6297 lines
315 KiB
JSON
6297 lines
315 KiB
JSON
{
|
|
"version": 4,
|
|
"terraform_version": "1.12.2",
|
|
"serial": 316,
|
|
"lineage": "e0fa6852-8979-09e2-362d-b95bd3e079e1",
|
|
"outputs": {},
|
|
"resources": [
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "cert_manager",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "3416383923",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:GetChange\",\n \"Resource\": \"arn:aws:route53:::change/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"route53:ListResourceRecordSets\",\n \"route53:ChangeResourceRecordSets\"\n ],\n \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:ListHostedZonesByName\",\n \"Resource\": \"*\"\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:GetChange\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":\"route53:ListHostedZonesByName\",\"Resource\":\"*\"}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"route53:GetChange"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:route53:::change/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"route53:ChangeResourceRecordSets",
|
|
"route53:ListResourceRecordSets"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:route53:::hostedzone/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"route53:ListHostedZonesByName"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "1545384681",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cert-manager\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRoleWithWebIdentity"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"system:serviceaccount:kube-system:cert-manager"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
],
|
|
"type": "Federated"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_region",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"description": "US East (N. Virginia)",
|
|
"endpoint": "ec2.us-east-1.amazonaws.com",
|
|
"id": "us-east-1",
|
|
"name": "us-east-1",
|
|
"region": "us-east-1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "cert_manager",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"attachment_count": 1,
|
|
"description": "Cert Manager policy to allow management of Route53 hosted zone records",
|
|
"id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"name": "AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"name_prefix": "AmazonEKS_eks1-devel_Cert_Manager_Policy-",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":\"route53:GetChange\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::change/*\"},{\"Action\":[\"route53:ListResourceRecordSets\",\"route53:ChangeResourceRecordSets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":\"route53:ListHostedZonesByName\",\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FG6HNVVFKD",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-cert-manager",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cert-manager\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-27T01:03:26Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-cert-manager",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-cert-manager",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FO56IFZGYS"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-cert-manager"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cert_manager_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "cert_manager",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-cert-manager/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"role": "eks1-devel-cert-manager"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cert_Manager_Policy-20250727010326281700000001",
|
|
"role": "eks1-devel-cert-manager"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cert_manager_irsa_role.aws_iam_policy.cert_manager",
|
|
"module.eks.module.cert_manager_irsa_role.aws_iam_role.this",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.cert_manager",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.cert_manager_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "cluster_autoscaler",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2162280319",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"eks:DescribeNodegroup\",\n \"ec2:GetInstanceTypesFromInstanceRequirements\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeImages\",\n \"autoscaling:DescribeTags\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeAutoScalingGroups\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:SetDesiredCapacity\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\": \"owned\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"autoscaling:DescribeAutoScalingGroups",
|
|
"autoscaling:DescribeAutoScalingInstances",
|
|
"autoscaling:DescribeLaunchConfigurations",
|
|
"autoscaling:DescribeScalingActivities",
|
|
"autoscaling:DescribeTags",
|
|
"ec2:DescribeImages",
|
|
"ec2:DescribeInstanceTypes",
|
|
"ec2:DescribeLaunchTemplateVersions",
|
|
"ec2:GetInstanceTypesFromInstanceRequirements",
|
|
"eks:DescribeNodegroup"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"autoscaling:SetDesiredCapacity",
|
|
"autoscaling:TerminateInstanceInAutoScalingGroup"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"owned"
|
|
],
|
|
"variable": "autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "1043243729",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:cluster-autoscaler\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRoleWithWebIdentity"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"system:serviceaccount:kube-system:cluster-autoscaler"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
],
|
|
"type": "Federated"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_region",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"description": "US East (N. Virginia)",
|
|
"endpoint": "ec2.us-east-1.amazonaws.com",
|
|
"id": "us-east-1",
|
|
"name": "us-east-1",
|
|
"region": "us-east-1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "cluster_autoscaler",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"attachment_count": 1,
|
|
"description": "Cluster autoscaler policy to allow examination and modification of EC2 Auto Scaling Groups",
|
|
"id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"name": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"name_prefix": "AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":[\"eks:DescribeNodegroup\",\"ec2:GetInstanceTypesFromInstanceRequirements\",\"ec2:DescribeLaunchTemplateVersions\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeImages\",\"autoscaling:DescribeTags\",\"autoscaling:DescribeScalingActivities\",\"autoscaling:DescribeLaunchConfigurations\",\"autoscaling:DescribeAutoScalingInstances\",\"autoscaling:DescribeAutoScalingGroups\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"autoscaling:TerminateInstanceInAutoScalingGroup\",\"autoscaling:SetDesiredCapacity\"],\"Condition\":{\"StringEquals\":{\"autoscaling:ResourceTag/kubernetes.io/cluster/eks1-devel\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FADZLMDOQX",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-autoscaler",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:cluster-autoscaler\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-26T05:25:15Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-cluster-autoscaler",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-cluster-autoscaler",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FEIFH6MTO2"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-cluster-autoscaler"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.cluster_autoscaler_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "cluster_autoscaler",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-cluster-autoscaler/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"role": "eks1-devel-cluster-autoscaler"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_Cluster_Autoscaler_Policy-2025072605080303050000000d",
|
|
"role": "eks1-devel-cluster-autoscaler"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.cluster_autoscaler_irsa_role.aws_iam_policy.cluster_autoscaler",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.aws_iam_role.this",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.cluster_autoscaler",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.cluster_autoscaler_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "ebs_csi",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "4189668531",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeAvailabilityZones\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:ModifyVolume\",\n \"ec2:CreateSnapshot\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DetachVolume\",\n \"ec2:AttachVolume\"\n ],\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:instance/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:EnableFastSnapshotRestores\",\n \"ec2:CreateVolume\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateTags\",\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:snapshot/*\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteTags\",\n \"Resource\": [\n \"arn:aws:ec2:*:*:volume/*\",\n \"arn:aws:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/CSIVolumeName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/CSIVolumeName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteVolume\",\n \"Resource\": \"arn:aws:ec2:*:*:volume/*\",\n \"Condition\": {\n \"StringLike\": {\n \"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/CSIVolumeSnapshotName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/CSIVolumeSnapshotName\": \"*\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DeleteSnapshot\",\n \"Resource\": \"arn:aws:ec2:*:*:snapshot/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/ebs.csi.aws.com/cluster\": \"true\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"],\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteTags\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteVolume\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}}},{\"Effect\":\"Allow\",\"Action\":\"ec2:DeleteSnapshot\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"ec2:DescribeAvailabilityZones",
|
|
"ec2:DescribeInstances",
|
|
"ec2:DescribeSnapshots",
|
|
"ec2:DescribeTags",
|
|
"ec2:DescribeVolumes",
|
|
"ec2:DescribeVolumesModifications"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateSnapshot",
|
|
"ec2:ModifyVolume"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:AttachVolume",
|
|
"ec2:DetachVolume"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:instance/*",
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateVolume",
|
|
"ec2:EnableFastSnapshotRestores"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateTags"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"CreateVolume",
|
|
"CreateSnapshot"
|
|
],
|
|
"variable": "ec2:CreateAction"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*",
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteTags"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*",
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateVolume"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:RequestTag/ebs.csi.aws.com/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateVolume"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"*"
|
|
],
|
|
"variable": "aws:RequestTag/CSIVolumeName"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteVolume"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:ResourceTag/ebs.csi.aws.com/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteVolume"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"*"
|
|
],
|
|
"variable": "aws:ResourceTag/CSIVolumeName"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteVolume"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"*"
|
|
],
|
|
