6430 lines
		
	
	
		
			324 KiB
		
	
	
	
		
			JSON
		
	
	
	
	
	
			
		
		
	
	
			6430 lines
		
	
	
		
			324 KiB
		
	
	
	
		
			JSON
		
	
	
	
	
	
{
 | 
						|
  "version": 4,
 | 
						|
  "terraform_version": "1.12.2",
 | 
						|
  "serial": 318,
 | 
						|
  "lineage": "e0fa6852-8979-09e2-362d-b95bd3e079e1",
 | 
						|
  "outputs": {},
 | 
						|
  "resources": [
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "cert_manager",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "3416383923",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"route53:GetChange\",\n      \"Resource\": \"arn:aws:route53:::change/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListResourceRecordSets\",\n        \"route53:ChangeResourceRecordSets\"\n      ],\n      \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"route53:ListHostedZonesByName\",\n      \"Resource\": \"*\"\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:GetChange\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":\"route53:ListHostedZonesByName\",\"Resource\":\"*\"}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "route53:GetChange"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:route53:::change/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "route53:ChangeResourceRecordSets",
 | 
						|
                  "route53:ListResourceRecordSets"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:route53:::hostedzone/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "route53:ListHostedZonesByName"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "1545384681",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n      \"Principal\": {\n        \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n      },\n      \"Condition\": {\n        \"StringEquals\": {\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cert-manager\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRoleWithWebIdentity"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "sts.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "system:serviceaccount:kube-system:cert-manager"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                    ],
 | 
						|
                    "type": "Federated"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_region",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "description": "US East (N. Virginia)",
 | 
						|
            "endpoint": "ec2.us-east-1.amazonaws.com",
 | 
						|
            "id": "us-east-1",
 | 
						|
            "name": "us-east-1",
 | 
						|
            "region": "us-east-1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "cert_manager",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "Cert Manager policy to allow management of Route53 hosted zone records",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "name": "AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "name_prefix": "AmazonEKS_eks1-devel_Cert_Manager_Policy-",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":\"route53:GetChange\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":\"route53:ListHostedZonesByName\",\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FG6HNVVFKD",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-cert-manager",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-27T01:03:26Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-cert-manager",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-cert-manager",
 | 
						|
            "name_prefix": "",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FO56IFZGYS"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-cert-manager"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cert_manager_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "cert_manager",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-cert-manager/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "role": "eks1-devel-cert-manager"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
 | 
						|
            "role": "eks1-devel-cert-manager"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cert_manager_irsa_role.aws_iam_policy.cert_manager",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.aws_iam_role.this",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "cluster_autoscaler",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "2162280319",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"eks:DescribeNodegroup\",\n        \"ec2:GetInstanceTypesFromInstanceRequirements\",\n        \"ec2:DescribeLaunchTemplateVersions\",\n        \"ec2:DescribeInstanceTypes\",\n        \"ec2:DescribeImages\",\n        \"autoscaling:DescribeTags\",\n        \"autoscaling:DescribeScalingActivities\",\n        \"autoscaling:DescribeLaunchConfigurations\",\n        \"autoscaling:DescribeAutoScalingInstances\",\n        \"autoscaling:DescribeAutoScalingGroups\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n        \"autoscaling:SetDesiredCapacity\"\n      ],\n      \"Resource\": \"*\",\n      \"Condition\": {\n        \"StringEquals\": {\n          \"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\": \"owned\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "autoscaling:DescribeAutoScalingGroups",
 | 
						|
                  "autoscaling:DescribeAutoScalingInstances",
 | 
						|
                  "autoscaling:DescribeLaunchConfigurations",
 | 
						|
                  "autoscaling:DescribeScalingActivities",
 | 
						|
                  "autoscaling:DescribeTags",
 | 
						|
                  "ec2:DescribeImages",
 | 
						|
                  "ec2:DescribeInstanceTypes",
 | 
						|
                  "ec2:DescribeLaunchTemplateVersions",
 | 
						|
                  "ec2:GetInstanceTypesFromInstanceRequirements",
 | 
						|
                  "eks:DescribeNodegroup"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "autoscaling:SetDesiredCapacity",
 | 
						|
                  "autoscaling:TerminateInstanceInAutoScalingGroup"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "owned"
 | 
						|
                    ],
 | 
						|
                    "variable": "autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "1043243729",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n      \"Principal\": {\n        \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n      },\n      \"Condition\": {\n        \"StringEquals\": {\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cluster-autoscaler\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRoleWithWebIdentity"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "sts.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "system:serviceaccount:kube-system:cluster-autoscaler"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                    ],
 | 
						|
                    "type": "Federated"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_region",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "description": "US East (N. Virginia)",
 | 
						|
            "endpoint": "ec2.us-east-1.amazonaws.com",
 | 
						|
            "id": "us-east-1",
 | 
						|
            "name": "us-east-1",
 | 
						|
            "region": "us-east-1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "cluster_autoscaler",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "Cluster autoscaler policy to allow examination and modification of EC2 Auto Scaling Groups",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "name": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "name_prefix": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FADZLMDOQX",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-autoscaler",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-26T05:25:15Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-cluster-autoscaler",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-cluster-autoscaler",
 | 
						|
            "name_prefix": "",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FEIFH6MTO2"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-cluster-autoscaler"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.cluster_autoscaler_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "cluster_autoscaler",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-cluster-autoscaler/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "role": "eks1-devel-cluster-autoscaler"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
 | 
						|
            "role": "eks1-devel-cluster-autoscaler"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.aws_iam_policy.cluster_autoscaler",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.aws_iam_role.this",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "ebs_csi",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "4189668531",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeVolumesModifications\",\n        \"ec2:DescribeVolumes\",\n        \"ec2:DescribeTags\",\n        \"ec2:DescribeSnapshots\",\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeAvailabilityZones\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:ModifyVolume\",\n        \"ec2:CreateSnapshot\"\n      ],\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DetachVolume\",\n        \"ec2:AttachVolume\"\n      ],\n      \"Resource\": [\n        \"arn:aws:ec2:*:*:volume/*\",\n        \"arn:aws:ec2:*:*:instance/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:EnableFastSnapshotRestores\",\n        \"ec2:CreateVolume\"\n      ],\n      \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateTags\",\n      \"Resource\": [\n        \"arn:aws:ec2:*:*:volume/*\",\n        \"arn:aws:ec2:*:*:snapshot/*\"\n      ],\n      \"Condition\": {\n        \"StringEquals\": {\n          \"ec2:CreateAction\": [\n            \"CreateVolume\",\n            \"CreateSnapshot\"\n          ]\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteTags\",\n      \"Resource\": [\n        \"arn:aws:ec2:*:*:volume/*\",\n        \"arn:aws:ec2:*:*:snapshot/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateVolume\",\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateVolume\",\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:RequestTag/CSIVolumeName\": \"*\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteVolume\",\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteVolume\",\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:ResourceTag/CSIVolumeName\": \"*\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteVolume\",\n      \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\": \"*\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateSnapshot\",\n      \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:RequestTag/CSIVolumeSnapshotName\": \"*\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateSnapshot\",\n      \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteSnapshot\",\n      \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:ResourceTag/CSIVolumeSnapshotName\": \"*\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:DeleteSnapshot\",\n      \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n      \"Condition\": {\n        \"StringLike\": {\n          \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"],\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DescribeAvailabilityZones",
 | 
						|
                  "ec2:DescribeInstances",
 | 
						|
                  "ec2:DescribeSnapshots",
 | 
						|
                  "ec2:DescribeTags",
 | 
						|
                  "ec2:DescribeVolumes",
 | 
						|
                  "ec2:DescribeVolumesModifications"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateSnapshot",
 | 
						|
                  "ec2:ModifyVolume"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:AttachVolume",
 | 
						|
                  "ec2:DetachVolume"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:instance/*",
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateVolume",
 | 
						|
                  "ec2:EnableFastSnapshotRestores"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateTags"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "CreateVolume",
 | 
						|
                      "CreateSnapshot"
 | 
						|
                    ],
 | 
						|
                    "variable": "ec2:CreateAction"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*",
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteTags"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*",
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateVolume"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/ebs.csi.aws.com/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateVolume"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "*"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/CSIVolumeName"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteVolume"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/ebs.csi.aws.com/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteVolume"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "*"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/CSIVolumeName"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteVolume"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "*"
 | 
						|
                    ],
 | 
						|
                    "variable": "ec2:ResourceTag/kubernetes.io/created-for/pvc/name"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:volume/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateSnapshot"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "*"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/CSIVolumeSnapshotName"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateSnapshot"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/ebs.csi.aws.com/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteSnapshot"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "*"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/CSIVolumeSnapshotName"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DeleteSnapshot"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringLike",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/ebs.csi.aws.com/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:snapshot/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "3862641923",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n      \"Principal\": {\n        \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n      },\n      \"Condition\": {\n        \"StringEquals\": {\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:ebs-csi-controller-sa\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRoleWithWebIdentity"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "sts.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "system:serviceaccount:kube-system:ebs-csi-controller-sa"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                    ],
