terraform.aws-baseline-infra/examples/eks-managed-nodegroup/terraform.tfstate.backup

2390 lines
106 KiB
JSON

{
"version": 4,
"terraform_version": "1.3.9",
"serial": 108,
"lineage": "56ace51c-87f1-d020-d988-593131aec3da",
"outputs": {},
"resources": [
{
"mode": "data",
"type": "aws_caller_identity",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"account_id": "040216112220",
"arn": "arn:aws:iam::040216112220:user/ken2026",
"id": "040216112220",
"user_id": "AIDAQSXIRFROOXYISSIEQ"
},
"sensitive_attributes": []
}
]
},
{
"mode": "managed",
"type": "aws_iam_policy",
"name": "additional",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
"description": "",
"id": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
"name": "lab-ape1-ken2026-eks-pub-module-test-policy",
"name_prefix": "",
"path": "/",
"policy": "{\"Statement\":[{\"Action\":[\"ec2:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
"policy_id": "ANPAQSXIRFROIIQSMDYCL",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
}
},
"sensitive_attributes": [],
"private": "bnVsbA=="
}
]
},
{
"mode": "managed",
"type": "aws_security_group",
"name": "additional",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 1,
"attributes": {
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-07d06dc3dd1d3ac76",
"description": "Managed by Terraform",
"egress": [],
"id": "sg-07d06dc3dd1d3ac76",
"ingress": [
{
"cidr_blocks": [
"10.0.0.0/8",
"172.16.0.0/12",
"192.168.0.0/16"
],
"description": "",
"from_port": 22,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [],
"self": false,
"to_port": 22
}
],
"name": "lab-ape1-ken2026-eks-pub-module-test-sg20231219130639544000000003",
"name_prefix": "lab-ape1-ken2026-eks-pub-module-test-sg",
"owner_id": "040216112220",
"revoke_rules_on_delete": false,
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": null,
"vpc_id": "vpc-01a10b033169f89a8"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_caller_identity",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"account_id": "040216112220",
"arn": "arn:aws:iam::040216112220:user/ken2026",
"id": "040216112220",
"user_id": "AIDAQSXIRFROOXYISSIEQ"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_eks_addon_version",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "coredns",
"schema_version": 0,
"attributes": {
"addon_name": "coredns",
"id": "coredns",
"kubernetes_version": "1.27",
"most_recent": true,
"version": "v1.10.1-eksbuild.6"
},
"sensitive_attributes": []
},
{
"index_key": "kube-proxy",
"schema_version": 0,
"attributes": {
"addon_name": "kube-proxy",
"id": "kube-proxy",
"kubernetes_version": "1.27",
"most_recent": true,
"version": "v1.27.6-eksbuild.2"
},
"sensitive_attributes": []
},
{
"index_key": "vpc-cni",
"schema_version": 0,
"attributes": {
"addon_name": "vpc-cni",
"id": "vpc-cni",
"kubernetes_version": "1.27",
"most_recent": true,
"version": "v1.15.4-eksbuild.1"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_policy",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"id": "2764486067",
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}",
"override_policy_documents": null,
"policy_id": null,
"source_policy_documents": null,
"statement": [
{
"actions": [
"sts:AssumeRole"
],
"condition": [],
"effect": "Allow",
"not_actions": [],
"not_principals": [],
"not_resources": [],
"principals": [
{
"identifiers": [
"eks.amazonaws.com"
],
"type": "Service"
}
],
"resources": [],
"sid": "EKSClusterAssumeRole"
}
],
"version": "2012-10-17"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_iam_session_context",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:user/ken2026",
"id": "arn:aws:iam::040216112220:user/ken2026",
"issuer_arn": "arn:aws:iam::040216112220:user/ken2026",
"issuer_id": "",
"issuer_name": "",
"session_name": ""
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "aws_partition",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"dns_suffix": "amazonaws.com",
"id": "aws",
"partition": "aws",
"reverse_dns_prefix": "com.amazonaws"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "data",
"type": "tls_certificate",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/tls\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"certificates": [
{
"cert_pem": "-----BEGIN CERTIFICATE-----\nMIIEdTCCA12gAwIBAgIJAKcOSkw0grd/MA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV\nBAYTAlVTMSUwIwYDVQQKExxTdGFyZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTIw\nMAYDVQQLEylTdGFyZmllbGQgQ2xhc3MgMiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0\neTAeFw0wOTA5MDIwMDAwMDBaFw0zNDA2MjgxNzM5MTZaMIGYMQswCQYDVQQGEwJV\nUzEQMA4GA1UECBMHQXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTElMCMGA1UE\nChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjE7MDkGA1UEAxMyU3RhcmZp\nZWxkIFNlcnZpY2VzIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IC0gRzIwggEi\nMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDVDDrEKvlO4vW+GZdfjohTsR8/\ny8+fIBNtKTrID30892t2OGPZNmCom15cAICyL1l/9of5JUOG52kbUpqQ4XHj2C0N\nTm/2yEnZtvMaVq4rtnQU68/7JuMauh2WLmo7WJSJR1b/JaCTcFOD2oR0FMNnngRo\nOt+OQFodSk7PQ5E751bWAHDLUu57fa4657wx+UX2wmDPE1kCK4DMNEffud6QZW0C\nzyyRpqbn3oUYSXxmTqM6bam17jQuug0DuDPfR+uxa40l2ZvOgdFFRjKWcIfeAg5J\nQ4W2bHO7ZOphQazJ1FTfhy/HIrImzJ9ZVGif/L4qL8RVHHVAYBeFAlU5i38FAgMB\nAAGjgfAwge0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0O\nBBYEFJxfAN+qAdcwKziIorhtSpzyEZGDMB8GA1UdIwQYMBaAFL9ft9HO3R+G9FtV\nrNzXEMIOqYjnME8GCCsGAQUFBwEBBEMwQTAcBggrBgEFBQcwAYYQaHR0cDovL28u\nc3MyLnVzLzAhBggrBgEFBQcwAoYVaHR0cDovL3guc3MyLnVzL3guY2VyMCYGA1Ud\nHwQfMB0wG6AZoBeGFWh0dHA6Ly9zLnNzMi51cy9yLmNybDARBgNVHSAECjAIMAYG\nBFUdIAAwDQYJKoZIhvcNAQELBQADggEBACMd44pXyn3pF3lM8R5V/cxTbj5HD9/G\nVfKyBDbtgB9TxF00KGu+x1X8Z+rLP3+QsjPNG1gQggL4+C/1E2DUBc7xgQjB3ad1\nl08YuW3e95ORCLp+QCztweq7dp4zBncdDQh/U90bZKuCJ/Fp1U1ervShw3WnWEQt\n8jxwmKy6abaVd38PMV4s/KCHOkdp8Hlf9BRUpJVeEXgSYCfOn8J3/yNTd126/+pZ\n59vPr5KW7ySaNRB6nJHGDn2Z9j8Z3/VyVOEVqQdZe4O/Ui5GjLIAZHYcSNPYeehu\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n",
