diff --git a/examples/basic/test b/examples/basic/test deleted file mode 100644 index 290a5b6..0000000 --- a/examples/basic/test +++ /dev/null @@ -1,1115 +0,0 @@ -module.vpc.data.aws_region.current: Reading... -module.eks.data.aws_eks_cluster_versions.available: Reading... -module.vpc.data.aws_region.current: Read complete after 0s [id=ap-southeast-2] -module.eks.data.aws_eks_cluster_versions.available: Read complete after 0s - -Terraform used the selected providers to generate the following execution -plan. Resource actions are indicated with the following symbols: - + create - <= read (data resources) - -Terraform will perform the following actions: - - # random_string.suffix will be created - + resource "random_string" "suffix" { - + id = (known after apply) - + length = 4 - + lower = true - + min_lower = 0 - + min_numeric = 0 - + min_special = 0 - + min_upper = 0 - + number = true - + numeric = true - + result = (known after apply) - + special = false - + upper = false - } - - # module.vpc.aws_eip.nat[0] will be created - + resource "aws_eip" "nat" { - + allocation_id = (known after apply) - + arn = (known after apply) - + association_id = (known after apply) - + carrier_ip = (known after apply) - + customer_owned_ip = (known after apply) - + domain = "vpc" - + id = (known after apply) - + instance = (known after apply) - + ipam_pool_id = (known after apply) - + network_border_group = (known after apply) - + network_interface = (known after apply) - + private_dns = (known after apply) - + private_ip = (known after apply) - + ptr_record = (known after apply) - + public_dns = (known after apply) - + public_ip = (known after apply) - + public_ipv4_pool = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - } - - # module.vpc.aws_internet_gateway.this[0] will be created - + resource "aws_internet_gateway" "this" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_nat_gateway.this[0] will be created - + resource "aws_nat_gateway" "this" { - + allocation_id = (known after apply) - + association_id = (known after apply) - + connectivity_type = "public" - + id = (known after apply) - + network_interface_id = (known after apply) - + private_ip = (known after apply) - + public_ip = (known after apply) - + region = "ap-southeast-2" - + secondary_allocation_ids = (known after apply) - + secondary_private_ip_address_count = (known after apply) - + secondary_private_ip_addresses = (known after apply) - + subnet_id = (known after apply) - + tags = (known after apply) - + tags_all = (known after apply) - } - - # module.vpc.aws_network_acl.private[0] will be created - + resource "aws_network_acl" "private" { - + arn = (known after apply) - + egress = [ - + { - + action = "allow" - + cidr_block = "0.0.0.0/0" - + from_port = 0 - + protocol = "-1" - + rule_no = 100 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - ] - + id = (known after apply) - + ingress = [ - + { - + action = "allow" - + cidr_block = "0.0.0.0/0" - + from_port = 0 - + protocol = "-1" - + rule_no = 200 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - + { - + action = "allow" - + cidr_block = "10.0.0.0/16" - + from_port = 0 - + protocol = "-1" - + rule_no = 100 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - + { - + action = "allow" - + cidr_block = "10.0.1.0/24" - + from_port = 0 - + protocol = "-1" - + rule_no = 150 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - ] - + owner_id = (known after apply) - + region = "ap-southeast-2" - + subnet_ids = (known after apply) - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_network_acl.public[0] will be created - + resource "aws_network_acl" "public" { - + arn = (known after apply) - + egress = [ - + { - + action = "allow" - + cidr_block = "0.0.0.0/0" - + from_port = 0 - + protocol = "-1" - + rule_no = 100 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - ] - + id = (known after apply) - + ingress = [ - + { - + action = "allow" - + cidr_block = "0.0.0.0/0" - + from_port = 0 - + protocol = "-1" - + rule_no = 200 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - + { - + action = "allow" - + cidr_block = "10.0.0.0/16" - + from_port = 0 - + protocol = "-1" - + rule_no = 100 - + to_port = 0 - # (1 unchanged attribute hidden) - }, - ] - + owner_id = (known after apply) - + region = "ap-southeast-2" - + subnet_ids = (known after apply) - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.private[0] will be created - + resource "aws_route_table" "private" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + