = "disabled"
+ http_put_response_hop_limit = (known after apply)
+ http_tokens = "required"
+ instance_metadata_tags = (known after apply)
}
+ network_interface (known after apply)
+ private_dns_name_options (known after apply)
+ root_block_device {
+ delete_on_termination = true
+ device_name = (known after apply)
+ encrypted = true
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ tags_all = (known after apply)
+ throughput = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
}
# module.bastion.aws_security_group.bastion_sg will be created
+ resource "aws_security_group" "bastion_sg" {
+ arn = (known after apply)
+ description = "Security group for bastion host"
+ egress = [
+ {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ description = "Allow all traffic to all destinations"
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "-1"
+ security_groups = []
+ self = false
+ to_port = 0
},
]
+ id = (known after apply)
+ ingress = [
+ {
+ cidr_blocks = [
+ "172.16.0.0/16",
]
+ description = "Allow SSH from VPC CIDR"
+ from_port = 22
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "tcp"
+ security_groups = []
+ self = false
+ to_port = 22
},
]
+ name = "devopslite-dev-bastion-sg"
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-bastion-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-bastion-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_id = (known after apply)
}
# module.ecr_be.aws_ecr_lifecycle_policy.policy_tagged will be created
+ resource "aws_ecr_lifecycle_policy" "policy_tagged" {
+ id = (known after apply)
+ policy = jsonencode(
{
+ rules = [
+ {
+ action = {
+ type = "expire"
}
+ description = "Keep last 7 images"
+ rulePriority = 2
+ selection = {
+ countNumber = 7
+ countType = "imageCountMoreThan"
+ tagPrefixList = [
+ "v",
]
+ tagStatus = "tagged"
}
},
]
}
)
+ registry_id = (known after apply)
+ repository = "devopslite-be"
}
# module.ecr_be.aws_ecr_lifecycle_policy.policy_untagged will be created
+ resource "aws_ecr_lifecycle_policy" "policy_untagged" {
+ id = (known after apply)
+ policy = jsonencode(
{
+ rules = [
+ {
+ action = {
+ type = "expire"
}
+ description = "Expire images older than 7 days"
+ rulePriority = 1
+ selection = {
+ countNumber = 7
+ countType = "sinceImagePushed"
+ countUnit = "days"
+ tagStatus = "untagged"
}
},
]
}
)
+ registry_id = (known after apply)
+ repository = "devopslite-be"
}
# module.ecr_be.aws_ecr_repository.repository will be created
+ resource "aws_ecr_repository" "repository" {
+ arn = (known after apply)
+ force_delete = true
+ id = (known after apply)
+ image_tag_mutability = "IMMUTABLE"
+ name = "devopslite-be"
+ registry_id = (known after apply)
+ repository_url = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-devopslite-be"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-devopslite-be"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ encryption_configuration {
+ encryption_type = "KMS"
+ kms_key = (known after apply)
}
+ image_scanning_configuration {
+ scan_on_push = true
}
}
# module.ecr_fe.aws_ecr_lifecycle_policy.policy_tagged will be created
+ resource "aws_ecr_lifecycle_policy" "policy_tagged" {
+ id = (known after apply)
+ policy = jsonencode(
{
+ rules = [
+ {
+ action = {
+ type = "expire"
}
+ description = "Keep last 7 images"
+ rulePriority = 2
+ selection = {
+ countNumber = 7
+ countType = "imageCountMoreThan"
+ tagPrefixList = [
+ "v",
]
+ tagStatus = "tagged"
}
},
]
}
)
+ registry_id = (known after apply)
+ repository = "devopslite-fe"
}
# module.ecr_fe.aws_ecr_lifecycle_policy.policy_untagged will be created
+ resource "aws_ecr_lifecycle_policy" "policy_untagged" {
+ id = (known after apply)
+ policy = jsonencode(
{
+ rules = [
+ {
+ action = {
+ type = "expire"
}
+ description = "Expire images older than 7 days"
+ rulePriority = 1
+ selection = {
+ countNumber = 7
+ countType = "sinceImagePushed"
+ countUnit = "days"
+ tagStatus = "untagged"
}
},
]
}
)
+ registry_id = (known after apply)
+ repository = "devopslite-fe"
}
# module.ecr_fe.aws_ecr_repository.repository will be created
+ resource "aws_ecr_repository" "repository" {
+ arn = (known after apply)
+ force_delete = true
+ id = (known after apply)
+ image_tag_mutability = "IMMUTABLE"
+ name = "devopslite-fe"
+ registry_id = (known after apply)
+ repository_url = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-devopslite-fe"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-devopslite-fe"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ encryption_configuration {
+ encryption_type = "KMS"
+ kms_key = (known after apply)
}
+ image_scanning_configuration {
+ scan_on_push = true
}
}
# module.eks.data.aws_caller_identity.current will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_caller_identity" "current" {
+ account_id = (known after apply)
+ arn = (known after apply)
+ id = (known after apply)
+ user_id = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEC2ContainerRegistryPullOnly will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEC2ContainerRegistryPullOnly" {
+ arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSBlockStoragePolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSBlockStoragePolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSBlockStoragePolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSClusterPolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSClusterPolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSComputePolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSComputePolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSComputePolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSLoadBalancingPolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSLoadBalancingPolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSLoadBalancingPolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSNetworkingPolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSNetworkingPolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSNetworkingPolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKSWorkerNodePolicy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKSWorkerNodePolicy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonEKS_CNI_Policy will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonEKS_CNI_Policy" {
+ arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy.AmazonSSMManagedInstanceCore will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_iam_policy" "AmazonSSMManagedInstanceCore" {
+ arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
+ attachment_count = (known after apply)
+ description = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ path = (known after apply)
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = (known after apply)
}
# module.eks.data.aws_iam_policy_document.eks_cluster_sa_assume_role_policy will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "eks_cluster_sa_assume_role_policy" {
+ id = (known after apply)
+ json = (known after apply)
+ minified_json = (known after apply)
+ statement {
+ actions = [
+ "sts:AssumeRoleWithWebIdentity",
]
+ effect = "Allow"
+ condition {
+ test = "StringEquals"
+ values = [
+ "system:serviceaccount:kube-system:aws-node",
]
+ variable = (known after apply)
}
+ principals {
+ identifiers = [
+ (known after apply),
]
+ type = "Federated"
}
}
}
# module.eks.data.aws_region.current will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_region" "current" {
+ description = (known after apply)
+ endpoint = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
}
# module.eks.data.tls_certificate.eks_cluster_sa_tls will be read during apply
# (config refers to values not yet known)
<= data "tls_certificate" "eks_cluster_sa_tls" {
+ certificates = (known after apply)
+ id = (known after apply)
+ url = (known after apply)
}
# module.eks.aws_eks_addon.addon_coredns will be created
+ resource "aws_eks_addon" "addon_coredns" {
+ addon_name = "coredns"
+ addon_version = "v1.11.4-eksbuild.2"
+ arn = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ configuration_values = (known after apply)
+ created_at = (known after apply)
+ id = (known after apply)
+ modified_at = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_eks_addon.addon_ebs_csi_driver will be created
+ resource "aws_eks_addon" "addon_ebs_csi_driver" {
+ addon_name = "aws-ebs-csi-driver"
+ addon_version = "v1.38.1-eksbuild.1"
+ arn = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ configuration_values = (known after apply)
+ created_at = (known after apply)
+ id = (known after apply)
+ modified_at = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_eks_addon.addon_kube_proxy will be created
+ resource "aws_eks_addon" "addon_kube_proxy" {
+ addon_name = "kube-proxy"
+ addon_version = "v1.31.3-eksbuild.2"
+ arn = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ configuration_values = (known after apply)
+ created_at = (known after apply)
+ id = (known after apply)
+ modified_at = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_eks_addon.addon_vpc_cni will be created
+ resource "aws_eks_addon" "addon_vpc_cni" {
+ addon_name = "vpc-cni"
+ addon_version = "v1.19.2-eksbuild.1"
+ arn = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ configuration_values = (known after apply)
+ created_at = (known after apply)
+ id = (known after apply)
+ modified_at = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_eks_cluster.eks_cluster will be created
+ resource "aws_eks_cluster" "eks_cluster" {
+ arn = (known after apply)
+ bootstrap_self_managed_addons = true
+ certificate_authority = (known after apply)
+ cluster_id = (known after apply)
+ created_at = (known after apply)
+ enabled_cluster_log_types = [
+ "api",
+ "audit",
+ "authenticator",
+ "controllerManager",
+ "scheduler",
]
+ endpoint = (known after apply)
+ id = (known after apply)
+ identity = (known after apply)
+ name = "devopslite-dev-eks-cluster"
+ platform_version = (known after apply)
+ role_arn = (known after apply)
+ status = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-cluster"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-cluster"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ version = "1.31"
+ access_config {
+ authentication_mode = "API_AND_CONFIG_MAP"
}
+ encryption_config {
+ resources = [
+ "secrets",
]
+ provider {
+ key_arn = (known after apply)
}
}
+ kubernetes_network_config (known after apply)
+ timeouts {
+ delete = "30m"
}
+ upgrade_policy (known after apply)
+ vpc_config {
+ cluster_security_group_id = (known after apply)
+ endpoint_private_access = true
+ endpoint_public_access = false
+ public_access_cidrs = (known after apply)
+ subnet_ids = (known after apply)
+ vpc_id = (known after apply)
}
}
# module.eks.aws_eks_node_group.eks_node_group will be created
+ resource "aws_eks_node_group" "eks_node_group" {
+ ami_type = (known after apply)
+ arn = (known after apply)
+ capacity_type = "ON_DEMAND"
+ cluster_name = "devopslite-dev-eks-cluster"
+ disk_size = (known after apply)
+ id = (known after apply)
+ instance_types = (known after apply)
+ node_group_name = "devopslite-dev-ng"
+ node_group_name_prefix = (known after apply)
+ node_role_arn = (known after apply)
+ release_version = (known after apply)
+ resources = (known after apply)
+ status = (known after apply)
+ subnet_ids = (known after apply)
+ tags_all = (known after apply)
+ version = (known after apply)
+ launch_template {
+ id = (known after apply)
+ name = (known after apply)
+ version = (known after apply)
}
+ node_repair_config (known after apply)
+ scaling_config {
+ desired_size = 6
+ max_size = 10
+ min_size = 6
}
+ update_config {
+ max_unavailable = 1
}
}
# module.eks.aws_iam_openid_connect_provider.eks_cluster_sa_oidc_provider will be created
+ resource "aws_iam_openid_connect_provider" "eks_cluster_sa_oidc_provider" {
+ arn = (known after apply)
+ client_id_list = [
+ "sts.amazonaws.com",
]
+ id = (known after apply)
+ tags_all = (known after apply)
+ thumbprint_list = (known after apply)
+ url = (known after apply)
}
# module.eks.aws_iam_policy.ebs_csi_driver_policy will be created
+ resource "aws_iam_policy" "ebs_csi_driver_policy" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ description = "IAM policy for EBS CSI driver"
+ id = (known after apply)
+ name = "devopslite_dev_ebs_csi_driver_policy"
+ name_prefix = (known after apply)
+ path = "/"
+ policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "ec2:AttachVolume",
+ "ec2:CreateSnapshot",
+ "ec2:CreateTags",
+ "ec2:CreateVolume",
+ "ec2:DeleteSnapshot",
+ "ec2:DeleteTags",
+ "ec2:DeleteVolume",
+ "ec2:DescribeAvailabilityZones",
+ "ec2:DescribeInstances",
+ "ec2:DescribeSnapshots",
+ "ec2:DescribeTags",
+ "ec2:DescribeVolumes",
+ "ec2:DetachVolume",
+ "ec2:ModifyVolume",
]
+ Effect = "Allow"
+ Resource = "*"
},
]
+ Version = "2012-10-17"
}
)
+ policy_id = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_iam_policy.eks_cluster_serviceaccount_vpc_cni_policy will be created
+ resource "aws_iam_policy" "eks_cluster_serviceaccount_vpc_cni_policy" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ id = (known after apply)
+ name = "devopslite_dev_EKSClusterServiceAccountVPCCniPolicy"
+ name_prefix = (known after apply)
+ path = "/"
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags_all = (known after apply)
}
# module.eks.aws_iam_role.ebs_csi_driver_role will be created
+ resource "aws_iam_role" "ebs_csi_driver_role" {
+ arn = (known after apply)
+ assume_role_policy = (known after apply)
+ create_date = (known after apply)
+ description = "IAM role for EBS CSI driver"
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "devopslite_dev_ebs_csi_driver_role"
+ name_prefix = (known after apply)
+ path = "/"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.eks.aws_iam_role.eks_cluster_role will be created
+ resource "aws_iam_role" "eks_cluster_role" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "sts:AssumeRole",
+ "sts:TagSession",
]
+ Effect = "Allow"
+ Principal = {
+ Service = "eks.amazonaws.com"
}
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ description Warning: Output length greater than max comment size. Continued in next comment. |
Continued plan output from previous comment. Show Output = "IAM role for EKS cluster"
+ force_detach_policies = true
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "devopslite_dev_eks_cluster_role"
+ name_prefix = (known after apply)
+ path = "/"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.eks.aws_iam_role.eks_cluster_serviceaccount_role will be created
+ resource "aws_iam_role" "eks_cluster_serviceaccount_role" {
+ arn = (known after apply)
+ assume_role_policy = (known after apply)
+ create_date = (known after apply)
+ description = "IAM role for EKS service account"
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "devopslite_dev_eks_serviceaccount_role"
+ name_prefix = (known after apply)
+ path = "/"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.eks.aws_iam_role.eks_node_group_role will be created
+ resource "aws_iam_role" "eks_node_group_role" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "ec2.amazonaws.com"
}
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ description = "IAM role for EKS node group"
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "devopslite_dev_eks_node_group_role"
+ name_prefix = (known after apply)
+ path = "/"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.eks.aws_iam_role_policy_attachment.ebs_csi_driver_policy_attachment will be created
+ resource "aws_iam_role_policy_attachment" "ebs_csi_driver_policy_attachment" {
+ id = (known after apply)
+ policy_arn = (known after apply)
+ role = "devopslite_dev_ebs_csi_driver_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSBlockStoragePolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_AmazonEKSBlockStoragePolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSBlockStoragePolicy"
+ role = "devopslite_dev_eks_cluster_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSClusterPolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_AmazonEKSClusterPolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