 | 
						|
                    "type": "Federated"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_region",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "description": "US East (N. Virginia)",
 | 
						|
            "endpoint": "ec2.us-east-1.amazonaws.com",
 | 
						|
            "id": "us-east-1",
 | 
						|
            "name": "us-east-1",
 | 
						|
            "region": "us-east-1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "ebs_csi",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "Provides permissions to manage EBS volumes via the container storage interface driver",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "name": "AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "name_prefix": "AmazonEKS_eks1-devel_EBS_CSI_Policy-",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FBDEFQK6I6",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-ebs-csi",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-28T19:11:10Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-ebs-csi",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-ebs-csi",
 | 
						|
            "name_prefix": "",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FAOGGU4EPY"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-ebs-csi"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.ebs_csi_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "ebs_csi",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-ebs-csi/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "role": "eks1-devel-ebs-csi"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
 | 
						|
            "role": "eks1-devel-ebs-csi"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.aws_iam_role.this",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_eks_addon_version",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "aws-ebs-csi-driver",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "aws-ebs-csi-driver",
 | 
						|
            "id": "aws-ebs-csi-driver",
 | 
						|
            "kubernetes_version": "1.33",
 | 
						|
            "most_recent": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "version": "v1.46.0-eksbuild.1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "coredns",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "coredns",
 | 
						|
            "id": "coredns",
 | 
						|
            "kubernetes_version": "1.33",
 | 
						|
            "most_recent": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "version": "v1.12.2-eksbuild.4"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "eks-pod-identity-agent",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "eks-pod-identity-agent",
 | 
						|
            "id": "eks-pod-identity-agent",
 | 
						|
            "kubernetes_version": "1.33",
 | 
						|
            "most_recent": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "version": "v1.3.8-eksbuild.2"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "kube-proxy",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "kube-proxy",
 | 
						|
            "id": "kube-proxy",
 | 
						|
            "kubernetes_version": "1.33",
 | 
						|
            "most_recent": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "version": "v1.33.0-eksbuild.2"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "vpc-cni",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "vpc-cni",
 | 
						|
            "id": "vpc-cni",
 | 
						|
            "kubernetes_version": "1.33",
 | 
						|
            "most_recent": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "version": "v1.20.0-eksbuild.1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "assume_role_policy",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "2830595799",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Sid\": \"EKSClusterAssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"sts:TagSession\",\n        \"sts:AssumeRole\"\n      ],\n      \"Principal\": {\n        \"Service\": \"eks.amazonaws.com\"\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSClusterAssumeRole\",\"Effect\":\"Allow\",\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRole",
 | 
						|
                  "sts:TagSession"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "eks.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "type": "Service"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": "EKSClusterAssumeRole"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_session_context",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "issuer_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
 | 
						|
            "issuer_id": "AROAT7O4IS4FGZRTFR25S",
 | 
						|
            "issuer_name": "AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
 | 
						|
            "session_name": "ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "tls_certificate",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/tls\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "certificates": [
 | 
						|
              {
 | 
						|
                "cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n",
 | 
						|
                "is_ca": true,
 | 
						|
                "issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US",
 | 
						|
                "not_after": "2034-06-28T17:39:16Z",
 | 
						|
                "not_before": "2009-09-02T00:00:00Z",
 | 
						|
                "public_key_algorithm": "RSA",
 | 
						|
                "serial_number": "12037640545166866303",
 | 
						|
                "sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280",
 | 
						|
                "signature_algorithm": "SHA256-RSA",
 | 
						|
                "subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
 | 
						|
                "version": 3
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n",
 | 
						|
                "is_ca": true,
 | 
						|
                "issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
 | 
						|
                "not_after": "2037-12-31T01:00:00Z",
 | 
						|
                "not_before": "2015-05-25T12:00:00Z",
 | 
						|
                "public_key_algorithm": "RSA",
 | 
						|
                "serial_number": "144918191876577076464031512351042010504348870",
 | 
						|
                "sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39",
 | 
						|
                "signature_algorithm": "SHA256-RSA",
 | 
						|
                "subject": "CN=Amazon Root CA 1,O=Amazon,C=US",
 | 
						|
                "version": 3
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cert_pem": "-----BEGIN CERTIFICATE-----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\ni02f2ivH2vxkjDLltSpe2fiC\n-----END CERTIFICATE-----\n",
 | 
						|
                "is_ca": true,
 | 
						|
                "issuer": "CN=Amazon Root CA 1,O=Amazon,C=US",
 | 
						|
                "not_after": "2030-08-23T22:26:04Z",
 | 
						|
                "not_before": "2022-08-23T22:26:04Z",
 | 
						|
                "public_key_algorithm": "RSA",
 | 
						|
                "serial_number": "166129356476704345391986644047206454194698629",
 | 
						|
                "sha1_fingerprint": "d9fe0a65fa00cabf61f5120d373a8135e1461f15",
 | 
						|
                "signature_algorithm": "SHA256-RSA",
 | 
						|
                "subject": "CN=Amazon RSA 2048 M03,O=Amazon,C=US",
 | 
						|
                "version": 3
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cert_pem": "-----BEGIN CERTIFICATE-----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\n0mKQwrjkiglpYaXc247Qi8IUCdk6s13xHJ4e\n-----END CERTIFICATE-----\n",
 | 
						|
                "is_ca": false,
 | 
						|
                "issuer": "CN=Amazon RSA 2048 M03,O=Amazon,C=US",
 | 
						|
                "not_after": "2026-03-27T23:59:59Z",
 | 
						|
                "not_before": "2025-02-26T00:00:00Z",
 | 
						|
                "public_key_algorithm": "RSA",
 | 
						|
                "serial_number": "10383334045647432453656403708671617453",
 | 
						|
                "sha1_fingerprint": "63462dda480d8b900e0a7dbfaf6238a62ba4fce0",
 | 
						|
                "signature_algorithm": "SHA256-RSA",
 | 
						|
                "subject": "CN=*.eks.us-east-1.amazonaws.com",
 | 
						|
                "version": 3
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "content": null,
 | 
						|
            "id": "922877a0975ad078a65b8ff11ebc47b8311945c7",
 | 
						|
            "url": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
 | 
						|
            "verify_chain": true
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_cloudwatch_log_group",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:logs:us-east-1:273729230602:log-group:/aws/eks/eks1-devel/cluster",
 | 
						|
            "id": "/aws/eks/eks1-devel/cluster",
 | 
						|
            "kms_key_id": "",
 | 
						|
            "log_group_class": "STANDARD",
 | 
						|
            "name": "/aws/eks/eks1-devel/cluster",
 | 
						|
            "name_prefix": "",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "retention_in_days": 90,
 | 
						|
            "skip_destroy": false,
 | 
						|
            "tags": {
 | 
						|
              "Name": "/aws/eks/eks1-devel/cluster"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "/aws/eks/eks1-devel/cluster",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_access_entry",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "cluster_creator",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "access_entry_arn": "arn:aws:eks:us-east-1:273729230602:access-entry/eks1-devel/role/273729230602/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/c0cc2290-c2f1-d36f-a3aa-9948fb9dd5c4",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "created_at": "2025-07-26T05:08:01Z",
 | 
						|
            "id": "eks1-devel:arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
 | 
						|
            "kubernetes_groups": [],
 | 
						|
            "modified_at": "2025-07-26T05:08:01Z",
 | 
						|
            "principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "type": "STANDARD",
 | 
						|
            "user_name": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/{{SessionName}}"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_access_policy_association",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "cluster_creator_admin",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "access_scope": [
 | 
						|
              {
 | 
						|
                "namespaces": [],
 | 
						|
                "type": "cluster"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "associated_at": "2025-07-26 05:08:02.648 +0000 UTC",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "id": "eks1-devel#arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687#arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy",
 | 
						|
            "modified_at": "2025-07-26 05:08:02.648 +0000 UTC",
 | 
						|
            "policy_arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy",
 | 
						|
            "principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_addon",
 | 
						|
      "name": "before_compute",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "eks-pod-identity-agent",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "eks-pod-identity-agent",
 | 
						|
            "addon_version": "v1.3.8-eksbuild.2",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/eks-pod-identity-agent/eecc2290-c377-f6c7-9f0f-f2eb7aa1d1c1",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "configuration_values": "",
 | 
						|
            "created_at": "2025-07-26T05:08:02Z",
 | 
						|
            "id": "eks1-devel:eks-pod-identity-agent",
 | 
						|
            "modified_at": "2025-07-26T05:11:08Z",
 | 
						|
            "pod_identity_association": [],
 | 
						|
            "preserve": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "resolve_conflicts_on_create": "NONE",
 | 
						|
            "resolve_conflicts_on_update": "OVERWRITE",
 | 
						|
            "service_account_role_arn": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": {
 | 
						|
              "create": null,
 | 
						|
              "delete": null,
 | 
						|
              "update": null
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_eks_addon_version.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "vpc-cni",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "vpc-cni",
 | 
						|
            "addon_version": "v1.19.5-eksbuild.1",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/vpc-cni/e0cc2290-c371-9193-a1fe-79a2fc911873",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "configuration_values": "",
 | 
						|
            "created_at": "2025-07-26T05:08:02Z",
 | 
						|
            "id": "eks1-devel:vpc-cni",
 | 
						|
            "modified_at": "2025-07-26T05:08:11Z",
 | 
						|
            "pod_identity_association": [],
 | 
						|
            "preserve": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "resolve_conflicts_on_create": "NONE",
 | 
						|
            "resolve_conflicts_on_update": "OVERWRITE",
 | 
						|
            "service_account_role_arn": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": {
 | 
						|
              "create": null,
 | 
						|
              "delete": null,
 | 
						|
              "update": null
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_eks_addon_version.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_addon",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "aws-ebs-csi-driver",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "aws-ebs-csi-driver",