nat_gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.private[1] will be created - + resource "aws_route_table" "private" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + nat_gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.private[2] will be created - + resource "aws_route_table" "private" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + nat_gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.public[0] will be created - + resource "aws_route_table" "public" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.public[1] will be created - + resource "aws_route_table" "public" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table.public[2] will be created - + resource "aws_route_table" "public" { - + arn = (known after apply) - + id = (known after apply) - + owner_id = (known after apply) - + propagating_vgws = (known after apply) - + region = "ap-southeast-2" - + route = [ - + { - + cidr_block = "0.0.0.0/0" - + gateway_id = (known after apply) - # (11 unchanged attributes hidden) - }, - ] - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_route_table_association.private[0] will be created - + resource "aws_route_table_association" "private" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_route_table_association.private[1] will be created - + resource "aws_route_table_association" "private" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_route_table_association.private[2] will be created - + resource "aws_route_table_association" "private" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_route_table_association.public[0] will be created - + resource "aws_route_table_association" "public" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_route_table_association.public[1] will be created - + resource "aws_route_table_association" "public" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_route_table_association.public[2] will be created - + resource "aws_route_table_association" "public" { - + id = (known after apply) - + region = "ap-southeast-2" - + route_table_id = (known after apply) - + subnet_id = (known after apply) - } - - # module.vpc.aws_subnet.private[0] will be created - + resource "aws_subnet" "private" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2a" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.101.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = false - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_subnet.private[1] will be created - + resource "aws_subnet" "private" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2b" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.102.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = false - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_subnet.private[2] will be created - + resource "aws_subnet" "private" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2c" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.103.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = false - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_subnet.public[0] will be created - + resource "aws_subnet" "public" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2a" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.1.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = true - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_subnet.public[1] will be created - + resource "aws_subnet" "public" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2b" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.2.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = true - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_subnet.public[2] will be created - + resource "aws_subnet" "public" { - + arn = (known after apply) - + assign_ipv6_address_on_creation = false - + availability_zone = "ap-southeast-2c" - + availability_zone_id = (known after apply) - + cidr_block = "10.0.3.0/24" - + enable_dns64 = false - + enable_resource_name_dns_a_record_on_launch = false - + enable_resource_name_dns_aaaa_record_on_launch = false - + id = (known after apply) - + ipv6_cidr_block_association_id = (known after apply) - + ipv6_native = false - + map_public_ip_on_launch = true - + owner_id = (known after apply) - + private_dns_hostname_type_on_launch = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.vpc.aws_vpc.this will be created - + resource "aws_vpc" "this" { - + arn = (known after apply) - + assign_generated_ipv6_cidr_block = true - + cidr_block = "10.0.0.0/16" - + default_network_acl_id = (known after