+ role = "devopslite_dev_eks_cluster_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSComputePolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_AmazonEKSComputePolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSComputePolicy"
+ role = "devopslite_dev_eks_cluster_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSLoadBalancingPolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_AmazonEKSLoadBalancingPolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSLoadBalancingPolicy"
+ role = "devopslite_dev_eks_cluster_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSNetworkingPolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_AmazonEKSNetworkingPolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSNetworkingPolicy"
+ role = "devopslite_dev_eks_cluster_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_cluster_serviceaccount_vpc_cni_policy_attachment will be created
+ resource "aws_iam_role_policy_attachment" "eks_cluster_serviceaccount_vpc_cni_policy_attachment" {
+ id = (known after apply)
+ policy_arn = (known after apply)
+ role = "devopslite_dev_eks_serviceaccount_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEC2ContainerRegistryPullOnly will be created
+ resource "aws_iam_role_policy_attachment" "eks_node_group_AmazonEC2ContainerRegistryPullOnly" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
+ role = "devopslite_dev_eks_node_group_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKSWorkerNodePolicy will be created
+ resource "aws_iam_role_policy_attachment" "eks_node_group_AmazonEKSWorkerNodePolicy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy"
+ role = "devopslite_dev_eks_node_group_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKS_CNI_Policy will be created
+ resource "aws_iam_role_policy_attachment" "eks_node_group_AmazonEKS_CNI_Policy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
+ role = "devopslite_dev_eks_node_group_role"
}
# module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonSSMManagedInstanceCore will be created
+ resource "aws_iam_role_policy_attachment" "eks_node_group_AmazonSSMManagedInstanceCore" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
+ role = "devopslite_dev_eks_node_group_role"
}
# module.eks.aws_launch_template.eks_node_group_launch_template will be created
+ resource "aws_launch_template" "eks_node_group_launch_template" {
+ arn = (known after apply)
+ default_version = (known after apply)
+ ebs_optimized = "true"
+ id = (known after apply)
+ image_id = "ami-08c2660b179aebe8e"
+ instance_type = "t3.medium"
+ latest_version = (known after apply)
+ name = (known after apply)
+ name_prefix = "devopslite-dev-eks-ng-"
+ tags_all = (known after apply)
+ update_default_version = true
+ user_data = (known after apply)
+ vpc_security_group_ids = (known after apply)
+ block_device_mappings {
+ device_name = "/dev/xvda"
+ ebs {
+ iops = (known after apply)
+ throughput = (known after apply)
+ volume_size = 20
+ volume_type = "gp3"
}
}
+ metadata_options {
+ http_endpoint = "enabled"
+ http_protocol_ipv6 = (known after apply)
+ http_put_response_hop_limit = 1
+ http_tokens = "required"
+ instance_metadata_tags = "enabled"
}
+ tag_specifications {
+ resource_type = "instance"
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-ng-node"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
}
}
# module.eks.aws_security_group.eks_node_sg will be created
+ resource "aws_security_group" "eks_node_sg" {
+ arn = (known after apply)
+ description = "Security group for EKS nodes"
+ egress = [
+ {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ description = "Allow all traffic to all destinations"
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "-1"
+ security_groups = []
+ self = false
+ to_port = 0
},
]
+ id = (known after apply)
+ ingress = [
+ {
+ cidr_blocks = [
+ "172.16.0.0/16",
]
+ description = "Allow all traffic from VPC CIDR"
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "-1"
+ security_groups = []
+ self = false
+ to_port = 0
},
+ {
+ cidr_blocks = []
+ description = "Allow traffic from EKS Control Plane SG"
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "tcp"
+ security_groups = (known after apply)
+ self = false
+ to_port = 65535
},
]
+ name = "devopslite-dev-eks-node-sg"
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-node-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-node-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_id = (known after apply)
}
# module.eks.aws_security_group_rule.eks_control_plane_bastion_ingress_rule will be created
+ resource "aws_security_group_rule" "eks_control_plane_bastion_ingress_rule" {
+ description = "Allow traffic from EKS node group to control plane"
+ from_port = 0
+ id = (known after apply)
+ protocol = "tcp"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.eks.aws_security_group_rule.eks_control_plane_ingress_rule will be created
+ resource "aws_security_group_rule" "eks_control_plane_ingress_rule" {
+ description = "Allow traffic from EKS node group to control plane"
+ from_port = 0
+ id = (known after apply)
+ protocol = "tcp"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.eks_access.data.aws_caller_identity.current will be read during apply
# (depends on a resource or a module with changes pending)
<= data "aws_caller_identity" "current" {
+ account_id = (known after apply)
+ arn = (known after apply)
+ id = (known after apply)
+ user_id = (known after apply)
}
# module.eks_access.aws_eks_access_entry.eks_access_entry will be created
+ resource "aws_eks_access_entry" "eks_access_entry" {
+ access_entry_arn = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ created_at = (known after apply)
+ id = (known after apply)
+ kubernetes_groups = [
+ "admin",
]
+ modified_at = (known after apply)
+ principal_arn = (known after apply)
+ tags_all = (known after apply)
+ type = "STANDARD"
+ user_name = (known after apply)
}
# module.eks_access.aws_eks_access_policy_association.eks_access_policy will be created
+ resource "aws_eks_access_policy_association" "eks_access_policy" {
+ associated_at = (known after apply)
+ cluster_name = "devopslite-dev-eks-cluster"
+ id = (known after apply)
+ modified_at = (known after apply)
+ policy_arn = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
+ principal_arn = (known after apply)
+ access_scope {
+ type = "cluster"
}
}
# module.kms.aws_kms_alias.kms_alias will be created
+ resource "aws_kms_alias" "kms_alias" {
+ arn = (known after apply)
+ id = (known after apply)
+ name = "alias/devopslite-dev-kms-key"
+ name_prefix = (known after apply)
+ target_key_arn = (known after apply)
+ target_key_id = (known after apply)
}
# module.kms.aws_kms_key.kms_key will be created
+ resource "aws_kms_key" "kms_key" {
+ arn = (known after apply)
+ bypass_policy_lockout_safety_check = false
+ customer_master_key_spec = "SYMMETRIC_DEFAULT"
+ deletion_window_in_days = 7
+ description = "KMS key used to encrypt data for all services in this demo"
+ enable_key_rotation = true
+ id = (known after apply)
+ is_enabled = true
+ key_id = (known after apply)
+ key_usage = "ENCRYPT_DECRYPT"
+ multi_region = (known after apply)
+ policy = (known after apply)
+ rotation_period_in_days = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-kms-key"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-kms-key"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
}
# module.kms.aws_kms_key_policy.kms_key_policy will be created
+ resource "aws_kms_key_policy" "kms_key_policy" {
+ bypass_policy_lockout_safety_check = false
+ id = (known after apply)
+ key_id = (known after apply)
+ policy = jsonencode(
{
+ Id = "key-default-1"
+ Statement = [
+ {
+ Action = "kms:*"
+ Effect = "Allow"
+ Principal = {
+ AWS = "arn:aws:iam::637423494924:root"
}
+ Resource = "*"
+ Sid = "Enable IAM User Permissions"
},
+ {
+ Action = [
+ "kms:ReplicateKey",
+ "kms:Create*",
+ "kms:Describe*",
+ "kms:Enable*",
+ "kms:List*",
+ "kms:Put*",
+ "kms:Update*",
+ "kms:Revoke*",
+ "kms:Disable*",
+ "kms:Get*",
+ "kms:Delete*",
+ "kms:ScheduleKeyDeletion",
+ "kms:CancelKeyDeletion",
]
+ Effect = "Allow"
+ Principal = {
+ AWS = "arn:aws:iam::637423494924:user/cloud_user"
}
+ Resource = "*"