 | 
						|
            "addon_version": "v1.46.0-eksbuild.1",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/aws-ebs-csi-driver/92cc293b-7f4b-36a7-a654-e0ef08941147",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "configuration_values": "",
 | 
						|
            "created_at": "2025-07-28T19:16:27Z",
 | 
						|
            "id": "eks1-devel:aws-ebs-csi-driver",
 | 
						|
            "modified_at": "2025-07-28T19:17:18Z",
 | 
						|
            "pod_identity_association": [],
 | 
						|
            "preserve": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "resolve_conflicts_on_create": "NONE",
 | 
						|
            "resolve_conflicts_on_update": "OVERWRITE",
 | 
						|
            "service_account_role_arn": "",
 | 
						|
            "tags": null,
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": {
 | 
						|
              "create": null,
 | 
						|
              "delete": null,
 | 
						|
              "update": null
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_eks_addon_version.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_region.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "coredns",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "coredns",
 | 
						|
            "addon_version": "v1.12.1-eksbuild.2",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/coredns/9acc2291-b411-4ab5-46a4-c9fd2bf3dff7",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "configuration_values": "",
 | 
						|
            "created_at": "2025-07-26T05:10:05Z",
 | 
						|
            "id": "eks1-devel:coredns",
 | 
						|
            "modified_at": "2025-07-26T05:10:48Z",
 | 
						|
            "pod_identity_association": [],
 | 
						|
            "preserve": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "resolve_conflicts_on_create": "NONE",
 | 
						|
            "resolve_conflicts_on_update": "OVERWRITE",
 | 
						|
            "service_account_role_arn": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": {
 | 
						|
              "create": null,
 | 
						|
              "delete": null,
 | 
						|
              "update": null
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_eks_addon_version.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_region.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "kube-proxy",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "addon_name": "kube-proxy",
 | 
						|
            "addon_version": "v1.33.0-eksbuild.2",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/kube-proxy/dacc2291-b40d-625e-13de-8d62e87a886b",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "configuration_values": "",
 | 
						|
            "created_at": "2025-07-26T05:10:05Z",
 | 
						|
            "id": "eks1-devel:kube-proxy",
 | 
						|
            "modified_at": "2025-07-26T05:11:12Z",
 | 
						|
            "pod_identity_association": [],
 | 
						|
            "preserve": true,
 | 
						|
            "region": "us-east-1",
 | 
						|
            "resolve_conflicts_on_create": "NONE",
 | 
						|
            "resolve_conflicts_on_update": "OVERWRITE",
 | 
						|
            "service_account_role_arn": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": {
 | 
						|
              "create": null,
 | 
						|
              "delete": null,
 | 
						|
              "update": null
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_eks_addon_version.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.fargate_profile.data.aws_region.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_cluster",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "access_config": [
 | 
						|
              {
 | 
						|
                "authentication_mode": "API_AND_CONFIG_MAP",
 | 
						|
                "bootstrap_cluster_creator_admin_permissions": false
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:cluster/eks1-devel",
 | 
						|
            "bootstrap_self_managed_addons": false,
 | 
						|
            "certificate_authority": [
 | 
						|
              {
 | 
						|
                "data": "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"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "cluster_id": null,
 | 
						|
            "compute_config": [],
 | 
						|
            "created_at": "2025-07-26T04:58:04Z",
 | 
						|
            "enabled_cluster_log_types": [
 | 
						|
              "api",
 | 
						|
              "audit",
 | 
						|
              "authenticator"
 | 
						|
            ],
 | 
						|
            "encryption_config": [
 | 
						|
              {
 | 
						|
                "provider": [
 | 
						|
                  {
 | 
						|
                    "key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [
 | 
						|
                  "secrets"
 | 
						|
                ]
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com",
 | 
						|
            "force_update_version": null,
 | 
						|
            "id": "eks1-devel",
 | 
						|
            "identity": [
 | 
						|
              {
 | 
						|
                "oidc": [
 | 
						|
                  {
 | 
						|
                    "issuer": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                  }
 | 
						|
                ]
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "kubernetes_network_config": [
 | 
						|
              {
 | 
						|
                "elastic_load_balancing": [
 | 
						|
                  {
 | 
						|
                    "enabled": false
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "ip_family": "ipv4",
 | 
						|
                "service_ipv4_cidr": "10.100.0.0/16",
 | 
						|
                "service_ipv6_cidr": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "name": "eks1-devel",
 | 
						|
            "outpost_config": [],
 | 
						|
            "platform_version": "eks.6",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "remote_network_config": [],
 | 
						|
            "role_arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006",
 | 
						|
            "status": "ACTIVE",
 | 
						|
            "storage_config": [],
 | 
						|
            "tags": {
 | 
						|
              "terraform-aws-modules": "eks"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "terraform-aws-modules": "eks"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "upgrade_policy": [
 | 
						|
              {
 | 
						|
                "support_type": "EXTENDED"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "1.33",
 | 
						|
            "vpc_config": [
 | 
						|
              {
 | 
						|
                "cluster_security_group_id": "sg-076b2d2377e33d292",
 | 
						|
                "endpoint_private_access": true,
 | 
						|
                "endpoint_public_access": true,
 | 
						|
                "public_access_cidrs": [
 | 
						|
                  "0.0.0.0/0"
 | 
						|
                ],
 | 
						|
                "security_group_ids": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "subnet_ids": [
 | 
						|
                  "subnet-02555be9c1954bbda",
 | 
						|
                  "subnet-08dbbf19ff2c937f1",
 | 
						|
                  "subnet-0d7ae39c853e68127",
 | 
						|
                  "subnet-0e188b45be889dcc3",
 | 
						|
                  "subnet-0f0da9e04f1c8369a",
 | 
						|
                  "subnet-0f84cfaa3d8da724d"
 | 
						|
                ],
 | 
						|
                "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "zonal_shift_config": []
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_openid_connect_provider",
 | 
						|
      "name": "oidc_provider",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
 | 
						|
            "client_id_list": [
 | 
						|
              "sts.amazonaws.com"
 | 
						|
            ],
 | 
						|
            "id": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
 | 
						|
            "tags": {
 | 
						|
              "Name": "eks1-devel-eks-irsa"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "eks1-devel-eks-irsa",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "thumbprint_list": [
 | 
						|
              "9e99a48a9960b14926bb7f3b02e22da2b0ab7280"
 | 
						|
            ],
 | 
						|
            "url": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "cluster_encryption",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "Cluster encryption policy to allow cluster role to utilize CMK provided",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "name": "eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "name_prefix": "eks1-devel-cluster-ClusterEncryption",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FODRVQNHGK",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-26T04:57:06Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-cluster-20250726045706140700000006",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
              "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-cluster-20250726045706140700000006",
 | 
						|
            "name_prefix": "eks1-devel-cluster-",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FAGFOIF7OI"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-cluster-20250726045706140700000006"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "cluster_encryption",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "role": "eks1-devel-cluster-20250726045706140700000006"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
 | 
						|
            "role": "eks1-devel-cluster-20250726045706140700000006"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cluster_encryption",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "AmazonEKSClusterPolicy",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
 | 
						|
            "role": "eks1-devel-cluster-20250726045706140700000006"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
 | 
						|
            "role": "eks1-devel-cluster-20250726045706140700000006"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_security_group",
 | 
						|
      "name": "cluster",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0f6f49725d40dcc30",
 | 
						|
            "description": "EKS cluster security group",
 | 
						|
            "egress": [],
 | 
						|
            "id": "sg-0f6f49725d40dcc30",
 | 
						|
            "ingress": [
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Node groups to cluster API",
 | 
						|
                "from_port": 443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0a74b044afaa663ed"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 443
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "name": "eks1-devel-cluster-20250726045706139300000004",
 | 
						|
            "name_prefix": "eks1-devel-cluster-",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "revoke_rules_on_delete": false,
 | 
						|
            "tags": {
 | 
						|
              "Name": "eks1-devel-cluster"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "eks1-devel-cluster",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_security_group",
 | 
						|
      "name": "node",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0a74b044afaa663ed",
 | 
						|
            "description": "EKS node shared security group",
 | 
						|
            "egress": [
 | 
						|
              {
 | 
						|
                "cidr_blocks": [
 | 
						|
                  "0.0.0.0/0"
 | 
						|
                ],
 | 
						|
                "description": "Allow all egress",
 | 
						|
                "from_port": 0,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "-1",
 | 
						|
                "security_groups": [],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 0
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "id": "sg-0a74b044afaa663ed",
 | 
						|
            "ingress": [
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node 4443/tcp webhook",
 | 
						|
                "from_port": 4443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 4443
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node 6443/tcp webhook",
 | 
						|
                "from_port": 6443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 6443
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node 8443/tcp webhook",
 | 
						|
                "from_port": 8443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 8443
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node 9443/tcp webhook",
 | 
						|
                "from_port": 9443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 9443
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node groups",
 | 
						|
                "from_port": 443,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 443
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Cluster API to node kubelets",
 | 
						|
                "from_port": 10250,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-0f6f49725d40dcc30"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 10250
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Node to node CoreDNS UDP",
 | 
						|
                "from_port": 53,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "udp",
 | 
						|
                "security_groups": [],
 | 
						|
                "self": true,
 | 
						|
                "to_port": 53
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Node to node CoreDNS",
 | 
						|
                "from_port": 53,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [],
 | 
						|
                "self": true,
 | 
						|
                "to_port": 53
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "Node to node ingress on ephemeral ports",
 | 
						|
                "from_port": 1025,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [],
 | 
						|
                "self": true,
 | 
						|
                "to_port": 65535
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "cidr_blocks": [],
 | 
						|
                "description": "elbv2.k8s.aws/targetGroupBinding=shared",
 | 
						|
                "from_port": 80,
 | 
						|
                "ipv6_cidr_blocks": [],
 | 
						|
                "prefix_list_ids": [],
 | 