"variable": "ec2:ResourceTag/kubernetes.io/created-for/pvc/name"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:volume/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateSnapshot"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"*"
|
|
],
|
|
"variable": "aws:RequestTag/CSIVolumeSnapshotName"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateSnapshot"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:RequestTag/ebs.csi.aws.com/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteSnapshot"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"*"
|
|
],
|
|
"variable": "aws:ResourceTag/CSIVolumeSnapshotName"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DeleteSnapshot"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringLike",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:ResourceTag/ebs.csi.aws.com/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:snapshot/*"
|
|
],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "3862641923",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:ebs-csi-controller-sa\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRoleWithWebIdentity"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"system:serviceaccount:kube-system:ebs-csi-controller-sa"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
],
|
|
"type": "Federated"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_region",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"description": "US East (N. Virginia)",
|
|
"endpoint": "ec2.us-east-1.amazonaws.com",
|
|
"id": "us-east-1",
|
|
"name": "us-east-1",
|
|
"region": "us-east-1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "ebs_csi",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"attachment_count": 0,
|
|
"description": "Provides permissions to manage EBS volumes via the container storage interface driver",
|
|
"id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"name": "AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"name_prefix": "AmazonEKS_eks1-devel_EBS_CSI_Policy-",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":[\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:ModifyVolume\",\"ec2:CreateSnapshot\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":[\"ec2:DetachVolume\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:instance/*\"]},{\"Action\":[\"ec2:EnableFastSnapshotRestores\",\"ec2:CreateVolume\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:CreateSnapshot\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FBDEFQK6I6",
|
|
"tags": null,
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-ebs-csi",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:ebs-csi-controller-sa\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-28T19:11:10Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-ebs-csi",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-ebs-csi",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": null,
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FAOGGU4EPY"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-ebs-csi"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.ebs_csi_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "ebs_csi",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-ebs-csi/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"role": "eks1-devel-ebs-csi"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_EBS_CSI_Policy-20250728191109888000000001",
|
|
"role": "eks1-devel-ebs-csi"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi",
|
|
"module.eks.module.ebs_csi_irsa_role.aws_iam_role.this",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.ebs_csi_irsa_role.data.aws_partition.current",
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "aws_eks_addon_version",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "coredns",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "coredns",
|
|
"id": "coredns",
|
|
"kubernetes_version": "1.33",
|
|
"most_recent": true,
|
|
"region": "us-east-1",
|
|
"version": "v1.12.2-eksbuild.4"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
},
|
|
{
|
|
"index_key": "eks-pod-identity-agent",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "eks-pod-identity-agent",
|
|
"id": "eks-pod-identity-agent",
|
|
"kubernetes_version": "1.33",
|
|
"most_recent": true,
|
|
"region": "us-east-1",
|
|
"version": "v1.3.8-eksbuild.2"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
},
|
|
{
|
|
"index_key": "kube-proxy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "kube-proxy",
|
|
"id": "kube-proxy",
|
|
"kubernetes_version": "1.33",
|
|
"most_recent": true,
|
|
"region": "us-east-1",
|
|
"version": "v1.33.0-eksbuild.2"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
},
|
|
{
|
|
"index_key": "vpc-cni",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "vpc-cni",
|
|
"id": "vpc-cni",
|
|
"kubernetes_version": "1.33",
|
|
"most_recent": true,
|
|
"region": "us-east-1",
|
|
"version": "v1.20.0-eksbuild.1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "assume_role_policy",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2830595799",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"sts:TagSession\",\n \"sts:AssumeRole\"\n ],\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSClusterAssumeRole\",\"Effect\":\"Allow\",\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Principal\":{\"Service\":\"eks.amazonaws.com\"}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRole",
|
|
"sts:TagSession"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"eks.amazonaws.com"
|
|
],
|
|
"type": "Service"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": "EKSClusterAssumeRole"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "aws_iam_session_context",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"issuer_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
|
|
"issuer_id": "AROAT7O4IS4FGZRTFR25S",
|
|
"issuer_name": "AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
|
|
"session_name": "ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "data",
|
|
"type": "tls_certificate",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/tls\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"certificates": [
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US",
|
|
"not_after": "2034-06-28T17:39:16Z",
|
|
"not_before": "2009-09-02T00:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "12037640545166866303",
|
|
"sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US",
|
|
"not_after": "2037-12-31T01:00:00Z",
|
|
"not_before": "2015-05-25T12:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "144918191876577076464031512351042010504348870",
|
|
"sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Amazon Root CA 1,O=Amazon,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\ni02f2ivH2vxkjDLltSpe2fiC\n-----END CERTIFICATE-----\n",
|
|
"is_ca": true,
|
|
"issuer": "CN=Amazon Root CA 1,O=Amazon,C=US",
|
|
"not_after": "2030-08-23T22:26:04Z",
|
|
"not_before": "2022-08-23T22:26:04Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "166129356476704345391986644047206454194698629",
|
|
"sha1_fingerprint": "d9fe0a65fa00cabf61f5120d373a8135e1461f15",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=Amazon RSA 2048 M03,O=Amazon,C=US",
|
|
"version": 3
|
|
},
|
|
{
|
|
"cert_pem": "-----BEGIN CERTIFICATE-----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\n0mKQwrjkiglpYaXc247Qi8IUCdk6s13xHJ4e\n-----END CERTIFICATE-----\n",
|
|
"is_ca": false,
|
|
"issuer": "CN=Amazon RSA 2048 M03,O=Amazon,C=US",
|
|
"not_after": "2026-03-27T23:59:59Z",
|
|
"not_before": "2025-02-26T00:00:00Z",
|
|
"public_key_algorithm": "RSA",
|
|
"serial_number": "10383334045647432453656403708671617453",
|
|
"sha1_fingerprint": "63462dda480d8b900e0a7dbfaf6238a62ba4fce0",
|
|
"signature_algorithm": "SHA256-RSA",
|
|
"subject": "CN=*.eks.us-east-1.amazonaws.com",
|
|
"version": 3
|
|
}
|
|
],
|
|
"content": null,
|
|
"id": "922877a0975ad078a65b8ff11ebc47b8311945c7",
|
|
"url": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
|
|
"verify_chain": true
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_cloudwatch_log_group",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:logs:us-east-1:273729230602:log-group:/aws/eks/eks1-devel/cluster",
|
|
"id": "/aws/eks/eks1-devel/cluster",
|
|
"kms_key_id": "",
|
|
"log_group_class": "STANDARD",
|
|
"name": "/aws/eks/eks1-devel/cluster",
|
|
"name_prefix": "",
|
|
"region": "us-east-1",
|
|
"retention_in_days": 90,
|
|
"skip_destroy": false,
|
|
"tags": {
|
|
"Name": "/aws/eks/eks1-devel/cluster"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "/aws/eks/eks1-devel/cluster",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "bnVsbA==",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_access_entry",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "cluster_creator",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"access_entry_arn": "arn:aws:eks:us-east-1:273729230602:access-entry/eks1-devel/role/273729230602/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/c0cc2290-c2f1-d36f-a3aa-9948fb9dd5c4",
|
|
"cluster_name": "eks1-devel",
|
|
"created_at": "2025-07-26T05:08:01Z",
|
|
"id": "eks1-devel:arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
|
|
"kubernetes_groups": [],
|
|
"modified_at": "2025-07-26T05:08:01Z",
|
|
"principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
|
|
"region": "us-east-1",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"type": "STANDARD",
|
|
"user_name": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/{{SessionName}}"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_access_policy_association",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "cluster_creator_admin",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"access_scope": [
|
|
{
|
|
"namespaces": [],
|
|
"type": "cluster"
|
|
}
|
|
],
|
|
"associated_at": "2025-07-26 05:08:02.648 +0000 UTC",
|
|
"cluster_name": "eks1-devel",
|
|
"id": "eks1-devel#arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687#arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy",
|
|
"modified_at": "2025-07-26 05:08:02.648 +0000 UTC",
|
|
"policy_arn": "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy",
|
|
"principal_arn": "arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687",
|
|
"region": "us-east-1",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwfX0=",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_addon",
|
|
"name": "before_compute",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "eks-pod-identity-agent",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "eks-pod-identity-agent",
|
|
"addon_version": "v1.3.8-eksbuild.2",
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/eks-pod-identity-agent/eecc2290-c377-f6c7-9f0f-f2eb7aa1d1c1",
|
|
"cluster_name": "eks1-devel",
|
|
"configuration_values": "",
|
|
"created_at": "2025-07-26T05:08:02Z",
|
|
"id": "eks1-devel:eks-pod-identity-agent",
|
|
"modified_at": "2025-07-26T05:11:08Z",
|
|
"pod_identity_association": [],
|
|
"preserve": true,
|
|
"region": "us-east-1",
|
|
"resolve_conflicts_on_create": "NONE",
|
|
"resolve_conflicts_on_update": "OVERWRITE",
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "vpc-cni",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "vpc-cni",
|
|
"addon_version": "v1.19.5-eksbuild.1",
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/vpc-cni/e0cc2290-c371-9193-a1fe-79a2fc911873",
|
|
"cluster_name": "eks1-devel",
|
|
"configuration_values": "",
|
|
"created_at": "2025-07-26T05:08:02Z",
|
|
"id": "eks1-devel:vpc-cni",
|
|
"modified_at": "2025-07-26T05:08:11Z",
|
|
"pod_identity_association": [],
|
|
"preserve": true,
|
|
"region": "us-east-1",
|
|
"resolve_conflicts_on_create": "NONE",
|
|
"resolve_conflicts_on_update": "OVERWRITE",
