{ "version": 4, "terraform_version": "1.12.2", "serial": 318, "lineage": "e0fa6852-8979-09e2-362d-b95bd3e079e1", "outputs": {}, "resources": [ { "module": "module.eks.module.cert_manager_irsa_role", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "cert_manager", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "3416383923", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:GetChange\",\n \"Resource\": \"arn:aws:route53:::change/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"route53:ListResourceRecordSets\",\n \"route53:ChangeResourceRecordSets\"\n ],\n \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:ListHostedZonesByName\",\n \"Resource\": \"*\"\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:GetChange\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":\"route53:ListHostedZonesByName\",\"Resource\":\"*\"}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "route53:GetChange" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:route53:::change/*" ], "sid": "" }, { "actions": [ "route53:ChangeResourceRecordSets", "route53:ListResourceRecordSets" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:route53:::hostedzone/*" ], "sid": "" }, { "actions": [ "route53:ListHostedZonesByName" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "1545384681", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cert-manager\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRoleWithWebIdentity" ], "condition": [ { "test": "StringEquals", "values": [ "sts.amazonaws.com" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud" }, { "test": "StringEquals", "values": [ "system:serviceaccount:kube-system:cert-manager" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" ], "type": "Federated" } ], "resources": [], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1", "region": "us-east-1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "managed", "type": "aws_iam_policy", "name": "cert_manager", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "attachment_count": 1, "description": "Cert Manager policy to allow management of Route53 hosted zone records", "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "name": "AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "name_prefix": "AmazonEKS_eks1-devel_Cert_Manager_Policy-", "path": "/", "policy": "{\"Statement\":[{\"Action\":\"route53:GetChange\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":\"route53:ListHostedZonesByName\",\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FG6HNVVFKD", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager", "module.eks.module.cert_manager_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-cert-manager", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-27T01:03:26Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-cert-manager", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001" ], "max_session_duration": 3600, "name": "eks1-devel-cert-manager", "name_prefix": "", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FO56IFZGYS" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-cert-manager" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current", "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.cert_manager_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.cert_manager_irsa_role", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "cert_manager", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-cert-manager/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "role": "eks1-devel-cert-manager" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001", "role": "eks1-devel-cert-manager" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cert_manager_irsa_role.aws_iam_policy.cert_manager", "module.eks.module.cert_manager_irsa_role.aws_iam_role.this", "module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current", "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager", "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.cert_manager_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "cluster_autoscaler", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2162280319", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"eks:DescribeNodegroup\",\n \"ec2:GetInstanceTypesFromInstanceRequirements\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeImages\",\n \"autoscaling:DescribeTags\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeAutoScalingGroups\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:SetDesiredCapacity\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\": \"owned\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "autoscaling:DescribeAutoScalingGroups", "autoscaling:DescribeAutoScalingInstances", "autoscaling:DescribeLaunchConfigurations", "autoscaling:DescribeScalingActivities", "autoscaling:DescribeTags", "ec2:DescribeImages", "ec2:DescribeInstanceTypes", "ec2:DescribeLaunchTemplateVersions", "ec2:GetInstanceTypesFromInstanceRequirements", "eks:DescribeNodegroup" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "autoscaling:SetDesiredCapacity", "autoscaling:TerminateInstanceInAutoScalingGroup" ], "condition": [ { "test": "StringEquals", "values": [ "owned" ], "variable": "autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "1043243729", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cluster-autoscaler\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRoleWithWebIdentity" ], "condition": [ { "test": "StringEquals", "values": [ "sts.amazonaws.com" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud" }, { "test": "StringEquals", "values": [ "system:serviceaccount:kube-system:cluster-autoscaler" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" ], "type": "Federated" } ], "resources": [], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1", "region": "us-east-1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "managed", "type": "aws_iam_policy", "name": "cluster_autoscaler", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "attachment_count": 1, "description": "Cluster autoscaler policy to allow examination and modification of EC2 Auto Scaling Groups", "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "name": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "name_prefix": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-", "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FADZLMDOQX", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-autoscaler", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-26T05:25:15Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-cluster-autoscaler", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d" ], "max_session_duration": 3600, "name": "eks1-devel-cluster-autoscaler", "name_prefix": "", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FEIFH6MTO2" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-cluster-autoscaler" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.cluster_autoscaler_irsa_role", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "cluster_autoscaler", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-cluster-autoscaler/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "role": "eks1-devel-cluster-autoscaler" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d", "role": "eks1-devel-cluster-autoscaler" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.cluster_autoscaler_irsa_role.aws_iam_policy.cluster_autoscaler", "module.eks.module.cluster_autoscaler_irsa_role.aws_iam_role.this", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "ebs_csi", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "4189668531", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeAvailabilityZones\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:ModifyVolume\",\n \"ec2:CreateSnapshot\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DetachVolume\",\n \"ec2:AttachVolume\"\n ],\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:instance/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:EnableFastSnapshotRestores\",\n \"ec2:CreateVolume\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateTags\",\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:snapshot/*\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteTags\",\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/CSIVolumeName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/CSIVolumeName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/CSIVolumeSnapshotName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/CSIVolumeSnapshotName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"],\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "ec2:DescribeAvailabilityZones", "ec2:DescribeInstances", "ec2:DescribeSnapshots", "ec2:DescribeTags", "ec2:DescribeVolumes", "ec2:DescribeVolumesModifications" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "ec2:CreateSnapshot", "ec2:ModifyVolume" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:AttachVolume", "ec2:DetachVolume" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:CreateVolume", "ec2:EnableFastSnapshotRestores" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*" ], "sid": "" }, { "actions": [ "ec2:CreateTags" ], "condition": [ { "test": "StringEquals", "values": [ "CreateVolume", "CreateSnapshot" ], "variable": "ec2:CreateAction" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*", "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:DeleteTags" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*", "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:CreateVolume" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:RequestTag/ebs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:CreateVolume" ], "condition": [ { "test": "StringLike", "values": [ "*" ], "variable": "aws:RequestTag/CSIVolumeName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:DeleteVolume" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:ResourceTag/ebs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:DeleteVolume" ], "condition": [ { "test": "StringLike", "values": [ "*" ], "variable": "aws:ResourceTag/CSIVolumeName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:DeleteVolume" ], "condition": [ { "test": "StringLike", "values": [ "*" ], "variable": "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:volume/*" ], "sid": "" }, { "actions": [ "ec2:CreateSnapshot" ], "condition": [ { "test": "StringLike", "values": [ "*" ], "variable": "aws:RequestTag/CSIVolumeSnapshotName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*" ], "sid": "" }, { "actions": [ "ec2:CreateSnapshot" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:RequestTag/ebs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*" ], "sid": "" }, { "actions": [ "ec2:DeleteSnapshot" ], "condition": [ { "test": "StringLike", "values": [ "*" ], "variable": "aws:ResourceTag/CSIVolumeSnapshotName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*" ], "sid": "" }, { "actions": [ "ec2:DeleteSnapshot" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:ResourceTag/ebs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:snapshot/*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "3862641923", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:ebs-csi-controller-sa\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRoleWithWebIdentity" ], "condition": [ { "test": "StringEquals", "values": [ "sts.amazonaws.com" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud" }, { "test": "StringEquals", "values": [ "system:serviceaccount:kube-system:ebs-csi-controller-sa" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" ], "type": "Federated" } ], "resources": [], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1", "region": "us-east-1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "managed", "type": "aws_iam_policy", "name": "ebs_csi", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "attachment_count": 1, "description": "Provides permissions to manage EBS volumes via the container storage interface driver", "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "name": "AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "name_prefix": "AmazonEKS_eks1-devel_EBS_CSI_Policy-", "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FBDEFQK6I6", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi", "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-ebs-csi", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-28T19:11:10Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-ebs-csi", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001" ], "max_session_duration": 3600, "name": "eks1-devel-ebs-csi", "name_prefix": "", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FAOGGU4EPY" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-ebs-csi" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current", "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.ebs_csi_irsa_role", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "ebs_csi", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-ebs-csi/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "role": "eks1-devel-ebs-csi" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001", "role": "eks1-devel-ebs-csi" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi", "module.eks.module.ebs_csi_irsa_role.aws_iam_role.this", "module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current", "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi", "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current", "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "aws_eks_addon_version", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "aws-ebs-csi-driver", "schema_version": 0, "attributes": { "addon_name": "aws-ebs-csi-driver", "id": "aws-ebs-csi-driver", "kubernetes_version": "1.33", "most_recent": true, "region": "us-east-1", "version": "v1.46.0-eksbuild.1" }, "sensitive_attributes": [], "identity_schema_version": 0 }, { "index_key": "coredns", "schema_version": 0, "attributes": { "addon_name": "coredns", "id": "coredns", "kubernetes_version": "1.33", "most_recent": true, "region": "us-east-1", "version": "v1.12.2-eksbuild.4" }, "sensitive_attributes": [], "identity_schema_version": 0 }, { "index_key": "eks-pod-identity-agent", "schema_version": 0, "attributes": { "addon_name": "eks-pod-identity-agent", "id": "eks-pod-identity-agent", "kubernetes_version": "1.33", "most_recent": true, "region": "us-east-1", "version": "v1.3.8-eksbuild.2" }, "sensitive_attributes": [], "identity_schema_version": 0 }, { "index_key": "kube-proxy", "schema_version": 0, "attributes": { "addon_name": "kube-proxy", "id": "kube-proxy", "kubernetes_version": "1.33", "most_recent": true, "region": "us-east-1", "version": "v1.33.0-eksbuild.2" }, "sensitive_attributes": [], "identity_schema_version": 0 }, { "index_key": "vpc-cni", "schema_version": 0, "attributes": { "addon_name": "vpc-cni", "id": "vpc-cni", "kubernetes_version": "1.33", "most_recent": true, "region": "us-east-1", "version": "v1.20.0-eksbuild.1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "aws_iam_policy_document", "name": "assume_role_policy", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2830595799", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sts:TagSession\",\n \"sts:AssumeRole\"\n ],\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSClusterAssumeRole\",\"Effect\":\"Allow\",\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRole", "sts:TagSession" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "eks.amazonaws.com" ], "type": "Service" } ], "resources": [], "sid": "EKSClusterAssumeRole" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "aws_iam_session_context", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "issuer_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687", "issuer_id": "AROAT7O4IS4FGZRTFR25S", "issuer_name": "AWSReservedSSO_AdministratorAccess_b8026af88eb7c687", "session_name": "ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "data", "type": "tls_certificate", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/tls\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "certificates": [ { "cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US", "not_after": "2034-06-28T17:39:16Z", "not_before": "2009-09-02T00:00:00Z", "public_key_algorithm": "RSA", "serial_number": "12037640545166866303", "sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", "signature_algorithm": "SHA256-RSA", "subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", "not_after": "2037-12-31T01:00:00Z", "not_before": "2015-05-25T12:00:00Z", "public_key_algorithm": "RSA", "serial_number": "144918191876577076464031512351042010504348870", "sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39", "signature_algorithm": "SHA256-RSA", "subject": "CN=Amazon Root CA 1,O=Amazon,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----\nMIIEXjCCA0agAwIBAgITB3MSTNQG0mfAmRzdKZqfODF5hTANBgkqhkiG9w0BAQsF\nADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6\nb24gUm9vdCBDQSAxMB4XDTIyMDgyMzIyMjYwNFoXDTMwMDgyMzIyMjYwNFowPDEL\nMAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEcMBoGA1UEAxMTQW1hem9uIFJT\nQSAyMDQ4IE0wMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALd/pVko\n8vuM475Tf45HV3BbCl/B9Jy89G1CRkFjcPY06WA9lS+7dWbUA7GtWUKoksr69hKM\nwcMsNpxlw7b3jeXFgxB09/nmalcAWtnLzF+LaDKEA5DQmvKzuh1nfIfqEiKCQSmX\nXh09Xs+dO7cm5qbaL2hhNJCSAejciwcvOFgFNgEMR42wm6KIFHsQW28jhA+1u/M0\np6fVwReuEgZfLfdx82Px0LJck3lST3EB/JfbdsdOzzzg5YkY1dfuqf8y5fUeZ7Cz\nWXbTjujwX/TovmeWKA36VLCz75azW6tDNuDn66FOpADZZ9omVaF6BqNJiLMVl6P3\n/c0OiUMC6Z5OfKcCAwEAAaOCAVowggFWMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYD\nVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAdBgNV\nHQ4EFgQUVdkYX9IczAHhWLS+q9lVQgHXLgIwHwYDVR0jBBgwFoAUhBjMhTTsvAyU\nlC4IWZzHshBOCggwewYIKwYBBQUHAQEEbzBtMC8GCCsGAQUFBzABhiNodHRwOi8v\nb2NzcC5yb290Y2ExLmFtYXpvbnRydXN0LmNvbTA6BggrBgEFBQcwAoYuaHR0cDov\nL2NydC5yb290Y2ExLmFtYXpvbnRydXN0LmNvbS9yb290Y2ExLmNlcjA/BgNVHR8E\nODA2MDSgMqAwhi5odHRwOi8vY3JsLnJvb3RjYTEuYW1hem9udHJ1c3QuY29tL3Jv\nb3RjYTEuY3JsMBMGA1UdIAQMMAowCAYGZ4EMAQIBMA0GCSqGSIb3DQEBCwUAA4IB\nAQAGjeWm2cC+3z2MzSCnte46/7JZvj3iQZDY7EvODNdZF41n71Lrk9kbfNwerK0d\nVNzW36Wefr7j7ZSwBVg50W5ay65jNSN74TTQV1yt4WnSbVvN6KlMs1hiyOZdoHKs\nKDV2UGNxbdoBYCQNa2GYF8FQIWLugNp35aSOpMy6cFlymFQomIrnOQHwK1nvVY4q\nxDSJMU/gNJz17D8ArPN3ngnyZ2TwepJ0uBINz3G5te2rdFUF4i4Y3Bb7FUlHDYm4\nu8aIRGpk2ZpfXmxaoxnbIBZRvGLPSUuPwnwoUOMsJ8jirI5vs2dvchPb7MtI1rle\ni02f2ivH2vxkjDLltSpe2fiC\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "CN=Amazon Root CA 1,O=Amazon,C=US", "not_after": "2030-08-23T22:26:04Z", "not_before": "2022-08-23T22:26:04Z", "public_key_algorithm": "RSA", "serial_number": "166129356476704345391986644047206454194698629", "sha1_fingerprint": "d9fe0a65fa00cabf61f5120d373a8135e1461f15", "signature_algorithm": "SHA256-RSA", "subject": "CN=Amazon RSA 2048 M03,O=Amazon,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----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\n0mKQwrjkiglpYaXc247Qi8IUCdk6s13xHJ4e\n-----END CERTIFICATE-----\n", "is_ca": false, "issuer": "CN=Amazon RSA 2048 M03,O=Amazon,C=US", "not_after": "2026-03-27T23:59:59Z", "not_before": "2025-02-26T00:00:00Z", "public_key_algorithm": "RSA", "serial_number": "10383334045647432453656403708671617453", "sha1_fingerprint": "63462dda480d8b900e0a7dbfaf6238a62ba4fce0", "signature_algorithm": "SHA256-RSA", "subject": "CN=*.eks.us-east-1.amazonaws.com", "version": 3 } ], "content": null, "id": "922877a0975ad078a65b8ff11ebc47b8311945c7", "url": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19", "verify_chain": true }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_cloudwatch_log_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:logs:us-east-1:273729230602:log-group:/aws/eks/eks1-devel/cluster", "id": "/aws/eks/eks1-devel/cluster", "kms_key_id": "", "log_group_class": "STANDARD", "name": "/aws/eks/eks1-devel/cluster", "name_prefix": "", "region": "us-east-1", "retention_in_days": 