"is_ca": true,
"issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US",
"not_after": "2034-06-28T17:39:16Z",
"not_before": "2009-09-02T00:00:00Z",
"public_key_algorithm": "RSA",
"serial_number": "12037640545166866303",
"sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280",
"signature_algorithm": "SHA256-RSA",
"subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
"version": 3
},
{
"cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n",
"is_ca": true,
"issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
"not_after": "2037-12-31T01:00:00Z",
"not_before": "2015-05-25T12:00:00Z",
"public_key_algorithm": "RSA",
"serial_number": "144918191876577076464031512351042010504348870",
"sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39",
"signature_algorithm": "SHA256-RSA",
"subject": "CN=Amazon Root CA 1,O=Amazon,C=US",
"version": 3
},
{
"cert_pem": "-----BEGIN CERTIFICATE-----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\nxRRrwszrzX/WWGm6wyB+f7C4\n-----END CERTIFICATE-----\n",
"is_ca": true,
"issuer": "CN=Amazon Root CA 1,O=Amazon,C=US",
"not_after": "2030-08-23T22:21:28Z",
"not_before": "2022-08-23T22:21:28Z",
"public_key_algorithm": "RSA",
"serial_number": "166129328851546858514271303855646110030630415",
"sha1_fingerprint": "2ad974a775f73cbdbbd8f5ac3a49255fa8fb1f8c",
"signature_algorithm": "SHA256-RSA",
"subject": "CN=Amazon RSA 2048 M01,O=Amazon,C=US",
"version": 3
},
{
"cert_pem": "-----BEGIN CERTIFICATE-----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\nDRdH8uhRYTvrI1x5riiDTEyRVleRH2hsjjnWdA2K6Eo=\n-----END CERTIFICATE-----\n",
"is_ca": false,
"issuer": "CN=Amazon RSA 2048 M01,O=Amazon,C=US",
"not_after": "2024-05-13T23:59:59Z",
"not_before": "2023-04-15T00:00:00Z",
"public_key_algorithm": "RSA",
"serial_number": "8165492534910603794073837749204893166",
"sha1_fingerprint": "90831f0130599ef1447a265888f207b904d487d0",
"signature_algorithm": "SHA256-RSA",
"subject": "CN=oidc.eks.ap-east-1.amazonaws.com",
"version": 3
}
],
"content": null,
"id": "b6fd8d4cda71e17b51920c3833049b9dc8ab06eb",
"url": "https://oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
"verify_chain": true
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_cloudwatch_log_group",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:logs:ap-east-1:040216112220:log-group:/aws/eks/lab-ken2026-eks01/cluster",
"id": "/aws/eks/lab-ken2026-eks01/cluster",
"kms_key_id": "",
"log_group_class": "STANDARD",
"name": "/aws/eks/lab-ken2026-eks01/cluster",
"name_prefix": "",
"retention_in_days": 90,
"skip_destroy": false,
"tags": {
"Name": "/aws/eks/lab-ken2026-eks01/cluster"
},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Name": "/aws/eks/lab-ken2026-eks01/cluster",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
}
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_eks_addon",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "coredns",
"schema_version": 0,
"attributes": {
"addon_name": "coredns",
"addon_version": "v1.10.1-eksbuild.6",
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/coredns/c8c6411d-1655-1cbd-84e9-1fe1a3a4f11c",
"cluster_name": "lab-ken2026-eks01",
"configuration_values": "",
"created_at": "2023-12-19T13:18:19Z",
"id": "lab-ken2026-eks01:coredns",
"modified_at": "2023-12-19T15:36:57Z",
"preserve": true,
"resolve_conflicts": "OVERWRITE",
"resolve_conflicts_on_create": null,
"resolve_conflicts_on_update": null,
"service_account_role_arn": "",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": {
"create": "25m",
"delete": "10m",
"update": null
}
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxNTAwMDAwMDAwMDAwLCJkZWxldGUiOjYwMDAwMDAwMDAwMCwidXBkYXRlIjoxMjAwMDAwMDAwMDAwfX0=",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_eks_addon_version.this",
"module.eks.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
"module.eks.module.fargate_profile.aws_iam_role.this",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.fargate_profile.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
"module.eks.module.self_managed_node_group.aws_iam_role.this",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.self_managed_node_group.aws_launch_template.this",
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.self_managed_node_group.data.aws_partition.current",
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.time_sleep.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this"
]
},
{
"index_key": "kube-proxy",
"schema_version": 0,
"attributes": {
"addon_name": "kube-proxy",
"addon_version": "v1.27.6-eksbuild.2",
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/kube-proxy/30c6411d-165d-2f30-2603-5d25c775b48d",
"cluster_name": "lab-ken2026-eks01",
"configuration_values": "",
"created_at": "2023-12-19T13:18:19Z",
"id": "lab-ken2026-eks01:kube-proxy",
"modified_at": "2023-12-19T15:36:57Z",
"preserve": null,
"resolve_conflicts": "OVERWRITE",
"resolve_conflicts_on_create": null,
"resolve_conflicts_on_update": null,
"service_account_role_arn": "",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": {
"create": null,
"delete": null,
"update": null
}
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_eks_addon_version.this",
"module.eks.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
"module.eks.module.fargate_profile.aws_iam_role.this",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.fargate_profile.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
"module.eks.module.self_managed_node_group.aws_iam_role.this",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.self_managed_node_group.aws_launch_template.this",
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.self_managed_node_group.data.aws_partition.current",
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.time_sleep.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this"
]
},
{
"index_key": "vpc-cni",
"schema_version": 0,
"attributes": {
"addon_name": "vpc-cni",
"addon_version": "v1.15.4-eksbuild.1",
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/vpc-cni/bac6411d-1654-32b4-2ee0-8b986e78c220",
"cluster_name": "lab-ken2026-eks01",
"configuration_values": "",
"created_at": "2023-12-19T13:18:20Z",
"id": "lab-ken2026-eks01:vpc-cni",
"modified_at": "2023-12-19T13:18:54Z",
"preserve": null,
"resolve_conflicts": "OVERWRITE",
"resolve_conflicts_on_create": null,
"resolve_conflicts_on_update": null,
"service_account_role_arn": "",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": {
"create": null,
"delete": null,
"update": null
}
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
"dependencies": [
"aws_security_group.additional",
"data.aws_caller_identity.current",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_caller_identity.current",
"module.eks.data.aws_eks_addon_version.this",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
"module.eks.data.aws_iam_session_context.current",
"module.eks.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
"module.eks.module.fargate_profile.aws_iam_role.this",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.fargate_profile.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.kms.data.aws_caller_identity.current",
"module.eks.module.kms.data.aws_iam_policy_document.this",
"module.eks.module.kms.data.aws_partition.current",
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
"module.eks.module.self_managed_node_group.aws_iam_role.this",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks.module.self_managed_node_group.aws_launch_template.this",
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks.module.self_managed_node_group.data.aws_partition.current",
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.eks.time_sleep.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_eks_cluster",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:eks:ap-east-1:040216112220:cluster/lab-ken2026-eks01",
"certificate_authority": [
{
"data": "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"
}
],
"cluster_id": null,
"created_at": "2023-12-19 13:08:01.505 +0000 UTC",
"enabled_cluster_log_types": [
"api",
"audit",
"authenticator"
],
"encryption_config": [
{
"provider": [
{
"key_arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21"
}
],
"resources": [
"secrets"
]
}
],
"endpoint": "https://429089EE7D5495A667CEB1C7C6C03230.sk1.ap-east-1.eks.amazonaws.com",
"id": "lab-ken2026-eks01",
"identity": [
{
"oidc": [
{
"issuer": "https://oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230"
}
]
}
],
"kubernetes_network_config": [
{
"ip_family": "ipv4",
"service_ipv4_cidr": "10.100.0.0/16",
"service_ipv6_cidr": ""
}
],
"name": "lab-ken2026-eks01",
"outpost_config": [],
"platform_version": "eks.10",
"role_arn": "arn:aws:iam::040216112220:role/lab-ken2026-eks01-cluster-20231219130639543400000002",
"status": "ACTIVE",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": {
"create": null,
"delete": null,
"update": null
},
"version": "1.27",
"vpc_config": [
{
"cluster_security_group_id": "sg-0735e2bab44a525b8",
"endpoint_private_access": true,
"endpoint_public_access": true,
"public_access_cidrs": [
"0.0.0.0/0"
],
"security_group_ids": [
"sg-05cb28b4ddca034bd"
],
"subnet_ids": [
"subnet-08dec6787782ee087",
"subnet-0927ba1b06ccfe6c5"
],
"vpc_id": "vpc-01a10b033169f89a8"
}
]
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfX0=",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_openid_connect_provider",
"name": "oidc_provider",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:oidc-provider/oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
"client_id_list": [
"sts.amazonaws.com"
],
"id": "arn:aws:iam::040216112220:oidc-provider/oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
"tags": {
"Name": "lab-ken2026-eks01-eks-irsa"
},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Name": "lab-ken2026-eks01-eks-irsa",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"thumbprint_list": [
"9e99a48a9960b14926bb7f3b02e22da2b0ab7280"
],
"url": "oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"aws_security_group.additional",
"data.aws_caller_identity.current",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_caller_identity.current",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
"module.eks.data.aws_iam_session_context.current",
"module.eks.data.aws_partition.current",
"module.eks.data.tls_certificate.this",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.kms.data.aws_caller_identity.current",
"module.eks.module.kms.data.aws_iam_policy_document.this",
"module.eks.module.kms.data.aws_partition.current",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_policy",
"name": "cluster_encryption",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