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_addon",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "coredns",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "coredns",
|
|
"addon_version": "v1.12.1-eksbuild.2",
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/coredns/9acc2291-b411-4ab5-46a4-c9fd2bf3dff7",
|
|
"cluster_name": "eks1-devel",
|
|
"configuration_values": "",
|
|
"created_at": "2025-07-26T05:10:05Z",
|
|
"id": "eks1-devel:coredns",
|
|
"modified_at": "2025-07-26T05:10:48Z",
|
|
"pod_identity_association": [],
|
|
"preserve": true,
|
|
"region": "us-east-1",
|
|
"resolve_conflicts_on_create": "NONE",
|
|
"resolve_conflicts_on_update": "OVERWRITE",
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_partition.current",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_region.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"module.eks.module.eks.time_sleep.this",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "kube-proxy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"addon_name": "kube-proxy",
|
|
"addon_version": "v1.33.0-eksbuild.2",
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:addon/eks1-devel/kube-proxy/dacc2291-b40d-625e-13de-8d62e87a886b",
|
|
"cluster_name": "eks1-devel",
|
|
"configuration_values": "",
|
|
"created_at": "2025-07-26T05:10:05Z",
|
|
"id": "eks1-devel:kube-proxy",
|
|
"modified_at": "2025-07-26T05:11:12Z",
|
|
"pod_identity_association": [],
|
|
"preserve": true,
|
|
"region": "us-east-1",
|
|
"resolve_conflicts_on_create": "NONE",
|
|
"resolve_conflicts_on_update": "OVERWRITE",
|
|
"service_account_role_arn": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": {
|
|
"create": null,
|
|
"delete": null,
|
|
"update": null
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_eks_addon_version.this",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_eks_node_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_egress_rule.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_vpc_security_group_ingress_rule.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"module.eks.module.eks.module.fargate_profile.aws_eks_fargate_profile.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_partition.current",
|
|
"module.eks.module.eks.module.fargate_profile.data.aws_region.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_autoscaling_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_instance_profile.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_egress_rule.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.aws_vpc_security_group_ingress_rule.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_iam_policy_document.role",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_ssm_parameter.ami",
|
|
"module.eks.module.eks.module.self_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"module.eks.module.eks.time_sleep.this",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_eks_cluster",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"access_config": [
|
|
{
|
|
"authentication_mode": "API_AND_CONFIG_MAP",
|
|
"bootstrap_cluster_creator_admin_permissions": false
|
|
}
|
|
],
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:cluster/eks1-devel",
|
|
"bootstrap_self_managed_addons": false,
|
|
"certificate_authority": [
|
|
{
|
|
"data": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCVENDQWUyZ0F3SUJBZ0lJT2luRkFybWtSSEF3RFFZSktvWklodmNOQVFFTEJRQXdGVEVUTUJFR0ExVUUKQXhNS2EzVmlaWEp1WlhSbGN6QWVGdzB5TlRBM01qWXdORFUzTlRSYUZ3MHpOVEEzTWpRd05UQXlOVFJhTUJVeApFekFSQmdOVkJBTVRDbXQxWW1WeWJtVjBaWE13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLCkFvSUJBUURiNytlcmRaaVF3Q2xmVTBoQWJ1dFNxVXZiY0JUYmdwelI4UkhITThDa3pCdVdmcVhJREtjUWdDd08KeHNhbXErbUtDczlZTlNMVDJlaXNlcUdIaXpYTXRmTlhtOEo5RGo1LzhZSlNFeUxjR1BUUHFyVXFobmFBRTJ2UQpxZlJJWGYzTVcrQWFjRWd4cVBRNStEcU0rQTFFaFAybDBUSGRiZHdPTFViQ1Vkc2Ftb2VJRVYvckVQM2dteTBRCnlWRmY2K3VCVy9jVTUxWDRSMm1OTmovaW9pZjJUUHhMZ0w0bEhXYUpsWk5PdzdUNEJ5TnQ0NXQ5eS9yUURjV0IKTGpJYnJMQjFSUnlLY1VYR0g0eE1MeitqVTFWVFZzUUR0aGZWT1NmWEs3aTNmRWY1dHUwbndSU04rdThjK0RKcQptQ0JxZ252YU1Pb3lvb2ZrUlZ3ZmZOY3hxOEIvQWdNQkFBR2pXVEJYTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQCkJnTlZIUk1CQWY4RUJUQURBUUgvTUIwR0ExVWREZ1FXQkJTcEFyMk0wYm04MUtkUGhaUnd6bEV1dEx0bHNEQVYKQmdOVkhSRUVEakFNZ2dwcmRXSmxjbTVsZEdWek1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQUxBTk1oTW1vcwp3eWhaRDNlSXN1SzJYcVdqd2Y4SXAzcnlaRlcrRGcwOVBHdUI1OXdWVmJrVW5WV0NLMGN0eE52WUxkd3pxUGw0CjMvaUhDOHRhV2o3KzJFcjJHK3JaUlFPVzczUkV2K1JVWUpyeDZwZExCTFZlbmJ5cjZ3SFA5Q0xpcXlpc3EvQzUKei9hTmJoSXpiQjY0eFI0NHk5bXl3TnRURlVLVW9ockE2NlltME1QTVdOdzZYaTlVV1dpemw2b2dHRmhjQi9VUQoxL1g0UmlXVlFjYndndzBXTmxWdDBkaWwvaHZnWFpyK0JIMHRkTlRNa2tEUEtpekFqbFpqV0xtME5OVmZZRTNiCjNiWHY3OVpRUEVnVXNlMU14U0lHU2ZKVWtBbUlEYWJxMEdIYlZ1WjFRcklha2thdkY5UWwrODJNV0lQKzFxNzIKekVTRVNnUFI3dUZ2Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K"
|
|
}
|
|
],
|
|
"cluster_id": null,
|
|
"compute_config": [],
|
|
"created_at": "2025-07-26T04:58:04Z",
|
|
"enabled_cluster_log_types": [
|
|
"api",
|
|
"audit",
|
|
"authenticator"
|
|
],
|
|
"encryption_config": [
|
|
{
|
|
"provider": [
|
|
{
|
|
"key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655"
|
|
}
|
|
],
|
|
"resources": [
|
|
"secrets"
|
|
]
|
|
}
|
|
],
|
|
"endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com",
|
|
"force_update_version": null,
|
|
"id": "eks1-devel",
|
|
"identity": [
|
|
{
|
|
"oidc": [
|
|
{
|
|
"issuer": "https://oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"kubernetes_network_config": [
|
|
{
|
|
"elastic_load_balancing": [
|
|
{
|
|
"enabled": false
|
|
}
|
|
],
|
|
"ip_family": "ipv4",
|
|
"service_ipv4_cidr": "10.100.0.0/16",
|
|
"service_ipv6_cidr": ""
|
|
}
|
|
],
|
|
"name": "eks1-devel",
|
|
"outpost_config": [],
|
|
"platform_version": "eks.6",
|
|
"region": "us-east-1",
|
|
"remote_network_config": [],
|
|
"role_arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006",
|
|
"status": "ACTIVE",
|
|
"storage_config": [],
|
|
"tags": {
|
|
"terraform-aws-modules": "eks"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes",
|
|
"terraform-aws-modules": "eks"
|
|
},
|
|
"timeouts": null,
|
|
"upgrade_policy": [
|
|
{
|
|
"support_type": "EXTENDED"
|
|
}
|
|
],
|
|
"version": "1.33",
|
|
"vpc_config": [
|
|
{
|
|
"cluster_security_group_id": "sg-076b2d2377e33d292",
|
|
"endpoint_private_access": true,
|
|
"endpoint_public_access": true,
|
|
"public_access_cidrs": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"security_group_ids": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"subnet_ids": [
|
|
"subnet-02555be9c1954bbda",
|
|
"subnet-08dbbf19ff2c937f1",
|
|
"subnet-0d7ae39c853e68127",
|
|
"subnet-0e188b45be889dcc3",
|
|
"subnet-0f0da9e04f1c8369a",
|
|
"subnet-0f84cfaa3d8da724d"
|
|
],
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
}
|
|
],
|
|
"zonal_shift_config": []
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_openid_connect_provider",
|
|
"name": "oidc_provider",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
|
|
"client_id_list": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"id": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19",
|
|
"tags": {
|
|
"Name": "eks1-devel-eks-irsa"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "eks1-devel-eks-irsa",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"thumbprint_list": [
|
|
"9e99a48a9960b14926bb7f3b02e22da2b0ab7280"
|
|
],
|
|
"url": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "cluster_encryption",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"attachment_count": 1,
|
|
"description": "Cluster encryption policy to allow cluster role to utilize CMK provided",
|
|
"id": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"name": "eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"name_prefix": "eks1-devel-cluster-ClusterEncryption",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FODRVQNHGK",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":[\"sts:TagSession\",\"sts:AssumeRole\"],\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-26T04:57:06Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-cluster-20250726045706140700000006",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-cluster-20250726045706140700000006",
|
|
"name_prefix": "eks1-devel-cluster-",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FAGFOIF7OI"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-cluster-20250726045706140700000006"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "cluster_encryption",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"role": "eks1-devel-cluster-20250726045706140700000006"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/eks1-devel-cluster-ClusterEncryption2025072604580195760000000a",
|
|
"role": "eks1-devel-cluster-20250726045706140700000006"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_iam_policy.cluster_encryption",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "AmazonEKSClusterPolicy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-cluster-20250726045706140700000006/arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
|
|
"role": "eks1-devel-cluster-20250726045706140700000006"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy",
|
|
"role": "eks1-devel-cluster-20250726045706140700000006"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group",
|
|
"name": "cluster",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0f6f49725d40dcc30",
|
|
"description": "EKS cluster security group",
|
|
"egress": [],
|
|
"id": "sg-0f6f49725d40dcc30",
|
|
"ingress": [
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node groups to cluster API",
|
|
"from_port": 443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0a74b044afaa663ed"
|
|
],
|
|
"self": false,
|
|
"to_port": 443
|
|
}
|
|
],
|
|
"name": "eks1-devel-cluster-20250726045706139300000004",
|
|
"name_prefix": "eks1-devel-cluster-",
|
|
"owner_id": "273729230602",
|
|
"region": "us-east-1",
|
|
"revoke_rules_on_delete": false,
|
|
"tags": {
|
|
"Name": "eks1-devel-cluster"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "eks1-devel-cluster",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group",
|
|
"name": "node",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:security-group/sg-0a74b044afaa663ed",
|
|
"description": "EKS node shared security group",
|
|
"egress": [
|
|
{
|
|
"cidr_blocks": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"description": "Allow all egress",
|
|
"from_port": 0,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "-1",
|
|
"security_groups": [],
|
|
"self": false,
|
|
"to_port": 0
|
|
}
|
|
],
|
|
"id": "sg-0a74b044afaa663ed",
|
|
"ingress": [
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 4443/tcp webhook",
|
|
"from_port": 4443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 4443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 6443/tcp webhook",
|
|
"from_port": 6443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 6443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 8443/tcp webhook",
|
|
"from_port": 8443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 8443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node 9443/tcp webhook",
|
|
"from_port": 9443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 9443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node groups",
|
|
"from_port": 443,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 443
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Cluster API to node kubelets",
|
|
"from_port": 10250,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-0f6f49725d40dcc30"
|
|
],
|
|
"self": false,
|
|
"to_port": 10250
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node CoreDNS UDP",
|
|
"from_port": 53,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "udp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 53
