2390 lines
106 KiB
JSON
2390 lines
106 KiB
JSON
{
|
|
"version": 4,
|
|
"terraform_version": "1.3.9",
|
|
"serial": 108,
|
|
"lineage": "56ace51c-87f1-d020-d988-593131aec3da",
|
|
"outputs": {},
|
|
"resources": [
|
|
{
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "040216112220",
|
|
"arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"id": "040216112220",
|
|
"user_id": "AIDAQSXIRFROOXYISSIEQ"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "additional",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
|
|
"description": "",
|
|
"id": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
|
|
"name": "lab-ape1-ken2026-eks-pub-module-test-policy",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":[\"ec2:Describe*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAQSXIRFROIIQSMDYCL",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA=="
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"mode": "managed",
|
|
"type": "aws_security_group",
|
|
"name": "additional",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-07d06dc3dd1d3ac76",
|
|
"description": "Managed by Terraform",
|
|
"egress": [],
|
|
"id": "sg-07d06dc3dd1d3ac76",
|
|
"ingress": [
|
|
{
|
|
"cidr_blocks": [
|
|
"10.0.0.0/8",
|
|
"172.16.0.0/12",
|
|
"192.168.0.0/16"
|
|
],
|
|
"description": "",
|
|
"from_port": 22,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [],
|
|
"self": false,
|
|
"to_port": 22
|
|
}
|
|
],
|
|
"name": "lab-ape1-ken2026-eks-pub-module-test-sg20231219130639544000000003",
|
|
"name_prefix": "lab-ape1-ken2026-eks-pub-module-test-sg",
|
|
"owner_id": "040216112220",
|
|
"revoke_rules_on_delete": false,
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-01a10b033169f89a8"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "040216112220",
|
|
"arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"id": "040216112220",
|
|
"user_id": "AIDAQSXIRFROOXYISSIEQ"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "aws_eks_addon_version",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "coredns",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "coredns",
|
|
"id": "coredns",
|
|
"kubernetes_version": "1.27",
|
|
"most_recent": true,
|
|
"version": "v1.10.1-eksbuild.6"
|
|
},
|
|
"sensitive_attributes": []
|
|
},
|
|
{
|
|
"index_key": "kube-proxy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "kube-proxy",
|
|
"id": "kube-proxy",
|
|
"kubernetes_version": "1.27",
|
|
"most_recent": true,
|
|
"version": "v1.27.6-eksbuild.2"
|
|
},
|
|
"sensitive_attributes": []
|
|
},
|
|
{
|
|
"index_key": "vpc-cni",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "vpc-cni",
|
|
"id": "vpc-cni",
|
|
"kubernetes_version": "1.27",
|
|
"most_recent": true,
|
|
"version": "v1.15.4-eksbuild.1"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "assume_role_policy",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2764486067",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}",
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRole"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"eks.amazonaws.com"
|
|
],
|
|
"type": "Service"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": "EKSClusterAssumeRole"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "aws_iam_session_context",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"id": "arn:aws:iam::040216112220:user/ken2026",
|
|
"issuer_arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"issuer_id": "",
|
|
"issuer_name": "",
|
|
"session_name": ""
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "data",
|
|
"type": "tls_certificate",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/tls\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"certificates": [
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US",
|
|
"not_after": "2034-06-28T17:39:16Z",
|
|
"not_before": "2009-09-02T00:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "12037640545166866303",
|
|
"sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----\nMIIEkjCCA3qgAwIBAgITBn+USionzfP6wq4rAfkI7rnExjANBgkqhkiG9w0BAQsF\nADCBmDELMAkGA1UEBhMCVVMxEDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNj\nb3R0c2RhbGUxJTAjBgNVBAoTHFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4x\nOzA5BgNVBAMTMlN0YXJmaWVsZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1\ndGhvcml0eSAtIEcyMB4XDTE1MDUyNTEyMDAwMFoXDTM3MTIzMTAxMDAwMFowOTEL\nMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv\nb3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj\nca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM\n9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw\nIFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6\nVOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L\n93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm\njgSubJrIqg0CAwEAAaOCATEwggEtMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/\nBAQDAgGGMB0GA1UdDgQWBBSEGMyFNOy8DJSULghZnMeyEE4KCDAfBgNVHSMEGDAW\ngBScXwDfqgHXMCs4iKK4bUqc8hGRgzB4BggrBgEFBQcBAQRsMGowLgYIKwYBBQUH\nMAGGImh0dHA6Ly9vY3NwLnJvb3RnMi5hbWF6b250cnVzdC5jb20wOAYIKwYBBQUH\nMAKGLGh0dHA6Ly9jcnQucm9vdGcyLmFtYXpvbnRydXN0LmNvbS9yb290ZzIuY2Vy\nMD0GA1UdHwQ2MDQwMqAwoC6GLGh0dHA6Ly9jcmwucm9vdGcyLmFtYXpvbnRydXN0\nLmNvbS9yb290ZzIuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQsF\nAAOCAQEAYjdCXLwQtT6LLOkMm2xF4gcAevnFWAu5CIw+7bMlPLVvUOTNNWqnkzSW\nMiGpSESrnO09tKpzbeR/FoCJbM8oAxiDR3mjEH4wW6w7sGDgd9QIpuEdfF7Au/ma\neyKdpwAJfqxGF4PcnCZXmTA5YpaP7dreqsXMGz7KQ2hsVxa81Q4gLv7/wmpdLqBK\nbRRYh5TmOTFffHPLkIhqhBGWJ6bt2YFGpn6jcgAKUj6DiAdjd4lpFw85hdKrCEVN\n0FE6/V1dN2RMfjCyVSRCnTawXZwXgWHxyvkQAiSr6w10kY17RSlQOYiypok1JR4U\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
|
|
"not_after": "2037-12-31T01:00:00Z",
|
|
"not_before": "2015-05-25T12:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "144918191876577076464031512351042010504348870",
|
|
"sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Amazon Root CA 1,O=Amazon,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----\nMIIEXjCCA0agAwIBAgITB3MSOAudZoijOx7Zv5zNpo4ODzANBgkqhkiG9w0BAQsF\nADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6\nb24gUm9vdCBDQSAxMB4XDTIyMDgyMzIyMjEyOFoXDTMwMDgyMzIyMjEyOFowPDEL\nMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEcMBoGA1UEAxMTQW1hem9uIFJT\nQSAyMDQ4IE0wMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOtxLKnL\nH4gokjIwr4pXD3i3NyWVVYesZ1yX0yLI2qIUZ2t88Gfa4gMqs1YSXca1R/lnCKeT\nepWSGA+0+fkQNpp/L4C2T7oTTsddUx7g3ZYzByDTlrwS5HRQQqEFE3O1T5tEJP4t\nf+28IoXsNiEzl3UGzicYgtzj2cWCB41eJgEmJmcf2T8TzzK6a614ZPyq/w4CPAff\nnAV4coz96nW3AyiE2uhuB4zQUIXvgVSycW7sbWLvj5TDXunEpNCRwC4kkZjK7rol\njtT2cbb7W2s4Bkg3R42G3PLqBvt2N32e/0JOTViCk8/iccJ4sXqrS1uUN4iB5Nmv\nJK74csVl+0u0UecCAwEAAaOCAVowggFWMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYD\nVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAdBgNV\nHQ4EFgQUgbgOY4qJEhjl+js7UJWf5uWQE4UwHwYDVR0jBBgwFoAUhBjMhTTsvAyU\nlC4IWZzHshBOCggwewYIKwYBBQUHAQEEbzBtMC8GCCsGAQUFBzABhiNodHRwOi8v\nb2NzcC5yb290Y2ExLmFtYXpvbnRydXN0LmNvbTA6BggrBgEFBQcwAoYuaHR0cDov\nL2NydC5yb290Y2ExLmFtYXpvbnRydXN0LmNvbS9yb290Y2ExLmNlcjA/BgNVHR8E\nODA2MDSgMqAwhi5odHRwOi8vY3JsLnJvb3RjYTEuYW1hem9udHJ1c3QuY29tL3Jv\nb3RjYTEuY3JsMBMGA1UdIAQMMAowCAYGZ4EMAQIBMA0GCSqGSIb3DQEBCwUAA4IB\nAQCtAN4CBSMuBjJitGuxlBbkEUDeK/pZwTXv4KqPK0G50fOHOQAd8j21p0cMBgbG\nkfMHVwLU7b0XwZCav0h1ogdPMN1KakK1DT0VwA/+hFvGPJnMV1Kx2G4S1ZaSk0uU\n5QfoiYIIano01J5k4T2HapKQmmOhS/iPtuo00wW+IMLeBuKMn3OLn005hcrOGTad\nhcmeyfhQP7Z+iKHvyoQGi1C0ClymHETx/chhQGDyYSWqB/THwnN15AwLQo0E5V9E\nSJlbe4mBlqeInUsNYugExNf+tOiybcrswBy8OFsd34XOW3rjSUtsuafd9AWySa3h\nxRRrwszrzX/WWGm6wyB+f7C4\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "CN=Amazon Root CA 1,O=Amazon,C=US",
|
|
"not_after": "2030-08-23T22:21:28Z",
|
|
"not_before": "2022-08-23T22:21:28Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "166129328851546858514271303855646110030630415",
|
|
"sha1_fingerprint": "2ad974a775f73cbdbbd8f5ac3a49255fa8fb1f8c",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Amazon RSA 2048 M01,O=Amazon,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\nDRdH8uhRYTvrI1x5riiDTEyRVleRH2hsjjnWdA2K6Eo=\n-----END CERTIFICATE-----\n",
|
|
"is_ca": false,
|
|
"issuer": "CN=Amazon RSA 2048 M01,O=Amazon,C=US",
|
|
"not_after": "2024-05-13T23:59:59Z",
|
|
"not_before": "2023-04-15T00:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "8165492534910603794073837749204893166",
|
|
"sha1_fingerprint": "90831f0130599ef1447a265888f207b904d487d0",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=oidc.eks.ap-east-1.amazonaws.com",
|
|
"version": 3
|
|
}
|
|
],
|
|
"content": null,
|
|
"id": "b6fd8d4cda71e17b51920c3833049b9dc8ab06eb",
|
|
"url": "https://oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
|
|
"verify_chain": true
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_cloudwatch_log_group",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:logs:ap-east-1:040216112220:log-group:/aws/eks/lab-ken2026-eks01/cluster",
|
|
"id": "/aws/eks/lab-ken2026-eks01/cluster",
|
|
"kms_key_id": "",
|
|
"log_group_class": "STANDARD",
|
|
"name": "/aws/eks/lab-ken2026-eks01/cluster",
|
|
"name_prefix": "",
|
|
"retention_in_days": 90,
|
|
"skip_destroy": false,
|
|
"tags": {
|
|
"Name": "/aws/eks/lab-ken2026-eks01/cluster"
|
|
},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Name": "/aws/eks/lab-ken2026-eks01/cluster",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_addon",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "coredns",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "coredns",
|
|
"addon_version": "v1.10.1-eksbuild.6",
|
|
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/coredns/c8c6411d-1655-1cbd-84e9-1fe1a3a4f11c",
|
|
"cluster_name": "lab-ken2026-eks01",
|
|
"configuration_values": "",
|
|
"created_at": "2023-12-19T13:18:19Z",
|
|