apply) - + default_route_table_id = (known after apply) - + default_security_group_id = (known after apply) - + dhcp_options_id = (known after apply) - + enable_dns_hostnames = true - + enable_dns_support = true - + enable_network_address_usage_metrics = true - + id = (known after apply) - + instance_tenancy = "default" - + ipv6_association_id = (known after apply) - + ipv6_cidr_block = (known after apply) - + ipv6_cidr_block_network_border_group = (known after apply) - + main_route_table_id = (known after apply) - + owner_id = (known after apply) - + region = "ap-southeast-2" - + tags = (known after apply) - + tags_all = (known after apply) - } - - # module.eks.module.addons.aws_eks_addon.coredns[0] will be created - + resource "aws_eks_addon" "coredns" { - + addon_name = "coredns" - + addon_version = (known after apply) - + arn = (known after apply) - + cluster_name = (known after apply) - + configuration_values = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + region = "ap-southeast-2" - + resolve_conflicts_on_create = "OVERWRITE" - + resolve_conflicts_on_update = "OVERWRITE" - + tags_all = (known after apply) - - + timeouts { - + create = "20m" - + delete = "20m" - + update = "20m" - } - } - - # module.eks.module.addons.aws_eks_addon.ebs_csi[0] will be created - + resource "aws_eks_addon" "ebs_csi" { - + addon_name = "aws-ebs-csi-driver" - + addon_version = (known after apply) - + arn = (known after apply) - + cluster_name = (known after apply) - + configuration_values = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + region = "ap-southeast-2" - + resolve_conflicts_on_create = "OVERWRITE" - + resolve_conflicts_on_update = "OVERWRITE" - + tags_all = (known after apply) - - + timeouts { - + create = "20m" - + delete = "20m" - + update = "20m" - } - } - - # module.eks.module.addons.aws_eks_addon.efs_csi[0] will be created - + resource "aws_eks_addon" "efs_csi" { - + addon_name = "aws-efs-csi-driver" - + addon_version = (known after apply) - + arn = (known after apply) - + cluster_name = (known after apply) - + configuration_values = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + region = "ap-southeast-2" - + resolve_conflicts_on_create = "OVERWRITE" - + resolve_conflicts_on_update = "OVERWRITE" - + tags_all = (known after apply) - - + timeouts { - + create = "20m" - + delete = "20m" - + update = "20m" - } - } - - # module.eks.module.addons.aws_eks_addon.kube_proxy[0] will be created - + resource "aws_eks_addon" "kube_proxy" { - + addon_name = "kube-proxy" - + addon_version = (known after apply) - + arn = (known after apply) - + cluster_name = (known after apply) - + configuration_values = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + region = "ap-southeast-2" - + resolve_conflicts_on_create = "OVERWRITE" - + resolve_conflicts_on_update = "OVERWRITE" - + tags_all = (known after apply) - - + timeouts { - + create = "20m" - + delete = "20m" - + update = "20m" - } - } - - # module.eks.module.addons.aws_eks_addon.vpc_cni[0] will be created - + resource "aws_eks_addon" "vpc_cni" { - + addon_name = "vpc-cni" - + addon_version = (known after apply) - + arn = (known after apply) - + cluster_name = (known after apply) - + configuration_values = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + region = "ap-southeast-2" - + resolve_conflicts_on_create = "OVERWRITE" - + resolve_conflicts_on_update = "OVERWRITE" - + tags_all = (known after apply) - - + timeouts { - + create = "20m" - + delete = "20m" - + update = "20m" - } - } - - # module.eks.module.cloudwatch_logs.aws_cloudwatch_log_group.control_plane[0] will be created - + resource "aws_cloudwatch_log_group" "control_plane" { - + arn = (known after apply) - + id = (known after apply) - + log_group_class = (known after apply) - + name = (known after apply) - + name_prefix = (known after apply) - + region = "ap-southeast-2" - + retention_in_days = 1 - + skip_destroy = false - + tags = { - + "Environment" = "dev" - + "Project" = "example" - } - + tags_all = { - + "Environment" = "dev" - + "Project" = "example" - } - } - - # module.eks.module.cluster.data.aws_caller_identity.current will be read during apply - # (depends on a resource or a module with changes pending) - <= data "aws_caller_identity" "current" { - + account_id = (known after apply) - + arn = (known after apply) - + id = (known after apply) - + user_id = (known after apply) - } - - # module.eks.module.cluster.data.aws_eks_cluster_auth.this[0] will be read during apply - # (config refers to values not