						|
                "protocol": "tcp",
 | 
						|
                "security_groups": [
 | 
						|
                  "sg-02b2e955e7a69217a"
 | 
						|
                ],
 | 
						|
                "self": false,
 | 
						|
                "to_port": 10254
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "name": "eks1-devel-node-20250726045706138200000003",
 | 
						|
            "name_prefix": "eks1-devel-node-",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "revoke_rules_on_delete": false,
 | 
						|
            "tags": {
 | 
						|
              "Name": "eks1-devel-node",
 | 
						|
              "kubernetes.io/cluster/eks1-devel": "owned"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "eks1-devel-node",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/cluster/eks1-devel": "owned"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_security_group_rule",
 | 
						|
      "name": "cluster",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "ingress_nodes_443",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Node groups to cluster API",
 | 
						|
            "from_port": 443,
 | 
						|
            "id": "sgrule-3138574090",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "security_group_rule_id": "sgr-068c762594d1de680",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_security_group_rule",
 | 
						|
      "name": "node",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "egress_all",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": [
 | 
						|
              "0.0.0.0/0"
 | 
						|
            ],
 | 
						|
            "description": "Allow all egress",
 | 
						|
            "from_port": 0,
 | 
						|
            "id": "sgrule-3315708913",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "-1",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-07bd88701cf08d8b8",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": null,
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 0,
 | 
						|
            "type": "egress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_443",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node groups",
 | 
						|
            "from_port": 443,
 | 
						|
            "id": "sgrule-45776182",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0361333e190e1a04b",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_4443_webhook",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node 4443/tcp webhook",
 | 
						|
            "from_port": 4443,
 | 
						|
            "id": "sgrule-500800407",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0a1a8f25a5818003a",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 4443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_6443_webhook",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node 6443/tcp webhook",
 | 
						|
            "from_port": 6443,
 | 
						|
            "id": "sgrule-3566992385",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0c4f285327006f065",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 6443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_8443_webhook",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node 8443/tcp webhook",
 | 
						|
            "from_port": 8443,
 | 
						|
            "id": "sgrule-3351756832",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0d3d4fa20169a2ea8",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 8443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_9443_webhook",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node 9443/tcp webhook",
 | 
						|
            "from_port": 9443,
 | 
						|
            "id": "sgrule-2741433323",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-035233532bcbfb1d9",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 9443,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_cluster_kubelet",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Cluster API to node kubelets",
 | 
						|
            "from_port": 10250,
 | 
						|
            "id": "sgrule-1489672607",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-006dc66a135d40e67",
 | 
						|
            "self": false,
 | 
						|
            "source_security_group_id": "sg-0f6f49725d40dcc30",
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 10250,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_nodes_ephemeral",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Node to node ingress on ephemeral ports",
 | 
						|
            "from_port": 1025,
 | 
						|
            "id": "sgrule-901693526",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0068ba55843cb9c50",
 | 
						|
            "self": true,
 | 
						|
            "source_security_group_id": null,
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 65535,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_self_coredns_tcp",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Node to node CoreDNS",
 | 
						|
            "from_port": 53,
 | 
						|
            "id": "sgrule-3646939900",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "tcp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-00d96212df13f95db",
 | 
						|
            "self": true,
 | 
						|
            "source_security_group_id": null,
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 53,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "ingress_self_coredns_udp",
 | 
						|
          "schema_version": 2,
 | 
						|
          "attributes": {
 | 
						|
            "cidr_blocks": null,
 | 
						|
            "description": "Node to node CoreDNS UDP",
 | 
						|
            "from_port": 53,
 | 
						|
            "id": "sgrule-2097168659",
 | 
						|
            "ipv6_cidr_blocks": null,
 | 
						|
            "prefix_list_ids": null,
 | 
						|
            "protocol": "udp",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_id": "sg-0a74b044afaa663ed",
 | 
						|
            "security_group_rule_id": "sgr-0f9065f0d4958f39e",
 | 
						|
            "self": true,
 | 
						|
            "source_security_group_id": null,
 | 
						|
            "timeouts": null,
 | 
						|
            "to_port": 53,
 | 
						|
            "type": "ingress"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "time_sleep",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/time\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "create_duration": "30s",
 | 
						|
            "destroy_duration": null,
 | 
						|
            "id": "2025-07-26T05:08:31Z",
 | 
						|
            "triggers": {
 | 
						|
              "certificate_authority_data": "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",
 | 
						|
              "endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com",
 | 
						|
              "kubernetes_version": "1.33",
 | 
						|
              "name": "eks1-devel",
 | 
						|
              "service_cidr": "10.100.0.0/16"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "assume_role_policy",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "2560088296",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Sid\": \"EKSNodeAssumeRole\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRole\",\n      \"Principal\": {\n        \"Service\": \"ec2.amazonaws.com\"\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSNodeAssumeRole\",\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRole"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "ec2.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "type": "Service"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": "EKSNodeAssumeRole"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_ssm_parameter",
 | 
						|
      "name": "ami",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ssm:us-east-1::parameter/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
 | 
						|
            "id": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
 | 
						|
            "insecure_value": "1.33.0-20250715",
 | 
						|
            "name": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "type": "String",
 | 
						|
            "value": "1.33.0-20250715",
 | 
						|
            "version": 6,
 | 
						|
            "with_decryption": true
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [
 | 
						|
            [
 | 
						|
              {
 | 
						|
                "type": "get_attr",
 | 
						|
                "value": "value"
 | 
						|
              }
 | 
						|
            ]
 | 
						|
          ],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eks_node_group",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "ami_type": "AL2023_x86_64_STANDARD",
 | 
						|
            "arn": "arn:aws:eks:us-east-1:273729230602:nodegroup/eks1-devel/ng-20250726050837528800000015/4ecc2291-0935-59bf-b572-c11bd62148f2",
 | 
						|
            "capacity_type": "ON_DEMAND",
 | 
						|
            "cluster_name": "eks1-devel",
 | 
						|
            "disk_size": 0,
 | 
						|
            "force_update_version": null,
 | 
						|
            "id": "eks1-devel:ng-20250726050837528800000015",
 | 
						|
            "instance_types": [
 | 
						|
              "m6i.large"
 | 
						|
            ],
 | 
						|
            "labels": {},
 | 
						|
            "launch_template": [
 | 
						|
              {
 | 
						|
                "id": "lt-0d2be8605aecac3d6",
 | 
						|
                "name": "ng-20250726050831652700000013",
 | 
						|
                "version": "2"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "node_group_name": "ng-20250726050837528800000015",
 | 
						|
            "node_group_name_prefix": "ng-",
 | 
						|
            "node_repair_config": [],
 | 
						|
            "node_role_arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "release_version": "1.33.0-20250715",
 | 
						|
            "remote_access": [],
 | 
						|
            "resources": [
 | 
						|
              {
 | 
						|
                "autoscaling_groups": [
 | 
						|
                  {
 | 
						|
                    "name": "eks-ng-20250726050837528800000015-4ecc2291-0935-59bf-b572-c11bd62148f2"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "remote_access_security_group_id": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "scaling_config": [
 | 
						|
              {
 | 
						|
                "desired_size": 3,
 | 
						|
                "max_size": 10,
 | 
						|
                "min_size": 1
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "status": "ACTIVE",
 | 
						|
            "subnet_ids": [
 | 
						|
              "subnet-02555be9c1954bbda",
 | 
						|
              "subnet-08dbbf19ff2c937f1",
 | 
						|
              "subnet-0d7ae39c853e68127",
 | 
						|
              "subnet-0e188b45be889dcc3",
 | 
						|
              "subnet-0f0da9e04f1c8369a",
 | 
						|
              "subnet-0f84cfaa3d8da724d"
 | 
						|
            ],
 | 
						|
            "tags": {
 | 
						|
              "Name": "ng"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "ng",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "taint": [],
 | 
						|
            "timeouts": null,
 | 
						|
            "update_config": [
 | 
						|
              {
 | 
						|
                "max_unavailable": 0,
 | 
						|
                "max_unavailable_percentage": 33
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "1.33"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-26T04:57:06Z",
 | 
						|
            "description": "EKS managed node group IAM role",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "ng-eks-node-group-20250726045706136900000001",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
 | 
						|
              "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
 | 
						|
              "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "ng-eks-node-group-20250726045706136900000001",
 | 
						|
            "name_prefix": "ng-eks-node-group-",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FE2DMUYZHS"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "AmazonEC2ContainerRegistryReadOnly",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "AmazonEKSWorkerNodePolicy",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "AmazonEKS_CNI_Policy",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
 | 
						|
            "role": "ng-eks-node-group-20250726045706136900000001"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_launch_template",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:launch-template/lt-0d2be8605aecac3d6",
 | 
						|
            "block_device_mappings": [],
 | 
						|
            "capacity_reservation_specification": [],
 | 
						|
            "cpu_options": [],
 | 
						|
            "credit_specification": [],
 | 
						|
            "default_version": 2,
 | 
						|
            "description": "Custom launch template for ng EKS managed node group",
 | 
						|
            "disable_api_stop": false,
 | 
						|
            "disable_api_termination": false,
 | 
						|
            "ebs_optimized": "",
 | 
						|
            "enclave_options": [],
 | 
						|
            "hibernation_options": [],
 | 
						|
            "iam_instance_profile": [],
 | 
						|
            "id": "lt-0d2be8605aecac3d6",
 | 
						|
            "image_id": "",
 | 
						|
            "instance_initiated_shutdown_behavior": "",
 | 
						|
            "instance_market_options": [],
 | 
						|
            "instance_requirements": [],
 | 
						|
            "instance_type": "",
 | 
						|
            "kernel_id": "",
 | 
						|
            "key_name": "",
 | 
						|
            "latest_version": 2,
 | 
						|
            "license_specification": [],
 | 
						|
            "maintenance_options": [],
 | 
						|
            "metadata_options": [
 | 
						|
              {
 | 
						|
                "http_endpoint": "enabled",
 | 
						|
                "http_protocol_ipv6": "",
 | 
						|
                "http_put_response_hop_limit": 2,
 | 
						|
                "http_tokens": "required",
 | 
						|
                "instance_metadata_tags": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "monitoring": [],
 | 
						|
            "name": "ng-20250726050831652700000013",