"id": "lab-ken2026-eks01:coredns",
|
|
"modified_at": "2023-12-19T15:36:57Z",
|
|
"preserve": true,
|
|
"resolve_conflicts": "OVERWRITE",
|
|
"resolve_conflicts_on_create": null,
|
|
"resolve_conflicts_on_update": null,
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": {
|
|
"create": "25m",
|
|
"delete": "10m",
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxNTAwMDAwMDAwMDAwLCJkZWxldGUiOjYwMDAwMDAwMDAwMCwidXBkYXRlIjoxMjAwMDAwMDAwMDAwfX0=",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
|
|
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.fargate_profile.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.self_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
|
|
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.self_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.time_sleep.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "kube-proxy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "kube-proxy",
|
|
"addon_version": "v1.27.6-eksbuild.2",
|
|
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/kube-proxy/30c6411d-165d-2f30-2603-5d25c775b48d",
|
|
"cluster_name": "lab-ken2026-eks01",
|
|
"configuration_values": "",
|
|
"created_at": "2023-12-19T13:18:19Z",
|
|
"id": "lab-ken2026-eks01:kube-proxy",
|
|
"modified_at": "2023-12-19T15:36:57Z",
|
|
"preserve": null,
|
|
"resolve_conflicts": "OVERWRITE",
|
|
"resolve_conflicts_on_create": null,
|
|
"resolve_conflicts_on_update": null,
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
|
|
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.fargate_profile.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.self_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
|
|
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.self_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.time_sleep.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "vpc-cni",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "vpc-cni",
|
|
"addon_version": "v1.15.4-eksbuild.1",
|
|
"arn": "arn:aws:eks:ap-east-1:040216112220:addon/lab-ken2026-eks01/vpc-cni/bac6411d-1654-32b4-2ee0-8b986e78c220",
|
|
"cluster_name": "lab-ken2026-eks01",
|
|
"configuration_values": "",
|
|
"created_at": "2023-12-19T13:18:20Z",
|
|
"id": "lab-ken2026-eks01:vpc-cni",
|
|
"modified_at": "2023-12-19T13:18:54Z",
|
|
"preserve": null,
|
|
"resolve_conflicts": "OVERWRITE",
|
|
"resolve_conflicts_on_create": null,
|
|
"resolve_conflicts_on_update": null,
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"data.aws_caller_identity.current",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_caller_identity.current",
|
|
"module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role.this",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.fargate_profile.data.aws_caller_identity.current",
|
|
"module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.fargate_profile.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
|
|
"module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.self_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.self_managed_node_group.data.aws_ami.eks_default",
|
|
"module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.self_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.eks.time_sleep.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_cluster",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:eks:ap-east-1:040216112220:cluster/lab-ken2026-eks01",
|
|
"certificate_authority": [
|
|
{
|
|
"data": "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"
|
|
}
|
|
],
|
|
"cluster_id": null,
|
|
"created_at": "2023-12-19 13:08:01.505 +0000 UTC",
|
|
"enabled_cluster_log_types": [
|
|
"api",
|
|
"audit",
|
|
"authenticator"
|
|
],
|
|
"encryption_config": [
|
|
{
|
|
"provider": [
|
|
{
|
|
"key_arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21"
|
|
}
|
|
],
|
|
"resources": [
|
|
"secrets"
|
|
]
|
|
}
|
|
],
|
|
"endpoint": "https://429089EE7D5495A667CEB1C7C6C03230.sk1.ap-east-1.eks.amazonaws.com",
|
|
"id": "lab-ken2026-eks01",
|
|
"identity": [
|
|
{
|
|
"oidc": [
|
|
{
|
|
"issuer": "https://oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"kubernetes_network_config": [
|
|
{
|
|
"ip_family": "ipv4",
|
|
"service_ipv4_cidr": "10.100.0.0/16",
|
|
"service_ipv6_cidr": ""
|
|
}
|
|
],
|
|
"name": "lab-ken2026-eks01",
|
|
"outpost_config": [],
|
|
"platform_version": "eks.10",
|
|
"role_arn": "arn:aws:iam::040216112220:role/lab-ken2026-eks01-cluster-20231219130639543400000002",
|
|
"status": "ACTIVE",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
},
|
|
"version": "1.27",
|
|
"vpc_config": [
|
|
{
|
|
"cluster_security_group_id": "sg-0735e2bab44a525b8",
|
|
"endpoint_private_access": true,
|
|
"endpoint_public_access": true,
|
|
"public_access_cidrs": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"security_group_ids": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"subnet_ids": [