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node CoreDNS",
|
|
"from_port": 53,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 53
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "Node to node ingress on ephemeral ports",
|
|
"from_port": 1025,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [],
|
|
"self": true,
|
|
"to_port": 65535
|
|
},
|
|
{
|
|
"cidr_blocks": [],
|
|
"description": "elbv2.k8s.aws/targetGroupBinding=shared",
|
|
"from_port": 80,
|
|
"ipv6_cidr_blocks": [],
|
|
"prefix_list_ids": [],
|
|
"protocol": "tcp",
|
|
"security_groups": [
|
|
"sg-02b2e955e7a69217a"
|
|
],
|
|
"self": false,
|
|
"to_port": 10254
|
|
}
|
|
],
|
|
"name": "eks1-devel-node-20250726045706138200000003",
|
|
"name_prefix": "eks1-devel-node-",
|
|
"owner_id": "273729230602",
|
|
"region": "us-east-1",
|
|
"revoke_rules_on_delete": false,
|
|
"tags": {
|
|
"Name": "eks1-devel-node",
|
|
"kubernetes.io/cluster/eks1-devel": "owned"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "eks1-devel-node",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/cluster/eks1-devel": "owned"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=",
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group_rule",
|
|
"name": "cluster",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "ingress_nodes_443",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node groups to cluster API",
|
|
"from_port": 443,
|
|
"id": "sgrule-3138574090",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0f6f49725d40dcc30",
|
|
"security_group_rule_id": "sgr-068c762594d1de680",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0a74b044afaa663ed",
|
|
"timeouts": null,
|
|
"to_port": 443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "aws_security_group_rule",
|
|
"name": "node",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "egress_all",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": [
|
|
"0.0.0.0/0"
|
|
],
|
|
"description": "Allow all egress",
|
|
"from_port": 0,
|
|
"id": "sgrule-3315708913",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "-1",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-07bd88701cf08d8b8",
|
|
"self": false,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 0,
|
|
"type": "egress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_443",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node groups",
|
|
"from_port": 443,
|
|
"id": "sgrule-45776182",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0361333e190e1a04b",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_4443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 4443/tcp webhook",
|
|
"from_port": 4443,
|
|
"id": "sgrule-500800407",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0a1a8f25a5818003a",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 4443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_6443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 6443/tcp webhook",
|
|
"from_port": 6443,
|
|
"id": "sgrule-3566992385",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0c4f285327006f065",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 6443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_8443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 8443/tcp webhook",
|
|
"from_port": 8443,
|
|
"id": "sgrule-3351756832",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0d3d4fa20169a2ea8",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 8443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_9443_webhook",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node 9443/tcp webhook",
|
|
"from_port": 9443,
|
|
"id": "sgrule-2741433323",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-035233532bcbfb1d9",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 9443,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_cluster_kubelet",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Cluster API to node kubelets",
|
|
"from_port": 10250,
|
|
"id": "sgrule-1489672607",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-006dc66a135d40e67",
|
|
"self": false,
|
|
"source_security_group_id": "sg-0f6f49725d40dcc30",
|
|
"timeouts": null,
|
|
"to_port": 10250,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_nodes_ephemeral",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node ingress on ephemeral ports",
|
|
"from_port": 1025,
|
|
"id": "sgrule-901693526",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0068ba55843cb9c50",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 65535,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_self_coredns_tcp",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node CoreDNS",
|
|
"from_port": 53,
|
|
"id": "sgrule-3646939900",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "tcp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-00d96212df13f95db",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 53,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "ingress_self_coredns_udp",
|
|
"schema_version": 2,
|
|
"attributes": {
|
|
"cidr_blocks": null,
|
|
"description": "Node to node CoreDNS UDP",
|
|
"from_port": 53,
|
|
"id": "sgrule-2097168659",
|
|
"ipv6_cidr_blocks": null,
|
|
"prefix_list_ids": null,
|
|
"protocol": "udp",
|
|
"region": "us-east-1",
|
|
"security_group_id": "sg-0a74b044afaa663ed",
|
|
"security_group_rule_id": "sgr-0f9065f0d4958f39e",
|
|
"self": true,
|
|
"source_security_group_id": null,
|
|
"timeouts": null,
|
|
"to_port": 53,
|
|
"type": "ingress"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks",
|
|
"mode": "managed",
|
|
"type": "time_sleep",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/time\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"create_duration": "30s",
|
|
"destroy_duration": null,
|
|
"id": "2025-07-26T05:08:31Z",
|
|
"triggers": {
|
|
"certificate_authority_data": "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",
|
|
"endpoint": "https://BF3C0697CBF107D1CFBAC6728A7EED19.gr7.us-east-1.eks.amazonaws.com",
|
|
"kubernetes_version": "1.33",
|
|
"name": "eks1-devel",
|
|
"service_cidr": "10.100.0.0/16"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "assume_role_policy",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "2560088296",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"EKSNodeAssumeRole\",\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRole\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRole"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"ec2.amazonaws.com"
|
|
],
|
|
"type": "Service"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": "EKSNodeAssumeRole"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "data",
|
|
"type": "aws_ssm_parameter",
|
|
"name": "ami",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ssm:us-east-1::parameter/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
|
|
"id": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
|
|
"insecure_value": "1.33.0-20250715",
|
|
"name": "/aws/service/eks/optimized-ami/1.33/amazon-linux-2023/x86_64/standard/recommended/release_version",
|
|
"region": "us-east-1",
|
|
"type": "String",
|
|
"value": "1.33.0-20250715",
|
|
"version": 6,
|
|
"with_decryption": true
|
|
},
|
|
"sensitive_attributes": [
|
|
[
|
|
{
|
|
"type": "get_attr",
|
|
"value": "value"
|
|
}
|
|
]
|
|
],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "managed",
|
|
"type": "aws_eks_node_group",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"ami_type": "AL2023_x86_64_STANDARD",
|
|
"arn": "arn:aws:eks:us-east-1:273729230602:nodegroup/eks1-devel/ng-20250726050837528800000015/4ecc2291-0935-59bf-b572-c11bd62148f2",
|
|
"capacity_type": "ON_DEMAND",
|
|
"cluster_name": "eks1-devel",
|
|
"disk_size": 0,
|
|
"force_update_version": null,
|
|
"id": "eks1-devel:ng-20250726050837528800000015",
|
|
"instance_types": [
|
|
"m6i.large"
|
|
],
|
|
"labels": {},
|
|
"launch_template": [
|
|
{
|
|
"id": "lt-0d2be8605aecac3d6",
|
|
"name": "ng-20250726050831652700000013",
|
|
"version": "2"
|
|
}
|
|
],
|
|
"node_group_name": "ng-20250726050837528800000015",
|
|
"node_group_name_prefix": "ng-",
|
|
"node_repair_config": [],
|
|
"node_role_arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001",
|
|
"region": "us-east-1",
|
|
"release_version": "1.33.0-20250715",
|
|
"remote_access": [],
|
|
"resources": [
|
|
{
|
|
"autoscaling_groups": [
|
|
{
|
|
"name": "eks-ng-20250726050837528800000015-4ecc2291-0935-59bf-b572-c11bd62148f2"
|
|
}
|
|
],
|
|
"remote_access_security_group_id": ""
|
|
}
|
|
],
|
|
"scaling_config": [
|
|
{
|
|
"desired_size": 3,
|
|
"max_size": 10,
|
|
"min_size": 1
|
|
}
|
|
],
|
|
"status": "ACTIVE",
|
|
"subnet_ids": [
|
|
"subnet-02555be9c1954bbda",
|
|
"subnet-08dbbf19ff2c937f1",
|
|
"subnet-0d7ae39c853e68127",
|
|
"subnet-0e188b45be889dcc3",
|
|
"subnet-0f0da9e04f1c8369a",
|
|
"subnet-0f84cfaa3d8da724d"
|
|
],
|
|
"tags": {
|
|
"Name": "ng"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "ng",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"taint": [],
|
|
"timeouts": null,
|
|
"update_config": [
|
|
{
|
|
"max_unavailable": 0,
|
|
"max_unavailable_percentage": 33
|
|
}
|
|
],
|
|
"version": "1.33"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_launch_template.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_eks_cluster_versions.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ssm_parameter.ami",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.eks.time_sleep.this",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/ng-eks-node-group-20250726045706136900000001",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-26T04:57:06Z",
|
|
"description": "EKS managed node group IAM role",
|
|
"force_detach_policies": true,
|
|
"id": "ng-eks-node-group-20250726045706136900000001",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "ng-eks-node-group-20250726045706136900000001",
|
|
"name_prefix": "ng-eks-node-group-",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FE2DMUYZHS"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "AmazonEC2ContainerRegistryReadOnly",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "AmazonEKSWorkerNodePolicy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "AmazonEKS_CNI_Policy",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "ng-eks-node-group-20250726045706136900000001/arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
"role": "ng-eks-node-group-20250726045706136900000001"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"]",
|
|
"mode": "managed",
|
|
"type": "aws_launch_template",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:launch-template/lt-0d2be8605aecac3d6",
|
|
"block_device_mappings": [],
|
|
"capacity_reservation_specification": [],
|
|
"cpu_options": [],
|
|
"credit_specification": [],
|
|
"default_version": 2,
|
|
"description": "Custom launch template for ng EKS managed node group",
|
|
"disable_api_stop": false,
|
|
"disable_api_termination": false,
|
|
"ebs_optimized": "",
|
|
"enclave_options": [],
|
|
"hibernation_options": [],
|
|
"iam_instance_profile": [],
|
|
"id": "lt-0d2be8605aecac3d6",
|
|
"image_id": "",
|
|
"instance_initiated_shutdown_behavior": "",
|
|
"instance_market_options": [],
|
|
"instance_requirements": [],
|
|
"instance_type": "",
|
|
"kernel_id": "",
|
|
"key_name": "",
|
|
"latest_version": 2,
|
|
"license_specification": [],
|
|
"maintenance_options": [],
|
|
"metadata_options": [
|
|
{
|
|
"http_endpoint": "enabled",
|
|
"http_protocol_ipv6": "",
|
|
"http_put_response_hop_limit": 2,
|
|
"http_tokens": "required",
|
|
"instance_metadata_tags": ""
|
|
}
|
|
],
|
|
"monitoring": [],
|
|
"name": "ng-20250726050831652700000013",
|
|
"name_prefix": "ng-",
|
|
"network_interfaces": [],
|
|
"placement": [],
|
|
"private_dns_name_options": [],