 | 
						|
            "name_prefix": "ng-",
 | 
						|
            "network_interfaces": [],
 | 
						|
            "placement": [],
 | 
						|
            "private_dns_name_options": [],
 | 
						|
            "ram_disk_id": "",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "security_group_names": [],
 | 
						|
            "tag_specifications": [
 | 
						|
              {
 | 
						|
                "resource_type": "instance",
 | 
						|
                "tags": {
 | 
						|
                  "Name": "ng"
 | 
						|
                }
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "resource_type": "network-interface",
 | 
						|
                "tags": {
 | 
						|
                  "Name": "ng"
 | 
						|
                }
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "resource_type": "volume",
 | 
						|
                "tags": {
 | 
						|
                  "Name": "ng"
 | 
						|
                }
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "update_default_version": true,
 | 
						|
            "user_data": "",
 | 
						|
            "vpc_security_group_ids": [
 | 
						|
              "sg-0a74b044afaa663ed"
 | 
						|
            ]
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "null_resource",
 | 
						|
      "name": "validate_cluster_service_cidr",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "5050192302767161671",
 | 
						|
            "triggers": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.time_sleep.this",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.kms",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.kms",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "3915224678",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Sid\": \"Default\",\n      \"Effect\": \"Allow\",\n      \"Action\": \"kms:*\",\n      \"Resource\": \"*\",\n      \"Principal\": {\n        \"AWS\": \"arn:aws:iam::273729230602:root\"\n      }\n    },\n    {\n      \"Sid\": \"KeyAdministration\",\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"kms:Update*\",\n        \"kms:UntagResource\",\n        \"kms:TagResource\",\n        \"kms:ScheduleKeyDeletion\",\n        \"kms:Revoke*\",\n        \"kms:ReplicateKey\",\n        \"kms:Put*\",\n        \"kms:List*\",\n        \"kms:ImportKeyMaterial\",\n        \"kms:Get*\",\n        \"kms:Enable*\",\n        \"kms:Disable*\",\n        \"kms:Describe*\",\n        \"kms:Delete*\",\n        \"kms:Create*\",\n        \"kms:CancelKeyDeletion\"\n      ],\n      \"Resource\": \"*\",\n      \"Principal\": {\n        \"AWS\": \"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"\n      }\n    },\n    {\n      \"Sid\": \"KeyUsage\",\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"kms:ReEncrypt*\",\n        \"kms:GenerateDataKey*\",\n        \"kms:Encrypt\",\n        \"kms:DescribeKey\",\n        \"kms:Decrypt\"\n      ],\n      \"Resource\": \"*\",\n      \"Principal\": {\n        \"AWS\": \"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Default\",\"Effect\":\"Allow\",\"Action\":\"kms:*\",\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"}},{\"Sid\":\"KeyAdministration\",\"Effect\":\"Allow\",\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"}},{\"Sid\":\"KeyUsage\",\"Effect\":\"Allow\",\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "kms:*"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:root"
 | 
						|
                    ],
 | 
						|
                    "type": "AWS"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": "Default"
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "kms:CancelKeyDeletion",
 | 
						|
                  "kms:Create*",
 | 
						|
                  "kms:Delete*",
 | 
						|
                  "kms:Describe*",
 | 
						|
                  "kms:Disable*",
 | 
						|
                  "kms:Enable*",
 | 
						|
                  "kms:Get*",
 | 
						|
                  "kms:ImportKeyMaterial",
 | 
						|
                  "kms:List*",
 | 
						|
                  "kms:Put*",
 | 
						|
                  "kms:ReplicateKey",
 | 
						|
                  "kms:Revoke*",
 | 
						|
                  "kms:ScheduleKeyDeletion",
 | 
						|
                  "kms:TagResource",
 | 
						|
                  "kms:UntagResource",
 | 
						|
                  "kms:Update*"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687"
 | 
						|
                    ],
 | 
						|
                    "type": "AWS"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": "KeyAdministration"
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "kms:Decrypt",
 | 
						|
                  "kms:DescribeKey",
 | 
						|
                  "kms:Encrypt",
 | 
						|
                  "kms:GenerateDataKey*",
 | 
						|
                  "kms:ReEncrypt*"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006"
 | 
						|
                    ],
 | 
						|
                    "type": "AWS"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": "KeyUsage"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.kms",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.kms",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_kms_alias",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "cluster",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:kms:us-east-1:273729230602:alias/eks/eks1-devel",
 | 
						|
            "id": "alias/eks/eks1-devel",
 | 
						|
            "name": "alias/eks/eks1-devel",
 | 
						|
            "name_prefix": "",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "target_key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655",
 | 
						|
            "target_key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.eks.module.kms",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_kms_key",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655",
 | 
						|
            "bypass_policy_lockout_safety_check": false,
 | 
						|
            "custom_key_store_id": "",
 | 
						|
            "customer_master_key_spec": "SYMMETRIC_DEFAULT",
 | 
						|
            "deletion_window_in_days": null,
 | 
						|
            "description": "eks1-devel cluster encryption key",
 | 
						|
            "enable_key_rotation": true,
 | 
						|
            "id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655",
 | 
						|
            "is_enabled": true,
 | 
						|
            "key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655",
 | 
						|
            "key_usage": "ENCRYPT_DECRYPT",
 | 
						|
            "multi_region": false,
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"},\"Resource\":\"*\",\"Sid\":\"Default\"},{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"},\"Resource\":\"*\",\"Sid\":\"KeyAdministration\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"},\"Resource\":\"*\",\"Sid\":\"KeyUsage\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "rotation_period_in_days": 365,
 | 
						|
            "tags": {
 | 
						|
              "terraform-aws-modules": "eks"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "terraform-aws-modules": "eks"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "xks_key_id": ""
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDB9fQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "external_dns",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "1268413494",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"route53:ChangeResourceRecordSets\",\n      \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListTagsForResources\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": \"*\"\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:ChangeResourceRecordSets\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Resource\":\"*\"}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "route53:ChangeResourceRecordSets"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:route53:::hostedzone/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "route53:ListHostedZones",
 | 
						|
                  "route53:ListResourceRecordSets",
 | 
						|
                  "route53:ListTagsForResources"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "1716340323",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n      \"Principal\": {\n        \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n      },\n      \"Condition\": {\n        \"StringEquals\": {\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:external-dns\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRoleWithWebIdentity"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "sts.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "system:serviceaccount:kube-system:external-dns"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                    ],
 | 
						|
                    "type": "Federated"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_region",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "description": "US East (N. Virginia)",
 | 
						|
            "endpoint": "ec2.us-east-1.amazonaws.com",
 | 
						|
            "id": "us-east-1",
 | 
						|
            "name": "us-east-1",
 | 
						|
            "region": "us-east-1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "external_dns",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "External DNS policy to allow management of Route53 hosted zone records",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "name": "AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "name_prefix": "AmazonEKS_eks1-devel_External_DNS_Policy-",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":\"route53:ChangeResourceRecordSets\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FBJOOEWX3J",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-external-dns",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-26T05:25:15Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-external-dns",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-external-dns",
 | 
						|
            "name_prefix": "",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FBJGK2IPMG"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-external-dns"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.external_dns_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "external_dns",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-external-dns/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "role": "eks1-devel-external-dns"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
 | 
						|
            "role": "eks1-devel-external-dns"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.external_dns_irsa_role.aws_iam_policy.external_dns",
 | 
						|
            "module.eks.module.external_dns_irsa_role.aws_iam_role.this",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.external_dns_irsa_role.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_caller_identity",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
 | 
						|
            "id": "273729230602",
 | 
						|
            "user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "load_balancer_controller",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "1541424006",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"iam:CreateServiceLinkedRole\",\n      \"Resource\": \"*\",\n      \"Condition\": {\n        \"StringEquals\": {\n          \"iam:AWSServiceName\": \"elasticloadbalancing.amazonaws.com\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:DescribeTrustStores\",\n        \"elasticloadbalancing:DescribeTargetHealth\",\n        \"elasticloadbalancing:DescribeTargetGroups\",\n        \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n        \"elasticloadbalancing:DescribeTags\",\n        \"elasticloadbalancing:DescribeSSLPolicies\",\n        \"elasticloadbalancing:DescribeRules\",\n        \"elasticloadbalancing:DescribeLoadBalancers\",\n        \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n        \"elasticloadbalancing:DescribeListeners\",\n        \"elasticloadbalancing:DescribeListenerCertificates\",\n        \"elasticloadbalancing:DescribeListenerAttributes\",\n        \"elasticloadbalancing:DescribeCapacityReservation\",\n        \"ec2:GetSecurityGroupsForVpc\",\n        \"ec2:GetCoipPoolUsage\",\n        \"ec2:DescribeVpcs\",\n        \"ec2:DescribeVpcPeeringConnections\",\n        \"ec2:DescribeTags\",\n        \"ec2:DescribeSubnets\",\n        \"ec2:DescribeSecurityGroups\",\n        \"ec2:DescribeRouteTables\",\n        \"ec2:DescribeNetworkInterfaces\",\n        \"ec2:DescribeIpamPools\",\n        \"ec2:DescribeInternetGateways\",\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeCoipPools\",\n        \"ec2:DescribeAvailabilityZones\",\n        \"ec2:DescribeAddresses\",\n        \"ec2:DescribeAccountAttributes\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"wafv2:GetWebACLForResource\",\n        \"wafv2:GetWebACL\",\n        \"wafv2:DisassociateWebACL\",\n        \"wafv2:AssociateWebACL\",\n        \"waf-regional:GetWebACLForResource\",\n        \"waf-regional:GetWebACL\",\n        \"waf-regional:DisassociateWebACL\",\n        \"waf-regional:AssociateWebACL\",\n        \"shield:GetSubscriptionState\",\n        \"shield:DescribeProtection\",\n        \"shield:DeleteProtection\",\n        \"shield:CreateProtection\",\n        \"iam:ListServerCertificates\",\n        \"iam:GetServerCertificate\",\n        \"cognito-idp:DescribeUserPoolClient\",\n        \"acm:ListCertificates\",\n        \"acm:DescribeCertificate\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:RevokeSecurityGroupIngress\",\n        \"ec2:AuthorizeSecurityGroupIngress\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateSecurityGroup\",\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"ec2:CreateTags\",\n      \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n      \"Condition\": {\n        \"Null\": {\n          \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n        },\n        \"StringEquals\": {\n          \"ec2:CreateAction\": \"CreateSecurityGroup\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DeleteTags\",\n        \"ec2:CreateTags\"\n      ],\n      \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n      \"Condition\": {\n        \"Null\": {\n          \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n          \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:RevokeSecurityGroupIngress\",\n        \"ec2:DeleteSecurityGroup\",\n        \"ec2:AuthorizeSecurityGroupIngress\"\n      ],\n      \"Resource\": \"*\",\n      \"Condition\": {\n        \"Null\": {\n          \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:CreateTargetGroup\",\n        \"elasticloadbalancing:CreateLoadBalancer\"\n      ],\n      \"Resource\": \"*\",\n      \"Condition\": {\n        \"Null\": {\n          \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:DeleteRule\",\n        \"elasticloadbalancing:DeleteListener\",\n        \"elasticloadbalancing:CreateRule\",\n        \"elasticloadbalancing:CreateListener\"\n      ],\n      \"Resource\": \"*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:RemoveTags\",\n        \"elasticloadbalancing:AddTags\"\n      ],\n      \"Resource\": [\n        \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n      ],\n      \"Condition\": {\n        \"Null\": {\n          \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n          \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:RemoveTags\",\n        \"elasticloadbalancing:AddTags\"\n      ],\n      \"Resource\": [\n        \"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:SetSubnets\",\n        \"elasticloadbalancing:SetSecurityGroups\",\n        \"elasticloadbalancing:SetIpAddressType\",\n        \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n        \"elasticloadbalancing:ModifyTargetGroup\",\n        \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n        \"elasticloadbalancing:ModifyListenerAttributes\",\n        \"elasticloadbalancing:ModifyIpPools\",\n        \"elasticloadbalancing:ModifyCapacityReservation\",\n        \"elasticloadbalancing:DeleteTargetGroup\",\n        \"elasticloadbalancing:DeleteLoadBalancer\"\n      ],\n      \"Resource\": \"*\",\n      \"Condition\": {\n        \"Null\": {\n          \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"elasticloadbalancing:AddTags\",\n      \"Resource\": [\n        \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n        \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n      ],\n      \"Condition\": {\n        \"Null\": {\n          \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n        },\n        \"StringEquals\": {\n          \"elasticloadbalancing:CreateAction\": [\n            \"CreateTargetGroup\",\n            \"CreateLoadBalancer\"\n          ]\n        }\n      }\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:RegisterTargets\",\n        \"elasticloadbalancing:DeregisterTargets\"\n      ],\n      \"Resource\": \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:SetWebAcl\",\n        \"elasticloadbalancing:SetRulePriorities\",\n        \"elasticloadbalancing:RemoveListenerCertificates\",\n        \"elasticloadbalancing:ModifyRule\",\n        \"elasticloadbalancing:ModifyListener\",\n        \"elasticloadbalancing:AddListenerCertificates\"\n      ],\n      \"Resource\": \"*\"\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"iam:CreateServiceLinkedRole\",\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSecurityGroup\",\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":\"elasticloadbalancing:AddTags\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Resource\":\"*\"}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "iam:CreateServiceLinkedRole"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "elasticloadbalancing.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "iam:AWSServiceName"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:DescribeAccountAttributes",
 | 
						|
                  "ec2:DescribeAddresses",
 | 
						|
                  "ec2:DescribeAvailabilityZones",
 | 
						|
                  "ec2:DescribeCoipPools",
 | 
						|
                  "ec2:DescribeInstances",
 | 
						|
                  "ec2:DescribeInternetGateways",
 | 
						|
                  "ec2:DescribeIpamPools",
 | 
						|
                  "ec2:DescribeNetworkInterfaces",
 | 
						|
                  "ec2:DescribeRouteTables",
 | 
						|
                  "ec2:DescribeSecurityGroups",
 | 
						|
                  "ec2:DescribeSubnets",
 | 
						|
                  "ec2:DescribeTags",
 | 
						|
                  "ec2:DescribeVpcPeeringConnections",
 | 
						|
                  "ec2:DescribeVpcs",
 | 
						|
                  "ec2:GetCoipPoolUsage",
 | 
						|
                  "ec2:GetSecurityGroupsForVpc",
 | 
						|
                  "elasticloadbalancing:DescribeCapacityReservation",
 | 
						|
                  "elasticloadbalancing:DescribeListenerAttributes",
 | 
						|
                  "elasticloadbalancing:DescribeListenerCertificates",
 | 
						|
                  "elasticloadbalancing:DescribeListeners",
 | 
						|
                  "elasticloadbalancing:DescribeLoadBalancerAttributes",
 | 
						|
                  "elasticloadbalancing:DescribeLoadBalancers",
 | 
						|
                  "elasticloadbalancing:DescribeRules",
 | 
						|
                  "elasticloadbalancing:DescribeSSLPolicies",
 | 
						|
                  "elasticloadbalancing:DescribeTags",
 | 
						|
                  "elasticloadbalancing:DescribeTargetGroupAttributes",
 | 
						|
                  "elasticloadbalancing:DescribeTargetGroups",
 | 
						|
                  "elasticloadbalancing:DescribeTargetHealth",
 | 
						|
                  "elasticloadbalancing:DescribeTrustStores"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "acm:DescribeCertificate",
 | 
						|
                  "acm:ListCertificates",
 | 
						|
                  "cognito-idp:DescribeUserPoolClient",
 | 
						|
                  "iam:GetServerCertificate",
 | 
						|
                  "iam:ListServerCertificates",
 | 
						|
                  "shield:CreateProtection",
 | 
						|
                  "shield:DeleteProtection",
 | 
						|
                  "shield:DescribeProtection",
 | 
						|
                  "shield:GetSubscriptionState",
 | 
						|
                  "waf-regional:AssociateWebACL",
 | 
						|
                  "waf-regional:DisassociateWebACL",
 | 
						|
                  "waf-regional:GetWebACL",
 | 
						|
                  "waf-regional:GetWebACLForResource",
 | 
						|
                  "wafv2:AssociateWebACL",
 | 
						|
                  "wafv2:DisassociateWebACL",
 | 
						|
                  "wafv2:GetWebACL",
 | 
						|
                  "wafv2:GetWebACLForResource"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:AuthorizeSecurityGroupIngress",
 | 
						|
                  "ec2:RevokeSecurityGroupIngress"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateSecurityGroup"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateTags"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "CreateSecurityGroup"
 | 
						|
                    ],
 | 
						|
                    "variable": "ec2:CreateAction"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:security-group/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:CreateTags",
 | 
						|
                  "ec2:DeleteTags"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:ec2:*:*:security-group/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "ec2:AuthorizeSecurityGroupIngress",
 | 
						|
                  "ec2:DeleteSecurityGroup",
 | 
						|
                  "ec2:RevokeSecurityGroupIngress"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:CreateLoadBalancer",
 | 
						|
                  "elasticloadbalancing:CreateTargetGroup"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:CreateListener",
 | 
						|
                  "elasticloadbalancing:CreateRule",
 | 
						|
                  "elasticloadbalancing:DeleteListener",
 | 
						|
                  "elasticloadbalancing:DeleteRule"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:AddTags",
 | 
						|
                  "elasticloadbalancing:RemoveTags"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "true"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:AddTags",
 | 
						|
                  "elasticloadbalancing:RemoveTags"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:DeleteLoadBalancer",
 | 
						|
                  "elasticloadbalancing:DeleteTargetGroup",
 | 
						|
                  "elasticloadbalancing:ModifyCapacityReservation",
 | 
						|
                  "elasticloadbalancing:ModifyIpPools",
 | 
						|
                  "elasticloadbalancing:ModifyListenerAttributes",
 | 
						|
                  "elasticloadbalancing:ModifyLoadBalancerAttributes",
 | 
						|
                  "elasticloadbalancing:ModifyTargetGroup",
 | 
						|
                  "elasticloadbalancing:ModifyTargetGroupAttributes",
 | 
						|
                  "elasticloadbalancing:SetIpAddressType",
 | 
						|
                  "elasticloadbalancing:SetSecurityGroups",
 | 
						|
                  "elasticloadbalancing:SetSubnets"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:AddTags"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "Null",
 | 
						|
                    "values": [
 | 
						|
                      "false"
 | 
						|
                    ],
 | 
						|
                    "variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "CreateTargetGroup",
 | 
						|
                      "CreateLoadBalancer"
 | 
						|
                    ],
 | 
						|
                    "variable": "elasticloadbalancing:CreateAction"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*",
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:DeregisterTargets",
 | 
						|
                  "elasticloadbalancing:RegisterTargets"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              },
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "elasticloadbalancing:AddListenerCertificates",
 | 
						|
                  "elasticloadbalancing:ModifyListener",
 | 
						|
                  "elasticloadbalancing:ModifyRule",
 | 
						|
                  "elasticloadbalancing:RemoveListenerCertificates",
 | 
						|
                  "elasticloadbalancing:SetRulePriorities",
 | 
						|
                  "elasticloadbalancing:SetWebAcl"
 | 
						|
                ],
 | 
						|
                "condition": [],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [],
 | 
						|
                "resources": [
 | 
						|
                  "*"
 | 
						|
                ],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_iam_policy_document",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "236870047",
 | 
						|
            "json": "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n      \"Principal\": {\n        \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n      },\n      \"Condition\": {\n        \"StringEquals\": {\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n          \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:aws-load-balancer-controller\"\n        }\n      }\n    }\n  ]\n}",
 | 
						|
            "minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}}}]}",
 | 
						|
            "override_json": null,
 | 
						|
            "override_policy_documents": null,
 | 
						|
            "policy_id": null,
 | 
						|
            "source_json": null,
 | 
						|
            "source_policy_documents": null,
 | 
						|
            "statement": [
 | 
						|
              {
 | 
						|
                "actions": [
 | 
						|
                  "sts:AssumeRoleWithWebIdentity"
 | 
						|
                ],
 | 
						|
                "condition": [
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "sts.amazonaws.com"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
 | 
						|
                  },
 | 
						|
                  {
 | 
						|
                    "test": "StringEquals",
 | 
						|
                    "values": [
 | 
						|
                      "system:serviceaccount:kube-system:aws-load-balancer-controller"
 | 
						|
                    ],
 | 
						|
                    "variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "effect": "Allow",
 | 
						|
                "not_actions": [],
 | 
						|
                "not_principals": [],
 | 
						|
                "not_resources": [],
 | 
						|
                "principals": [
 | 
						|
                  {
 | 
						|
                    "identifiers": [
 | 
						|
                      "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
 | 
						|
                    ],
 | 
						|
                    "type": "Federated"
 | 
						|
                  }
 | 
						|
                ],
 | 
						|
                "resources": [],
 | 
						|
                "sid": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "version": "2012-10-17"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_partition",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "dns_suffix": "amazonaws.com",
 | 
						|
            "id": "aws",
 | 
						|
            "partition": "aws",
 | 
						|
            "reverse_dns_prefix": "com.amazonaws"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_region",
 | 
						|
      "name": "current",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "description": "US East (N. Virginia)",
 | 
						|
            "endpoint": "ec2.us-east-1.amazonaws.com",
 | 
						|
            "id": "us-east-1",
 | 
						|
            "name": "us-east-1",
 | 
						|
            "region": "us-east-1"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_policy",
 | 
						|
      "name": "load_balancer_controller",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "attachment_count": 1,
 | 
						|
            "description": "Provides permissions for AWS Load Balancer Controller addon",
 | 
						|
            "id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "name": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "name_prefix": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-",
 | 
						|
            "path": "/",
 | 
						|