|
|
"subnet-08dec6787782ee087",
|
|
"subnet-0927ba1b06ccfe6c5"
|
|
],
|
|
"vpc_id": "vpc-01a10b033169f89a8"
|
|
}
|
|
]
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfX0=",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_openid_connect_provider",
|
|
"name": "oidc_provider",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:oidc-provider/oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
|
|
"client_id_list": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"id": "arn:aws:iam::040216112220:oidc-provider/oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230",
|
|
"tags": {
|
|
"Name": "lab-ken2026-eks01-eks-irsa"
|
|
},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Name": "lab-ken2026-eks01-eks-irsa",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"thumbprint_list": [
|
|
"9e99a48a9960b14926bb7f3b02e22da2b0ab7280"
|
|
],
|
|
"url": "oidc.eks.ap-east-1.amazonaws.com/id/429089EE7D5495A667CEB1C7C6C03230"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"data.aws_caller_identity.current",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_caller_identity.current",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.data.tls_certificate.this",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.kms.data.aws_partition.current",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "cluster_encryption",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
|
|
"description": "Cluster encryption policy to allow cluster role to utilize CMK provided",
|
|
"id": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
|
|
"name": "lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
|
|
"name_prefix": "lab-ken2026-eks01-cluster-ClusterEncryption",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAQSXIRFROOLCWLS54P",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"data.aws_caller_identity.current",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.data.aws_caller_identity.current",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.kms.data.aws_partition.current",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:role/lab-ken2026-eks01-cluster-20231219130639543400000002",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2023-12-19T13:06:40Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002",
|
|
"inline_policy": [
|
|
{
|
|
"name": "lab-ken2026-eks01-cluster",
|
|
"policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"logs:CreateLogGroup\"],\"Effect\":\"Deny\",\"Resource\":\"*\"}]}"
|
|
}
|
|
],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
|
|
"arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
|
|
"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
|
|
"arn:aws:iam::aws:policy/AmazonEKSVPCResourceController"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "lab-ken2026-eks01-cluster-20231219130639543400000002",
|
|
"name_prefix": "lab-ken2026-eks01-cluster-",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"unique_id": "AROAQSXIRFROGM7O6BKZQ"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "additional",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "additional",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064329940000000b",
|
|
"policy_arn": "arn:aws:iam::040216112220:policy/lab-ape1-ken2026-eks-pub-module-test-policy",
|
|
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"aws_iam_policy.additional",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "cluster_encryption",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913065426620000000f",
|
|
"policy_arn": "arn:aws:iam::040216112220:policy/lab-ken2026-eks01-cluster-ClusterEncryption2023121913065283250000000e",
|
|
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"data.aws_caller_identity.current",
|
|
"module.eks.aws_iam_policy.cluster_encryption",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.data.aws_caller_identity.current",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.kms.data.aws_partition.current",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "AmazonEKSClusterPolicy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064342790000000c",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
|
|
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "AmazonEKSVPCResourceController",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "lab-ken2026-eks01-cluster-20231219130639543400000002-2023121913064345390000000d",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController",
|
|
"role": "lab-ken2026-eks01-cluster-20231219130639543400000002"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group",
|
|
"name": "cluster",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-05cb28b4ddca034bd",
|
|
"description": "EKS cluster security group",
|
|
"egress": [],
|
|
"id": "sg-05cb28b4ddca034bd",
|
|
"ingress": [
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Ingress from another computed security group",