"description": "Cluster encryption policy to allow cluster role to utilize CMK provided",
"id": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
"name": "lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
"name_prefix": "lab-ken2026-eks01-cluster-ClusterEncryption",
"path": "/",
"policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21\"}],\"Version\":\"2012-10-17\"}",
"policy_id": "ANPAQSXIRFROOLCWLS54P",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
}
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"data.aws_caller_identity.current",
"module.eks.aws_iam_role.this",
"module.eks.data.aws_caller_identity.current",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_iam_session_context.current",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.kms.data.aws_caller_identity.current",
"module.eks.module.kms.data.aws_iam_policy_document.this",
"module.eks.module.kms.data.aws_partition.current",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:role/lab-ken2026-eks01-cluster-20231219130639543400000002",
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}",
"create_date": "2023-12-19T13:06:40Z",
"description": "",
"force_detach_policies": true,
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002",
"inline_policy": [
{
"name": "lab-ken2026-eks01-cluster",
"policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"logs:CreateLogGroup\"],\"Effect\":\"Deny\",\"Resource\":\"*\"}]}"
}
],
"managed_policy_arns": [
"arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
"arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
"arn:aws:iam::aws:policy/AmazonEKSVPCResourceController"
],
"max_session_duration": 3600,
"name": "lab-ken2026-eks01-cluster-20231219130639543400000002",
"name_prefix": "lab-ken2026-eks01-cluster-",
"path": "/",
"permissions_boundary": "",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"unique_id": "AROAQSXIRFROGM7O6BKZQ"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_partition.current"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "additional",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "additional",
"schema_version": 0,
"attributes": {
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064329940000000b",
"policy_arn": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"aws_iam_policy.additional",
"module.eks.aws_iam_role.this",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "cluster_encryption",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913065426620000000f",
"policy_arn": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"data.aws_caller_identity.current",
"module.eks.aws_iam_policy.cluster_encryption",
"module.eks.aws_iam_role.this",
"module.eks.data.aws_caller_identity.current",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_iam_session_context.current",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.kms.data.aws_caller_identity.current",
"module.eks.module.kms.data.aws_iam_policy_document.this",
"module.eks.module.kms.data.aws_partition.current",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "AmazonEKSClusterPolicy",
"schema_version": 0,
"attributes": {
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064342790000000c",
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks.aws_iam_role.this",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_partition.current"
],
"create_before_destroy": true
},
{
"index_key": "AmazonEKSVPCResourceController",
"schema_version": 0,
"attributes": {
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064345390000000d",
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController",
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks.aws_iam_role.this",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_partition.current"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group",
"name": "cluster",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 1,
"attributes": {
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-05cb28b4ddca034bd",
"description": "EKS cluster security group",
"egress": [],
"id": "sg-05cb28b4ddca034bd",
"ingress": [
{
"cidr_blocks": [],
"description": "Ingress from another computed security group",
"from_port": 22,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-07d06dc3dd1d3ac76"
],
"self": false,
"to_port": 22
},
{
"cidr_blocks": [],
"description": "Node groups to cluster API",
"from_port": 443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-0b26be1293a8798bb"
],
"self": false,
"to_port": 443
},
{
"cidr_blocks": [],
"description": "Nodes on ephemeral ports",
"from_port": 1025,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-0b26be1293a8798bb"
],
"self": false,
"to_port": 65535
}
],
"name": "lab-ken2026-eks01-cluster-20231219130755451100000002",
"name_prefix": "lab-ken2026-eks01-cluster-",
"owner_id": "040216112220",
"revoke_rules_on_delete": false,
"tags": {
"Name": "lab-ken2026-eks01-cluster"
},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Name": "lab-ken2026-eks01-cluster",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": null,
"vpc_id": "vpc-01a10b033169f89a8"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group",
"name": "node",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 1,
"attributes": {
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-0b26be1293a8798bb",
"description": "EKS node shared security group",
"egress": [
{
"cidr_blocks": [
"0.0.0.0/0"
],
"description": "Allow all egress",
"from_port": 0,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "-1",