90, "skip_destroy": false, "tags": { "Name": "/aws/eks/eks1-devel/cluster" }, "tags_all": { "Environment": "devel", "Name": "/aws/eks/eks1-devel/cluster", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "bnVsbA==", "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_eks_access_entry", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "cluster_creator", "schema_version": 0, "attributes": { "access_entry_arn": "arn:aws:eks:us-east-1:273729230602:access-entry/eks1-devel/role/273729230602/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/c0cc2290-c2f1-d36f-a3aa-9948fb9dd5c4", "cluster_name": "eks1-devel", "created_at": "2025-07-26T05:08:01Z", "id": "eks1-devel:arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687", "kubernetes_groups": [], "modified_at": "2025-07-26T05:08:01Z", "principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687", "region": "us-east-1", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": null, "type": "STANDARD", "user_name": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/{{SessionName}}" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_eks_access_policy_association", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "cluster_creator_admin", "schema_version": 0, "attributes": { "access_scope": [ { "namespaces": [], "type": "cluster" } ], "associated_at": "2025-07-26 05:08:02.648 +0000 UTC", "cluster_name": "eks1-devel", "id": "eks1-devel#arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687#arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy", "modified_at": "2025-07-26 05:08:02.648 +0000 UTC", "policy_arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy", "principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687", "region": "us-east-1", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_eks_addon", "name": "before_compute", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "eks-pod-identity-agent", "schema_version": 0, "attributes": { "addon_name": "eks-pod-identity-agent", "addon_version": "v1.3.8-eksbuild.2", "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/eks-pod-identity-agent/eecc2290-c377-f6c7-9f0f-f2eb7aa1d1c1", "cluster_name": "eks1-devel", "configuration_values": "", "created_at": "2025-07-26T05:08:02Z", "id": "eks1-devel:eks-pod-identity-agent", "modified_at": "2025-07-26T05:11:08Z", "pod_identity_association": [], "preserve": true, "region": "us-east-1", "resolve_conflicts_on_create": "NONE", "resolve_conflicts_on_update": "OVERWRITE", "service_account_role_arn": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_eks_addon_version.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "vpc-cni", "schema_version": 0, "attributes": { "addon_name": "vpc-cni", "addon_version": "v1.19.5-eksbuild.1", "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/vpc-cni/e0cc2290-c371-9193-a1fe-79a2fc911873", "cluster_name": "eks1-devel", "configuration_values": "", "created_at": "2025-07-26T05:08:02Z", "id": "eks1-devel:vpc-cni", "modified_at": "2025-07-26T05:08:11Z", "pod_identity_association": [], "preserve": true, "region": "us-east-1", "resolve_conflicts_on_create": "NONE", "resolve_conflicts_on_update": "OVERWRITE", "service_account_role_arn": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_eks_addon_version.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_eks_addon", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "aws-ebs-csi-driver", "schema_version": 0, "attributes": { "addon_name": "aws-ebs-csi-driver", "addon_version": "v1.46.0-eksbuild.1", "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/aws-ebs-csi-driver/92cc293b-7f4b-36a7-a654-e0ef08941147", "cluster_name": "eks1-devel", "configuration_values": "", "created_at": "2025-07-28T19:16:27Z", "id": "eks1-devel:aws-ebs-csi-driver", "modified_at": "2025-07-28T19:17:18Z", "pod_identity_association": [], "preserve": true, "region": "us-east-1", "resolve_conflicts_on_create": "NONE", "resolve_conflicts_on_update": "OVERWRITE", "service_account_role_arn": "", "tags": null, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_eks_addon_version.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role", "module.eks.module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.eks.module.fargate_profile.data.aws_region.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "coredns", "schema_version": 0, "attributes": { "addon_name": "coredns", "addon_version": "v1.12.1-eksbuild.2", "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/coredns/9acc2291-b411-4ab5-46a4-c9fd2bf3dff7", "cluster_name": "eks1-devel", "configuration_values": "", "created_at": "2025-07-26T05:10:05Z", "id": "eks1-devel:coredns", "modified_at": "2025-07-26T05:10:48Z", "pod_identity_association": [], "preserve": true, "region": "us-east-1", "resolve_conflicts_on_create": "NONE", "resolve_conflicts_on_update": "OVERWRITE", "service_account_role_arn": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_eks_addon_version.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role", "module.eks.module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.eks.module.fargate_profile.data.aws_region.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "kube-proxy", "schema_version": 0, "attributes": { "addon_name": "kube-proxy", "addon_version": "v1.33.0-eksbuild.2", "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/kube-proxy/dacc2291-b40d-625e-13de-8d62e87a886b", "cluster_name": "eks1-devel", "configuration_values": "", "created_at": "2025-07-26T05:10:05Z", "id": "eks1-devel:kube-proxy", "modified_at": "2025-07-26T05:11:12Z", "pod_identity_association": [], "preserve": true, "region": "us-east-1", "resolve_conflicts_on_create": "NONE", "resolve_conflicts_on_update": "OVERWRITE", "service_account_role_arn": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_eks_addon_version.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role", "module.eks.module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.eks.module.fargate_profile.data.aws_region.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this", "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role", "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_eks_cluster", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "access_config": [ { "authentication_mode": "API_AND_CONFIG_MAP", "bootstrap_cluster_creator_admin_permissions": false } ], "arn": "arn:aws:eks:us-east-1:273729230602:cluster/eks1-devel", "bootstrap_self_managed_addons": false, "certificate_authority": [ { "data": "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" } ], "cluster_id": null, "compute_config": [], "created_at": "2025-07-26T04:58:04Z", "enabled_cluster_log_types": [ "api", "audit", "authenticator" ], "encryption_config": [ { "provider": [ { "key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655" } ], "resources": [ "secrets" ] } ], "endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com", "force_update_version": null, "id": "eks1-devel", "identity": [ { "oidc": [ { "issuer": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" } ] } ], "kubernetes_network_config": [ { "elastic_load_balancing": [ { "enabled": false } ], "ip_family": "ipv4", "service_ipv4_cidr": "10.100.0.0/16", "service_ipv6_cidr": "" } ], "name": "eks1-devel", "outpost_config": [], "platform_version": "eks.6", "region": "us-east-1", "remote_network_config": [], "role_arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006", "status": "ACTIVE", "storage_config": [], "tags": { "terraform-aws-modules": "eks" }, "tags_all": { "Environment": "devel", "Service": "Kubernetes", "terraform-aws-modules": "eks" }, "timeouts": null, "upgrade_policy": [ { "support_type": "EXTENDED" } ], "version": "1.33", "vpc_config": [ { "cluster_security_group_id": "sg-076b2d2377e33d292", "endpoint_private_access": true, "endpoint_public_access": true, "public_access_cidrs": [ "0.0.0.0/0" ], "security_group_ids": [ "sg-0f6f49725d40dcc30" ], "subnet_ids": [ "subnet-02555be9c1954bbda", "subnet-08dbbf19ff2c937f1", "subnet-0d7ae39c853e68127", "subnet-0e188b45be889dcc3", "subnet-0f0da9e04f1c8369a", "subnet-0f84cfaa3d8da724d" ], "vpc_id": "vpc-0271dff7a4b4bbf76" } ], "zonal_shift_config": [] }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_iam_openid_connect_provider", "name": "oidc_provider", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19", "client_id_list": [ "sts.amazonaws.com" ], "id": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19", "tags": { "Name": "eks1-devel-eks-irsa" }, "tags_all": { "Environment": "devel", "Name": "eks1-devel-eks-irsa", "Service": "Kubernetes" }, "thumbprint_list": [ "9e99a48a9960b14926bb7f3b02e22da2b0ab7280" ], "url": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_iam_policy", "name": "cluster_encryption", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "attachment_count": 1, "description": "Cluster encryption policy to allow cluster role to utilize CMK provided", "id": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "name": "eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "name_prefix": "eks1-devel-cluster-ClusterEncryption", "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FODRVQNHGK", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006", "assume_role_policy": "{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-26T04:57:06Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-cluster-20250726045706140700000006", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" ], "max_session_duration": 3600, "name": "eks1-devel-cluster-20250726045706140700000006", "name_prefix": "eks1-devel-cluster-", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FAGFOIF7OI" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-cluster-20250726045706140700000006" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "cluster_encryption", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "role": "eks1-devel-cluster-20250726045706140700000006" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a", "role": "eks1-devel-cluster-20250726045706140700000006" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_iam_policy.cluster_encryption", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "AmazonEKSClusterPolicy", "schema_version": 