|
|
"ram_disk_id": "",
|
|
"region": "us-east-1",
|
|
"security_group_names": [],
|
|
"tag_specifications": [
|
|
{
|
|
"resource_type": "instance",
|
|
"tags": {
|
|
"Name": "ng"
|
|
}
|
|
},
|
|
{
|
|
"resource_type": "network-interface",
|
|
"tags": {
|
|
"Name": "ng"
|
|
}
|
|
},
|
|
{
|
|
"resource_type": "volume",
|
|
"tags": {
|
|
"Name": "ng"
|
|
}
|
|
}
|
|
],
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"update_default_version": true,
|
|
"user_data": "",
|
|
"vpc_security_group_ids": [
|
|
"sg-0a74b044afaa663ed"
|
|
]
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_placement_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.aws_security_group.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_ec2_instance_type.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_partition.current",
|
|
"module.eks.module.eks.module.eks_managed_node_group.data.aws_subnet.this",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2023_eks_managed_node_group",
|
|
"module.eks.module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.al2_eks_managed_node_group",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.eks.time_sleep.this",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data",
|
|
"mode": "managed",
|
|
"type": "null_resource",
|
|
"name": "validate_cluster_service_cidr",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "5050192302767161671",
|
|
"triggers": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.eks.time_sleep.this",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.kms",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.kms",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "3915224678",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"Default\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:root\"\n }\n },\n {\n \"Sid\": \"KeyAdministration\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:Update*\",\n \"kms:UntagResource\",\n \"kms:TagResource\",\n \"kms:ScheduleKeyDeletion\",\n \"kms:Revoke*\",\n \"kms:ReplicateKey\",\n \"kms:Put*\",\n \"kms:List*\",\n \"kms:ImportKeyMaterial\",\n \"kms:Get*\",\n \"kms:Enable*\",\n \"kms:Disable*\",\n \"kms:Describe*\",\n \"kms:Delete*\",\n \"kms:Create*\",\n \"kms:CancelKeyDeletion\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"\n }\n },\n {\n \"Sid\": \"KeyUsage\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Default\",\"Effect\":\"Allow\",\"Action\":\"kms:*\",\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"}},{\"Sid\":\"KeyAdministration\",\"Effect\":\"Allow\",\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"}},{\"Sid\":\"KeyUsage\",\"Effect\":\"Allow\",\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Resource\":\"*\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"kms:*"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:root"
|
|
],
|
|
"type": "AWS"
|
|
}
|
|
],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": "Default"
|
|
},
|
|
{
|
|
"actions": [
|
|
"kms:CancelKeyDeletion",
|
|
"kms:Create*",
|
|
"kms:Delete*",
|
|
"kms:Describe*",
|
|
"kms:Disable*",
|
|
"kms:Enable*",
|
|
"kms:Get*",
|
|
"kms:ImportKeyMaterial",
|
|
"kms:List*",
|
|
"kms:Put*",
|
|
"kms:ReplicateKey",
|
|
"kms:Revoke*",
|
|
"kms:ScheduleKeyDeletion",
|
|
"kms:TagResource",
|
|
"kms:UntagResource",
|
|
"kms:Update*"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687"
|
|
],
|
|
"type": "AWS"
|
|
}
|
|
],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": "KeyAdministration"
|
|
},
|
|
{
|
|
"actions": [
|
|
"kms:Decrypt",
|
|
"kms:DescribeKey",
|
|
"kms:Encrypt",
|
|
"kms:GenerateDataKey*",
|
|
"kms:ReEncrypt*"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006"
|
|
],
|
|
"type": "AWS"
|
|
}
|
|
],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": "KeyUsage"
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.kms",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.kms",
|
|
"mode": "managed",
|
|
"type": "aws_kms_alias",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "cluster",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:kms:us-east-1:273729230602:alias/eks/eks1-devel",
|
|
"id": "alias/eks/eks1-devel",
|
|
"name": "alias/eks/eks1-devel",
|
|
"name_prefix": "",
|
|
"region": "us-east-1",
|
|
"target_key_arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655",
|
|
"target_key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.eks.module.kms",
|
|
"mode": "managed",
|
|
"type": "aws_kms_key",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:kms:us-east-1:273729230602:key/edf79a99-4643-4a3a-b4f2-cd75c2a20655",
|
|
"bypass_policy_lockout_safety_check": false,
|
|
"custom_key_store_id": "",
|
|
"customer_master_key_spec": "SYMMETRIC_DEFAULT",
|
|
"deletion_window_in_days": null,
|
|
"description": "eks1-devel cluster encryption key",
|
|
"enable_key_rotation": true,
|
|
"id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655",
|
|
"is_enabled": true,
|
|
"key_id": "edf79a99-4643-4a3a-b4f2-cd75c2a20655",
|
|
"key_usage": "ENCRYPT_DECRYPT",
|
|
"multi_region": false,
|
|
"policy": "{\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:root\"},\"Resource\":\"*\",\"Sid\":\"Default\"},{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:ReplicateKey\",\"kms:Put*\",\"kms:List*\",\"kms:ImportKeyMaterial\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687\"},\"Resource\":\"*\",\"Sid\":\"KeyAdministration\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::273729230602:role/eks1-devel-cluster-20250726045706140700000006\"},\"Resource\":\"*\",\"Sid\":\"KeyUsage\"}],\"Version\":\"2012-10-17\"}",
|
|
"region": "us-east-1",
|
|
"rotation_period_in_days": 365,
|
|
"tags": {
|
|
"terraform-aws-modules": "eks"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes",
|
|
"terraform-aws-modules": "eks"
|
|
},
|
|
"timeouts": null,
|
|
"xks_key_id": ""
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDB9fQ==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "external_dns",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "1268413494",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"route53:ChangeResourceRecordSets\",\n \"Resource\": \"arn:aws:route53:::hostedzone/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"route53:ListTagsForResources\",\n \"route53:ListResourceRecordSets\",\n \"route53:ListHostedZones\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"route53:ChangeResourceRecordSets\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Effect\":\"Allow\",\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Resource\":\"*\"}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"route53:ChangeResourceRecordSets"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:route53:::hostedzone/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"route53:ListHostedZones",
|
|
"route53:ListResourceRecordSets",
|
|
"route53:ListTagsForResources"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "1716340323",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:external-dns\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRoleWithWebIdentity"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"system:serviceaccount:kube-system:external-dns"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
],
|
|
"type": "Federated"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_region",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"description": "US East (N. Virginia)",
|
|
"endpoint": "ec2.us-east-1.amazonaws.com",
|
|
"id": "us-east-1",
|
|
"name": "us-east-1",
|
|
"region": "us-east-1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "external_dns",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"attachment_count": 1,
|
|
"description": "External DNS policy to allow management of Route53 hosted zone records",
|
|
"id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"name": "AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"name_prefix": "AmazonEKS_eks1-devel_External_DNS_Policy-",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":\"route53:ChangeResourceRecordSets\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:route53:::hostedzone/*\"},{\"Action\":[\"route53:ListTagsForResources\",\"route53:ListResourceRecordSets\",\"route53:ListHostedZones\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FBJOOEWX3J",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-external-dns",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:external-dns\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-26T05:25:15Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-external-dns",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-external-dns",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FBJGK2IPMG"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-external-dns"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.external_dns_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "external_dns",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-external-dns/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"role": "eks1-devel-external-dns"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_External_DNS_Policy-2025072605080303200000000e",
|
|
"role": "eks1-devel-external-dns"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.external_dns_irsa_role.aws_iam_policy.external_dns",
|
|
"module.eks.module.external_dns_irsa_role.aws_iam_role.this",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.external_dns",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.external_dns_irsa_role.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_caller_identity",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"account_id": "273729230602",
|
|
"arn": "arn:aws:sts::273729230602:assumed-role/AWSReservedSSO_AdministratorAccess_b8026af88eb7c687/ryan",
|
|
"id": "273729230602",
|
|
"user_id": "AROAT7O4IS4FGZRTFR25S:ryan"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "load_balancer_controller",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "1541424006",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"iam:CreateServiceLinkedRole\",\n \"Resource\": \"*\",\n \"Condition\": {\n \"StringEquals\": {\n \"iam:AWSServiceName\": \"elasticloadbalancing.amazonaws.com\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:DescribeTrustStores\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeSSLPolicies\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListenerAttributes\",\n \"elasticloadbalancing:DescribeCapacityReservation\",\n \"ec2:GetSecurityGroupsForVpc\",\n \"ec2:GetCoipPoolUsage\",\n \"ec2:DescribeVpcs\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeIpamPools\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeCoipPools\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeAddresses\",\n \"ec2:DescribeAccountAttributes\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"wafv2:GetWebACLForResource\",\n \"wafv2:GetWebACL\",\n \"wafv2:DisassociateWebACL\",\n \"wafv2:AssociateWebACL\",\n \"waf-regional:GetWebACLForResource\",\n \"waf-regional:GetWebACL\",\n \"waf-regional:DisassociateWebACL\",\n \"waf-regional:AssociateWebACL\",\n \"shield:GetSubscriptionState\",\n \"shield:DescribeProtection\",\n \"shield:DeleteProtection\",\n \"shield:CreateProtection\",\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"acm:ListCertificates\",\n \"acm:DescribeCertificate\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:RevokeSecurityGroupIngress\",\n \"ec2:AuthorizeSecurityGroupIngress\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:CreateTags\",\n \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n },\n \"StringEquals\": {\n \"ec2:CreateAction\": \"CreateSecurityGroup\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:DeleteTags\",\n \"ec2:CreateTags\"\n ],\n \"Resource\": \"arn:aws:ec2:*:*:security-group/*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"ec2:RevokeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:AuthorizeSecurityGroupIngress\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:CreateLoadBalancer\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateListener\"\n ],\n \"Resource\": \"*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:AddTags\"\n ],\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"true\",\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:AddTags\"\n ],\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"\n ]\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:SetSubnets\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyListenerAttributes\",\n \"elasticloadbalancing:ModifyIpPools\",\n \"elasticloadbalancing:ModifyCapacityReservation\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeleteLoadBalancer\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"Null\": {\n \"aws:ResourceTag/elbv2.k8s.aws/cluster\": \"false\"\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": \"elasticloadbalancing:AddTags\",\n \"Resource\": [\n \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\n \"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/elbv2.k8s.aws/cluster\": \"false\"\n },\n \"StringEquals\": {\n \"elasticloadbalancing:CreateAction\": [\n \"CreateTargetGroup\",\n \"CreateLoadBalancer\"\n ]\n }\n }\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:DeregisterTargets\"\n ],\n \"Resource\": \"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"\n },\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticloadbalancing:SetWebAcl\",\n \"elasticloadbalancing:SetRulePriorities\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:AddListenerCertificates\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"iam:CreateServiceLinkedRole\",\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateSecurityGroup\",\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":\"ec2:CreateTags\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Resource\":\"arn:aws:ec2:*:*:security-group/*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Resource\":\"*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Resource\":\"*\",\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}}},{\"Effect\":\"Allow\",\"Action\":\"elasticloadbalancing:AddTags\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}}},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Effect\":\"Allow\",\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Resource\":\"*\"}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"iam:CreateServiceLinkedRole"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"elasticloadbalancing.amazonaws.com"
|
|
],
|
|
"variable": "iam:AWSServiceName"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:DescribeAccountAttributes",
|
|
"ec2:DescribeAddresses",
|
|
"ec2:DescribeAvailabilityZones",
|
|
"ec2:DescribeCoipPools",
|
|
"ec2:DescribeInstances",
|
|
"ec2:DescribeInternetGateways",
|
|
"ec2:DescribeIpamPools",
|
|
"ec2:DescribeNetworkInterfaces",
|
|
"ec2:DescribeRouteTables",
|
|
"ec2:DescribeSecurityGroups",
|
|
"ec2:DescribeSubnets",
|
|
"ec2:DescribeTags",
|
|
"ec2:DescribeVpcPeeringConnections",
|
|
"ec2:DescribeVpcs",
|
|
"ec2:GetCoipPoolUsage",
|
|
"ec2:GetSecurityGroupsForVpc",
|
|
"elasticloadbalancing:DescribeCapacityReservation",
|
|
"elasticloadbalancing:DescribeListenerAttributes",
|
|
"elasticloadbalancing:DescribeListenerCertificates",
|
|
"elasticloadbalancing:DescribeListeners",
|
|
"elasticloadbalancing:DescribeLoadBalancerAttributes",
|
|
"elasticloadbalancing:DescribeLoadBalancers",
|
|
"elasticloadbalancing:DescribeRules",
|
|
"elasticloadbalancing:DescribeSSLPolicies",
|
|
"elasticloadbalancing:DescribeTags",
|
|
"elasticloadbalancing:DescribeTargetGroupAttributes",
|
|
"elasticloadbalancing:DescribeTargetGroups",
|
|
"elasticloadbalancing:DescribeTargetHealth",
|
|
"elasticloadbalancing:DescribeTrustStores"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"acm:DescribeCertificate",
|
|
"acm:ListCertificates",
|
|
"cognito-idp:DescribeUserPoolClient",
|
|
"iam:GetServerCertificate",
|
|
"iam:ListServerCertificates",
|
|
"shield:CreateProtection",
|
|
"shield:DeleteProtection",
|
|
"shield:DescribeProtection",
|
|
"shield:GetSubscriptionState",
|
|
"waf-regional:AssociateWebACL",
|
|
"waf-regional:DisassociateWebACL",
|
|
"waf-regional:GetWebACL",
|
|
"waf-regional:GetWebACLForResource",
|
|
"wafv2:AssociateWebACL",
|
|
"wafv2:DisassociateWebACL",
|
|
"wafv2:GetWebACL",
|
|
"wafv2:GetWebACLForResource"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:AuthorizeSecurityGroupIngress",
|
|
"ec2:RevokeSecurityGroupIngress"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateSecurityGroup"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateTags"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"CreateSecurityGroup"
|
|
],
|
|
"variable": "ec2:CreateAction"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:security-group/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:CreateTags",
|
|
"ec2:DeleteTags"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
|
|
},
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:ec2:*:*:security-group/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"ec2:AuthorizeSecurityGroupIngress",
|
|
"ec2:DeleteSecurityGroup",
|
|
"ec2:RevokeSecurityGroupIngress"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:CreateLoadBalancer",
|
|
"elasticloadbalancing:CreateTargetGroup"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:CreateListener",
|
|
"elasticloadbalancing:CreateRule",
|
|
"elasticloadbalancing:DeleteListener",
|
|
"elasticloadbalancing:DeleteRule"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:AddTags",
|
|
"elasticloadbalancing:RemoveTags"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
|
|
},
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"true"
|
|
],
|
|
"variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:AddTags",
|
|
"elasticloadbalancing:RemoveTags"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:DeleteLoadBalancer",
|
|
"elasticloadbalancing:DeleteTargetGroup",
|
|
"elasticloadbalancing:ModifyCapacityReservation",
|
|
"elasticloadbalancing:ModifyIpPools",
|
|
"elasticloadbalancing:ModifyListenerAttributes",
|
|
"elasticloadbalancing:ModifyLoadBalancerAttributes",
|
|
"elasticloadbalancing:ModifyTargetGroup",
|
|
"elasticloadbalancing:ModifyTargetGroupAttributes",
|
|
"elasticloadbalancing:SetIpAddressType",
|
|
"elasticloadbalancing:SetSecurityGroups",
|
|
"elasticloadbalancing:SetSubnets"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:ResourceTag/elbv2.k8s.aws/cluster"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:AddTags"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "Null",
|
|
"values": [
|
|
"false"
|
|
],
|
|
"variable": "aws:RequestTag/elbv2.k8s.aws/cluster"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"CreateTargetGroup",
|
|
"CreateLoadBalancer"
|
|
],
|
|
"variable": "elasticloadbalancing:CreateAction"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*",
|
|
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:DeregisterTargets",
|
|
"elasticloadbalancing:RegisterTargets"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*"
|
|
],
|
|
"sid": ""
|
|
},
|
|
{
|
|
"actions": [
|
|
"elasticloadbalancing:AddListenerCertificates",
|
|
"elasticloadbalancing:ModifyListener",
|
|
"elasticloadbalancing:ModifyRule",
|
|
"elasticloadbalancing:RemoveListenerCertificates",
|
|
"elasticloadbalancing:SetRulePriorities",
|
|
"elasticloadbalancing:SetWebAcl"
|
|
],
|
|
"condition": [],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [],
|
|
"resources": [
|
|
"*"
|
|
],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_iam_policy_document",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "236870047",
|
|
"json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRoleWithWebIdentity\",\n \"Principal\": {\n \"Federated\": \"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"\n },\n \"Condition\": {\n \"StringEquals\": {\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\": \"sts.amazonaws.com\",\n \"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\": \"system:serviceaccount:kube-system:aws-load-balancer-controller\"\n }\n }\n }\n ]\n}",
|
|
"minified_json": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"},\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}}}]}",
|
|
"override_json": null,
|
|
"override_policy_documents": null,
|
|
"policy_id": null,
|
|
"source_json": null,
|
|
"source_policy_documents": null,
|
|
"statement": [
|
|
{
|
|
"actions": [
|
|
"sts:AssumeRoleWithWebIdentity"
|
|
],
|
|
"condition": [
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"sts.amazonaws.com"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud"
|
|
},
|
|
{
|
|
"test": "StringEquals",
|
|
"values": [
|
|
"system:serviceaccount:kube-system:aws-load-balancer-controller"
|
|
],
|
|
"variable": "oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub"
|
|
}
|
|
],
|
|
"effect": "Allow",
|
|
"not_actions": [],
|
|
"not_principals": [],
|
|
"not_resources": [],
|
|
"principals": [
|
|
{
|
|
"identifiers": [
|
|
"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19"
|
|
],
|
|
"type": "Federated"
|
|
}
|
|
],
|
|
"resources": [],
|
|
"sid": ""
|
|
}
|
|
],
|
|
"version": "2012-10-17"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_partition",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"dns_suffix": "amazonaws.com",
|
|
"id": "aws",
|
|
"partition": "aws",
|
|
"reverse_dns_prefix": "com.amazonaws"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "data",
|
|
"type": "aws_region",
|
|
"name": "current",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"description": "US East (N. Virginia)",
|
|
"endpoint": "ec2.us-east-1.amazonaws.com",
|
|
"id": "us-east-1",
|
|
"name": "us-east-1",
|
|
"region": "us-east-1"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_policy",
|
|
"name": "load_balancer_controller",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"attachment_count": 1,
|
|
"description": "Provides permissions for AWS Load Balancer Controller addon",
|
|
"id": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"name": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"name_prefix": "AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-",
|
|
"path": "/",
|
|