            "policy": "{\"Statement\":[{\"Action\":\"iam:CreateServiceLinkedRole\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateSecurityGroup\",\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"elasticloadbalancing:AddTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "policy_id": "ANPAT7O4IS4FDJFNVQKAK",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            }
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role",
 | 
						|
      "name": "this",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:iam::273729230602:role/eks1-devel-aws-load-balancer-controller",
 | 
						|
            "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
 | 
						|
            "create_date": "2025-07-26T05:23:56Z",
 | 
						|
            "description": "",
 | 
						|
            "force_detach_policies": true,
 | 
						|
            "id": "eks1-devel-aws-load-balancer-controller",
 | 
						|
            "inline_policy": [],
 | 
						|
            "managed_policy_arns": [
 | 
						|
              "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f"
 | 
						|
            ],
 | 
						|
            "max_session_duration": 3600,
 | 
						|
            "name": "eks1-devel-aws-load-balancer-controller",
 | 
						|
            "name_prefix": "",
 | 
						|
            "path": "/",
 | 
						|
            "permissions_boundary": "",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "unique_id": "AROAT7O4IS4FNEGNOKZIO"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "name": "eks1-devel-aws-load-balancer-controller"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.eks.module.load_balancer_controller_irsa_role",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_iam_role_policy_attachment",
 | 
						|
      "name": "load_balancer_controller",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": 0,
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "id": "eks1-devel-aws-load-balancer-controller/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "role": "eks1-devel-aws-load-balancer-controller"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "identity": {
 | 
						|
            "account_id": "273729230602",
 | 
						|
            "policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
 | 
						|
            "role": "eks1-devel-aws-load-balancer-controller"
 | 
						|
          },
 | 
						|
          "private": "bnVsbA==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.eks.module.eks.aws_cloudwatch_log_group.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_entry.this",
 | 
						|
            "module.eks.module.eks.aws_eks_access_policy_association.this",
 | 
						|
            "module.eks.module.eks.aws_eks_cluster.this",
 | 
						|
            "module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
 | 
						|
            "module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.aws_iam_role.eks_auto",
 | 
						|
            "module.eks.module.eks.aws_iam_role.this",
 | 
						|
            "module.eks.module.eks.aws_iam_role_policy_attachment.this",
 | 
						|
            "module.eks.module.eks.aws_security_group.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group.node",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.cluster",
 | 
						|
            "module.eks.module.eks.aws_security_group_rule.node",
 | 
						|
            "module.eks.module.eks.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
 | 
						|
            "module.eks.module.eks.data.aws_iam_session_context.current",
 | 
						|
            "module.eks.module.eks.data.aws_partition.current",
 | 
						|
            "module.eks.module.eks.data.tls_certificate.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.aws_kms_replica_key.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.eks.module.kms.data.aws_partition.current",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.aws_iam_policy.load_balancer_controller",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.aws_iam_role.this",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this",
 | 
						|
            "module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_availability_zones",
 | 
						|
      "name": "available",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "all_availability_zones": null,
 | 
						|
            "exclude_names": null,
 | 
						|
            "exclude_zone_ids": [
 | 
						|
              "cac1-az3",
 | 
						|
              "use1-az3",
 | 
						|
              "usw1-az2"
 | 
						|
            ],
 | 
						|
            "filter": [
 | 
						|
              {
 | 
						|
                "name": "opt-in-status",
 | 
						|
                "values": [
 | 
						|
                  "opt-in-not-required"
 | 
						|
                ]
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "group_names": [
 | 
						|
              "us-east-1-zg-1"
 | 
						|
            ],
 | 
						|
            "id": "us-east-1",
 | 
						|
            "names": [
 | 
						|
              "us-east-1a",
 | 
						|
              "us-east-1b",
 | 
						|
              "us-east-1c",
 | 
						|
              "us-east-1d",
 | 
						|
              "us-east-1f"
 | 
						|
            ],
 | 
						|
            "region": "us-east-1",
 | 
						|
            "state": null,
 | 
						|
            "timeouts": null,
 | 
						|
            "zone_ids": [
 | 
						|
              "use1-az1",
 | 
						|
              "use1-az2",
 | 
						|
              "use1-az4",
 | 
						|
              "use1-az6",
 | 
						|
              "use1-az5"
 | 
						|
            ]
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_internet_gateway",
 | 
						|
      "name": "default",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:internet-gateway/igw-04c8aad5899c55659",
 | 
						|
            "attachments": [
 | 
						|
              {
 | 
						|
                "state": "available",
 | 
						|
                "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "filter": [
 | 
						|
              {
 | 
						|
                "name": "attachment.vpc-id",
 | 
						|
                "values": [
 | 
						|
                  "vpc-0271dff7a4b4bbf76"
 | 
						|
                ]
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "id": "igw-04c8aad5899c55659",
 | 
						|
            "internet_gateway_id": "igw-04c8aad5899c55659",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {},
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "data",
 | 
						|
      "type": "aws_vpc",
 | 
						|
      "name": "selected",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:vpc/vpc-0271dff7a4b4bbf76",
 | 
						|
            "cidr_block": "172.31.0.0/16",
 | 
						|
            "cidr_block_associations": [
 | 
						|
              {
 | 
						|
                "association_id": "vpc-cidr-assoc-05f4dfb5fe3092d82",
 | 
						|
                "cidr_block": "172.31.0.0/16",
 | 
						|
                "state": "associated"
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "default": true,
 | 
						|
            "dhcp_options_id": "dopt-0271d6713d96f2254",
 | 
						|
            "enable_dns_hostnames": true,
 | 
						|
            "enable_dns_support": true,
 | 
						|
            "enable_network_address_usage_metrics": false,
 | 
						|
            "filter": null,
 | 
						|
            "id": "vpc-0271dff7a4b4bbf76",
 | 
						|
            "instance_tenancy": "default",
 | 
						|
            "ipv6_association_id": "",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "main_route_table_id": "rtb-01ff49732ea0b5a76",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "state": null,
 | 
						|
            "tags": {},
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_eip",
 | 
						|
      "name": "nat",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "address": null,
 | 
						|
            "allocation_id": "eipalloc-0efd9a4666274d4b9",
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:elastic-ip/eipalloc-0efd9a4666274d4b9",
 | 
						|
            "associate_with_private_ip": null,
 | 
						|
            "association_id": "eipassoc-0670094f7c1ebaa09",
 | 
						|
            "carrier_ip": "",
 | 
						|
            "customer_owned_ip": "",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "domain": "vpc",
 | 
						|
            "id": "eipalloc-0efd9a4666274d4b9",
 | 
						|
            "instance": "",
 | 
						|
            "ipam_pool_id": null,
 | 
						|
            "network_border_group": "us-east-1",
 | 
						|
            "network_interface": "eni-0af2e53d148f4e2ef",
 | 
						|
            "private_dns": "ip-172-31-176-31.ec2.internal",
 | 
						|
            "private_ip": "172.31.176.31",
 | 
						|
            "ptr_record": "",
 | 
						|
            "public_dns": "ec2-3-223-7-164.compute-1.amazonaws.com",
 | 
						|
            "public_ip": "3.223.7.164",
 | 
						|
            "public_ipv4_pool": "amazon",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ=="
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_nat_gateway",
 | 
						|
      "name": "nat_gateway",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "allocation_id": "eipalloc-0efd9a4666274d4b9",
 | 
						|
            "association_id": "eipassoc-0670094f7c1ebaa09",
 | 
						|
            "connectivity_type": "public",
 | 
						|
            "id": "nat-09006b80b9074bdb7",
 | 
						|
            "network_interface_id": "eni-0af2e53d148f4e2ef",
 | 
						|
            "private_ip": "172.31.176.31",
 | 
						|
            "public_ip": "3.223.7.164",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "secondary_allocation_ids": [],
 | 
						|
            "secondary_private_ip_address_count": 0,
 | 
						|
            "secondary_private_ip_addresses": [],
 | 
						|
            "subnet_id": "subnet-0e188b45be889dcc3",
 | 
						|
            "tags": {},
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTgwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9fQ==",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_eip.nat",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route",
 | 
						|
      "name": "nat_gateway",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "carrier_gateway_id": "",
 | 
						|
            "core_network_arn": "",
 | 
						|
            "destination_cidr_block": "0.0.0.0/0",
 | 
						|
            "destination_ipv6_cidr_block": "",
 | 
						|
            "destination_prefix_list_id": "",
 | 
						|
            "egress_only_gateway_id": "",
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "r-rtb-041eec80d0151b4131080289494",
 | 
						|
            "instance_id": "",
 | 
						|
            "instance_owner_id": "",
 | 
						|
            "local_gateway_id": "",
 | 
						|
            "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
            "network_interface_id": "",
 | 
						|
            "origin": "CreateRoute",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-041eec80d0151b413",
 | 
						|
            "state": "active",
 | 
						|
            "timeouts": null,
 | 
						|
            "transit_gateway_id": "",
 | 
						|
            "vpc_endpoint_id": "",
 | 
						|
            "vpc_peering_connection_id": ""
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_eip.nat",
 | 
						|
            "module.network.aws_nat_gateway.nat_gateway",
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "carrier_gateway_id": "",
 | 
						|
            "core_network_arn": "",
 | 
						|
            "destination_cidr_block": "0.0.0.0/0",
 | 
						|
            "destination_ipv6_cidr_block": "",
 | 
						|
            "destination_prefix_list_id": "",
 | 
						|
            "egress_only_gateway_id": "",
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "r-rtb-045c9ab610c7aabd31080289494",
 | 
						|
            "instance_id": "",
 | 
						|
            "instance_owner_id": "",
 | 
						|
            "local_gateway_id": "",
 | 
						|
            "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
            "network_interface_id": "",
 | 
						|
            "origin": "CreateRoute",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-045c9ab610c7aabd3",
 | 
						|
            "state": "active",
 | 
						|
            "timeouts": null,
 | 
						|
            "transit_gateway_id": "",
 | 
						|
            "vpc_endpoint_id": "",
 | 
						|
            "vpc_peering_connection_id": ""
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_eip.nat",
 | 
						|
            "module.network.aws_nat_gateway.nat_gateway",
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "carrier_gateway_id": "",
 | 
						|
            "core_network_arn": "",
 | 
						|
            "destination_cidr_block": "0.0.0.0/0",
 | 
						|
            "destination_ipv6_cidr_block": "",
 | 
						|
            "destination_prefix_list_id": "",
 | 
						|
            "egress_only_gateway_id": "",
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "r-rtb-0a1eb19f2c209aa341080289494",
 | 
						|
            "instance_id": "",
 | 
						|
            "instance_owner_id": "",
 | 
						|
            "local_gateway_id": "",
 | 
						|
            "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
            "network_interface_id": "",
 | 
						|
            "origin": "CreateRoute",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0a1eb19f2c209aa34",
 | 
						|
            "state": "active",
 | 
						|
            "timeouts": null,
 | 
						|
            "transit_gateway_id": "",
 | 
						|
            "vpc_endpoint_id": "",
 | 
						|
            "vpc_peering_connection_id": ""
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_eip.nat",
 | 
						|
            "module.network.aws_nat_gateway.nat_gateway",
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route",
 | 
						|
      "name": "public_internet_gateway",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "carrier_gateway_id": "",
 | 
						|
            "core_network_arn": "",
 | 
						|
            "destination_cidr_block": "0.0.0.0/0",
 | 
						|
            "destination_ipv6_cidr_block": "",
 | 
						|
            "destination_prefix_list_id": "",
 | 
						|