"security_groups": [],
"self": false,
"to_port": 0
}
],
"id": "sg-0b26be1293a8798bb",
"ingress": [
{
"cidr_blocks": [],
"description": "Cluster API to node 4443/tcp webhook",
"from_port": 4443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 4443
},
{
"cidr_blocks": [],
"description": "Cluster API to node 6443/tcp webhook",
"from_port": 6443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 6443
},
{
"cidr_blocks": [],
"description": "Cluster API to node 8443/tcp webhook",
"from_port": 8443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 8443
},
{
"cidr_blocks": [],
"description": "Cluster API to node 9443/tcp webhook",
"from_port": 9443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 9443
},
{
"cidr_blocks": [],
"description": "Cluster API to node groups",
"from_port": 443,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 443
},
{
"cidr_blocks": [],
"description": "Cluster API to node kubelets",
"from_port": 10250,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [
"sg-05cb28b4ddca034bd"
],
"self": false,
"to_port": 10250
},
{
"cidr_blocks": [],
"description": "Node to node CoreDNS UDP",
"from_port": 53,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "udp",
"security_groups": [],
"self": true,
"to_port": 53
},
{
"cidr_blocks": [],
"description": "Node to node CoreDNS",
"from_port": 53,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [],
"self": true,
"to_port": 53
},
{
"cidr_blocks": [],
"description": "Node to node ingress on ephemeral ports",
"from_port": 1025,
"ipv6_cidr_blocks": [],
"prefix_list_ids": [],
"protocol": "tcp",
"security_groups": [],
"self": true,
"to_port": 65535
}
],
"name": "lab-ken2026-eks01-node-20231219130755450800000001",
"name_prefix": "lab-ken2026-eks01-node-",
"owner_id": "040216112220",
"revoke_rules_on_delete": false,
"tags": {
"Name": "lab-ken2026-eks01-node",
"kubernetes.io/cluster/lab-ken2026-eks01": "owned"
},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Name": "lab-ken2026-eks01-node",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed",
"kubernetes.io/cluster/lab-ken2026-eks01": "owned"
},
"timeouts": null,
"vpc_id": "vpc-01a10b033169f89a8"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "cluster",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "ingress_nodes_443",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Node groups to cluster API",
"from_port": 443,
"id": "sgrule-4086161652",
"ipv6_cidr_blocks": null,
"prefix_list_ids": null,
"protocol": "tcp",
"security_group_id": "sg-05cb28b4ddca034bd",
"security_group_rule_id": "sgr-0c9d68071b263a793",
"self": false,
"source_security_group_id": "sg-0b26be1293a8798bb",
"timeouts": null,
"to_port": 443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_nodes_ephemeral_ports_tcp",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Nodes on ephemeral ports",
"from_port": 1025,
"id": "sgrule-1342523956",
"ipv6_cidr_blocks": null,
"prefix_list_ids": null,
"protocol": "tcp",
"security_group_id": "sg-05cb28b4ddca034bd",
"security_group_rule_id": "sgr-099024ecd70ff43eb",
"self": false,
"source_security_group_id": "sg-0b26be1293a8798bb",
"timeouts": null,
"to_port": 65535,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_source_security_group_id",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Ingress from another computed security group",
"from_port": 22,
"id": "sgrule-1070107027",
"ipv6_cidr_blocks": null,
"prefix_list_ids": null,
"protocol": "tcp",
"security_group_id": "sg-05cb28b4ddca034bd",
"security_group_rule_id": "sgr-02db64b1ad863ab5d",
"self": false,
"source_security_group_id": "sg-07d06dc3dd1d3ac76",
"timeouts": null,
"to_port": 22,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "aws_security_group_rule",
"name": "node",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "egress_all",
"schema_version": 2,
"attributes": {
"cidr_blocks": [
"0.0.0.0/0"
],
"description": "Allow all egress",
"from_port": 0,
"id": "sgrule-2048858421",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "-1",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-09d732ed4880404ec",
"self": false,
"source_security_group_id": null,
"timeouts": null,
"to_port": 0,
"type": "egress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_443",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node groups",
"from_port": 443,
"id": "sgrule-4100952853",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-0c52533027be07c55",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_4443_webhook",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node 4443/tcp webhook",
"from_port": 4443,
"id": "sgrule-3552065770",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-066ee223b4568b05f",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 4443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_6443_webhook",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node 6443/tcp webhook",
"from_port": 6443,
"id": "sgrule-452616060",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-0a007e761bad7326b",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 6443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_8443_webhook",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node 8443/tcp webhook",
"from_port": 8443,
"id": "sgrule-161899357",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-0363b7221ce2b3f28",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 8443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_9443_webhook",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node 9443/tcp webhook",