+ Sid = "Allow administration of the key"
},
+ {
+ Action = [
+ "kms:DescribeKey",
+ "kms:Encrypt",
+ "kms:Decrypt",
+ "kms:ReEncrypt*",
+ "kms:GenerateDataKey",
+ "kms:GenerateDataKeyWithoutPlaintext",
]
+ Effect = "Allow"
+ Principal = {
+ AWS = "arn:aws:iam::637423494924:user/cloud_user"
+ Service = [
+ "ec2.amazonaws.com",
+ "ecr.amazonaws.com",
+ "eks.amazonaws.com",
+ "logs.amazonaws.com",
+ "vpc-flow-logs.amazonaws.com",
+ "waf.amazonaws.com",
+ "waf-regional.amazonaws.com",
]
}
+ Resource = "*"
+ Sid = "Allow use of the key"
},
]
+ Version = "2012-10-17"
}
)
}
# module.ssm.aws_iam_instance_profile.ssm_instance_profile will be created
+ resource "aws_iam_instance_profile" "ssm_instance_profile" {
+ arn = (known after apply)
+ create_date = (known after apply)
+ id = (known after apply)
+ name = "devopslite_dev_ssm_instance_profile"
+ name_prefix = (known after apply)
+ path = "/"
+ role = "devopslite_dev_ssm_role"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
}
# module.ssm.aws_iam_role.ssm_role will be created
+ resource "aws_iam_role" "ssm_role" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "ec2.amazonaws.com"
}
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ description = "IAM role for SSM"
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "devopslite_dev_ssm_role"
+ name_prefix = (known after apply)
+ path = "/"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.ssm.aws_iam_role_policy_attachment.ssm_policy_attachment will be created
+ resource "aws_iam_role_policy_attachment" "ssm_policy_attachment" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
+ role = "devopslite_dev_ssm_role"
}
# module.vpc.aws_default_security_group.default_sg will be created
+ resource "aws_default_security_group" "default_sg" {
+ arn = (known after apply)
+ description = (known after apply)
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags_all = (known after apply)
+ vpc_id = (known after apply)
}
# module.vpc.aws_eip.eip_nat_gw will be created
+ resource "aws_eip" "eip_nat_gw" {
+ allocation_id = (known after apply)
+ arn = (known after apply)
+ association_id = (known after apply)
+ carrier_ip = (known after apply)
+ customer_owned_ip = (known after apply)
+ domain = "vpc"
+ id = (known after apply)
+ instance = (known after apply)
+ ipam_pool_id = (known after apply)
+ network_border_group = (known after apply)
+ network_interface = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ ptr_record = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ public_ipv4_pool = "amazon"
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eip-nat-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eip-nat-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc = (known after apply)
}
# module.vpc.aws_internet_gateway.internet_gw will be created
+ resource "aws_internet_gateway" "internet_gw" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_nat_gateway.nat_gw will be created
+ resource "aws_nat_gateway" "nat_gw" {
+ allocation_id = (known after apply)
+ association_id = (known after apply)
+ connectivity_type = "public"
+ id = (known after apply)
+ network_interface_id = (known after apply)
+ private_ip = (known after apply)
+ public_ip = (known after apply)
+ secondary_private_ip_address_count = (known after apply)
+ secondary_private_ip_addresses = (known after apply)
+ subnet_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-nat-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-nat-gw"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
}
# module.vpc.aws_route_table.private_route_table will be created
+ resource "aws_route_table" "private_route_table" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ propagating_vgws = (known after apply)
+ route = [
+ {
+ cidr_block = "0.0.0.0/0"
+ gateway_id = (known after apply)
# (11 unchanged attributes hidden)
},
]
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-rtb"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-rtb"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_route_table.public_route_table will be created
+ resource "aws_route_table" "public_route_table" {
+ arn = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ propagating_vgws = (known after apply)
+ route = [
+ {
+ cidr_block = "0.0.0.0/0"
+ gateway_id = (known after apply)
# (11 unchanged attributes hidden)
},
]
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-rtb"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-rtb"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_private[0] will be created
+ resource "aws_route_table_association" "route_association_private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_private[1] will be created
+ resource "aws_route_table_association" "route_association_private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_private[2] will be created
+ resource "aws_route_table_association" "route_association_private" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_public[0] will be created
+ resource "aws_route_table_association" "route_association_public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_public[1] will be created
+ resource "aws_route_table_association" "route_association_public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_route_table_association.route_association_public[2] will be created
+ resource "aws_route_table_association" "route_association_public" {
+ id = (known after apply)
+ route_table_id = (known after apply)
+ subnet_id = (known after apply)
}
# module.vpc.aws_subnet.private_subnet[0] will be created
+ resource "aws_subnet" "private_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1a"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.10.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-0"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-0"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_subnet.private_subnet[1] will be created
+ resource "aws_subnet" "private_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1b"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.20.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-1"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-1"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_subnet.private_subnet[2] will be created
+ resource "aws_subnet" "private_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1c"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.30.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-2"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-private-2"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "private"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_subnet.public_subnet[0] will be created
+ resource "aws_subnet" "public_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1a"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.1.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-0"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-0"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_subnet.public_subnet[1] will be created
+ resource "aws_subnet" "public_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1b"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.2.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-1"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-1"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_subnet.public_subnet[2] will be created
+ resource "aws_subnet" "public_subnet" {
+ arn = (known after apply)
+ assign_ipv6_address_on_creation = false
+ availability_zone = "us-east-1c"
+ availability_zone_id = (known after apply)
+ cidr_block = "172.16.3.0/24"
+ enable_dns64 = false
+ enable_resource_name_dns_a_record_on_launch = false
+ enable_resource_name_dns_aaaa_record_on_launch = false
+ id = (known after apply)
+ ipv6_cidr_block_association_id = (known after apply)
+ ipv6_native = false
+ map_public_ip_on_launch = false
+ owner_id = (known after apply)
+ private_dns_hostname_type_on_launch = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-2"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-public-2"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