            "egress_only_gateway_id": "",
 | 
						|
            "gateway_id": "igw-04c8aad5899c55659",
 | 
						|
            "id": "r-rtb-0d102d2391110f0b51080289494",
 | 
						|
            "instance_id": "",
 | 
						|
            "instance_owner_id": "",
 | 
						|
            "local_gateway_id": "",
 | 
						|
            "nat_gateway_id": "",
 | 
						|
            "network_interface_id": "",
 | 
						|
            "origin": "CreateRoute",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0d102d2391110f0b5",
 | 
						|
            "state": "active",
 | 
						|
            "timeouts": null,
 | 
						|
            "transit_gateway_id": "",
 | 
						|
            "vpc_endpoint_id": "",
 | 
						|
            "vpc_peering_connection_id": ""
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.public",
 | 
						|
            "module.network.data.aws_internet_gateway.default",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route_table",
 | 
						|
      "name": "private",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-041eec80d0151b413",
 | 
						|
            "id": "rtb-041eec80d0151b413",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "propagating_vgws": [],
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route": [
 | 
						|
              {
 | 
						|
                "carrier_gateway_id": "",
 | 
						|
                "cidr_block": "0.0.0.0/0",
 | 
						|
                "core_network_arn": "",
 | 
						|
                "destination_prefix_list_id": "",
 | 
						|
                "egress_only_gateway_id": "",
 | 
						|
                "gateway_id": "",
 | 
						|
                "ipv6_cidr_block": "",
 | 
						|
                "local_gateway_id": "",
 | 
						|
                "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
                "network_interface_id": "",
 | 
						|
                "transit_gateway_id": "",
 | 
						|
                "vpc_endpoint_id": "",
 | 
						|
                "vpc_peering_connection_id": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1a)"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1a)",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-045c9ab610c7aabd3",
 | 
						|
            "id": "rtb-045c9ab610c7aabd3",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "propagating_vgws": [],
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route": [
 | 
						|
              {
 | 
						|
                "carrier_gateway_id": "",
 | 
						|
                "cidr_block": "0.0.0.0/0",
 | 
						|
                "core_network_arn": "",
 | 
						|
                "destination_prefix_list_id": "",
 | 
						|
                "egress_only_gateway_id": "",
 | 
						|
                "gateway_id": "",
 | 
						|
                "ipv6_cidr_block": "",
 | 
						|
                "local_gateway_id": "",
 | 
						|
                "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
                "network_interface_id": "",
 | 
						|
                "transit_gateway_id": "",
 | 
						|
                "vpc_endpoint_id": "",
 | 
						|
                "vpc_peering_connection_id": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1b)"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1b)",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0a1eb19f2c209aa34",
 | 
						|
            "id": "rtb-0a1eb19f2c209aa34",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "propagating_vgws": [],
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route": [
 | 
						|
              {
 | 
						|
                "carrier_gateway_id": "",
 | 
						|
                "cidr_block": "0.0.0.0/0",
 | 
						|
                "core_network_arn": "",
 | 
						|
                "destination_prefix_list_id": "",
 | 
						|
                "egress_only_gateway_id": "",
 | 
						|
                "gateway_id": "",
 | 
						|
                "ipv6_cidr_block": "",
 | 
						|
                "local_gateway_id": "",
 | 
						|
                "nat_gateway_id": "nat-09006b80b9074bdb7",
 | 
						|
                "network_interface_id": "",
 | 
						|
                "transit_gateway_id": "",
 | 
						|
                "vpc_endpoint_id": "",
 | 
						|
                "vpc_peering_connection_id": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1c)"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1c)",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route_table",
 | 
						|
      "name": "public",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0d102d2391110f0b5",
 | 
						|
            "id": "rtb-0d102d2391110f0b5",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "propagating_vgws": [],
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route": [
 | 
						|
              {
 | 
						|
                "carrier_gateway_id": "",
 | 
						|
                "cidr_block": "0.0.0.0/0",
 | 
						|
                "core_network_arn": "",
 | 
						|
                "destination_prefix_list_id": "",
 | 
						|
                "egress_only_gateway_id": "",
 | 
						|
                "gateway_id": "igw-04c8aad5899c55659",
 | 
						|
                "ipv6_cidr_block": "",
 | 
						|
                "local_gateway_id": "",
 | 
						|
                "nat_gateway_id": "",
 | 
						|
                "network_interface_id": "",
 | 
						|
                "transit_gateway_id": "",
 | 
						|
                "vpc_endpoint_id": "",
 | 
						|
                "vpc_peering_connection_id": ""
 | 
						|
              }
 | 
						|
            ],
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) public subnet"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) public subnet",
 | 
						|
              "Service": "Kubernetes"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route_table_association",
 | 
						|
      "name": "private",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-0e1e038f4c6d929ce",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-041eec80d0151b413",
 | 
						|
            "subnet_id": "subnet-0f0da9e04f1c8369a",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-0dd4118f5d0a30ca8",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-045c9ab610c7aabd3",
 | 
						|
            "subnet_id": "subnet-0d7ae39c853e68127",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-0ed1a7a490311bafb",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0a1eb19f2c209aa34",
 | 
						|
            "subnet_id": "subnet-0f84cfaa3d8da724d",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.private",
 | 
						|
            "module.network.aws_subnet.private",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_route_table_association",
 | 
						|
      "name": "public",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-0522ba344fcea4f83",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0d102d2391110f0b5",
 | 
						|
            "subnet_id": "subnet-0e188b45be889dcc3",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.public",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-088380c97cfc946c7",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0d102d2391110f0b5",
 | 
						|
            "subnet_id": "subnet-02555be9c1954bbda",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.public",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 0,
 | 
						|
          "attributes": {
 | 
						|
            "gateway_id": "",
 | 
						|
            "id": "rtbassoc-0d880a637fe8c9576",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "route_table_id": "rtb-0d102d2391110f0b5",
 | 
						|
            "subnet_id": "subnet-08dbbf19ff2c937f1",
 | 
						|
            "timeouts": null
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.aws_route_table.public",
 | 
						|
            "module.network.aws_subnet.public",
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ]
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_subnet",
 | 
						|
      "name": "private",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f0da9e04f1c8369a",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1a",
 | 
						|
            "availability_zone_id": "use1-az1",
 | 
						|
            "cidr_block": "172.31.128.0/20",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-0f0da9e04f1c8369a",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": false,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1a)",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1a)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0d7ae39c853e68127",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1b",
 | 
						|
            "availability_zone_id": "use1-az2",
 | 
						|
            "cidr_block": "172.31.144.0/20",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-0d7ae39c853e68127",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": false,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1b)",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1b)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f84cfaa3d8da724d",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1c",
 | 
						|
            "availability_zone_id": "use1-az4",
 | 
						|
            "cidr_block": "172.31.160.0/20",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-0f84cfaa3d8da724d",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": false,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1c)",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) private subnet (us-east-1c)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/internal-elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "module": "module.network",
 | 
						|
      "mode": "managed",
 | 
						|
      "type": "aws_subnet",
 | 
						|
      "name": "public",
 | 
						|
      "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
 | 
						|
      "instances": [
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1a",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0e188b45be889dcc3",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1a",
 | 
						|
            "availability_zone_id": "use1-az1",
 | 
						|
            "cidr_block": "172.31.176.0/24",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-0e188b45be889dcc3",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": true,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1a)",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1a)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1b",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-02555be9c1954bbda",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1b",
 | 
						|
            "availability_zone_id": "use1-az2",
 | 
						|
            "cidr_block": "172.31.177.0/24",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-02555be9c1954bbda",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": true,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1b)",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1b)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        },
 | 
						|
        {
 | 
						|
          "index_key": "us-east-1c",
 | 
						|
          "schema_version": 1,
 | 
						|
          "attributes": {
 | 
						|
            "arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-08dbbf19ff2c937f1",
 | 
						|
            "assign_ipv6_address_on_creation": false,
 | 
						|
            "availability_zone": "us-east-1c",
 | 
						|
            "availability_zone_id": "use1-az4",
 | 
						|
            "cidr_block": "172.31.178.0/24",
 | 
						|
            "customer_owned_ipv4_pool": "",
 | 
						|
            "enable_dns64": false,
 | 
						|
            "enable_lni_at_device_index": 0,
 | 
						|
            "enable_resource_name_dns_a_record_on_launch": false,
 | 
						|
            "enable_resource_name_dns_aaaa_record_on_launch": false,
 | 
						|
            "id": "subnet-08dbbf19ff2c937f1",
 | 
						|
            "ipv6_cidr_block": "",
 | 
						|
            "ipv6_cidr_block_association_id": "",
 | 
						|
            "ipv6_native": false,
 | 
						|
            "map_customer_owned_ip_on_launch": false,
 | 
						|
            "map_public_ip_on_launch": true,
 | 
						|
            "outpost_arn": "",
 | 
						|
            "owner_id": "273729230602",
 | 
						|
            "private_dns_hostname_type_on_launch": "ip-name",
 | 
						|
            "region": "us-east-1",
 | 
						|
            "tags": {
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1c)",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "tags_all": {
 | 
						|
              "Environment": "devel",
 | 
						|
              "Name": "EKS (eks1-devel) public subnet (us-east-1c)",
 | 
						|
              "Service": "Kubernetes",
 | 
						|
              "kubernetes.io/role/elb": "1"
 | 
						|
            },
 | 
						|
            "timeouts": null,
 | 
						|
            "vpc_id": "vpc-0271dff7a4b4bbf76"
 | 
						|
          },
 | 
						|
          "sensitive_attributes": [],
 | 
						|
          "identity_schema_version": 0,
 | 
						|
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
 | 
						|
          "dependencies": [
 | 
						|
            "module.network.data.aws_availability_zones.available",
 | 
						|
            "module.network.data.aws_vpc.selected"
 | 
						|
          ],
 | 
						|
          "create_before_destroy": true
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    }
 | 
						|
  ],
 | 
						|
  "check_results": [
 | 
						|
    {
 | 
						|
      "object_kind": "resource",
 | 
						|
      "config_addr": "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
      "status": "pass",
 | 
						|
      "objects": null
 | 
						|
    },
 | 
						|
    {
 | 
						|
      "object_kind": "resource",
 | 
						|
      "config_addr": "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
      "status": "pass",
 | 
						|
      "objects": [
 | 
						|
        {
 | 
						|
          "object_addr": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data.null_resource.validate_cluster_service_cidr",
 | 
						|
          "status": "pass"
 | 
						|
        }
 | 
						|
      ]
 | 
						|
    }
 | 
						|
  ]
 | 
						|
}
 |