"from_port": 9443,
"id": "sgrule-1829195926",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-0ad09455f981c0201",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 9443,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_cluster_kubelet",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Cluster API to node kubelets",
"from_port": 10250,
"id": "sgrule-3137228705",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-00bf4b7fe2e3713b4",
"self": false,
"source_security_group_id": "sg-05cb28b4ddca034bd",
"timeouts": null,
"to_port": 10250,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_nodes_ephemeral",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Node to node ingress on ephemeral ports",
"from_port": 1025,
"id": "sgrule-2441224662",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-09e81e74ac8979caa",
"self": true,
"source_security_group_id": null,
"timeouts": null,
"to_port": 65535,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_self_coredns_tcp",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Node to node CoreDNS",
"from_port": 53,
"id": "sgrule-802483520",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "tcp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-06fd8316cc112443e",
"self": true,
"source_security_group_id": null,
"timeouts": null,
"to_port": 53,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
},
{
"index_key": "ingress_self_coredns_udp",
"schema_version": 2,
"attributes": {
"cidr_blocks": null,
"description": "Node to node CoreDNS UDP",
"from_port": 53,
"id": "sgrule-2341162671",
"ipv6_cidr_blocks": null,
"prefix_list_ids": [],
"protocol": "udp",
"security_group_id": "sg-0b26be1293a8798bb",
"security_group_rule_id": "sgr-01e223c8388c979c5",
"self": true,
"source_security_group_id": null,
"timeouts": null,
"to_port": 53,
"type": "ingress"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
"dependencies": [
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks",
"mode": "managed",
"type": "time_sleep",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/time\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"create_duration": "30s",
"destroy_duration": null,
"id": "2023-12-19T15:36:24Z",
"triggers": {
"cluster_certificate_authority_data": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCVENDQWUyZ0F3SUJBZ0lJUjNyUGZubXlabUF3RFFZSktvWklodmNOQVFFTEJRQXdGVEVUTUJFR0ExVUUKQXhNS2EzVmlaWEp1WlhSbGN6QWVGdzB5TXpFeU1Ua3hNekEyTlRGYUZ3MHpNekV5TVRZeE16RXhOVEZhTUJVeApFekFSQmdOVkJBTVRDbXQxWW1WeWJtVjBaWE13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLCkFvSUJBUUMzY0ZrbzhDeThDb0o5MkxPOVpoL2NBdzRwY0l3UTB4RDErOG95Mk1zNkUxeGNYb1pFc1lWcEN6V1cKanNmQWFGSS95cjNDUUUrc0xYcFRGcE40NzJuaVM0aFNsYlpUSzlNNkZsekkySkEvczRYa3Zhb3UySDJKNnZBMQo4cXZoRDc0UzVEbE9BVGEvdHBlZWdNMVcyWEZvV3hIZzR0MmlYbHNSR1QrV0xEUFRscEFGTU96SnRTSEpZMjBJCk5xZ05JNFRQTGZadzF6MWZGd2l3VGRxZE1TQ0hvekkvZG40cjVydENnZ0lyWVFiVm03Zzl5bTN4RndtSFEwVmcKcHpYVzFIR0Fldk5OSmhudFBrWm41RE0zVUpBZlhSODMxMU9seEpBWkw0YVZ0YnVQK0l0UHpFWElZWHVjNmowbAp5ZEs5WTRpVzZJdkVIWjlNbncwSUQxZnVFaXpOQWdNQkFBR2pXVEJYTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQCkJnTlZIUk1CQWY4RUJUQURBUUgvTUIwR0ExVWREZ1FXQkJRa3hvNEtWSTk4NE8vVEw0MTI3SG5HSGVJRFJUQVYKQmdOVkhSRUVEakFNZ2dwcmRXSmxjbTVsZEdWek1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQTd1eTZBSzhSZQo2SGVkU0p1SXV2c0hYNW9qcUkxcXdIeDFEMklUTUs2SGNsQnAwWFAwamtodllCTzEzd2MwNE9oOGtFTjdTVjh3ClJVQTkyejF6Vjg4dTJlcVpJSUxnRmdlK0g1dXZZeW1FVnhmaTUzVDNHZjJ6Vm1YY2VzVFBxQ0p4bXFtZ1dlUDIKU05DMHZ6akx6SkVBZ2pQNFdjblVTSVVSdmdGMjVlby9qbE5HWDhYSkM0dWNxeWc2MDNhc3pERmZqcnVVcWx3cgphOFJBRjROTjRraFQrb3prN3R5d2xqQ3hqK0ZneGFxamtVY08zd3M1aEFLazYrTjRsS0ppbXdQVHBOaGtteDJqCjlGdVYwUFk3Q3ZWTXBNaHN6SVo4aW40UG5EeGZ4bDh2N3R6VGdjRFJLS0FLcmFPdGUrR2VFVlNCeXpyMVR1ajAKTm1ISldJamdvdldUCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K",
"cluster_endpoint": "https://429089EE7D5495A667CEB1C7C6C03230.sk1.ap-east-1.eks.amazonaws.com",
"cluster_name": "lab-ken2026-eks01",
"cluster_version": "1.27"
}
},
"sensitive_attributes": [],
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this"
]
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "data",
"type": "aws_caller_identity",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"account_id": "040216112220",
"arn": "arn:aws:iam::040216112220:user/ken2026",
"id": "040216112220",
"user_id": "AIDAQSXIRFROOXYISSIEQ"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "assume_role_policy",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"id": "2560088296",
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}",
"override_policy_documents": null,
"policy_id": null,
"source_policy_documents": null,
"statement": [
{
"actions": [
"sts:AssumeRole"
],
"condition": [],
"effect": "Allow",
"not_actions": [],
"not_principals": [],
"not_resources": [],
"principals": [
{
"identifiers": [
"ec2.amazonaws.com"
],
"type": "Service"
}
],
"resources": [],
"sid": "EKSNodeAssumeRole"
}
],
"version": "2012-10-17"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "data",
"type": "aws_partition",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"dns_suffix": "amazonaws.com",
"id": "aws",
"partition": "aws",
"reverse_dns_prefix": "com.amazonaws"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "managed",
"type": "aws_eks_node_group",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"ami_type": "AL2_x86_64",
"arn": "arn:aws:eks:ap-east-1:040216112220:nodegroup/lab-ken2026-eks01/eks-mng-20231219132251939500000002/f0c6411f-29ed-3829-c576-81c2416b8f15",
"capacity_type": "ON_DEMAND",