0, "attributes": { "id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "role": "eks1-devel-cluster-20250726045706140700000006" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "role": "eks1-devel-cluster-20250726045706140700000006" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_security_group", "name": "cluster", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0f6f49725d40dcc30", "description": "EKS cluster security group", "egress": [], "id": "sg-0f6f49725d40dcc30", "ingress": [ { "cidr_blocks": [], "description": "Node groups to cluster API", "from_port": 443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0a74b044afaa663ed" ], "self": false, "to_port": 443 } ], "name": "eks1-devel-cluster-20250726045706139300000004", "name_prefix": "eks1-devel-cluster-", "owner_id": "273729230602", "region": "us-east-1", "revoke_rules_on_delete": false, "tags": { "Name": "eks1-devel-cluster" }, "tags_all": { "Environment": "devel", "Name": "eks1-devel-cluster", "Service": "Kubernetes" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_security_group", "name": "node", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0a74b044afaa663ed", "description": "EKS node shared security group", "egress": [ { "cidr_blocks": [ "0.0.0.0/0" ], "description": "Allow all egress", "from_port": 0, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0 } ], "id": "sg-0a74b044afaa663ed", "ingress": [ { "cidr_blocks": [], "description": "Cluster API to node 4443/tcp webhook", "from_port": 4443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 4443 }, { "cidr_blocks": [], "description": "Cluster API to node 6443/tcp webhook", "from_port": 6443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 6443 }, { "cidr_blocks": [], "description": "Cluster API to node 8443/tcp webhook", "from_port": 8443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 8443 }, { "cidr_blocks": [], "description": "Cluster API to node 9443/tcp webhook", "from_port": 9443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 9443 }, { "cidr_blocks": [], "description": "Cluster API to node groups", "from_port": 443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 443 }, { "cidr_blocks": [], "description": "Cluster API to node kubelets", "from_port": 10250, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0f6f49725d40dcc30" ], "self": false, "to_port": 10250 }, { "cidr_blocks": [], "description": "Node to node CoreDNS UDP", "from_port": 53, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "udp", "security_groups": [], "self": true, "to_port": 53 }, { "cidr_blocks": [], "description": "Node to node CoreDNS", "from_port": 53, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": true, "to_port": 53 }, { "cidr_blocks": [], "description": "Node to node ingress on ephemeral ports", "from_port": 1025, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": true, "to_port": 65535 }, { "cidr_blocks": [], "description": "elbv2.k8s.aws/targetGroupBinding=shared", "from_port": 80, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-02b2e955e7a69217a" ], "self": false, "to_port": 10254 } ], "name": "eks1-devel-node-20250726045706138200000003", "name_prefix": "eks1-devel-node-", "owner_id": "273729230602", "region": "us-east-1", "revoke_rules_on_delete": false, "tags": { "Name": "eks1-devel-node", "kubernetes.io/cluster/eks1-devel": "owned" }, "tags_all": { "Environment": "devel", "Name": "eks1-devel-node", "Service": "Kubernetes", "kubernetes.io/cluster/eks1-devel": "owned" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_security_group_rule", "name": "cluster", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "ingress_nodes_443", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node groups to cluster API", "from_port": 443, "id": "sgrule-3138574090", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0f6f49725d40dcc30", "security_group_rule_id": "sgr-068c762594d1de680", "self": false, "source_security_group_id": "sg-0a74b044afaa663ed", "timeouts": null, "to_port": 443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "aws_security_group_rule", "name": "node", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "egress_all", "schema_version": 2, "attributes": { "cidr_blocks": [ "0.0.0.0/0" ], "description": "Allow all egress", "from_port": 0, "id": "sgrule-3315708913", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "-1", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-07bd88701cf08d8b8", "self": false, "source_security_group_id": null, "timeouts": null, "to_port": 0, "type": "egress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_443", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node groups", "from_port": 443, "id": "sgrule-45776182", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0361333e190e1a04b", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_4443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 4443/tcp webhook", "from_port": 4443, "id": "sgrule-500800407", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0a1a8f25a5818003a", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 4443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_6443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 6443/tcp webhook", "from_port": 6443, "id": "sgrule-3566992385", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0c4f285327006f065", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 6443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_8443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 8443/tcp webhook", "from_port": 8443, "id": "sgrule-3351756832", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0d3d4fa20169a2ea8", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 8443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_9443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 9443/tcp webhook", "from_port": 9443, "id": "sgrule-2741433323", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-035233532bcbfb1d9", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 9443, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_kubelet", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node kubelets", "from_port": 10250, "id": "sgrule-1489672607", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-006dc66a135d40e67", "self": false, "source_security_group_id": "sg-0f6f49725d40dcc30", "timeouts": null, "to_port": 10250, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_nodes_ephemeral", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node ingress on ephemeral ports", "from_port": 1025, "id": "sgrule-901693526", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0068ba55843cb9c50", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 65535, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_self_coredns_tcp", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node CoreDNS", "from_port": 53, "id": "sgrule-3646939900", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-00d96212df13f95db", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 53, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true }, { "index_key": "ingress_self_coredns_udp", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node CoreDNS UDP", "from_port": 53, "id": "sgrule-2097168659", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "udp", "region": "us-east-1", "security_group_id": "sg-0a74b044afaa663ed", "security_group_rule_id": "sgr-0f9065f0d4958f39e", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 53, "type": "ingress" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks", "mode": "managed", "type": "time_sleep", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/time\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "create_duration": "30s", "destroy_duration": null, "id": "2025-07-26T05:08:31Z", "triggers": { "certificate_authority_data": "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", "endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com", "kubernetes_version": "1.33", "name": "eks1-devel", "service_cidr": "10.100.0.0/16" } }, "sensitive_attributes": [], "identity_schema_version": 0, "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "data", "type": "aws_iam_policy_document", "name": "assume_role_policy", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2560088296", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSNodeAssumeRole\",\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRole" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "ec2.amazonaws.com" ], "type": "Service" } ], "resources": [], "sid": "EKSNodeAssumeRole" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "data", "type": "aws_ssm_parameter", "name": "ami", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ssm:us-east-1::parameter/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version", "id": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version", "insecure_value": "1.33.0-20250715", "name": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version", "region": "us-east-1", "type": "String", "value": "1.33.0-20250715", "version": 6, "with_decryption": true }, "sensitive_attributes": [ [ { "type": "get_attr", "value": "value" } ] ], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "managed", "type": "aws_eks_node_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "ami_type": "AL2023_x86_64_STANDARD", "arn": "arn:aws:eks:us-east-1:273729230602:nodegroup/eks1-devel/ng-20250726050837528800000015/4ecc2291-0935-59bf-b572-c11bd62148f2", "capacity_type": "ON_DEMAND", "cluster_name": "eks1-devel", "disk_size": 0, "force_update_version": null, "id": "eks1-devel:ng-20250726050837528800000015", "instance_types": [ "m6i.large" ], "labels": {}, "launch_template": [ { "id": "lt-0d2be8605aecac3d6", "name": "ng-20250726050831652700000013", "version": "2" } ], "node_group_name": "ng-20250726050837528800000015", "node_group_name_prefix": "ng-", "node_repair_config": [], "node_role_arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001", "region": "us-east-1", "release_version": "1.33.0-20250715", "remote_access": [], "resources": [ { "autoscaling_groups": [ { "name": "eks-ng-20250726050837528800000015-4ecc2291-0935-59bf-b572-c11bd62148f2" } ], "remote_access_security_group_id": "" } ], "scaling_config": [ { "desired_size": 3, "max_size": 10, "min_size": 1 } ], "status": "ACTIVE", "subnet_ids": [ "subnet-02555be9c1954bbda", "subnet-08dbbf19ff2c937f1", "subnet-0d7ae39c853e68127", "subnet-0e188b45be889dcc3", "subnet-0f0da9e04f1c8369a", "subnet-0f84cfaa3d8da724d" ], "tags": { "Name": "ng" }, "tags_all": { "Environment": "devel", "Name": "ng", "Service": "Kubernetes" }, "taint": [], "timeouts": null, "update_config": [ { "max_unavailable": 0, "max_unavailable_percentage": 33 } ], "version": "1.33" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami", "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-26T04:57:06Z", "description": "EKS managed node group IAM role", "force_detach_policies": true, "id": "ng-eks-node-group-20250726045706136900000001", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy" ], "max_session_duration": 3600, "name": "ng-eks-node-group-20250726045706136900000001", "name_prefix": "ng-eks-node-group-", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FE2DMUYZHS" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "ng-eks-node-group-20250726045706136900000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "AmazonEC2ContainerRegistryReadOnly", "schema_version": 0, "attributes": { "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "role": "ng-eks-node-group-20250726045706136900000001" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "role": "ng-eks-node-group-20250726045706136900000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true }, { "index_key": "AmazonEKSWorkerNodePolicy", "schema_version": 0, "attributes": { "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "role": "ng-eks-node-group-20250726045706136900000001" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "role": "ng-eks-node-group-20250726045706136900000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true }, { "index_key": "AmazonEKS_CNI_Policy", "schema_version": 0, "attributes": { "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "role": "ng-eks-node-group-20250726045706136900000001" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "role": "ng-eks-node-group-20250726045706136900000001" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]", "mode": "managed", "type": "aws_launch_template", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:launch-template/lt-0d2be8605aecac3d6", "block_device_mappings": [], "capacity_reservation_specification": [], "cpu_options": [], "credit_specification": [], "default_version": 2, "description": "Custom launch template for ng EKS managed node group", "disable_api_stop": false, "disable_api_termination": false, "ebs_optimized": "", "enclave_options": [], "hibernation_options": [], "iam_instance_profile": [], "id": "lt-0d2be8605aecac3d6", "image_id": "", "instance_initiated_shutdown_behavior": "", "instance_market_options": [], "instance_requirements": [], "instance_type": "", "kernel_id": "", "key_name": "", "latest_version": 2, "license_specification": [], "maintenance_options": [], "metadata_options": [ { "http_endpoint": "enabled", "http_protocol_ipv6": "", "http_put_response_hop_limit": 2, "http_tokens": "required", "instance_metadata_tags": "" } ], "monitoring": [], "name": "ng-20250726050831652700000013", "name_prefix": "ng-", "network_interfaces": [], "placement": [], "private_dns_name_options": [], "ram_disk_id": "", "region": "us-east-1", "security_group_names": [], "tag_specifications": [ { "resource_type": "instance", "tags": { "Name": "ng" } }, { "resource_type": "network-interface", "tags": { "Name": "ng" } }, { "resource_type": "volume", "tags": { "Name": "ng" } } ], "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "update_default_version": true, "user_data": "", "vpc_security_group_ids": [ "sg-0a74b044afaa663ed" ] }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this", "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this", "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group", "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data", "mode": "managed", "type": "null_resource", "name": "validate_cluster_service_cidr", "provider": "provider[\"registry.terraform.io/hashicorp/null\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "5050192302767161671", "triggers": null }, "sensitive_attributes": [], "identity_schema_version": 0, "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.eks.time_sleep.this", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.eks.module.kms", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks.module.kms", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "3915224678", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"Default\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:root\"\n }\n },\n {\n \"Sid\": \"KeyAdministration\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:Update*\",\n \"kms:UntagResource\",\n \"kms:TagResource\",\n \"kms:ScheduleKeyDeletion\",\n \"kms:Revoke*\",\n \"kms:ReplicateKey\",\n \"kms:Put*\",\n \"kms:List*\",\n \"kms:ImportKeyMaterial\",\n \"kms:Get*\",\n \"kms:Enable*\",\n \"kms:Disable*\",\n \"kms:Describe*\",\n \"kms:Delete*\",\n \"kms:Create*\",\n \"kms:CancelKeyDeletion\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"\n }\n },\n {\n \"Sid\": \"KeyUsage\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Default\",\"Effect\":\"Allow\",\"Action\":\"kms:*\",\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"}},{\"Sid\":\"KeyAdministration\",\"Effect\":\"Allow\",\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"}},{\"Sid\":\"KeyUsage\",\"Effect\":\"Allow\",\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "kms:*" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:root" ], "type": "AWS" } ], "resources": [ "*" ], "sid": "Default" }, { "actions": [ "kms:CancelKeyDeletion", "kms:Create*", "kms:Delete*", "kms:Describe*", "kms:Disable*", "kms:Enable*", "kms:Get*", "kms:ImportKeyMaterial", "kms:List*", "kms:Put*", "kms:ReplicateKey", "kms:Revoke*", "kms:ScheduleKeyDeletion", "kms:TagResource", "kms:UntagResource", "kms:Update*" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687" ], "type": "AWS" } ], "resources": [ "*" ], "sid": "KeyAdministration" }, { "actions": [ "kms:Decrypt", "kms:DescribeKey", "kms:Encrypt", "kms:GenerateDataKey*", "kms:ReEncrypt*" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006" ], "type": "AWS" } ], "resources": [ "*" ], "sid": "KeyUsage" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks.module.kms", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.eks.module.kms", "mode": "managed", "type": "aws_kms_alias", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "cluster", "schema_version": 0, "attributes": { "arn": "arn:aws:kms:us-east-1:273729230602:alias/eks/eks1-devel", "id": "alias/eks/eks1-devel", "name": "alias/eks/eks1-devel", "name_prefix": "", "region": "us-east-1", "target_key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655", "target_key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks.module.eks.module.kms", "mode": "managed", "type": "aws_kms_key", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655", "bypass_policy_lockout_safety_check": false, "custom_key_store_id": "", "customer_master_key_spec": "SYMMETRIC_DEFAULT", "deletion_window_in_days": null, "description": "eks1-devel cluster encryption key", "enable_key_rotation": true, "id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655", "is_enabled": true, "key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655", "key_usage": "ENCRYPT_DECRYPT", "multi_region": false, "policy": "{\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"},\"Resource\":\"*\",\"Sid\":\"Default\"},{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"},\"Resource\":\"*\",\"Sid\":\"KeyAdministration\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"},\"Resource\":\"*\",\"Sid\":\"KeyUsage\"}],\"Version\":\"2012-10-17\"}", "region": "us-east-1", "rotation_period_in_days": 365, "tags": { "terraform-aws-modules": "eks" }, "tags_all": { "Environment": "devel", "Service": "Kubernetes", "terraform-aws-modules": "eks" }, "timeouts": null, "xks_key_id": "" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDB9fQ==", "dependencies": [ "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "external_dns", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "1268413494", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:ChangeResourceRecordSets\",\n \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"route53:ListTagsForResources\",\n \"route53:ListResourceRecordSets\",\n \"route53:ListHostedZones\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:ChangeResourceRecordSets\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Resource\":\"*\"}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "route53:ChangeResourceRecordSets" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:route53:::hostedzone/*" ], "sid": "" }, { "actions": [ "route53:ListHostedZones", "route53:ListResourceRecordSets", "route53:ListTagsForResources" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "1716340323", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:external-dns\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRoleWithWebIdentity" ], "condition": [ { "test": "StringEquals", "values": [ "sts.amazonaws.com" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud" }, { "test": "StringEquals", "values": [ "system:serviceaccount:kube-system:external-dns" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" ], "type": "Federated" } ], "resources": [], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1", "region": "us-east-1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "managed", "type": "aws_iam_policy", "name": "external_dns", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "attachment_count": 1, "description": "External DNS policy to allow management of Route53 hosted zone records", "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "name": "AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "name_prefix": "AmazonEKS_eks1-devel_External_DNS_Policy-", "path": "/", "policy": "{\"Statement\":[{\"Action\":\"route53:ChangeResourceRecordSets\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FBJOOEWX3J", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-external-dns", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-26T05:25:15Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-external-dns", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e" ], "max_session_duration": 3600, "name": "eks1-devel-external-dns", "name_prefix": "", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FBJGK2IPMG" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-external-dns" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current", "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.external_dns_irsa_role.