yet known) - <= data "aws_eks_cluster_auth" "this" { - + id = (known after apply) - + name = (known after apply) - + region = (known after apply) - + token = (sensitive value) - } - - # module.eks.module.cluster.data.aws_iam_policy_document.eks_assume_role will be read during apply - # (depends on a resource or a module with changes pending) - <= data "aws_iam_policy_document" "eks_assume_role" { - + id = (known after apply) - + json = (known after apply) - + minified_json = (known after apply) - - + statement { - + actions = [ - + "sts:AssumeRole", - ] - - + principals { - + identifiers = [ - + "eks.amazonaws.com", - ] - + type = "Service" - } - } - } - - # module.eks.module.cluster.aws_eks_access_entry.terraform_executor[0] will be created - + resource "aws_eks_access_entry" "terraform_executor" { - + access_entry_arn = (known after apply) - + cluster_name = (known after apply) - + created_at = (known after apply) - + id = (known after apply) - + kubernetes_groups = (known after apply) - + modified_at = (known after apply) - + principal_arn = (known after apply) - + region = "ap-southeast-2" - + tags_all = (known after apply) - + type = "STANDARD" - + user_name = (known after apply) - } - - # module.eks.module.cluster.aws_eks_access_policy_association.terraform_executor[0] will be created - + resource "aws_eks_access_policy_association" "terraform_executor" { - + associated_at = (known after apply) - + cluster_name = (known after apply) - + id = (known after apply) - + modified_at = (known after apply) - + policy_arn = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" - + principal_arn = (known after apply) - + region = "ap-southeast-2" - - + access_scope { - + type = "cluster" - } - } - - # module.eks.module.cluster.aws_eks_cluster.this[0] will be created - + resource "aws_eks_cluster" "this" { - + arn = (known after apply) - + bootstrap_self_managed_addons = true - + certificate_authority = (known after apply) - + cluster_id = (known after apply) - + created_at = (known after apply) - + enabled_cluster_log_types = [ - + "api", - + "audit", - + "authenticator", - + "controllerManager", - + "scheduler", - ] - + endpoint = (known after apply) - + id = (known after apply) - + identity = (known after apply) - + name = (known after apply) - + platform_version = (known after apply) - + region = "ap-southeast-2" - + role_arn = (known after apply) - + status = (known after apply) - + tags = { - + "Environment" = "dev" - + "Project" = "example" - } - + tags_all = { - + "Environment" = "dev" - + "Project" = "example" - } - + version = (known after apply) - - + access_config { - + authentication_mode = "API_AND_CONFIG_MAP" - + bootstrap_cluster_creator_admin_permissions = false - } - - + encryption_config (known after apply) - - + kubernetes_network_config { - + ip_family = (known after apply) - + service_ipv4_cidr = "10.100.0.0/16" - + service_ipv6_cidr = (known after apply) - - + elastic_load_balancing (known after apply) - } - - + timeouts {} - - + upgrade_policy (known after apply) - - + vpc_config { - + cluster_security_group_id = (known after apply) - + endpoint_private_access = false - + endpoint_public_access = true - + public_access_cidrs = [ - + "0.0.0.0/0", - ] - + security_group_ids = (known after apply) - + subnet_ids = (known after apply) - + vpc_id = (known after apply) - } - } - - # module.eks.module.cluster.aws_iam_role.cluster[0] will be created - + resource "aws_iam_role" "cluster" { - + arn = (known after apply) - + assume_role_policy = (known after apply) - + create_date = (known after apply) - + force_detach_policies = false - + id = (known after apply) - + managed_policy_arns = (known after apply) - + max_session_duration = 3600 - + name = (known after apply) - + name_prefix = (known after apply) - + path = "/" - + tags = { - + "Environment" = "dev" - + "Project" = "example" - } - + tags_all = { - + "Environment" = "dev" - + "Project" = "example" - } - + unique_id = (known after apply) - - + inline_policy (known after apply) - } - - # module.eks.module.cluster.aws_iam_role_policy_attachment.cluster_policies["arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"] will be created - + resource "aws_iam_role_policy_attachment" "cluster_policies" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" - + role = (known after apply) - } - - # module.eks.module.cluster.aws_security_group.cluster[0] will be created - + resource "aws_security_group" "cluster" { - + arn = (known after apply) - + description = "Cluster