"policy": "{\"Statement\":[{\"Action\":\"iam:CreateServiceLinkedRole\",\"Condition\":{\"StringEquals\":{\"iam:AWSServiceName\":\"elasticloadbalancing.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DescribeTrustStores\",\"elasticloadbalancing:DescribeTargetHealth\",\"elasticloadbalancing:DescribeTargetGroups\",\"elasticloadbalancing:DescribeTargetGroupAttributes\",\"elasticloadbalancing:DescribeTags\",\"elasticloadbalancing:DescribeSSLPolicies\",\"elasticloadbalancing:DescribeRules\",\"elasticloadbalancing:DescribeLoadBalancers\",\"elasticloadbalancing:DescribeLoadBalancerAttributes\",\"elasticloadbalancing:DescribeListeners\",\"elasticloadbalancing:DescribeListenerCertificates\",\"elasticloadbalancing:DescribeListenerAttributes\",\"elasticloadbalancing:DescribeCapacityReservation\",\"ec2:GetSecurityGroupsForVpc\",\"ec2:GetCoipPoolUsage\",\"ec2:DescribeVpcs\",\"ec2:DescribeVpcPeeringConnections\",\"ec2:DescribeTags\",\"ec2:DescribeSubnets\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeRouteTables\",\"ec2:DescribeNetworkInterfaces\",\"ec2:DescribeIpamPools\",\"ec2:DescribeInternetGateways\",\"ec2:DescribeInstances\",\"ec2:DescribeCoipPools\",\"ec2:DescribeAvailabilityZones\",\"ec2:DescribeAddresses\",\"ec2:DescribeAccountAttributes\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"wafv2:GetWebACLForResource\",\"wafv2:GetWebACL\",\"wafv2:DisassociateWebACL\",\"wafv2:AssociateWebACL\",\"waf-regional:GetWebACLForResource\",\"waf-regional:GetWebACL\",\"waf-regional:DisassociateWebACL\",\"waf-regional:AssociateWebACL\",\"shield:GetSubscriptionState\",\"shield:DescribeProtection\",\"shield:DeleteProtection\",\"shield:CreateProtection\",\"iam:ListServerCertificates\",\"iam:GetServerCertificate\",\"cognito-idp:DescribeUserPoolClient\",\"acm:ListCertificates\",\"acm:DescribeCertificate\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateSecurityGroup\",\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"ec2:CreateAction\":\"CreateSecurityGroup\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:DeleteTags\",\"ec2:CreateTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:security-group/*\"},{\"Action\":[\"ec2:RevokeSecurityGroupIngress\",\"ec2:DeleteSecurityGroup\",\"ec2:AuthorizeSecurityGroupIngress\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:CreateTargetGroup\",\"elasticloadbalancing:CreateLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:DeleteRule\",\"elasticloadbalancing:DeleteListener\",\"elasticloadbalancing:CreateRule\",\"elasticloadbalancing:CreateListener\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"true\",\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RemoveTags\",\"elasticloadbalancing:AddTags\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*\",\"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*\"]},{\"Action\":[\"elasticloadbalancing:SetSubnets\",\"elasticloadbalancing:SetSecurityGroups\",\"elasticloadbalancing:SetIpAddressType\",\"elasticloadbalancing:ModifyTargetGroupAttributes\",\"elasticloadbalancing:ModifyTargetGroup\",\"elasticloadbalancing:ModifyLoadBalancerAttributes\",\"elasticloadbalancing:ModifyListenerAttributes\",\"elasticloadbalancing:ModifyIpPools\",\"elasticloadbalancing:ModifyCapacityReservation\",\"elasticloadbalancing:DeleteTargetGroup\",\"elasticloadbalancing:DeleteLoadBalancer\"],\"Condition\":{\"Null\":{\"aws:ResourceTag/elbv2.k8s.aws/cluster\":\"false\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"elasticloadbalancing:AddTags\",\"Condition\":{\"Null\":{\"aws:RequestTag/elbv2.k8s.aws/cluster\":\"false\"},\"StringEquals\":{\"elasticloadbalancing:CreateAction\":[\"CreateTargetGroup\",\"CreateLoadBalancer\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/net/*/*\",\"arn:aws:elasticloadbalancing:*:*:loadbalancer/app/*/*\"]},{\"Action\":[\"elasticloadbalancing:RegisterTargets\",\"elasticloadbalancing:DeregisterTargets\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticloadbalancing:*:*:targetgroup/*/*\"},{\"Action\":[\"elasticloadbalancing:SetWebAcl\",\"elasticloadbalancing:SetRulePriorities\",\"elasticloadbalancing:RemoveListenerCertificates\",\"elasticloadbalancing:ModifyRule\",\"elasticloadbalancing:ModifyListener\",\"elasticloadbalancing:AddListenerCertificates\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
|
|
"policy_id": "ANPAT7O4IS4FDJFNVQKAK",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
}
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role",
|
|
"name": "this",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:iam::273729230602:role/eks1-devel-aws-load-balancer-controller",
|
|
"assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringEquals\":{\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19:sub\":\"system:serviceaccount:kube-system:aws-load-balancer-controller\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::273729230602:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/BF3C0697CBF107D1CFBAC6728A7EED19\"}}],\"Version\":\"2012-10-17\"}",
|
|
"create_date": "2025-07-26T05:23:56Z",
|
|
"description": "",
|
|
"force_detach_policies": true,
|
|
"id": "eks1-devel-aws-load-balancer-controller",
|
|
"inline_policy": [],
|
|
"managed_policy_arns": [
|
|
"arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f"
|
|
],
|
|
"max_session_duration": 3600,
|
|
"name": "eks1-devel-aws-load-balancer-controller",
|
|
"name_prefix": "",
|
|
"path": "/",
|
|
"permissions_boundary": "",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"unique_id": "AROAT7O4IS4FNEGNOKZIO"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"name": "eks1-devel-aws-load-balancer-controller"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.eks.module.load_balancer_controller_irsa_role",
|
|
"mode": "managed",
|
|
"type": "aws_iam_role_policy_attachment",
|
|
"name": "load_balancer_controller",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": 0,
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"id": "eks1-devel-aws-load-balancer-controller/arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"role": "eks1-devel-aws-load-balancer-controller"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"identity": {
|
|
"account_id": "273729230602",
|
|
"policy_arn": "arn:aws:iam::273729230602:policy/AmazonEKS_eks1-devel_AWS_Load_Balancer_Controller-2025072605080304760000000f",
|
|
"role": "eks1-devel-aws-load-balancer-controller"
|
|
},
|
|
"private": "bnVsbA==",
|
|
"dependencies": [
|
|
"module.eks.module.eks.aws_cloudwatch_log_group.this",
|
|
"module.eks.module.eks.aws_eks_access_entry.this",
|
|
"module.eks.module.eks.aws_eks_access_policy_association.this",
|
|
"module.eks.module.eks.aws_eks_cluster.this",
|
|
"module.eks.module.eks.aws_iam_openid_connect_provider.oidc_provider",
|
|
"module.eks.module.eks.aws_iam_policy.cni_ipv6_policy",
|
|
"module.eks.module.eks.aws_iam_role.eks_auto",
|
|
"module.eks.module.eks.aws_iam_role.this",
|
|
"module.eks.module.eks.aws_iam_role_policy_attachment.this",
|
|
"module.eks.module.eks.aws_security_group.cluster",
|
|
"module.eks.module.eks.aws_security_group.node",
|
|
"module.eks.module.eks.aws_security_group_rule.cluster",
|
|
"module.eks.module.eks.aws_security_group_rule.node",
|
|
"module.eks.module.eks.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.cni_ipv6_policy",
|
|
"module.eks.module.eks.data.aws_iam_policy_document.node_assume_role_policy",
|
|
"module.eks.module.eks.data.aws_iam_session_context.current",
|
|
"module.eks.module.eks.data.aws_partition.current",
|
|
"module.eks.module.eks.data.tls_certificate.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_external_key.this",
|
|
"module.eks.module.eks.module.kms.aws_kms_replica_key.this",
|
|
"module.eks.module.eks.module.kms.data.aws_caller_identity.current",
|
|
"module.eks.module.eks.module.kms.data.aws_iam_policy_document.this",
|
|
"module.eks.module.eks.module.kms.data.aws_partition.current",
|
|
"module.eks.module.load_balancer_controller_irsa_role.aws_iam_policy.load_balancer_controller",
|
|
"module.eks.module.load_balancer_controller_irsa_role.aws_iam_role.this",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_caller_identity.current",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.load_balancer_controller",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_iam_policy_document.this",
|
|
"module.eks.module.load_balancer_controller_irsa_role.data.aws_partition.current",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "data",
|
|
"type": "aws_availability_zones",
|
|
"name": "available",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"all_availability_zones": null,
|
|
"exclude_names": null,
|
|
"exclude_zone_ids": [
|
|
"cac1-az3",
|
|
"use1-az3",
|
|
"usw1-az2"
|
|
],
|
|
"filter": [
|
|
{
|
|
"name": "opt-in-status",
|
|
"values": [
|
|
"opt-in-not-required"
|
|
]
|
|
}
|
|
],
|
|
"group_names": [
|
|
"us-east-1-zg-1"
|
|
],
|
|
"id": "us-east-1",
|
|
"names": [
|
|
"us-east-1a",
|
|
"us-east-1b",
|
|
"us-east-1c",
|
|
"us-east-1d",
|
|
"us-east-1f"
|
|
],
|
|
"region": "us-east-1",
|
|
"state": null,
|
|
"timeouts": null,
|
|
"zone_ids": [
|
|
"use1-az1",
|
|
"use1-az2",
|
|
"use1-az4",
|
|
"use1-az6",
|
|
"use1-az5"
|
|
]
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "data",
|
|
"type": "aws_internet_gateway",
|
|
"name": "default",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:internet-gateway/igw-04c8aad5899c55659",
|
|
"attachments": [
|
|
{
|
|
"state": "available",
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
}
|
|
],
|
|
"filter": [
|
|
{
|
|
"name": "attachment.vpc-id",
|
|
"values": [
|
|
"vpc-0271dff7a4b4bbf76"
|
|
]
|
|
}
|
|
],
|
|
"id": "igw-04c8aad5899c55659",
|
|
"internet_gateway_id": "igw-04c8aad5899c55659",
|
|
"owner_id": "273729230602",
|
|
"region": "us-east-1",
|
|
"tags": {},
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "data",
|
|
"type": "aws_vpc",
|
|
"name": "selected",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:vpc/vpc-0271dff7a4b4bbf76",
|
|
"cidr_block": "172.31.0.0/16",
|
|
"cidr_block_associations": [
|
|
{
|
|
"association_id": "vpc-cidr-assoc-05f4dfb5fe3092d82",
|
|
"cidr_block": "172.31.0.0/16",
|
|
"state": "associated"
|
|
}
|
|
],
|
|
"default": true,
|
|
"dhcp_options_id": "dopt-0271d6713d96f2254",
|
|
"enable_dns_hostnames": true,
|
|
"enable_dns_support": true,
|
|
"enable_network_address_usage_metrics": false,
|
|
"filter": null,
|
|
"id": "vpc-0271dff7a4b4bbf76",
|
|
"instance_tenancy": "default",
|
|
"ipv6_association_id": "",
|
|
"ipv6_cidr_block": "",
|
|
"main_route_table_id": "rtb-01ff49732ea0b5a76",
|
|
"owner_id": "273729230602",
|
|
"region": "us-east-1",
|
|
"state": null,
|
|
"tags": {},
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_eip",
|
|
"name": "nat",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"address": null,
|
|
"allocation_id": "eipalloc-0efd9a4666274d4b9",
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:elastic-ip/eipalloc-0efd9a4666274d4b9",
|
|
"associate_with_private_ip": null,
|
|
"association_id": "eipassoc-0670094f7c1ebaa09",
|
|
"carrier_ip": "",
|
|
"customer_owned_ip": "",
|
|
"customer_owned_ipv4_pool": "",
|
|
"domain": "vpc",
|
|
"id": "eipalloc-0efd9a4666274d4b9",
|
|
"instance": "",
|
|
"ipam_pool_id": null,
|
|
"network_border_group": "us-east-1",
|
|
"network_interface": "eni-0af2e53d148f4e2ef",
|
|
"private_dns": "ip-172-31-176-31.ec2.internal",
|
|
"private_ip": "172.31.176.31",
|
|
"ptr_record": "",
|
|
"public_dns": "ec2-3-223-7-164.compute-1.amazonaws.com",
|
|
"public_ip": "3.223.7.164",
|
|
"public_ipv4_pool": "amazon",
|
|
"region": "us-east-1",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ=="
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_nat_gateway",
|
|
"name": "nat_gateway",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"allocation_id": "eipalloc-0efd9a4666274d4b9",
|
|
"association_id": "eipassoc-0670094f7c1ebaa09",
|
|
"connectivity_type": "public",
|
|
"id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "eni-0af2e53d148f4e2ef",
|
|
"private_ip": "172.31.176.31",
|
|
"public_ip": "3.223.7.164",
|
|
"region": "us-east-1",
|
|
"secondary_allocation_ids": [],
|
|
"secondary_private_ip_address_count": 0,
|
|
"secondary_private_ip_addresses": [],
|
|
"subnet_id": "subnet-0e188b45be889dcc3",
|
|
"tags": {},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTgwMDAwMDAwMDAwMCwidXBkYXRlIjo2MDAwMDAwMDAwMDB9fQ==",
|
|
"dependencies": [
|
|
"module.network.aws_eip.nat",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route",
|
|
"name": "nat_gateway",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"carrier_gateway_id": "",
|
|
"core_network_arn": "",
|
|
"destination_cidr_block": "0.0.0.0/0",
|
|
"destination_ipv6_cidr_block": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"id": "r-rtb-041eec80d0151b4131080289494",
|
|
"instance_id": "",
|
|
"instance_owner_id": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"origin": "CreateRoute",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-041eec80d0151b413",
|
|
"state": "active",
|
|
"timeouts": null,
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_eip.nat",
|
|