"cluster_name": "lab-ken2026-eks01",
"disk_size": 0,
"force_update_version": null,
"id": "lab-ken2026-eks01:eks-mng-20231219132251939500000002",
"instance_types": [
"t3.medium"
],
"labels": {},
"launch_template": [
{
"id": "lt-08dbcc22ce663df92",
"name": "eks-mng-eks-node-group-20231219131510418300000003",
"version": "3"
}
],
"node_group_name": "eks-mng-20231219132251939500000002",
"node_group_name_prefix": "eks-mng-",
"node_role_arn": "arn:aws:iam::040216112220:role/eks-mng-eks-node-group-20231219130639543000000001",
"release_version": "1.27.7-20231201",
"remote_access": [],
"resources": [
{
"autoscaling_groups": [
{
"name": "eks-eks-mng-20231219132251939500000002-f0c6411f-29ed-3829-c576-81c2416b8f15"
}
],
"remote_access_security_group_id": ""
}
],
"scaling_config": [
{
"desired_size": 1,
"max_size": 4,
"min_size": 0
}
],
"status": "ACTIVE",
"subnet_ids": [
"subnet-08dec6787782ee087",
"subnet-0927ba1b06ccfe6c5"
],
"tags": {
"Name": "eks-mng"
},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Name": "eks-mng",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"taint": [],
"timeouts": {
"create": null,
"delete": null,
"update": null
},
"update_config": [
{
"max_unavailable": 0,
"max_unavailable_percentage": 33
}
],
"version": "1.27"
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19",
"dependencies": [
"aws_security_group.additional",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.aws_launch_template.this",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::040216112220:role/eks-mng-eks-node-group-20231219130639543000000001",
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}",
"create_date": "2023-12-19T13:06:40Z",
"description": "",
"force_detach_policies": true,
"id": "eks-mng-eks-node-group-20231219130639543000000001",
"inline_policy": [],
"managed_policy_arns": [
"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
"arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
],
"max_session_duration": 3600,
"name": "eks-mng-eks-node-group-20231219130639543000000001",
"name_prefix": "eks-mng-eks-node-group-",
"path": "/",
"permissions_boundary": "",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"unique_id": "AROAQSXIRFROI7AGB57AT"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "additional",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "SsmInstanceCore",
"schema_version": 0,
"attributes": {
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219143117452600000003",
"policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore",
"role": "eks-mng-eks-node-group-20231219130639543000000001"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current"
]
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
"schema_version": 0,
"attributes": {
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642446200000006",
"policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
"role": "eks-mng-eks-node-group-20231219130639543000000001"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current"
],
"create_before_destroy": true
},
{
"index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
"schema_version": 0,
"attributes": {
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642484600000007",
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
"role": "eks-mng-eks-node-group-20231219130639543000000001"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current"
],
"create_before_destroy": true
},
{
"index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
"schema_version": 0,
"attributes": {
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642441500000005",
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
"role": "eks-mng-eks-node-group-20231219130639543000000001"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current"
],
"create_before_destroy": true
}
]
},
{
"module": "module.eks_managed_node_group",
"mode": "managed",
"type": "aws_launch_template",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:ec2:ap-east-1:040216112220:launch-template/lt-08dbcc22ce663df92",
"block_device_mappings": [],
"capacity_reservation_specification": [],
"cpu_options": [],
"credit_specification": [],
"default_version": 3,
"description": "",
"disable_api_stop": false,
"disable_api_termination": false,
"ebs_optimized": "",
"elastic_gpu_specifications": [],
"elastic_inference_accelerator": [],
"enclave_options": [],
"hibernation_options": [],
"iam_instance_profile": [],
"id": "lt-08dbcc22ce663df92",
"image_id": "",
"instance_initiated_shutdown_behavior": "",
"instance_market_options": [],
"instance_requirements": [],
"instance_type": "",
"kernel_id": "",
"key_name": "",
"latest_version": 3,
"license_specification": [],
"maintenance_options": [],
"metadata_options": [
{
"http_endpoint": "enabled",
"http_protocol_ipv6": "",
"http_put_response_hop_limit": 2,
"http_tokens": "required",
"instance_metadata_tags": ""
}
],
"monitoring": [
{
"enabled": true
}
],
"name": "eks-mng-eks-node-group-20231219131510418300000003",
"name_prefix": "eks-mng-eks-node-group-",
"network_interfaces": [],
"placement": [],
"private_dns_name_options": [],
"ram_disk_id": "",
"security_group_names": [],
"tag_specifications": [
{
"resource_type": "instance",
"tags": {
"Name": "eks-mng"
}
},
{
"resource_type": "network-interface",
"tags": {
"Name": "eks-mng"
}
},
{
"resource_type": "volume",
"tags": {
"Name": "eks-mng"
}
}
],
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"update_default_version": true,
"user_data": "",
"vpc_security_group_ids": [
"sg-05cb28b4ddca034bd",
"sg-0735e2bab44a525b8",
"sg-07d06dc3dd1d3ac76"
]
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"aws_security_group.additional",
"data.aws_caller_identity.current",
"module.eks.aws_cloudwatch_log_group.this",
"module.eks.aws_eks_cluster.this",
"module.eks.aws_iam_policy.cni_ipv6_policy",
"module.eks.aws_iam_role.this",
"module.eks.aws_iam_role_policy_attachment.this",
"module.eks.aws_security_group.cluster",
"module.eks.aws_security_group.node",
"module.eks.aws_security_group_rule.cluster",
"module.eks.aws_security_group_rule.node",
"module.eks.data.aws_caller_identity.current",
"module.eks.data.aws_iam_policy_document.assume_role_policy",
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
"module.eks.data.aws_iam_session_context.current",
"module.eks.data.aws_partition.current",
"module.eks.module.kms.aws_kms_external_key.this",
"module.eks.module.kms.aws_kms_key.this",
"module.eks.module.kms.aws_kms_replica_external_key.this",
"module.eks.module.kms.aws_kms_replica_key.this",
"module.eks.module.kms.data.aws_caller_identity.current",
"module.eks.module.kms.data.aws_iam_policy_document.this",
"module.eks.module.kms.data.aws_partition.current",
"module.eks_managed_node_group.aws_iam_role.this",
"module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
"module.eks_managed_node_group.data.aws_caller_identity.current",
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
"module.eks_managed_node_group.data.aws_partition.current",
"module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
],
"create_before_destroy": true
}
]
},
{
"module": "module.kms",
"mode": "data",
"type": "aws_caller_identity",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"account_id": "040216112220",
"arn": "arn:aws:iam::040216112220:user/ken2026",
"id": "040216112220",
"user_id": "AIDAQSXIRFROOXYISSIEQ"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.kms",
"mode": "data",
"type": "aws_iam_policy_document",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"id": "2110400556",
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"Default\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::040216112220:root\"\n }\n },\n {\n \"Sid\": \"KeyOwner\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::040216112220:user/ken2026\"\n }\n }\n ]\n}",
"override_policy_documents": null,
"policy_id": null,
"source_policy_documents": null,
"statement": [
{
"actions": [
"kms:*"
],
"condition": [],
"effect": "Allow",
"not_actions": [],
"not_principals": [],
"not_resources": [],
"principals": [
{
"identifiers": [
"arn:aws:iam::040216112220:root"
],
"type": "AWS"
}
],
"resources": [
"*"
],
"sid": "Default"
},
{
"actions": [
"kms:*"
],
"condition": [],
"effect": "Allow",
"not_actions": [],
"not_principals": [],
"not_resources": [],
"principals": [
{
"identifiers": [
"arn:aws:iam::040216112220:user/ken2026"
],
"type": "AWS"
}
],
"resources": [
"*"
],
"sid": "KeyOwner"
}
],
"version": "2012-10-17"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.kms",
"mode": "data",
"type": "aws_partition",
"name": "current",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"dns_suffix": "amazonaws.com",
"id": "aws",
"partition": "aws",
"reverse_dns_prefix": "com.amazonaws"
},
"sensitive_attributes": []
}
]
},
{
"module": "module.kms",
"mode": "managed",
"type": "aws_kms_alias",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": "eks/lab-ape1-ken2026-eks-pub-module-test",
"schema_version": 0,
"attributes": {
"arn": "arn:aws:kms:ap-east-1:040216112220:alias/eks/lab-ape1-ken2026-eks-pub-module-test",
"id": "alias/eks/lab-ape1-ken2026-eks-pub-module-test",
"name": "alias/eks/lab-ape1-ken2026-eks-pub-module-test",
"name_prefix": "",
"target_key_arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
"target_key_id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21"
},
"sensitive_attributes": [],
"private": "bnVsbA==",
"dependencies": [
"data.aws_caller_identity.current",
"module.kms.aws_kms_external_key.this",
"module.kms.aws_kms_key.this",
"module.kms.aws_kms_replica_external_key.this",
"module.kms.aws_kms_replica_key.this",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
]
}
]
},
{
"module": "module.kms",
"mode": "managed",
"type": "aws_kms_key",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
"bypass_policy_lockout_safety_check": false,
"custom_key_store_id": "",
"customer_master_key_spec": "SYMMETRIC_DEFAULT",
"deletion_window_in_days": null,
"description": "lab-ape1-ken2026-eks-pub-module-test cluster encryption key",
"enable_key_rotation": true,
"id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
"is_enabled": true,
"key_id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
"key_usage": "ENCRYPT_DECRYPT",
"multi_region": false,
"policy": "{\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::040216112220:root\"},\"Resource\":\"*\",\"Sid\":\"Default\"},{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::040216112220:user/ken2026\"},\"Resource\":\"*\",\"Sid\":\"KeyOwner\"}],\"Version\":\"2012-10-17\"}",
"tags": {},
"tags_all": {
"Application": "terraform",
"Environment": "lab",
"Project": "eks-pub-module-test",
"ServiceProvider": "RackspaceTechnology",
"TerraformDir": "experimental/eks-upgrade-test",
"TerraformMode": "managed"
},
"timeouts": null
},
"sensitive_attributes": [],
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDB9fQ==",
"dependencies": [
"data.aws_caller_identity.current",
"module.kms.data.aws_caller_identity.current",
"module.kms.data.aws_iam_policy_document.this",
"module.kms.data.aws_partition.current"
],
"create_before_destroy": true
}
]
}
],
"check_results": null
}