+ "State" = "public"
+ "VPC" = "devopslite-dev"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_vpc.vpc will be created
+ resource "aws_vpc" "vpc" {
+ arn = (known after apply)
+ cidr_block = "172.16.0.0/16"
+ default_network_acl_id = (known after apply)
+ default_route_table_id = (known after apply)
+ default_security_group_id = (known after apply)
+ dhcp_options_id = (known after apply)
+ enable_dns_hostnames = true
+ enable_dns_support = true
+ enable_network_address_usage_metrics = (known after apply)
+ id = (known after apply)
+ instance_tenancy = "default"
+ ipv6_association_id = (known after apply)
+ ipv6_cidr_block = (known after apply)
+ ipv6_cidr_block_network_border_group = (known after apply)
+ main_route_table_id = (known after apply)
+ owner_id = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-vpc"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-vpc"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
}
# module.vpc_endpoint.aws_security_group.vpc_endpoint_sg will be created
+ resource "aws_security_group" "vpc_endpoint_sg" {
+ arn = (known after apply)
+ description = "Security Group for VPC Endpoints"
+ egress = [
+ {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ description = "Allow all traffic to all destinations"
+ from_port = 443
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "tcp"
+ security_groups = []
+ self = false
+ to_port = 443
},
]
+ id = (known after apply)
+ ingress = [
+ {
+ cidr_blocks = [
+ "172.16.0.0/16",
]
+ description = "Allow all traffic to VPC Endpoint"
+ from_port = 443
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "tcp"
+ security_groups = []
+ self = false
+ to_port = 443
},
]
+ name = "devopslite-dev-vpc-endpoint-sg"
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-vpc-endpoint-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-vpc-endpoint-sg"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_id = (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ec2 will be created
+ resource "aws_vpc_endpoint" "ec2" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ec2"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ec2-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ec2-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ec2messages will be created
+ resource "aws_vpc_endpoint" "ec2messages" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ec2messages"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ec2messages-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ec2messages-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ecr_api will be created
+ resource "aws_vpc_endpoint" "ecr_api" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ecr.api"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ecr-api-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ecr-api-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr will be created
+ resource "aws_vpc_endpoint" "ecr_dkr" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ecr.dkr"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ecr-dkr-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ecr-dkr-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.eks will be created
+ resource "aws_vpc_endpoint" "eks" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.eks"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.eks_auth will be created
+ resource "aws_vpc_endpoint" "eks_auth" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.eks-auth"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-auth-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-eks-auth-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.elb will be created
+ resource "aws_vpc_endpoint" "elb" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.elasticloadbalancing"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-elb-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-elb-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.kms will be created
+ resource "aws_vpc_endpoint" "kms" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.kms"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-kms-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-kms-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.logs will be created
+ resource "aws_vpc_endpoint" "logs" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.logs"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-logs-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-logs-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.s3 will be created
+ resource "aws_vpc_endpoint" "s3" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = (known after apply)
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.s3"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-s3-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-s3-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Gateway"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ssm will be created
+ resource "aws_vpc_endpoint" "ssm" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ssm"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ssm-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ssm-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.ssmmessages will be created
+ resource "aws_vpc_endpoint" "ssmmessages" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.ssmmessages"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ssmmessages-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-ssmmessages-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
# module.vpc_endpoint.aws_vpc_endpoint.sts will be created
+ resource "aws_vpc_endpoint" "sts" {
+ arn = (known after apply)
+ cidr_blocks = (known after apply)
+ dns_entry = (known after apply)
+ id = (known after apply)
+ ip_address_type = (known after apply)
+ network_interface_ids = (known after apply)
+ owner_id = (known after apply)
+ policy = (known after apply)
+ prefix_list_id = (known after apply)
+ private_dns_enabled = true
+ requester_managed = (known after apply)
+ route_table_ids = (known after apply)
+ security_group_ids = (known after apply)
+ service_name = "com.amazonaws.us-east-1.sts"
+ service_region = (known after apply)
+ state = (known after apply)
+ subnet_ids = (known after apply)
+ tags = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-sts-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ tags_all = {
+ "Environment" = "dev"
+ "Name" = "devopslite-dev-sts-vpc-endpoint"
+ "Project" = "devopslite"
+ "Provisioner" = "terraform"
}
+ vpc_endpoint_type = "Interface"
+ vpc_id = (known after apply)
+ dns_options (known after apply)
+ subnet_configuration (known after apply)
}
Plan: 77 to add, 0 to change, 0 to destroy.
Changes to Outputs:
+ eks_cluster_endpoint = (known after apply)
+ eks_cluster_id = (known after apply)
+ eks_cluster_oidc_issuer_url = (known after apply)
+ eks_cluster_security_group_id = (known after apply)
+ eks_cluster_serviceaccount_role_arn = (known after apply)
+ eks_node_group_arn = (known after apply)
+ eks_node_group_role_arn = (known after apply)
Plan: 77 to add, 0 to change, 0 to destroy.
|
atlantis apply -p dev |
Ran Apply for project: Show Outputmodule.vpc.aws_vpc.vpc: Creating...
module.kms.aws_kms_key.kms_key: Creating...
module.ssm.aws_iam_role.ssm_role: Creating...
module.vpc.aws_eip.eip_nat_gw: Creating...
module.ssm.aws_iam_role.ssm_role: Creation complete after 0s [id=devopslite_dev_ssm_role]
module.ssm.aws_iam_role_policy_attachment.ssm_policy_attachment: Creating...
module.ssm.aws_iam_instance_profile.ssm_instance_profile: Creating...
module.ssm.aws_iam_role_policy_attachment.ssm_policy_attachment: Creation complete after 0s [id=devopslite_dev_ssm_role-20250117030512149200000001]
module.vpc.aws_eip.eip_nat_gw: Creation complete after 0s [id=eipalloc-051c96f0e085c47cb]
module.ssm.aws_iam_instance_profile.ssm_instance_profile: Creation complete after 6s [id=devopslite_dev_ssm_instance_profile]
module.kms.aws_kms_key.kms_key: Creation complete after 9s [id=33d3d612-1dc5-4f49-afad-5427923ae0e3]
module.kms.aws_kms_alias.kms_alias: Creating...
module.kms.aws_kms_key_policy.kms_key_policy: Creating...