"module.network.aws_nat_gateway.nat_gateway",
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"carrier_gateway_id": "",
|
|
"core_network_arn": "",
|
|
"destination_cidr_block": "0.0.0.0/0",
|
|
"destination_ipv6_cidr_block": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"id": "r-rtb-045c9ab610c7aabd31080289494",
|
|
"instance_id": "",
|
|
"instance_owner_id": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"origin": "CreateRoute",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-045c9ab610c7aabd3",
|
|
"state": "active",
|
|
"timeouts": null,
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_eip.nat",
|
|
"module.network.aws_nat_gateway.nat_gateway",
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"carrier_gateway_id": "",
|
|
"core_network_arn": "",
|
|
"destination_cidr_block": "0.0.0.0/0",
|
|
"destination_ipv6_cidr_block": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"id": "r-rtb-0a1eb19f2c209aa341080289494",
|
|
"instance_id": "",
|
|
"instance_owner_id": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"origin": "CreateRoute",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0a1eb19f2c209aa34",
|
|
"state": "active",
|
|
"timeouts": null,
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_eip.nat",
|
|
"module.network.aws_nat_gateway.nat_gateway",
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route",
|
|
"name": "public_internet_gateway",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"carrier_gateway_id": "",
|
|
"core_network_arn": "",
|
|
"destination_cidr_block": "0.0.0.0/0",
|
|
"destination_ipv6_cidr_block": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "igw-04c8aad5899c55659",
|
|
"id": "r-rtb-0d102d2391110f0b51080289494",
|
|
"instance_id": "",
|
|
"instance_owner_id": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "",
|
|
"network_interface_id": "",
|
|
"origin": "CreateRoute",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0d102d2391110f0b5",
|
|
"state": "active",
|
|
"timeouts": null,
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.public",
|
|
"module.network.data.aws_internet_gateway.default",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route_table",
|
|
"name": "private",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-041eec80d0151b413",
|
|
"id": "rtb-041eec80d0151b413",
|
|
"owner_id": "273729230602",
|
|
"propagating_vgws": [],
|
|
"region": "us-east-1",
|
|
"route": [
|
|
{
|
|
"carrier_gateway_id": "",
|
|
"cidr_block": "0.0.0.0/0",
|
|
"core_network_arn": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"ipv6_cidr_block": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
}
|
|
],
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1a)"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1a)",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-045c9ab610c7aabd3",
|
|
"id": "rtb-045c9ab610c7aabd3",
|
|
"owner_id": "273729230602",
|
|
"propagating_vgws": [],
|
|
"region": "us-east-1",
|
|
"route": [
|
|
{
|
|
"carrier_gateway_id": "",
|
|
"cidr_block": "0.0.0.0/0",
|
|
"core_network_arn": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"ipv6_cidr_block": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
}
|
|
],
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1b)"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1b)",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0a1eb19f2c209aa34",
|
|
"id": "rtb-0a1eb19f2c209aa34",
|
|
"owner_id": "273729230602",
|
|
"propagating_vgws": [],
|
|
"region": "us-east-1",
|
|
"route": [
|
|
{
|
|
"carrier_gateway_id": "",
|
|
"cidr_block": "0.0.0.0/0",
|
|
"core_network_arn": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "",
|
|
"ipv6_cidr_block": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "nat-09006b80b9074bdb7",
|
|
"network_interface_id": "",
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
}
|
|
],
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1c)"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1c)",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route_table",
|
|
"name": "public",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:route-table/rtb-0d102d2391110f0b5",
|
|
"id": "rtb-0d102d2391110f0b5",
|
|
"owner_id": "273729230602",
|
|
"propagating_vgws": [],
|
|
"region": "us-east-1",
|
|
"route": [
|
|
{
|
|
"carrier_gateway_id": "",
|
|
"cidr_block": "0.0.0.0/0",
|
|
"core_network_arn": "",
|
|
"destination_prefix_list_id": "",
|
|
"egress_only_gateway_id": "",
|
|
"gateway_id": "igw-04c8aad5899c55659",
|
|
"ipv6_cidr_block": "",
|
|
"local_gateway_id": "",
|
|
"nat_gateway_id": "",
|
|
"network_interface_id": "",
|
|
"transit_gateway_id": "",
|
|
"vpc_endpoint_id": "",
|
|
"vpc_peering_connection_id": ""
|
|
}
|
|
],
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) public subnet"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) public subnet",
|
|
"Service": "Kubernetes"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route_table_association",
|
|
"name": "private",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-0e1e038f4c6d929ce",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-041eec80d0151b413",
|
|
"subnet_id": "subnet-0f0da9e04f1c8369a",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-0dd4118f5d0a30ca8",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-045c9ab610c7aabd3",
|
|
"subnet_id": "subnet-0d7ae39c853e68127",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-0ed1a7a490311bafb",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0a1eb19f2c209aa34",
|
|
"subnet_id": "subnet-0f84cfaa3d8da724d",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.private",
|
|
"module.network.aws_subnet.private",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_route_table_association",
|
|
"name": "public",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-0522ba344fcea4f83",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0d102d2391110f0b5",
|
|
"subnet_id": "subnet-0e188b45be889dcc3",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.public",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-088380c97cfc946c7",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0d102d2391110f0b5",
|
|
"subnet_id": "subnet-02555be9c1954bbda",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.public",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 0,
|
|
"attributes": {
|
|
"gateway_id": "",
|
|
"id": "rtbassoc-0d880a637fe8c9576",
|
|
"region": "us-east-1",
|
|
"route_table_id": "rtb-0d102d2391110f0b5",
|
|
"subnet_id": "subnet-08dbbf19ff2c937f1",
|
|
"timeouts": null
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19",
|
|
"dependencies": [
|
|
"module.network.aws_route_table.public",
|
|
"module.network.aws_subnet.public",
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_subnet",
|
|
"name": "private",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f0da9e04f1c8369a",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1a",
|
|
"availability_zone_id": "use1-az1",
|
|
"cidr_block": "172.31.128.0/20",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-0f0da9e04f1c8369a",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": false,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1a)",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1a)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0d7ae39c853e68127",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1b",
|
|
"availability_zone_id": "use1-az2",
|
|
"cidr_block": "172.31.144.0/20",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-0d7ae39c853e68127",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": false,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1b)",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1b)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0f84cfaa3d8da724d",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1c",
|
|
"availability_zone_id": "use1-az4",
|
|
"cidr_block": "172.31.160.0/20",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-0f84cfaa3d8da724d",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": false,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1c)",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) private subnet (us-east-1c)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/internal-elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"module": "module.network",
|
|
"mode": "managed",
|
|
"type": "aws_subnet",
|
|
"name": "public",
|
|
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
|
|
"instances": [
|
|
{
|
|
"index_key": "us-east-1a",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-0e188b45be889dcc3",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1a",
|
|
"availability_zone_id": "use1-az1",
|
|
"cidr_block": "172.31.176.0/24",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-0e188b45be889dcc3",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": true,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1a)",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1a)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "us-east-1b",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-02555be9c1954bbda",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1b",
|
|
"availability_zone_id": "use1-az2",
|
|
"cidr_block": "172.31.177.0/24",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-02555be9c1954bbda",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": true,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1b)",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1b)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
},
|
|
{
|
|
"index_key": "us-east-1c",
|
|
"schema_version": 1,
|
|
"attributes": {
|
|
"arn": "arn:aws:ec2:us-east-1:273729230602:subnet/subnet-08dbbf19ff2c937f1",
|
|
"assign_ipv6_address_on_creation": false,
|
|
"availability_zone": "us-east-1c",
|
|
"availability_zone_id": "use1-az4",
|
|
"cidr_block": "172.31.178.0/24",
|
|
"customer_owned_ipv4_pool": "",
|
|
"enable_dns64": false,
|
|
"enable_lni_at_device_index": 0,
|
|
"enable_resource_name_dns_a_record_on_launch": false,
|
|
"enable_resource_name_dns_aaaa_record_on_launch": false,
|
|
"id": "subnet-08dbbf19ff2c937f1",
|
|
"ipv6_cidr_block": "",
|
|
"ipv6_cidr_block_association_id": "",
|
|
"ipv6_native": false,
|
|
"map_customer_owned_ip_on_launch": false,
|
|
"map_public_ip_on_launch": true,
|
|
"outpost_arn": "",
|
|
"owner_id": "273729230602",
|
|
"private_dns_hostname_type_on_launch": "ip-name",
|
|
"region": "us-east-1",
|
|
"tags": {
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1c)",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"tags_all": {
|
|
"Environment": "devel",
|
|
"Name": "EKS (eks1-devel) public subnet (us-east-1c)",
|
|
"Service": "Kubernetes",
|
|
"kubernetes.io/role/elb": "1"
|
|
},
|
|
"timeouts": null,
|
|
"vpc_id": "vpc-0271dff7a4b4bbf76"
|
|
},
|
|
"sensitive_attributes": [],
|
|
"identity_schema_version": 0,
|
|
"private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9",
|
|
"dependencies": [
|
|
"module.network.data.aws_availability_zones.available",
|
|
"module.network.data.aws_vpc.selected"
|
|
],
|
|
"create_before_destroy": true
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"check_results": [
|
|
{
|
|
"object_kind": "resource",
|
|
"config_addr": "module.eks.module.eks.module.eks_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"status": "pass",
|
|
"objects": [
|
|
{
|
|
"object_addr": "module.eks.module.eks.module.eks_managed_node_group[\"ng\"].module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"status": "pass"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"object_kind": "resource",
|
|
"config_addr": "module.eks.module.eks.module.self_managed_node_group.module.user_data.null_resource.validate_cluster_service_cidr",
|
|
"status": "pass",
|
|
"objects": null
|
|
}
|
|
]
|
|
}
|