security group" - + egress = [ - + { - + cidr_blocks = [ - + "0.0.0.0/0", - ] - + from_port = 0 - + ipv6_cidr_blocks = [] - + prefix_list_ids = [] - + protocol = "-1" - + security_groups = [] - + self = false - + to_port = 0 - # (1 unchanged attribute hidden) - }, - ] - + id = (known after apply) - + ingress = (known after apply) - + name = (known after apply) - + name_prefix = (known after apply) - + owner_id = (known after apply) - + region = "ap-southeast-2" - + revoke_rules_on_delete = false - + tags = (known after apply) - + tags_all = (known after apply) - + vpc_id = (known after apply) - } - - # module.eks.module.cluster.time_sleep.wait_for_access_propagation[0] will be created - + resource "time_sleep" "wait_for_access_propagation" { - + create_duration = "20s" - + id = (known after apply) - } - - # module.eks.module.cluster.time_sleep.wait_for_cluster_visibility[0] will be created - + resource "time_sleep" "wait_for_cluster_visibility" { - + create_duration = "30s" - + id = (known after apply) - } - - # module.eks.module.encryption.aws_kms_alias.this[0] will be created - + resource "aws_kms_alias" "this" { - + arn = (known after apply) - + id = (known after apply) - + name = (known after apply) - + name_prefix = (known after apply) - + region = "ap-southeast-2" - + target_key_arn = (known after apply) - + target_key_id = (known after apply) - } - - # module.eks.module.encryption.aws_kms_key.this[0] will be created - + resource "aws_kms_key" "this" { - + arn = (known after apply) - + bypass_policy_lockout_safety_check = false - + customer_master_key_spec = "SYMMETRIC_DEFAULT" - + deletion_window_in_days = 7 - + description = "EKS secret encryption key" - + enable_key_rotation = true - + id = (known after apply) - + is_enabled = true - + key_id = (known after apply) - + key_usage = "ENCRYPT_DECRYPT" - + multi_region = (known after apply) - + policy = (known after apply) - + region = "ap-southeast-2" - + rotation_period_in_days = (known after apply) - + tags = { - + "Environment" = "dev" - + "Project" = "example" - } - + tags_all = { - + "Environment" = "dev" - + "Project" = "example" - } - } - - # module.eks.module.irsa.aws_iam_openid_connect_provider.this[0] will be created - + resource "aws_iam_openid_connect_provider" "this" { - + arn = (known after apply) - + client_id_list = [ - + "sts.amazonaws.com", - ] - + id = (known after apply) - + tags = { - + "Environment" = "dev" - + "Project" = "example" - } - + tags_all = { - + "Environment" = "dev" - + "Project" = "example" - } - + thumbprint_list = (known after apply) - + url = (known after apply) - } - - # module.eks.module.namespaces.kubernetes_namespace.this["logging"] will be created - + resource "kubernetes_namespace" "this" { - + id = (known after apply) - + wait_for_default_service_account = false - - + metadata { - + generation = (known after apply) - + labels = { - + "app.kubernetes.io/name" = "logging" - } - + name = "logging" - + resource_version = (known after apply) - + uid = (known after apply) - } - } - - # module.eks.module.namespaces.kubernetes_namespace.this["monitoring"] will be created - + resource "kubernetes_namespace" "this" { - + id = (known after apply) - + wait_for_default_service_account = false - - + metadata { - + generation = (known after apply) - + labels = { - + "app.kubernetes.io/name" = "monitoring" - } - + name = "monitoring" - + resource_version = (known after apply) - + uid = (known after apply) - } - } - - # module.eks.module.node_groups.aws_eks_node_group.managed["general"] will be created - + resource "aws_eks_node_group" "managed" { - + ami_type = (known after apply) - + arn = (known after apply) - + capacity_type = (known after apply) - + cluster_name = (known after apply) - + disk_size = (known after apply) - + id = (known after apply) - + instance_types = [ - + "t3.medium", - ] - + labels = { - + "node.kubernetes.io/instance-type" = "t3.medium" - + "node.kubernetes.io/role" = "worker" - } - + node_group_name = "general" - + node_group_name_prefix = (known after apply) - + node_role_arn = (known after apply) - + region = "ap-southeast-2" - + release_version = (known after apply) - + resources = (known after apply) - + status = (known after apply) - + subnet_ids = (known after apply) - + tags = (known after apply) - + tags_all = (known after apply) - + version = (known after apply) - - + node_repair_config (known after apply) - - + scaling_config { - + desired_size = 2 - + max_size = 5 - + min_size = 1 - } - - + update_config (known