|
|
"from_port": 22,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-07d06dc3dd1d3ac76"
|
|
],
|
|
"self": false,
|
|
"to_port": 22
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node groups to cluster API",
|
|
"from_port": 443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0b26be1293a8798bb"
|
|
],
|
|
"self": false,
|
|
"to_port": 443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Nodes on ephemeral ports",
|
|
"from_port": 1025,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0b26be1293a8798bb"
|
|
],
|
|
"self": false,
|
|
"to_port": 65535
|
|
}
|
|
],
|
|
"name": "lab-ken2026-eks01-cluster-20231219130755451100000002",
|
|
"name_prefix": "lab-ken2026-eks01-cluster-",
|
|
"owner_id": "040216112220",
|
|
"revoke_rules_on_delete": false,
|
|
"tags": {
|
|
"Name": "lab-ken2026-eks01-cluster"
|
|
},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Name": "lab-ken2026-eks01-cluster",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-01a10b033169f89a8"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group",
|
|
"name": "node",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:ap-east-1:040216112220:security-group/sg-0b26be1293a8798bb",
|
|
"description": "EKS node shared security group",
|
|
"egress": [
|
|
{
|
|
"cidr_blocks": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"description": "Allow all egress",
|
|
"from_port": 0,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "-1",
|
|
"security_groups": [],
|
|
"self": false,
|
|
"to_port": 0
|
|
}
|
|
],
|
|
"id": "sg-0b26be1293a8798bb",
|
|
"ingress": [
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 4443/tcp webhook",
|
|
"from_port": 4443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 4443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 6443/tcp webhook",
|
|
"from_port": 6443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 6443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 8443/tcp webhook",
|
|
"from_port": 8443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 8443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 9443/tcp webhook",
|
|
"from_port": 9443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 9443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node groups",
|
|
"from_port": 443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node kubelets",
|
|
"from_port": 10250,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-05cb28b4ddca034bd"
|
|
],
|
|
"self": false,
|
|
"to_port": 10250
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node CoreDNS UDP",
|
|
"from_port": 53,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "udp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 53
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node CoreDNS",
|
|
"from_port": 53,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 53
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node ingress on ephemeral ports",
|
|
"from_port": 1025,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 65535
|
|
}
|
|
],
|
|
"name": "lab-ken2026-eks01-node-20231219130755450800000001",
|
|
"name_prefix": "lab-ken2026-eks01-node-",
|
|
"owner_id": "040216112220",
|
|
"revoke_rules_on_delete": false,
|
|
"tags": {
|
|
"Name": "lab-ken2026-eks01-node",
|
|
"kubernetes.io/cluster/lab-ken2026-eks01": "owned"
|
|
},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Name": "lab-ken2026-eks01-node",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed",
|
|
"kubernetes.io/cluster/lab-ken2026-eks01": "owned"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-01a10b033169f89a8"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group_rule",
|
|
"name": "cluster",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "ingress_nodes_443",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node groups to cluster API",
|
|
"from_port": 443,
|
|
"id": "sgrule-4086161652",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-05cb28b4ddca034bd",
|
|
"security_group_rule_id": "sgr-0c9d68071b263a793",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0b26be1293a8798bb",
|
|
"timeouts": null,
|
|
"to_port": 443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_nodes_ephemeral_ports_tcp",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Nodes on ephemeral ports",
|
|
"from_port": 1025,
|
|
"id": "sgrule-1342523956",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-05cb28b4ddca034bd",
|
|
"security_group_rule_id": "sgr-099024ecd70ff43eb",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0b26be1293a8798bb",
|
|
"timeouts": null,
|
|
"to_port": 65535,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_source_security_group_id",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Ingress from another computed security group",
|
|
"from_port": 22,
|
|
"id": "sgrule-1070107027",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-05cb28b4ddca034bd",