module.kms.aws_kms_alias.kms_alias: Creation complete after 0s [id=alias/devopslite-dev-kms-key]
module.vpc.aws_vpc.vpc: Still creating... [10s elapsed]
module.vpc.aws_vpc.vpc: Creation complete after 11s [id=vpc-09df7dd3974660e0b]
module.vpc.aws_internet_gateway.internet_gw: Creating...
module.vpc.aws_subnet.private_subnet[0]: Creating...
module.vpc.aws_subnet.private_subnet[2]: Creating...
module.vpc.aws_subnet.public_subnet[1]: Creating...
module.vpc.aws_subnet.public_subnet[0]: Creating...
module.vpc.aws_subnet.private_subnet[1]: Creating...
module.vpc.aws_default_security_group.default_sg: Creating...
module.vpc.aws_subnet.public_subnet[2]: Creating...
module.vpc.aws_internet_gateway.internet_gw: Creation complete after 1s [id=igw-071866fa4b4fb8570]
module.vpc.aws_route_table.public_route_table: Creating...
module.vpc.aws_subnet.private_subnet[1]: Creation complete after 1s [id=subnet-001e011d4b77aa919]
module.vpc.aws_subnet.private_subnet[2]: Creation complete after 1s [id=subnet-0c6d49944d2645d08]
module.vpc.aws_subnet.public_subnet[0]: Creation complete after 1s [id=subnet-008ce03f5fad97339]
module.vpc.aws_nat_gateway.nat_gw: Creating...
module.vpc.aws_subnet.public_subnet[1]: Creation complete after 1s [id=subnet-0fcd8fdc867a22b08]
module.vpc.aws_subnet.private_subnet[0]: Creation complete after 1s [id=subnet-0dc7e4898c0126dea]
module.vpc.aws_subnet.public_subnet[2]: Creation complete after 1s [id=subnet-0d69da514d823e06f]
module.vpc.aws_route_table.public_route_table: Creation complete after 1s [id=rtb-0991c016e00802345]
module.vpc.aws_route_table_association.route_association_public[2]: Creating...
module.vpc.aws_route_table_association.route_association_public[1]: Creating...
module.vpc.aws_route_table_association.route_association_public[0]: Creating...
module.vpc.aws_default_security_group.default_sg: Creation complete after 2s [id=sg-096da745c735855c3]
module.vpc.aws_route_table_association.route_association_public[0]: Creation complete after 0s [id=rtbassoc-033bcbbd3b9951091]
module.vpc.aws_route_table_association.route_association_public[2]: Creation complete after 0s [id=rtbassoc-0255f884c64271d20]
module.vpc.aws_route_table_association.route_association_public[1]: Creation complete after 0s [id=rtbassoc-01669cb999678d34c]
module.kms.aws_kms_key_policy.kms_key_policy: Creation complete after 4s [id=33d3d612-1dc5-4f49-afad-5427923ae0e3]
module.ecr_be.aws_ecr_repository.repository: Creating...
module.ecr_fe.aws_ecr_repository.repository: Creating...
module.ecr_be.aws_ecr_repository.repository: Creation complete after 1s [id=devopslite-be]
module.ecr_be.aws_ecr_lifecycle_policy.policy_tagged: Creating...
module.ecr_be.aws_ecr_lifecycle_policy.policy_untagged: Creating...
module.ecr_fe.aws_ecr_repository.repository: Creation complete after 1s [id=devopslite-fe]
module.ecr_fe.aws_ecr_lifecycle_policy.policy_tagged: Creating...
module.ecr_fe.aws_ecr_lifecycle_policy.policy_untagged: Creating...
module.ecr_be.aws_ecr_lifecycle_policy.policy_tagged: Creation complete after 0s [id=devopslite-be]
module.ecr_fe.aws_ecr_lifecycle_policy.policy_tagged: Creation complete after 0s [id=devopslite-fe]
module.ecr_fe.aws_ecr_lifecycle_policy.policy_untagged: Creation complete after 0s [id=devopslite-fe]
module.ecr_be.aws_ecr_lifecycle_policy.policy_untagged: Creation complete after 0s [id=devopslite-be]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [10s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [20s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [30s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [40s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [50s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m0s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m10s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m20s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m30s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m40s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [1m50s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [2m0s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Still creating... [2m10s elapsed]
module.vpc.aws_nat_gateway.nat_gw: Creation complete after 2m14s [id=nat-0799ccd5caa3e3d7a]
module.vpc.aws_route_table.private_route_table: Creating...
module.vpc.aws_route_table.private_route_table: Creation complete after 1s [id=rtb-00416f84998f6d2f2]
module.vpc.aws_route_table_association.route_association_private[0]: Creating...
module.vpc.aws_route_table_association.route_association_private[2]: Creating...
module.vpc.aws_route_table_association.route_association_private[1]: Creating...
module.vpc.aws_route_table_association.route_association_private[1]: Creation complete after 1s [id=rtbassoc-08be7d78e493ade4a]
module.vpc.aws_route_table_association.route_association_private[0]: Creation complete after 1s [id=rtbassoc-0497eb91f1ba9d676]
module.vpc.aws_route_table_association.route_association_private[2]: Creation complete after 1s [id=rtbassoc-0a866b0b0f1916bf2]
module.bastion.data.aws_region.current: Reading...
module.bastion.data.aws_region.current: Read complete after 0s [id=us-east-1]
module.vpc_endpoint.aws_security_group.vpc_endpoint_sg: Creating...
module.bastion.aws_security_group.bastion_sg: Creating...
module.vpc_endpoint.aws_vpc_endpoint.s3: Creating...
module.vpc_endpoint.aws_security_group.vpc_endpoint_sg: Creation complete after 2s [id=sg-095046b1dda077d5d]
module.vpc_endpoint.aws_vpc_endpoint.ec2: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Creating...
module.bastion.aws_security_group.bastion_sg: Creation complete after 2s [id=sg-053ff065ba2fbd7c9]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ssm: Creating...
module.vpc_endpoint.aws_vpc_endpoint.elb: Creating...
module.vpc_endpoint.aws_vpc_endpoint.sts: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Creating...
module.vpc_endpoint.aws_vpc_endpoint.kms: Creating...
module.vpc_endpoint.aws_vpc_endpoint.logs: Creating...
module.vpc_endpoint.aws_vpc_endpoint.s3: Creation complete after 6s [id=vpce-08943e231a214386c]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ec2: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.elb: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.sts: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.kms: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.logs: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.elb: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.sts: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.kms: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.logs: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.elb: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.sts: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.kms: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.logs: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.elb: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.sts: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.kms: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.logs: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.elb: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.sts: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.kms: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.logs: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssm: Creation complete after 53s [id=vpce-02259be605fc8c666]
module.vpc_endpoint.aws_vpc_endpoint.sts: Creation complete after 53s [id=vpce-03f9959a7abb8ebbb]
module.vpc_endpoint.aws_vpc_endpoint.eks: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Creating...