after apply) - } - - # module.eks.module.node_groups.aws_eks_node_group.managed["spot"] will be created - + resource "aws_eks_node_group" "managed" { - + ami_type = (known after apply) - + arn = (known after apply) - + capacity_type = (known after apply) - + cluster_name = (known after apply) - + disk_size = (known after apply) - + id = (known after apply) - + instance_types = [ - + "t3.medium", - + "t3.small", - ] - + labels = { - + "node.kubernetes.io/instance-type" = "spot" - + "node.kubernetes.io/role" = "worker" - } - + node_group_name = "spot" - + node_group_name_prefix = (known after apply) - + node_role_arn = (known after apply) - + region = "ap-southeast-2" - + release_version = (known after apply) - + resources = (known after apply) - + status = (known after apply) - + subnet_ids = (known after apply) - + tags = (known after apply) - + tags_all = (known after apply) - + version = (known after apply) - - + node_repair_config (known after apply) - - + scaling_config { - + desired_size = 1 - + max_size = 3 - + min_size = 0 - } - - + taint { - + effect = "NO_SCHEDULE" - + key = "spot" - + value = "true" - } - - + update_config (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role.managed_node_group["general"] will be created - + resource "aws_iam_role" "managed_node_group" { - + arn = (known after apply) - + assume_role_policy = jsonencode( - { - + Statement = [ - + { - + Action = "sts:AssumeRole" - + Effect = "Allow" - + Principal = { - + Service = "ec2.amazonaws.com" - } - }, - ] - + Version = "2012-10-17" - } - ) - + create_date = (known after apply) - + force_detach_policies = false - + id = (known after apply) - + managed_policy_arns = (known after apply) - + max_session_duration = 3600 - + name = (known after apply) - + name_prefix = (known after apply) - + path = "/" - + tags = (known after apply) - + tags_all = (known after apply) - + unique_id = (known after apply) - - + inline_policy (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role.managed_node_group["spot"] will be created - + resource "aws_iam_role" "managed_node_group" { - + arn = (known after apply) - + assume_role_policy = jsonencode( - { - + Statement = [ - + { - + Action = "sts:AssumeRole" - + Effect = "Allow" - + Principal = { - + Service = "ec2.amazonaws.com" - } - }, - ] - + Version = "2012-10-17" - } - ) - + create_date = (known after apply) - + force_detach_policies = false - + id = (known after apply) - + managed_policy_arns = (known after apply) - + max_session_duration = 3600 - + name = (known after apply) - + name_prefix = (known after apply) - + path = "/" - + tags = (known after apply) - + tags_all = (known after apply) - + unique_id = (known after apply) - - + inline_policy (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEC2ContainerRegistryReadOnly["general"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEC2ContainerRegistryReadOnly" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" - + role = (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEC2ContainerRegistryReadOnly["spot"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEC2ContainerRegistryReadOnly" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" - + role = (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEKSWorkerNodePolicy["general"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEKSWorkerNodePolicy" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy" - + role = (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEKSWorkerNodePolicy["spot"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEKSWorkerNodePolicy" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy" - + role = (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEKS_CNI_Policy["general"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEKS_CNI_Policy" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy" - + role = (known after apply) - } - - # module.eks.module.node_groups.aws_iam_role_policy_attachment.managed_node_group_AmazonEKS_CNI_Policy["spot"] will be created - + resource "aws_iam_role_policy_attachment" "managed_node_group_AmazonEKS_CNI_Policy" { - + id = (known after apply) - + policy_arn = "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy" - + role = (known after apply) - } - -Plan: 54 to add, 0 to change, 0 to destroy. - -───────────────────────────────────────────────────────────────────────────── - -Note: You didn't use the -out option to save this plan, so Terraform can't -guarantee to take exactly these actions if you run "terraform apply" now.