|
|
"security_group_rule_id": "sgr-02db64b1ad863ab5d",
|
|
"self": false,
|
|
"source_security_group_id": "sg-07d06dc3dd1d3ac76",
|
|
"timeouts": null,
|
|
"to_port": 22,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group_rule",
|
|
"name": "node",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "egress_all",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"description": "Allow all egress",
|
|
"from_port": 0,
|
|
"id": "sgrule-2048858421",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "-1",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-09d732ed4880404ec",
|
|
"self": false,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 0,
|
|
"type": "egress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_443",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node groups",
|
|
"from_port": 443,
|
|
"id": "sgrule-4100952853",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-0c52533027be07c55",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_4443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 4443/tcp webhook",
|
|
"from_port": 4443,
|
|
"id": "sgrule-3552065770",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-066ee223b4568b05f",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 4443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_6443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 6443/tcp webhook",
|
|
"from_port": 6443,
|
|
"id": "sgrule-452616060",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-0a007e761bad7326b",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 6443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_8443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 8443/tcp webhook",
|
|
"from_port": 8443,
|
|
"id": "sgrule-161899357",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-0363b7221ce2b3f28",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 8443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_9443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 9443/tcp webhook",
|
|
"from_port": 9443,
|
|
"id": "sgrule-1829195926",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-0ad09455f981c0201",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 9443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_kubelet",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node kubelets",
|
|
"from_port": 10250,
|
|
"id": "sgrule-3137228705",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-00bf4b7fe2e3713b4",
|
|
"self": false,
|
|
"source_security_group_id": "sg-05cb28b4ddca034bd",
|
|
"timeouts": null,
|
|
"to_port": 10250,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_nodes_ephemeral",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node ingress on ephemeral ports",
|
|
"from_port": 1025,
|
|
"id": "sgrule-2441224662",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-09e81e74ac8979caa",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 65535,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_self_coredns_tcp",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node CoreDNS",
|
|
"from_port": 53,
|
|
"id": "sgrule-802483520",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-06fd8316cc112443e",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 53,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_self_coredns_udp",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node CoreDNS UDP",
|
|
"from_port": 53,
|
|
"id": "sgrule-2341162671",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": [],
|
|
"protocol": "udp",
|
|
"security_group_id": "sg-0b26be1293a8798bb",
|
|
"security_group_rule_id": "sgr-01e223c8388c979c5",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 53,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks",
|
|
"mode": "managed",
|
|
"type": "time_sleep",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/time\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"create_duration": "30s",
|
|
"destroy_duration": null,
|
|
"id": "2023-12-19T15:36:24Z",
|
|
"triggers": {
|
|
"cluster_certificate_authority_data": "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",
|
|
"cluster_endpoint": "https://429089EE7D5495A667CEB1C7C6C03230.sk1.ap-east-1.eks.amazonaws.com",
|
|
"cluster_name": "lab-ken2026-eks01",
|
|
"cluster_version": "1.27"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "040216112220",
|
|
"arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"id": "040216112220",
|
|
"user_id": "AIDAQSXIRFROOXYISSIEQ"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "assume_role_policy",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2560088296",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}",
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRole"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"ec2.amazonaws.com"
|
|
],
|
|