module.vpc_endpoint.aws_vpc_endpoint.logs: Creation complete after 53s [id=vpce-0366e31f92f650671]
module.vpc_endpoint.aws_vpc_endpoint.ec2messages: Creation complete after 53s [id=vpce-0cacf56f734d7cf6f]
module.bastion.aws_instance.bastion_host: Creating...
module.vpc_endpoint.aws_vpc_endpoint.ec2: Creation complete after 53s [id=vpce-0f2f43025b50018d6]
module.vpc_endpoint.aws_vpc_endpoint.kms: Creation complete after 53s [id=vpce-06b21aa478d711efc]
module.vpc_endpoint.aws_vpc_endpoint.elb: Creation complete after 53s [id=vpce-0542bb29d941a3ee6]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks_auth: Creation complete after 56s [id=vpce-0ae7e4266c0e715b6]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Still creating... [1m0s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Still creating... [1m0s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Still creating... [10s elapsed]
module.bastion.aws_instance.bastion_host: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ssmmessages: Creation complete after 1m3s [id=vpce-03e666d28a4bed030]
module.vpc_endpoint.aws_vpc_endpoint.ecr_dkr: Creation complete after 1m3s [id=vpce-0c721274612826465]
module.bastion.aws_instance.bastion_host: Creation complete after 12s [id=i-04767e1af4c1a088a]
module.eks.data.aws_iam_policy.AmazonEC2ContainerRegistryPullOnly: Reading...
module.eks.data.aws_iam_policy.AmazonEKSLoadBalancingPolicy: Reading...
module.eks.data.aws_iam_policy.AmazonEKS_CNI_Policy: Reading...
module.eks.data.aws_iam_policy.AmazonEKSClusterPolicy: Reading...
module.eks.data.aws_iam_policy.AmazonEKSWorkerNodePolicy: Reading...
module.eks.data.aws_iam_policy.AmazonSSMManagedInstanceCore: Reading...
module.eks.data.aws_region.current: Reading...
module.eks.data.aws_iam_policy.AmazonEKSNetworkingPolicy: Reading...
module.eks.data.aws_region.current: Read complete after 0s [id=us-east-1]
module.eks.data.aws_iam_policy.AmazonEKSComputePolicy: Reading...
module.eks.data.aws_iam_policy.AmazonEKS_CNI_Policy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy]
module.eks.data.aws_caller_identity.current: Reading...
module.eks.data.aws_iam_policy.AmazonEC2ContainerRegistryPullOnly: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryPullOnly]
module.eks.data.aws_iam_policy.AmazonEKSNetworkingPolicy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKSNetworkingPolicy]
module.eks.data.aws_iam_policy.AmazonEKSLoadBalancingPolicy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKSLoadBalancingPolicy]
module.eks.aws_iam_policy.ebs_csi_driver_policy: Creating...
module.eks.data.aws_iam_policy.AmazonEKSClusterPolicy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKSClusterPolicy]
module.eks.aws_iam_role.eks_cluster_role: Creating...
module.eks.aws_iam_role.eks_node_group_role: Creating...
module.eks.data.aws_iam_policy.AmazonEKSBlockStoragePolicy: Reading...
module.eks.data.aws_iam_policy.AmazonEKSComputePolicy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKSComputePolicy]
module.eks.data.aws_caller_identity.current: Read complete after 0s [id=637423494924]
module.eks.data.aws_iam_policy.AmazonSSMManagedInstanceCore: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore]
module.eks.aws_iam_policy.eks_cluster_serviceaccount_vpc_cni_policy: Creating...
module.eks.data.aws_iam_policy.AmazonEKSWorkerNodePolicy: Read complete after 0s [id=arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy]
module.eks.aws_iam_policy.eks_cluster_serviceaccount_vpc_cni_policy: Creation complete after 1s [id=arn:aws:iam::637423494924:policy/devopslite_dev_EKSClusterServiceAccountVPCCniPolicy]
module.eks.aws_iam_policy.ebs_csi_driver_policy: Creation complete after 1s [id=arn:aws:iam::637423494924:policy/devopslite_dev_ebs_csi_driver_policy]
module.eks.data.aws_iam_policy.AmazonEKSBlockStoragePolicy: Read complete after 1s [id=arn:aws:iam::aws:policy/AmazonEKSBlockStoragePolicy]
module.eks.aws_iam_role.eks_cluster_role: Creation complete after 1s [id=devopslite_dev_eks_cluster_role]
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSComputePolicy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSClusterPolicy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSBlockStoragePolicy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSLoadBalancingPolicy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSNetworkingPolicy: Creating...
module.eks.aws_iam_role.eks_node_group_role: Creation complete after 1s [id=devopslite_dev_eks_node_group_role]
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKSWorkerNodePolicy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKS_CNI_Policy: Creating...
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonSSMManagedInstanceCore: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSComputePolicy: Creation complete after 0s [id=devopslite_dev_eks_cluster_role-20250117030847717900000013]
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEC2ContainerRegistryPullOnly: Creating...
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSNetworkingPolicy: Creation complete after 0s [id=devopslite_dev_eks_cluster_role-20250117030847726000000014]
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSClusterPolicy: Creation complete after 0s [id=devopslite_dev_eks_cluster_role-20250117030847726600000015]
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSLoadBalancingPolicy: Creation complete after 0s [id=devopslite_dev_eks_cluster_role-20250117030847731500000016]
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonSSMManagedInstanceCore: Creation complete after 0s [id=devopslite_dev_eks_node_group_role-20250117030847740900000017]
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKSWorkerNodePolicy: Creation complete after 0s [id=devopslite_dev_eks_node_group_role-20250117030847757900000018]
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEKS_CNI_Policy: Creation complete after 0s [id=devopslite_dev_eks_node_group_role-2025011703084777870000001a]
module.eks.aws_iam_role_policy_attachment.eks_cluster_AmazonEKSBlockStoragePolicy: Creation complete after 0s [id=devopslite_dev_eks_cluster_role-20250117030847769800000019]
module.eks.aws_eks_cluster.eks_cluster: Creating...
module.eks.aws_iam_role_policy_attachment.eks_node_group_AmazonEC2ContainerRegistryPullOnly: Creation complete after 0s [id=devopslite_dev_eks_node_group_role-2025011703084781180000001b]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Still creating... [20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [10s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Still creating... [30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [20s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Still creating... [40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [30s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Still creating... [50s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.ecr_api: Creation complete after 52s [id=vpce-0e30deddc7bdd7308]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [40s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Still creating... [1m0s elapsed]
module.vpc_endpoint.aws_vpc_endpoint.eks: Creation complete after 1m2s [id=vpce-001db67eb824a89e0]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [1m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [2m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [3m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [4m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [5m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [6m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [7m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [8m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m30s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m40s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [9m50s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [10m0s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [10m10s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Still creating... [10m20s elapsed]
module.eks.aws_eks_cluster.eks_cluster: Creation complete after 10m24s [id=devopslite-dev-eks-cluster]
module.eks.data.tls_certificate.eks_cluster_sa_tls: Reading...