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.external_dns_irsa_role", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "external_dns", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-external-dns/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "role": "eks1-devel-external-dns" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e", "role": "eks1-devel-external-dns" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.external_dns_irsa_role.aws_iam_policy.external_dns", "module.eks.module.external_dns_irsa_role.aws_iam_role.this", "module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current", "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns", "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.external_dns_irsa_role.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "273729230602", "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan", "id": "273729230602", "user_id": "AROAT7O4IS4FGZRTFR25S:ryan" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "load_balancer_controller", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "1541424006", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"iam:CreateServiceLinkedRole\",\n \"Resource\": \"*\",\n \"Condition\": {\n \"StringEquals\": {\n \"iam:AWSServiceName\": \"elasticloadbalancing.amazonaws.com\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:DescribeTrustStores\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeSSLPolicies\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListenerAttributes\",\n \"elasticloadbalancing:DescribeCapacityReservation\",\n \"ec2:GetSecurityGroupsForVpc\",\n \"ec2:GetCoipPoolUsage\",\n \"ec2:DescribeVpcs\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeIpamPools\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeCoipPools\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeAddresses\",\n \"ec2:DescribeAccountAttributes\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"wafv2:GetWebACLForResource\",\n \"wafv2:GetWebACL\",\n \"wafv2:DisassociateWebACL\",\n \"wafv2:AssociateWebACL\",\n \"waf-regional:GetWebACLForResource\",\n \"waf-regional:GetWebACL\",\n \"waf-regional:DisassociateWebACL\",\n \"waf-regional:AssociateWebACL\",\n \"shield:GetSubscriptionState\",\n \"shield:DescribeProtection\",\n \"shield:DeleteProtection\",\n \"shield:CreateProtection\",\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"acm:ListCertificates\",\n \"acm:DescribeCertificate\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:RevokeSecurityGroupIngress\",\n \"ec2:AuthorizeSecurityGroupIngress\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateTags\",\n \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n },\n \"StringEquals\": {\n \"ec2:CreateAction\": \"CreateSecurityGroup\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DeleteTags\",\n \"ec2:CreateTags\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:RevokeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:AuthorizeSecurityGroupIngress\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:CreateLoadBalancer\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateListener\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:AddTags\"\n ],\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:AddTags\"\n ],\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:SetSubnets\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyListenerAttributes\",\n \"elasticloadbalancing:ModifyIpPools\",\n \"elasticloadbalancing:ModifyCapacityReservation\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeleteLoadBalancer\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"elasticloadbalancing:AddTags\",\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n },\n \"StringEquals\": {\n \"elasticloadbalancing:CreateAction\": [\n \"CreateTargetGroup\",\n \"CreateLoadBalancer\"\n ]\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:DeregisterTargets\"\n ],\n \"Resource\": \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:SetWebAcl\",\n \"elasticloadbalancing:SetRulePriorities\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:AddListenerCertificates\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"iam:CreateServiceLinkedRole\",\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSecurityGroup\",\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":\"elasticloadbalancing:AddTags\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Resource\":\"*\"}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "iam:CreateServiceLinkedRole" ], "condition": [ { "test": "StringEquals", "values": [ "elasticloadbalancing.amazonaws.com" ], "variable": "iam:AWSServiceName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "ec2:DescribeAccountAttributes", "ec2:DescribeAddresses", "ec2:DescribeAvailabilityZones", "ec2:DescribeCoipPools", "ec2:DescribeInstances", "ec2:DescribeInternetGateways", "ec2:DescribeIpamPools", "ec2:DescribeNetworkInterfaces", "ec2:DescribeRouteTables", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeTags", "ec2:DescribeVpcPeeringConnections", "ec2:DescribeVpcs", "ec2:GetCoipPoolUsage", "ec2:GetSecurityGroupsForVpc", "elasticloadbalancing:DescribeCapacityReservation", "elasticloadbalancing:DescribeListenerAttributes", "elasticloadbalancing:DescribeListenerCertificates", "elasticloadbalancing:DescribeListeners", "elasticloadbalancing:DescribeLoadBalancerAttributes", "elasticloadbalancing:DescribeLoadBalancers", "elasticloadbalancing:DescribeRules", "elasticloadbalancing:DescribeSSLPolicies", "elasticloadbalancing:DescribeTags", "elasticloadbalancing:DescribeTargetGroupAttributes", "elasticloadbalancing:DescribeTargetGroups", "elasticloadbalancing:DescribeTargetHealth", "elasticloadbalancing:DescribeTrustStores" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "acm:DescribeCertificate", "acm:ListCertificates", "cognito-idp:DescribeUserPoolClient", "iam:GetServerCertificate", "iam:ListServerCertificates", "shield:CreateProtection", "shield:DeleteProtection", "shield:DescribeProtection", "shield:GetSubscriptionState", "waf-regional:AssociateWebACL", "waf-regional:DisassociateWebACL", "waf-regional:GetWebACL", "waf-regional:GetWebACLForResource", "wafv2:AssociateWebACL", "wafv2:DisassociateWebACL", "wafv2:GetWebACL", "wafv2:GetWebACLForResource" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:RevokeSecurityGroupIngress" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "ec2:CreateSecurityGroup" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "ec2:CreateTags" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:RequestTag/elbv2.k8s.aws/cluster" }, { "test": "StringEquals", "values": [ "CreateSecurityGroup" ], "variable": "ec2:CreateAction" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:security-group/*" ], "sid": "" }, { "actions": [ "ec2:CreateTags", "ec2:DeleteTags" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster" }, { "test": "Null", "values": [ "true" ], "variable": "aws:RequestTag/elbv2.k8s.aws/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:ec2:*:*:security-group/*" ], "sid": "" }, { "actions": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:DeleteSecurityGroup", "ec2:RevokeSecurityGroupIngress" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:CreateLoadBalancer", "elasticloadbalancing:CreateTargetGroup" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:RequestTag/elbv2.k8s.aws/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:CreateListener", "elasticloadbalancing:CreateRule", "elasticloadbalancing:DeleteListener", "elasticloadbalancing:DeleteRule" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:AddTags", "elasticloadbalancing:RemoveTags" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster" }, { "test": "Null", "values": [ "true" ], "variable": "aws:RequestTag/elbv2.k8s.aws/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*", "arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*", "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:AddTags", "elasticloadbalancing:RemoveTags" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*", "arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*", "arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*", "arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:DeleteLoadBalancer", "elasticloadbalancing:DeleteTargetGroup", "elasticloadbalancing:ModifyCapacityReservation", "elasticloadbalancing:ModifyIpPools", "elasticloadbalancing:ModifyListenerAttributes", "elasticloadbalancing:ModifyLoadBalancerAttributes", "elasticloadbalancing:ModifyTargetGroup", "elasticloadbalancing:ModifyTargetGroupAttributes", "elasticloadbalancing:SetIpAddressType", "elasticloadbalancing:SetSecurityGroups", "elasticloadbalancing:SetSubnets" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:AddTags" ], "condition": [ { "test": "Null", "values": [ "false" ], "variable": "aws:RequestTag/elbv2.k8s.aws/cluster" }, { "test": "StringEquals", "values": [ "CreateTargetGroup", "CreateLoadBalancer" ], "variable": "elasticloadbalancing:CreateAction" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*", "arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*", "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:DeregisterTargets", "elasticloadbalancing:RegisterTargets" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*" ], "sid": "" }, { "actions": [ "elasticloadbalancing:AddListenerCertificates", "elasticloadbalancing:ModifyListener", "elasticloadbalancing:ModifyRule", "elasticloadbalancing:RemoveListenerCertificates", "elasticloadbalancing:SetRulePriorities", "elasticloadbalancing:SetWebAcl" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "236870047", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:aws-load-balancer-controller\"\n }\n }\n }\n ]\n}", "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}}}]}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRoleWithWebIdentity" ], "condition": [ { "test": "StringEquals", "values": [ "sts.amazonaws.com" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud" }, { "test": "StringEquals", "values": [ "system:serviceaccount:kube-system:aws-load-balancer-controller" ], "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19" ], "type": "Federated" } ], "resources": [], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1", "region": "us-east-1" }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "managed", "type": "aws_iam_policy", "name": "load_balancer_controller", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "attachment_count": 1, "description": "Provides permissions for AWS Load Balancer Controller addon", "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "name": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "name_prefix": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-", "path": "/", "policy": "{\"Statement\":[{\"Action\":\"iam:CreateServiceLinkedRole\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateSecurityGroup\",\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"elasticloadbalancing:AddTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPAT7O4IS4FDJFNVQKAK", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" } }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller", "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::273729230602:role/eks1-devel-aws-load-balancer-controller", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2025-07-26T05:23:56Z", "description": "", "force_detach_policies": true, "id": "eks1-devel-aws-load-balancer-controller", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f" ], "max_session_duration": 3600, "name": "eks1-devel-aws-load-balancer-controller", "name_prefix": "", "path": "/", "permissions_boundary": "", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "unique_id": "AROAT7O4IS4FNEGNOKZIO" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "name": "eks1-devel-aws-load-balancer-controller" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current", "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.eks.module.load_balancer_controller_irsa_role", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "load_balancer_controller", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "eks1-devel-aws-load-balancer-controller/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "role": "eks1-devel-aws-load-balancer-controller" }, "sensitive_attributes": [], "identity_schema_version": 0, "identity": { "account_id": "273729230602", "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f", "role": "eks1-devel-aws-load-balancer-controller" }, "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks.aws_cloudwatch_log_group.this", "module.eks.module.eks.aws_eks_access_entry.this", "module.eks.module.eks.aws_eks_access_policy_association.this", "module.eks.module.eks.aws_eks_cluster.this", "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider", "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.module.eks.aws_iam_role.eks_auto", "module.eks.module.eks.aws_iam_role.this", "module.eks.module.eks.aws_iam_role_policy_attachment.this", "module.eks.module.eks.aws_security_group.cluster", "module.eks.module.eks.aws_security_group.node", "module.eks.module.eks.aws_security_group_rule.cluster", "module.eks.module.eks.aws_security_group_rule.node", "module.eks.module.eks.data.aws_caller_identity.current", "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy", "module.eks.module.eks.data.aws_iam_session_context.current", "module.eks.module.eks.data.aws_partition.current", "module.eks.module.eks.data.tls_certificate.this", "module.eks.module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.eks.module.kms.aws_kms_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this", "module.eks.module.eks.module.kms.aws_kms_replica_key.this", "module.eks.module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.eks.module.kms.data.aws_partition.current", "module.eks.module.load_balancer_controller_irsa_role.aws_iam_policy.load_balancer_controller", "module.eks.module.load_balancer_controller_irsa_role.aws_iam_role.this", "module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current", "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller", "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this", "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current", "module.network.aws_subnet.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "data", "type": "aws_availability_zones", "name": "available", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "all_availability_zones": null, "exclude_names": null, "exclude_zone_ids": [ "cac1-az3", "use1-az3", "usw1-az2" ], "filter": [ { "name": "opt-in-status", "values": [ "opt-in-not-required" ] } ], "group_names": [ "us-east-1-zg-1" ], "id": "us-east-1", "names": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1f" ], "region": "us-east-1", "state": null, "timeouts": null, "zone_ids": [ "use1-az1", "use1-az2", "use1-az4", "use1-az6", "use1-az5" ] }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.network", "mode": "data", "type": "aws_internet_gateway", "name": "default", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:internet-gateway/igw-04c8aad5899c55659", "attachments": [ { "state": "available", "vpc_id": "vpc-0271dff7a4b4bbf76" } ], "filter": [ { "name": "attachment.vpc-id", "values": [ "vpc-0271dff7a4b4bbf76" ] } ], "id": "igw-04c8aad5899c55659", "internet_gateway_id": "igw-04c8aad5899c55659", "owner_id": "273729230602", "region": "us-east-1", "tags": {}, "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.network", "mode": "data", "type": "aws_vpc", "name": "selected", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:vpc/vpc-0271dff7a4b4bbf76", "cidr_block": "172.31.0.0/16", "cidr_block_associations": [ { "association_id": "vpc-cidr-assoc-05f4dfb5fe3092d82", "cidr_block": "172.31.0.0/16", "state": "associated" } ], "default": true, "dhcp_options_id": "dopt-0271d6713d96f2254", "enable_dns_hostnames": true, "enable_dns_support": true, "enable_network_address_usage_metrics": false, "filter": null, "id": "vpc-0271dff7a4b4bbf76", "instance_tenancy": "default", "ipv6_association_id": "", "ipv6_cidr_block": "", "main_route_table_id": "rtb-01ff49732ea0b5a76", "owner_id": "273729230602", "region": "us-east-1", "state": null, "tags": {}, "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0 } ] }, { "module": "module.network", "mode": "managed", "type": "aws_eip", "name": "nat", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "address": null, "allocation_id": "eipalloc-0efd9a4666274d4b9", "arn": "arn:aws:ec2:us-east-1:273729230602:elastic-ip/eipalloc-0efd9a4666274d4b9", "associate_with_private_ip": null, "association_id": "eipassoc-0670094f7c1ebaa09", "carrier_ip": "", "customer_owned_ip": "", "customer_owned_ipv4_pool": "", "domain": "vpc", "id": "eipalloc-0efd9a4666274d4b9", "instance": "", "ipam_pool_id": null, "network_border_group": "us-east-1", "network_interface": "eni-0af2e53d148f4e2ef", "private_dns": "ip-172-31-176-31.ec2.internal", "private_ip": "172.31.176.31", "ptr_record": "", "public_dns": "ec2-3-223-7-164.compute-1.amazonaws.com", "public_ip": "3.223.7.164", "public_ipv4_pool": "amazon", "region": "us-east-1", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ==" } ] }, { "module": "module.network", "mode": "managed", "type": "aws_nat_gateway", "name": "nat_gateway", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "allocation_id": "eipalloc-0efd9a4666274d4b9", "association_id": "eipassoc-0670094f7c1ebaa09", "connectivity_type": "public", "id": "nat-09006b80b9074bdb7", "network_interface_id": "eni-0af2e53d148f4e2ef", "private_ip": "172.31.176.31", "public_ip": "3.223.7.164", "region": "us-east-1", "secondary_allocation_ids": [], "secondary_private_ip_address_count": 0, "secondary_private_ip_addresses": [], "subnet_id": "subnet-0e188b45be889dcc3", "tags": {}, "tags_all": { "Environment": "devel", "Service": "Kubernetes" }, "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTgwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9fQ==", "dependencies": [ "module.network.aws_eip.nat", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route", "name": "nat_gateway", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "id": "r-rtb-041eec80d0151b4131080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "origin": "CreateRoute", "region": "us-east-1", "route_table_id": "rtb-041eec80d0151b413", "state": "active", "timeouts": null, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_eip.nat", "module.network.aws_nat_gateway.nat_gateway", "module.network.aws_route_table.