"type": "Service"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": "EKSNodeAssumeRole"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "managed",
|
|
"type": "aws_eks_node_group",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"ami_type": "AL2_x86_64",
|
|
"arn": "arn:aws:eks:ap-east-1:040216112220:nodegroup/lab-ken2026-eks01/eks-mng-20231219132251939500000002/f0c6411f-29ed-3829-c576-81c2416b8f15",
|
|
"capacity_type": "ON_DEMAND",
|
|
"cluster_name": "lab-ken2026-eks01",
|
|
"disk_size": 0,
|
|
"force_update_version": null,
|
|
"id": "lab-ken2026-eks01:eks-mng-20231219132251939500000002",
|
|
"instance_types": [
|
|
"t3.medium"
|
|
],
|
|
"labels": {},
|
|
"launch_template": [
|
|
{
|
|
"id": "lt-08dbcc22ce663df92",
|
|
"name": "eks-mng-eks-node-group-20231219131510418300000003",
|
|
"version": "3"
|
|
}
|
|
],
|
|
"node_group_name": "eks-mng-20231219132251939500000002",
|
|
"node_group_name_prefix": "eks-mng-",
|
|
"node_role_arn": "arn:aws:iam::040216112220:role/eks-mng-eks-node-group-20231219130639543000000001",
|
|
"release_version": "1.27.7-20231201",
|
|
"remote_access": [],
|
|
"resources": [
|
|
{
|
|
"autoscaling_groups": [
|
|
{
|
|
"name": "eks-eks-mng-20231219132251939500000002-f0c6411f-29ed-3829-c576-81c2416b8f15"
|
|
}
|
|
],
|
|
"remote_access_security_group_id": ""
|
|
}
|
|
],
|
|
"scaling_config": [
|
|
{
|
|
"desired_size": 1,
|
|
"max_size": 4,
|
|
"min_size": 0
|
|
}
|
|
],
|
|
"status": "ACTIVE",
|
|
"subnet_ids": [
|
|
"subnet-08dec6787782ee087",
|
|
"subnet-0927ba1b06ccfe6c5"
|
|
],
|
|
"tags": {
|
|
"Name": "eks-mng"
|
|
},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Name": "eks-mng",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"taint": [],
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
},
|
|
"update_config": [
|
|
{
|
|
"max_unavailable": 0,
|
|
"max_unavailable_percentage": 33
|
|
}
|
|
],
|
|
"version": "1.27"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::040216112220:role/eks-mng-eks-node-group-20231219130639543000000001",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2023-12-19T13:06:40Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks-mng-eks-node-group-20231219130639543000000001",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks-mng-eks-node-group-20231219130639543000000001",
|
|
"name_prefix": "eks-mng-eks-node-group-",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"unique_id": "AROAQSXIRFROI7AGB57AT"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "additional",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "SsmInstanceCore",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219143117452600000003",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore",
|
|
"role": "eks-mng-eks-node-group-20231219130639543000000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642446200000006",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"role": "eks-mng-eks-node-group-20231219130639543000000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642484600000007",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"role": "eks-mng-eks-node-group-20231219130639543000000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks-mng-eks-node-group-20231219130639543000000001-20231219130642441500000005",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"role": "eks-mng-eks-node-group-20231219130639543000000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks_managed_node_group",
|
|
"mode": "managed",
|
|
"type": "aws_launch_template",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:ap-east-1:040216112220:launch-template/lt-08dbcc22ce663df92",
|
|
"block_device_mappings": [],
|
|
"capacity_reservation_specification": [],
|
|
"cpu_options": [],
|
|
"credit_specification": [],
|
|
"default_version": 3,
|
|
"description": "",
|
|
"disable_api_stop": false,
|
|
"disable_api_termination": false,
|
|
"ebs_optimized": "",
|
|
"elastic_gpu_specifications": [],
|
|
"elastic_inference_accelerator": [],
|
|
"enclave_options": [],
|
|
"hibernation_options": [],
|
|
"iam_instance_profile": [],
|
|
"id": "lt-08dbcc22ce663df92",
|
|
"image_id": "",
|
|
"instance_initiated_shutdown_behavior": "",
|
|
"instance_market_options": [],
|
|
"instance_requirements": [],
|
|
"instance_type": "",
|
|
"kernel_id": "",
|
|
"key_name": "",
|
|
"latest_version": 3,
|
|
"license_specification": [],
|
|
"maintenance_options": [],
|
|
"metadata_options": [
|
|
{
|
|
"http_endpoint": "enabled",
|
|
"http_protocol_ipv6": "",
|
|
"http_put_response_hop_limit": 2,
|
|
"http_tokens": "required",
|
|
"instance_metadata_tags": ""
|
|
}
|
|
],
|
|
"monitoring": [
|
|
{
|
|
"enabled": true
|
|
}
|
|
],
|
|
"name": "eks-mng-eks-node-group-20231219131510418300000003",
|
|
"name_prefix": "eks-mng-eks-node-group-",
|
|
"network_interfaces": [],
|
|
"placement": [],
|
|
"private_dns_name_options": [],
|
|
"ram_disk_id": "",
|
|
"security_group_names": [],
|
|
"tag_specifications": [