module.eks.aws_security_group_rule.eks_control_plane_bastion_ingress_rule: Creating...
module.eks.aws_security_group.eks_node_sg: Creating...
module.eks.data.tls_certificate.eks_cluster_sa_tls: Read complete after 0s [id=99d41e43229a4cdaf4141f3e8310e6d95c31dab9]
module.eks.aws_iam_openid_connect_provider.eks_cluster_sa_oidc_provider: Creating...
module.eks.aws_iam_openid_connect_provider.eks_cluster_sa_oidc_provider: Creation complete after 0s [id=arn:aws:iam::637423494924:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/6BB7DF1B4850EF2999FDB8F43FEE12F4]
module.eks.data.aws_iam_policy_document.eks_cluster_sa_assume_role_policy: Reading...
module.eks.data.aws_iam_policy_document.eks_cluster_sa_assume_role_policy: Read complete after 0s [id=2013176627]
module.eks.aws_iam_role.ebs_csi_driver_role: Creating...
module.eks.aws_iam_role.eks_cluster_serviceaccount_role: Creating...
module.eks.aws_iam_role.ebs_csi_driver_role: Creation complete after 0s [id=devopslite_dev_ebs_csi_driver_role]
module.eks.aws_iam_role_policy_attachment.ebs_csi_driver_policy_attachment: Creating...
module.eks.aws_iam_role.eks_cluster_serviceaccount_role: Creation complete after 0s [id=devopslite_dev_eks_serviceaccount_role]
module.eks.aws_iam_role_policy_attachment.eks_cluster_serviceaccount_vpc_cni_policy_attachment: Creating...
module.eks.aws_iam_role_policy_attachment.ebs_csi_driver_policy_attachment: Creation complete after 0s [id=devopslite_dev_ebs_csi_driver_role-2025011703191310440000001c]
module.eks.aws_iam_role_policy_attachment.eks_cluster_serviceaccount_vpc_cni_policy_attachment: Creation complete after 0s [id=devopslite_dev_eks_serviceaccount_role-2025011703191319060000001d]
module.eks.aws_security_group_rule.eks_control_plane_bastion_ingress_rule: Creation complete after 0s [id=sgrule-4129115252]
module.eks.aws_security_group.eks_node_sg: Creation complete after 2s [id=sg-07fc31cdfd1804a8e]
module.eks.aws_security_group_rule.eks_control_plane_ingress_rule: Creating...
module.eks.aws_launch_template.eks_node_group_launch_template: Creating...
module.eks.aws_security_group_rule.eks_control_plane_ingress_rule: Creation complete after 1s [id=sgrule-4256117672]
module.eks.aws_launch_template.eks_node_group_launch_template: Creation complete after 6s [id=lt-0791d711e8fb27c28]
module.eks.aws_eks_node_group.eks_node_group: Creating...
module.eks.aws_eks_node_group.eks_node_group: Still creating... [10s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [20s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [30s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [40s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [50s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m0s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m10s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m20s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m30s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m40s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [1m50s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m0s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m10s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m20s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m30s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m40s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [2m50s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [3m0s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [3m10s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [3m20s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Still creating... [3m30s elapsed]
module.eks.aws_eks_node_group.eks_node_group: Creation complete after 3m38s [id=devopslite-dev-eks-cluster:devopslite-dev-ng]
module.eks.aws_eks_addon.addon_kube_proxy: Creating...
module.eks.aws_eks_addon.addon_vpc_cni: Creating...
module.eks.aws_eks_addon.addon_coredns: Creating...
module.eks.aws_eks_addon.addon_ebs_csi_driver: Creating...
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [10s elapsed]
module.eks.aws_eks_addon.addon_kube_proxy: Still creating... [10s elapsed]
module.eks.aws_eks_addon.addon_coredns: Still creating... [10s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Still creating... [10s elapsed]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [20s elapsed]
module.eks.aws_eks_addon.addon_kube_proxy: Still creating... [20s elapsed]
module.eks.aws_eks_addon.addon_coredns: Still creating... [20s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Still creating... [20s elapsed]
module.eks.aws_eks_addon.addon_coredns: Creation complete after 25s [id=devopslite-dev-eks-cluster:coredns]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [30s elapsed]
module.eks.aws_eks_addon.addon_kube_proxy: Still creating... [30s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Still creating... [30s elapsed]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [40s elapsed]
module.eks.aws_eks_addon.addon_kube_proxy: Still creating... [40s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Still creating... [40s elapsed]
module.eks.aws_eks_addon.addon_kube_proxy: Creation complete after 45s [id=devopslite-dev-eks-cluster:kube-proxy]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [50s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Still creating... [50s elapsed]
module.eks.aws_eks_addon.addon_ebs_csi_driver: Creation complete after 55s [id=devopslite-dev-eks-cluster:aws-ebs-csi-driver]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [1m0s elapsed]
module.eks.aws_eks_addon.addon_vpc_cni: Still creating... [1m10s elapsed]
module.eks.aws_eks_addon.addon_vpc_cni: Creation complete after 1m15s [id=devopslite-dev-eks-cluster:vpc-cni]
module.eks_access.data.aws_caller_identity.current: Reading...
module.eks_access.data.aws_caller_identity.current: Read complete after 0s [id=637423494924]
module.eks_access.aws_eks_access_policy_association.eks_access_policy: Creating...
module.eks_access.aws_eks_access_entry.eks_access_entry: Creating...
module.eks_access.aws_eks_access_entry.eks_access_entry: Creation complete after 1s [id=devopslite-dev-eks-cluster:arn:aws:iam::637423494924:root]
module.eks_access.aws_eks_access_policy_association.eks_access_policy: Creation complete after 1s [id=devopslite-dev-eks-cluster#arn:aws:iam::637423494924:root#arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy]
Apply complete! Resources: 77 added, 0 changed, 0 destroyed.
Outputs:
eks_cluster_endpoint = "https://6BB7DF1B4850EF2999FDB8F43FEE12F4.gr7.us-east-1.eks.amazonaws.com"
eks_cluster_id = "devopslite-dev-eks-cluster"
eks_cluster_oidc_issuer_url = "https://oidc.eks.us-east-1.amazonaws.com/id/6BB7DF1B4850EF2999FDB8F43FEE12F4"
eks_cluster_security_group_id = "sg-07fc31cdfd1804a8e"
eks_cluster_serviceaccount_role_arn = "arn:aws:iam::637423494924:role/devopslite_dev_eks_serviceaccount_role"
eks_node_group_arn = "arn:aws:eks:us-east-1:637423494924:nodegroup/devopslite-dev-eks-cluster/devopslite-dev-ng/c8ca3922-deb2-017c-ffee-12d8c652bee7"
eks_node_group_role_arn = "arn:aws:iam::637423494924:role/devopslite_dev_eks_node_group_role" |
Automatically merging because all plans have been successfully applied. |
Locks and plans deleted for the projects and workspaces modified in this pull request:
|
No description provided.