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1b", "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "id": "r-rtb-045c9ab610c7aabd31080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "origin": "CreateRoute", "region": "us-east-1", "route_table_id": "rtb-045c9ab610c7aabd3", "state": "active", "timeouts": null, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_eip.nat", "module.network.aws_nat_gateway.nat_gateway", "module.network.aws_route_table.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1c", "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "id": "r-rtb-0a1eb19f2c209aa341080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "origin": "CreateRoute", "region": "us-east-1", "route_table_id": "rtb-0a1eb19f2c209aa34", "state": "active", "timeouts": null, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_eip.nat", "module.network.aws_nat_gateway.nat_gateway", "module.network.aws_route_table.private", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route", "name": "public_internet_gateway", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "igw-04c8aad5899c55659", "id": "r-rtb-0d102d2391110f0b51080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "", "network_interface_id": "", "origin": "CreateRoute", "region": "us-east-1", "route_table_id": "rtb-0d102d2391110f0b5", "state": "active", "timeouts": null, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.public", "module.network.data.aws_internet_gateway.default", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route_table", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-041eec80d0151b413", "id": "rtb-041eec80d0151b413", "owner_id": "273729230602", "propagating_vgws": [], "region": "us-east-1", "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1a)" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1a)", "Service": "Kubernetes" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1b", "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-045c9ab610c7aabd3", "id": "rtb-045c9ab610c7aabd3", "owner_id": "273729230602", "propagating_vgws": [], "region": "us-east-1", "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1b)" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1b)", "Service": "Kubernetes" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1c", "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0a1eb19f2c209aa34", "id": "rtb-0a1eb19f2c209aa34", "owner_id": "273729230602", "propagating_vgws": [], "region": "us-east-1", "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "nat-09006b80b9074bdb7", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1c)" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1c)", "Service": "Kubernetes" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route_table", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0d102d2391110f0b5", "id": "rtb-0d102d2391110f0b5", "owner_id": "273729230602", "propagating_vgws": [], "region": "us-east-1", "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "igw-04c8aad5899c55659", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Name": "EKS (eks1-devel) public subnet" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) public subnet", "Service": "Kubernetes" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route_table_association", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0e1e038f4c6d929ce", "region": "us-east-1", "route_table_id": "rtb-041eec80d0151b413", "subnet_id": "subnet-0f0da9e04f1c8369a", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.private", "module.network.aws_subnet.private", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1b", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0dd4118f5d0a30ca8", "region": "us-east-1", "route_table_id": "rtb-045c9ab610c7aabd3", "subnet_id": "subnet-0d7ae39c853e68127", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.private", "module.network.aws_subnet.private", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1c", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0ed1a7a490311bafb", "region": "us-east-1", "route_table_id": "rtb-0a1eb19f2c209aa34", "subnet_id": "subnet-0f84cfaa3d8da724d", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.private", "module.network.aws_subnet.private", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_route_table_association", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0522ba344fcea4f83", "region": "us-east-1", "route_table_id": "rtb-0d102d2391110f0b5", "subnet_id": "subnet-0e188b45be889dcc3", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.public", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1b", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-088380c97cfc946c7", "region": "us-east-1", "route_table_id": "rtb-0d102d2391110f0b5", "subnet_id": "subnet-02555be9c1954bbda", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.public", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] }, { "index_key": "us-east-1c", "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0d880a637fe8c9576", "region": "us-east-1", "route_table_id": "rtb-0d102d2391110f0b5", "subnet_id": "subnet-08dbbf19ff2c937f1", "timeouts": null }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "module.network.aws_route_table.public", "module.network.aws_subnet.public", "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ] } ] }, { "module": "module.network", "mode": "managed", "type": "aws_subnet", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f0da9e04f1c8369a", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "availability_zone_id": "use1-az1", "cidr_block": "172.31.128.0/20", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0f0da9e04f1c8369a", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1a)", "kubernetes.io/role/internal-elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1a)", "Service": "Kubernetes", "kubernetes.io/role/internal-elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true }, { "index_key": "us-east-1b", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0d7ae39c853e68127", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1b", "availability_zone_id": "use1-az2", "cidr_block": "172.31.144.0/20", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0d7ae39c853e68127", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1b)", "kubernetes.io/role/internal-elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1b)", "Service": "Kubernetes", "kubernetes.io/role/internal-elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true }, { "index_key": "us-east-1c", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f84cfaa3d8da724d", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1c", "availability_zone_id": "use1-az4", "cidr_block": "172.31.160.0/20", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0f84cfaa3d8da724d", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) private subnet (us-east-1c)", "kubernetes.io/role/internal-elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) private subnet (us-east-1c)", "Service": "Kubernetes", "kubernetes.io/role/internal-elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] }, { "module": "module.network", "mode": "managed", "type": "aws_subnet", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "us-east-1a", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0e188b45be889dcc3", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "availability_zone_id": "use1-az1", "cidr_block": "172.31.176.0/24", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0e188b45be889dcc3", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": true, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) public subnet (us-east-1a)", "kubernetes.io/role/elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) public subnet (us-east-1a)", "Service": "Kubernetes", "kubernetes.io/role/elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true }, { "index_key": "us-east-1b", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-02555be9c1954bbda", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1b", "availability_zone_id": "use1-az2", "cidr_block": "172.31.177.0/24", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-02555be9c1954bbda", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": true, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) public subnet (us-east-1b)", "kubernetes.io/role/elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) public subnet (us-east-1b)", "Service": "Kubernetes", "kubernetes.io/role/elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true }, { "index_key": "us-east-1c", "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-08dbbf19ff2c937f1", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1c", "availability_zone_id": "use1-az4", "cidr_block": "172.31.178.0/24", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-08dbbf19ff2c937f1", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": true, "outpost_arn": "", "owner_id": "273729230602", "private_dns_hostname_type_on_launch": "ip-name", "region": "us-east-1", "tags": { "Name": "EKS (eks1-devel) public subnet (us-east-1c)", "kubernetes.io/role/elb": "1" }, "tags_all": { "Environment": "devel", "Name": "EKS (eks1-devel) public subnet (us-east-1c)", "Service": "Kubernetes", "kubernetes.io/role/elb": "1" }, "timeouts": null, "vpc_id": "vpc-0271dff7a4b4bbf76" }, "sensitive_attributes": [], "identity_schema_version": 0, "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "module.network.data.aws_availability_zones.available", "module.network.data.aws_vpc.selected" ], "create_before_destroy": true } ] } ], "check_results": [ { "object_kind": "resource", "config_addr": "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "status": "pass", "objects": null }, { "object_kind": "resource", "config_addr": "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr", "status": "pass", "objects": [ { "object_addr": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data.null_resource.validate_cluster_service_cidr", "status": "pass" } ] } ] }