|
|
{
|
|
"resource_type": "instance",
|
|
"tags": {
|
|
"Name": "eks-mng"
|
|
}
|
|
},
|
|
{
|
|
"resource_type": "network-interface",
|
|
"tags": {
|
|
"Name": "eks-mng"
|
|
}
|
|
},
|
|
{
|
|
"resource_type": "volume",
|
|
"tags": {
|
|
"Name": "eks-mng"
|
|
}
|
|
}
|
|
],
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"update_default_version": true,
|
|
"user_data": "",
|
|
"vpc_security_group_ids": [
|
|
"sg-05cb28b4ddca034bd",
|
|
"sg-0735e2bab44a525b8",
|
|
"sg-07d06dc3dd1d3ac76"
|
|
]
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"aws_security_group.additional",
|
|
"data.aws_caller_identity.current",
|
|
"module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.aws_eks_cluster.this",
|
|
"module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.aws_iam_role.this",
|
|
"module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.aws_security_group.cluster",
|
|
"module.eks.aws_security_group.node",
|
|
"module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.aws_security_group_rule.node",
|
|
"module.eks.data.aws_caller_identity.current",
|
|
"module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.data.aws_partition.current",
|
|
"module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.kms",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "040216112220",
|
|
"arn": "arn:aws:iam::040216112220:user/ken2026",
|
|
"id": "040216112220",
|
|
"user_id": "AIDAQSXIRFROOXYISSIEQ"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.kms",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2110400556",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"Default\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::040216112220:root\"\n }\n },\n {\n \"Sid\": \"KeyOwner\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::040216112220:user/ken2026\"\n }\n }\n ]\n}",
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"kms:*"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::040216112220:root"
|
|
],
|
|
"type": "AWS"
|
|
}
|
|
],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": "Default"
|
|
},
|
|
{
|
|
"actions": [
|
|
"kms:*"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::040216112220:user/ken2026"
|
|
],
|
|
"type": "AWS"
|
|
}
|
|
],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": "KeyOwner"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.kms",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": []
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.kms",
|
|
"mode": "managed",
|
|
"type": "aws_kms_alias",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "eks/lab-ape1-ken2026-eks-pub-module-test",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:kms:ap-east-1:040216112220:alias/eks/lab-ape1-ken2026-eks-pub-module-test",
|
|
"id": "alias/eks/lab-ape1-ken2026-eks-pub-module-test",
|
|
"name": "alias/eks/lab-ape1-ken2026-eks-pub-module-test",
|
|
"name_prefix": "",
|
|
"target_key_arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
|
|
"target_key_id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"data.aws_caller_identity.current",
|
|
"module.kms.aws_kms_external_key.this",
|
|
"module.kms.aws_kms_key.this",
|
|
"module.kms.aws_kms_replica_external_key.this",
|
|
"module.kms.aws_kms_replica_key.this",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.kms",
|
|
"mode": "managed",
|
|
"type": "aws_kms_key",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:kms:ap-east-1:040216112220:key/87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
|
|
"bypass_policy_lockout_safety_check": false,
|
|
"custom_key_store_id": "",
|
|
"customer_master_key_spec": "SYMMETRIC_DEFAULT",
|
|
"deletion_window_in_days": null,
|
|
"description": "lab-ape1-ken2026-eks-pub-module-test cluster encryption key",
|
|
"enable_key_rotation": true,
|
|
"id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
|
|
"is_enabled": true,
|
|
"key_id": "87b63350-fb2d-4137-b3b6-f72e4d8e7f21",
|
|
"key_usage": "ENCRYPT_DECRYPT",
|
|
"multi_region": false,
|
|
"policy": "{\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::040216112220:root\"},\"Resource\":\"*\",\"Sid\":\"Default\"},{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::040216112220:user/ken2026\"},\"Resource\":\"*\",\"Sid\":\"KeyOwner\"}],\"Version\":\"2012-10-17\"}",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Application": "terraform",
|
|
"Environment": "lab",
|
|
"Project": "eks-pub-module-test",
|
|
"ServiceProvider": "RackspaceTechnology",
|
|
"TerraformDir": "experimental/eks-upgrade-test",
|
|
"TerraformMode": "managed"
|
|
},
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDB9fQ==",
|
|
"dependencies": [
|
|
"data.aws_caller_identity.current",
|
|
"module.kms.data.aws_caller_identity.current",
|
|
"module.kms.data.aws_iam_policy_document.this",
|
|
"module.kms.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"check_results": null
|
|
}
|