Skip to content
This repository was archived by the owner on Jan 13, 2025. It is now read-only.

update prod #25

Merged
merged 2 commits into from
Aug 7, 2024
Merged

update prod #25

merged 2 commits into from
Aug 7, 2024

Conversation

Lutonite
Copy link
Member

@Lutonite Lutonite commented Aug 7, 2024

Description

Linked Issues

Additional context

@Lutonite Lutonite requested a review from a team as a code owner August 7, 2024 17:03
Copy link

github-actions bot commented Aug 7, 2024

Terraform plan in infrastructure

Plan: 4 to add, 0 to change, 2 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create
-   destroy
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # module.argocd.null_resource.argocd_apply_once is tainted, so must be replaced
-/+ resource "null_resource" "argocd_apply_once" {
!~      id       = "*******************" -> (known after apply)
#        (1 unchanged attribute hidden)
    }

  # module.eks.module.eks.aws_eks_access_entry.this["cicd"] will be created
+   resource "aws_eks_access_entry" "this" {
+       access_entry_arn  = (known after apply)
+       cluster_name      = "presentium"
+       created_at        = (known after apply)
+       id                = (known after apply)
+       kubernetes_groups = [
+           "system:masters",
        ]
+       modified_at       = (known after apply)
+       principal_arn     = "arn:aws:iam::123247571664:role/cicd"
+       tags              = {
+           "karpenter.sh/discovery" = "presentium"
        }
+       tags_all          = {
+           "Terraform"              = "true"
+           "karpenter.sh/discovery" = "presentium"
        }
+       type              = "STANDARD"
+       user_name         = (known after apply)
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["admins_admin"] will be created
+   resource "aws_eks_access_policy_association" "this" {
+       associated_at = (known after apply)
+       cluster_name  = "presentium"
+       id            = (known after apply)
+       modified_at   = (known after apply)
+       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
+       principal_arn = "arn:aws:iam::123247571664:role/PRES-EKS-ADMIN"

+       access_scope {
+           type = "cluster"
        }
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["admins_example"] will be destroyed
  # (because key ["admins_example"] is not in for_each map)
-   resource "aws_eks_access_policy_association" "this" {
-       associated_at = "2024-08-07 16:18:20.056 +0000 UTC" -> null
-       cluster_name  = "presentium" -> null
-       id            = "presentium#arn:aws:iam::123247571664:role/PRES-EKS-ADMIN#arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" -> null
-       modified_at   = "2024-08-07 16:18:20.056 +0000 UTC" -> null
-       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" -> null
-       principal_arn = "arn:aws:iam::123247571664:role/PRES-EKS-ADMIN" -> null

-       access_scope {
-           namespaces = [] -> null
-           type       = "cluster" -> null
        }
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["cicd_edit"] will be created
+   resource "aws_eks_access_policy_association" "this" {
+       associated_at = (known after apply)
+       cluster_name  = "presentium"
+       id            = (known after apply)
+       modified_at   = (known after apply)
+       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
+       principal_arn = "arn:aws:iam::123247571664:role/cicd"

+       access_scope {
+           type = "cluster"
        }
    }

Plan: 4 to add, 0 to change, 2 to destroy.

❌ Error applying plan in Apply terraform plan #12

@Lutonite Lutonite merged commit 4d8dba6 into production Aug 7, 2024
7 checks passed
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant