Created
January 24, 2019 23:25
-
-
Save jpeach/2fdfde70e454912c0d2c815043b34354 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@a2e852b60be1 iam]# terraform init | |
Initializing modules... | |
- module.pie-cassandra-policies | |
- module.pie-deployment-policies | |
- module.pie-kubernetes-policies | |
- module.pie-runtime-policies | |
- module.pie-deployment-api-policies | |
- module.pie-readonly-policies | |
- module.pie-BedrockRole | |
- module.pie-eks-infrastructure-deployment-policies | |
- module.pie-eks-platform-deployment-policies | |
- module.pie-eks-cassandra-deployment-policies | |
- module.pie-eks-platform-sre-policies | |
- module.pie-eks-kubernetes-sre-policies | |
- module.pie-eks-cassandra-sre-policies | |
- module.pie-cassandra | |
- module.pie-cassandra-devs | |
- module.pie-deployment | |
- module.pie-deployment-api | |
- module.pie-kubernetes | |
- module.pie-readonly | |
- module.pie-rio | |
- module.pie-runtime | |
- module.pie-eks-infrastructure-deployment | |
- module.pie-eks-platform-deployment | |
- module.pie-eks-cassandra-deployment | |
- module.pie-eks-platform-sre | |
Initializing provider plugins... | |
The following providers do not have any version constraints in configuration, | |
so the latest version was installed. | |
To prevent automatic upgrades to new major versions that may contain breaking | |
changes, it is recommended to add version = "..." constraints to the | |
corresponding provider blocks in configuration, with the constraint strings | |
suggested below. | |
* provider.aws: version = "~> 1.56" | |
* provider.null: version = "~> 2.0" | |
* provider.template: version = "~> 2.0" | |
Terraform has been successfully initialized! | |
You may now begin working with Terraform. Try running "terraform plan" to see | |
any changes that are required for your infrastructure. All Terraform commands | |
should now work. | |
If you ever set or change modules or backend configuration for Terraform, | |
rerun this command to reinitialize your working directory. If you forget, other | |
commands will detect it and remind you to do so if necessary. | |
[root@a2e852b60be1 iam]# terraform plan | |
Refreshing Terraform state in-memory prior to plan... | |
The refreshed state will be used to calculate this plan, but will not be | |
persisted to local or remote state storage. | |
null_resource.dependency_getter: Refreshing state... (ID: 4138979597822394652) | |
null_resource.dependency_getter: Refreshing state... (ID: 8903278287492822413) | |
null_resource.dependency_getter: Refreshing state... (ID: 4536374721421871185) | |
null_resource.dependency_getter: Refreshing state... (ID: 5228100913465771308) | |
null_resource.dependency_getter: Refreshing state... (ID: 6451221340327041875) | |
null_resource.dependency_getter: Refreshing state... (ID: 4392765916973514053) | |
null_resource.dependency_getter: Refreshing state... (ID: 3001085382042151227) | |
data.template_file.assume-role-BedrockRole: Refreshing state... | |
data.template_file.assume-role-policy: Refreshing state... | |
data.template_file.APIRole: Refreshing state... | |
data.template_file.assume-role-policy-api: Refreshing state... | |
aws_iam_role.api_user: Refreshing state... (ID: pie.deployment) | |
data.aws_iam_group.MFARequired: Refreshing state... | |
aws_iam_policy.AllowProdRole: Refreshing state... (ID: arn:aws:iam::761099851141:policy/Allow-PROD-Role-Access) | |
aws_iam_user.robert_evans: Refreshing state... (ID: robert.evans) | |
aws_iam_policy.EKSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly) | |
aws_iam_user.alice_park: Refreshing state... (ID: alice.park) | |
aws_iam_user.yug_veluvali: Refreshing state... (ID: yug.veluvali) | |
data.aws_iam_group.pie-readonly: Refreshing state... | |
aws_iam_user.james_peach: Refreshing state... (ID: james.peach) | |
aws_iam_user.rob_meyer: Refreshing state... (ID: rob.meyer) | |
aws_iam_user.jiten_shah: Refreshing state... (ID: jiten.shah) | |
aws_iam_policy.KMSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly) | |
aws_iam_user.eduardo_aguilar: Refreshing state... (ID: eduardo.aguilar) | |
aws_iam_user.deployment_user: Refreshing state... (ID: pie.deployment) | |
aws_iam_user.douglas_borg: Refreshing state... (ID: douglas.borg) | |
aws_iam_policy.EKSAdmin: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-Admin) | |
aws_iam_policy.KMSFullAccess: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-Admin) | |
aws_iam_group.PIE_API_Deployment: Refreshing state... (ID: PIE_API_Deployment) | |
aws_iam_user.alexius_ludeman: Refreshing state... (ID: alexius.ludeman) | |
aws_iam_user.jeff_jirsa: Refreshing state... (ID: jeff.jirsa) | |
aws_iam_user.andrew_forgue: Refreshing state... (ID: andrew.forgue) | |
aws_iam_user.vishnu_rangayyan: Refreshing state... (ID: vishnu.rangayyan) | |
aws_iam_user.kenny_ma: Refreshing state... (ID: kenny.ma) | |
aws_iam_user.greg_changaris: Refreshing state... (ID: greg.changaris) | |
aws_iam_user.kai_lam: Refreshing state... (ID: kai.lam) | |
aws_iam_user.andrew_farmer: Refreshing state... (ID: andrew.farmer) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-runtime) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment-api) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-cassandra) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-rio) | |
aws_iam_group.target-group: Refreshing state... (ID: PIE_Cassandra_Devs) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-kubernetes) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-readonly) | |
aws_iam_role.pie-deployment: Refreshing state... (ID: pie-deployment) | |
aws_iam_policy.KMSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly) | |
aws_iam_role.pie-bedrock: Refreshing state... (ID: BedrockRole) | |
aws_iam_role.pie-runtime: Refreshing state... (ID: pie-runtime) | |
aws_iam_policy.EKSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly) | |
aws_iam_role.pie-kubernetes: Refreshing state... (ID: pie-kubernetes) | |
aws_iam_role.pie-deployment-api: Refreshing state... (ID: pie-deployment-api) | |
aws_iam_role.pie-readonly: Refreshing state... (ID: pie-readonly) | |
aws_iam_policy.EKSAdmin-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-Admin) | |
aws_iam_role_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: pie.deployment-20190121174739287900000001) | |
aws_iam_policy.KMSFullAccess-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-Admin) | |
aws_iam_role_policy.KMSFullAccess: Refreshing state... (ID: pie.deployment:Allow-KMS-key-management) | |
aws_iam_role_policy_attachment.S3Fullaccess: Refreshing state... (ID: pie.deployment-20190121174739310600000003) | |
aws_iam_role.pie-cassandra: Refreshing state... (ID: pie-cassandra) | |
aws_iam_role_policy_attachment.EC2Fullaccess: Refreshing state... (ID: pie.deployment-20190121174740440600000004) | |
aws_iam_role_policy.EKSFullAccess: Refreshing state... (ID: pie.deployment:Allow-EKS-cluster-management) | |
aws_iam_role_policy_attachment.IAMFullaccess: Refreshing state... (ID: pie.deployment-20190121174739310300000002) | |
aws_iam_user_group_membership.alice_park-groups: Refreshing state... (ID: terraform-2019012117475247460000000f) | |
aws_iam_user_group_membership.yug_veluvali-groups: Refreshing state... (ID: terraform-20190121183055604700000004) | |
aws_iam_user_group_membership.james_peach-groups: Refreshing state... (ID: terraform-20190121183056042600000006) | |
aws_iam_user_group_membership.robert_evans-groups: Refreshing state... (ID: terraform-20190121174752474600000010) | |
aws_iam_user_group_membership.rob_meyer-groups: Refreshing state... (ID: terraform-2019012117475964250000001b) | |
aws_iam_user_group_membership.eduardo_aguilar-groups: Refreshing state... (ID: terraform-20190121174746257900000008) | |
aws_iam_group_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626940000000b) | |
aws_iam_group_membership.PIE_API_Group: Refreshing state... (ID: PIE API group membership) | |
aws_iam_user_group_membership.alexius_ludeman-groups: Refreshing state... (ID: terraform-20190121174740479900000005) | |
aws_iam_group_policy_attachment.AllowProdRole: Refreshing state... (ID: PIE_API_Deployment-20190121174746265600000009) | |
aws_iam_user_group_membership.jiten_shah-groups: Refreshing state... (ID: terraform-20190122000022908800000011) | |
aws_iam_group_policy_attachment.EC2Fullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626700000000a) | |
aws_iam_group_policy_attachment.S3Fullaccess: Refreshing state... (ID: PIE_API_Deployment-20190121174741670800000007) | |
aws_iam_user_group_membership.douglas_borg-groups: Refreshing state... (ID: terraform-20190121174752480200000011) | |
aws_iam_user_group_membership.jeff_jirsa-groups: Refreshing state... (ID: terraform-20190121183055615600000005) | |
aws_iam_group_policy_attachment.IAMFullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474628190000000c) | |
aws_iam_user_group_membership.greg_changaris-groups: Refreshing state... (ID: terraform-20190121194136809300000002) | |
aws_iam_user_group_membership.vishnu_rangayyan-groups: Refreshing state... (ID: terraform-20190121174741508400000006) | |
aws_iam_user_group_membership.andrew_forgue-groups: Refreshing state... (ID: terraform-20190121194136832200000003) | |
aws_iam_user_group_membership.kenny_ma-groups: Refreshing state... (ID: terraform-20190121174759021400000019) | |
aws_iam_user_group_membership.kai_lam-groups: Refreshing state... (ID: terraform-20190110213748910300000001) | |
aws_iam_user_group_membership.andrew_farmer-groups: Refreshing state... (ID: terraform-20190121194137198200000004) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-rio-20190123012539533200000003) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-rio-20190123012539568100000008) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-rio-2019012301254122840000000b) | |
data.template_file.PIE-assume-kubernetes-template: Refreshing state... | |
data.template_file.PIE-assume-deployment-template: Refreshing state... | |
data.template_file.PIE-assume-deployment-api-template: Refreshing state... | |
data.template_file.PIE-assume-runtime-template: Refreshing state... | |
data.template_file.PIE-assume-readonly-template: Refreshing state... | |
data.template_file.PIE-assume-cassandra-template: Refreshing state... | |
aws_iam_user_group_membership.pie-deployment-api: Refreshing state... (ID: terraform-20190109222858311100000003) | |
aws_iam_role_policy_attachment.attach-policy: Refreshing state... (ID: BedrockRole-20190123000407582700000001) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190122003251843300000005) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-20190122003251776200000003) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190122003251844100000006) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190122003251722800000001) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190122003251752000000002) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190122003251848100000007) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190122003251839900000004) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-20190122003251848800000008) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190109230009051900000006) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190109230009048600000005) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190109230009053200000007) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190109230009048300000003) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190109230009048400000004) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-20190109230009038500000001) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190109230009041500000002) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190109211630243800000001) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190109223608956000000006) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190109223611040500000015) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190109223610097700000012) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-20190109223608950800000004) | |
aws_iam_role_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-20190109223608956300000007) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019010922360896210000000a) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-20190109223610116700000014) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190109223610081200000011) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190109223608960100000008) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-2019010922361005810000000f) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-2019010922361004400000000c) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-20190109223608960600000009) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-2019010922361005690000000e) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-20190109223120961200000001) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190109223120992900000007) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-20190109223120968500000002) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-20190109223120975600000004) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-20190109223121040900000008) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190109223120975500000003) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-20190109223120984500000006) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190109223120975800000005) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 4100980539342263196) | |
aws_iam_policy.PIE-assume-pie-kubernetes: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-kubernetes) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190109223608943300000003) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190109223608938500000001) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-2019010922360999650000000b) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190109223608943000000002) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-20190109223610102600000013) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190109223610075600000010) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-2019010922361004850000000d) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190109223608953100000005) | |
aws_iam_policy.PIE-assume-pie-deployment: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6346616545391941851) | |
aws_iam_policy.PIE-assume-pie-deployment-api: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment-api) | |
aws_iam_policy.PIE-assume-pie-runtime: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-runtime) | |
aws_iam_policy.PIE-assume-pie-readonly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6991837947934083645) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 4064315673444490507) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6484923612879353) | |
aws_iam_policy.PIE-assume-pie-cassandra: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-cassandra) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 9214406816689215044) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 3960533433938890249) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 8007655905577911863) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3103865056339632082) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 6577477338050065021) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 5039920784566077236) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3579762471513605910) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 7787071005550107267) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-20190122000016073200000001) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-20190121174752940600000014) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190122000016075900000003) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019012200002239360000000d) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-2019012200003454910000001d) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-2019012117475244860000000e) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-20190122000029413700000017) | |
aws_iam_group_policy_attachment.attach-policy[9]: Refreshing state... (ID: pie-kubernetes-2019012200001834140000000a) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190121174752503700000013) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-2019012200002240000000000e) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3174389806157649060) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190122000016089400000005) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190121174810722800000025) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-20190122000029497900000019) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-20190121174804554300000020) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-2019012117480451820000001d) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190121174805191100000024) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190122000016129400000009) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190122000016074600000002) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-20190122000016120900000008) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190121174804563500000022) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190122000016083500000004) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-2019012117475972530000001c) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-2019012117480451980000001e) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-2019012200002992160000001b) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-runtime-20190122000016090400000006) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-2019012117480455080000001f) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190122000016101300000007) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-2019012200002237280000000b) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190121174805103400000023) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190122000028282200000014) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190122000029491100000018) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-api-20190122000023330400000013) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190121174804556100000021) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190121174758492300000018) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190122000028722500000016) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190122000022861700000010) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-2019012117475902240000001a) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190123012539524600000001) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-2019012301254122960000000c) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190123012539567400000004) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190123012539568200000009) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-readonly-20190123012539567700000006) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190123012539533000000002) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190123012539568000000007) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-2019012301253956820000000a) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190123012539567600000005) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-cassandra-20190122000028301900000015) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190121174753632200000016) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190121174752940900000015) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: PIE_Cassandra_Devs-2019012200002238420000000c) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-2019012200002285860000000f) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055193500000002) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055207900000003) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190121174758486900000017) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055183000000001) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: PIE_Cassandra_Devs-20190122000023169300000012) | |
------------------------------------------------------------------------ | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
- destroy | |
-/+ destroy and then create replacement | |
Terraform will perform the following actions: | |
+ aws_iam_role.pie-eks-cassandra-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Cassandra deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-cassandra-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Cassandra SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-infrastructure-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Infrastructure deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-kubernetes-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Kubernetes SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-platform-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Platform deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-platform-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Platform SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-cassandra-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-cassandra-deployment-rio" | |
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-cassandra-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-cassandra-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-infrastructure-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-infrastructure-deployment-rio" | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-infrastructure-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-platform-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-platform-deployment-rio" | |
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-platform-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-platform-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-sre.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-eks-platform-sre" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-eks-platform-sre" | |
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-eks-platform-sre" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0] (new resource required) | |
id: "pie-readonly-20190122003251848800000008" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1] (new resource required) | |
id: "pie-readonly-20190122003251844100000006" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2] (new resource required) | |
id: "pie-readonly-20190122003251839900000004" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[3] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[4] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[5] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[6] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[7] | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0] (new resource required) | |
id: "pie-readonly-2019012301253956820000000a" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1] (new resource required) | |
id: "pie-readonly-20190123012539567400000004" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2] (new resource required) | |
id: "pie-readonly-20190123012539533000000002" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3] (new resource required) | |
id: "pie-readonly-20190123012539524600000001" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/IAMReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly" (forces new resource) | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[4] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[5] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[6] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[7] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[8] | |
Plan: 55 to add, 0 to change, 17 to destroy. | |
------------------------------------------------------------------------ | |
Note: You didn't specify an "-out" parameter to save this plan, so Terraform | |
can't guarantee that exactly these actions will be performed if | |
"terraform apply" is subsequently run. | |
[root@a2e852b60be1 iam]# terraform apply | |
null_resource.dependency_getter: Refreshing state... (ID: 5228100913465771308) | |
null_resource.dependency_getter: Refreshing state... (ID: 3001085382042151227) | |
null_resource.dependency_getter: Refreshing state... (ID: 4138979597822394652) | |
null_resource.dependency_getter: Refreshing state... (ID: 6451221340327041875) | |
null_resource.dependency_getter: Refreshing state... (ID: 4392765916973514053) | |
null_resource.dependency_getter: Refreshing state... (ID: 8903278287492822413) | |
null_resource.dependency_getter: Refreshing state... (ID: 4536374721421871185) | |
data.template_file.assume-role-BedrockRole: Refreshing state... | |
data.template_file.assume-role-policy-api: Refreshing state... | |
data.template_file.APIRole: Refreshing state... | |
data.template_file.assume-role-policy: Refreshing state... | |
aws_iam_policy.EKSAdmin-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-Admin) | |
aws_iam_role.pie-readonly: Refreshing state... (ID: pie-readonly) | |
aws_iam_role.pie-cassandra: Refreshing state... (ID: pie-cassandra) | |
aws_iam_role.pie-deployment: Refreshing state... (ID: pie-deployment) | |
aws_iam_policy.KMSFullAccess-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-Admin) | |
aws_iam_role.pie-deployment-api: Refreshing state... (ID: pie-deployment-api) | |
aws_iam_policy.EKSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly) | |
aws_iam_policy.KMSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly) | |
aws_iam_role.pie-kubernetes: Refreshing state... (ID: pie-kubernetes) | |
aws_iam_role.pie-bedrock: Refreshing state... (ID: BedrockRole) | |
aws_iam_role.pie-runtime: Refreshing state... (ID: pie-runtime) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-runtime) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-rio) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment-api) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-readonly) | |
aws_iam_group.target-group: Refreshing state... (ID: PIE_Cassandra_Devs) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-kubernetes) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment) | |
aws_iam_group.target-group: Refreshing state... (ID: pie-cassandra) | |
aws_iam_user.yug_veluvali: Refreshing state... (ID: yug.veluvali) | |
aws_iam_user.rob_meyer: Refreshing state... (ID: rob.meyer) | |
aws_iam_user.robert_evans: Refreshing state... (ID: robert.evans) | |
aws_iam_user.kenny_ma: Refreshing state... (ID: kenny.ma) | |
aws_iam_user.james_peach: Refreshing state... (ID: james.peach) | |
aws_iam_user.alice_park: Refreshing state... (ID: alice.park) | |
aws_iam_user.vishnu_rangayyan: Refreshing state... (ID: vishnu.rangayyan) | |
data.aws_iam_group.pie-readonly: Refreshing state... | |
aws_iam_user.andrew_farmer: Refreshing state... (ID: andrew.farmer) | |
aws_iam_policy.EKSAdmin: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-Admin) | |
aws_iam_policy.AllowProdRole: Refreshing state... (ID: arn:aws:iam::761099851141:policy/Allow-PROD-Role-Access) | |
aws_iam_user.deployment_user: Refreshing state... (ID: pie.deployment) | |
aws_iam_policy.EKSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly) | |
data.aws_iam_group.MFARequired: Refreshing state... | |
aws_iam_user.andrew_forgue: Refreshing state... (ID: andrew.forgue) | |
aws_iam_user.douglas_borg: Refreshing state... (ID: douglas.borg) | |
aws_iam_user.greg_changaris: Refreshing state... (ID: greg.changaris) | |
aws_iam_policy.KMSFullAccess: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-Admin) | |
aws_iam_user.eduardo_aguilar: Refreshing state... (ID: eduardo.aguilar) | |
aws_iam_policy.KMSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly) | |
aws_iam_user.jiten_shah: Refreshing state... (ID: jiten.shah) | |
aws_iam_role.api_user: Refreshing state... (ID: pie.deployment) | |
aws_iam_user.alexius_ludeman: Refreshing state... (ID: alexius.ludeman) | |
aws_iam_user.jeff_jirsa: Refreshing state... (ID: jeff.jirsa) | |
aws_iam_group.PIE_API_Deployment: Refreshing state... (ID: PIE_API_Deployment) | |
aws_iam_user.kai_lam: Refreshing state... (ID: kai.lam) | |
data.template_file.PIE-assume-deployment-template: Refreshing state... | |
data.template_file.PIE-assume-deployment-api-template: Refreshing state... | |
data.template_file.PIE-assume-kubernetes-template: Refreshing state... | |
data.template_file.PIE-assume-cassandra-template: Refreshing state... | |
data.template_file.PIE-assume-readonly-template: Refreshing state... | |
aws_iam_role_policy_attachment.attach-policy: Refreshing state... (ID: BedrockRole-20190123000407582700000001) | |
aws_iam_user_group_membership.kenny_ma-groups: Refreshing state... (ID: terraform-20190121174759021400000019) | |
aws_iam_user_group_membership.robert_evans-groups: Refreshing state... (ID: terraform-20190121174752474600000010) | |
data.template_file.PIE-assume-runtime-template: Refreshing state... | |
aws_iam_user_group_membership.douglas_borg-groups: Refreshing state... (ID: terraform-20190121174752480200000011) | |
aws_iam_user_group_membership.vishnu_rangayyan-groups: Refreshing state... (ID: terraform-20190121174741508400000006) | |
aws_iam_user_group_membership.james_peach-groups: Refreshing state... (ID: terraform-20190121183056042600000006) | |
aws_iam_user_group_membership.alice_park-groups: Refreshing state... (ID: terraform-2019012117475247460000000f) | |
aws_iam_user_group_membership.andrew_forgue-groups: Refreshing state... (ID: terraform-20190121194136832200000003) | |
aws_iam_user_group_membership.yug_veluvali-groups: Refreshing state... (ID: terraform-20190121183055604700000004) | |
aws_iam_user_group_membership.andrew_farmer-groups: Refreshing state... (ID: terraform-20190121194137198200000004) | |
aws_iam_user_group_membership.rob_meyer-groups: Refreshing state... (ID: terraform-2019012117475964250000001b) | |
aws_iam_user_group_membership.greg_changaris-groups: Refreshing state... (ID: terraform-20190121194136809300000002) | |
aws_iam_user_group_membership.eduardo_aguilar-groups: Refreshing state... (ID: terraform-20190121174746257900000008) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190122003251844100000006) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-20190122003251776200000003) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-20190122003251848800000008) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190122003251722800000001) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190122003251839900000004) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190122003251752000000002) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190122003251848100000007) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190122003251843300000005) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-2019010922361005810000000f) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-20190109223610116700000014) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190109223610081200000011) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190109223608960100000008) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019010922360896210000000a) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-2019010922361004400000000c) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-20190109223608960600000009) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-2019010922361005690000000e) | |
aws_iam_role_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-20190109223608956300000007) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190109223610097700000012) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-20190109223608950800000004) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190109223608956000000006) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190109223611040500000015) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190109223608943300000003) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190109223608938500000001) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-2019010922360999650000000b) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190109223610075600000010) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-20190109223610102600000013) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190109223608953100000005) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-2019010922361004850000000d) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190109223608943000000002) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190109230009048400000004) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190109230009048600000005) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190109230009051900000006) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-20190109230009038500000001) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190109230009048300000003) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190109230009041500000002) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190109211630243800000001) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190109230009053200000007) | |
aws_iam_policy.PIE-assume-pie-deployment: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 4100980539342263196) | |
aws_iam_policy.PIE-assume-pie-deployment-api: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment-api) | |
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-20190109223120961200000001) | |
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-20190109223120984500000006) | |
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-20190109223121040900000008) | |
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190109223120975500000003) | |
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-20190109223120975600000004) | |
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190109223120992900000007) | |
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-20190109223120968500000002) | |
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190109223120975800000005) | |
aws_iam_user_group_membership.pie-deployment-api: Refreshing state... (ID: terraform-20190109222858311100000003) | |
aws_iam_policy.PIE-assume-pie-cassandra: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-cassandra) | |
aws_iam_policy.PIE-assume-pie-kubernetes: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-kubernetes) | |
aws_iam_policy.PIE-assume-pie-readonly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly) | |
aws_iam_user_group_membership.jiten_shah-groups: Refreshing state... (ID: terraform-20190122000022908800000011) | |
aws_iam_user_group_membership.alexius_ludeman-groups: Refreshing state... (ID: terraform-20190121174740479900000005) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6346616545391941851) | |
aws_iam_role_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: pie.deployment-20190121174739287900000001) | |
aws_iam_user_group_membership.jeff_jirsa-groups: Refreshing state... (ID: terraform-20190121183055615600000005) | |
aws_iam_role_policy.EKSFullAccess: Refreshing state... (ID: pie.deployment:Allow-EKS-cluster-management) | |
aws_iam_role_policy_attachment.IAMFullaccess: Refreshing state... (ID: pie.deployment-20190121174739310300000002) | |
aws_iam_role_policy_attachment.S3Fullaccess: Refreshing state... (ID: pie.deployment-20190121174739310600000003) | |
aws_iam_role_policy_attachment.EC2Fullaccess: Refreshing state... (ID: pie.deployment-20190121174740440600000004) | |
aws_iam_role_policy.KMSFullAccess: Refreshing state... (ID: pie.deployment:Allow-KMS-key-management) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-rio-20190123012539568100000008) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-rio-2019012301254122840000000b) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-rio-20190123012539533200000003) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 4064315673444490507) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6991837947934083645) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 3960533433938890249) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 9214406816689215044) | |
null_resource.group_dependency_setter: Refreshing state... (ID: 6484923612879353) | |
aws_iam_policy.PIE-assume-pie-runtime: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-runtime) | |
aws_iam_group_membership.PIE_API_Group: Refreshing state... (ID: PIE API group membership) | |
aws_iam_group_policy_attachment.AllowProdRole: Refreshing state... (ID: PIE_API_Deployment-20190121174746265600000009) | |
aws_iam_group_policy_attachment.S3Fullaccess: Refreshing state... (ID: PIE_API_Deployment-20190121174741670800000007) | |
aws_iam_group_policy_attachment.IAMFullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474628190000000c) | |
aws_iam_group_policy_attachment.EC2Fullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626700000000a) | |
aws_iam_group_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626940000000b) | |
aws_iam_user_group_membership.kai_lam-groups: Refreshing state... (ID: terraform-20190110213748910300000001) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 8007655905577911863) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3103865056339632082) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3579762471513605910) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 5039920784566077236) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 3174389806157649060) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 6577477338050065021) | |
null_resource.role_dependency_setter: Refreshing state... (ID: 7787071005550107267) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-2019012117475902240000001a) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-20190122000016120900000008) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190122000028722500000016) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-api-20190122000023330400000013) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190121174805103400000023) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190121174758492300000018) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190122000022861700000010) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190121174804556100000021) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190122000029491100000018) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190122000028282200000014) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190122000016129400000009) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190121174805191100000024) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190122000016074600000002) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-20190122000029497900000019) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-20190121174804554300000020) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190121174810722800000025) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190122000016089400000005) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055207900000003) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-2019012117480451820000001d) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: PIE_Cassandra_Devs-2019012200002238420000000c) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: PIE_Cassandra_Devs-20190122000023169300000012) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055183000000001) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055193500000002) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190121174758486900000017) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190121174752940900000015) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-cassandra-20190122000028301900000015) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190121174753632200000016) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-2019012117475244860000000e) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-20190121174752940600000014) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190121174752503700000013) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-2019012200003454910000001d) | |
aws_iam_group_policy_attachment.attach-policy[9]: Refreshing state... (ID: pie-kubernetes-2019012200001834140000000a) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190122000016075900000003) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-20190122000029413700000017) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-20190122000016073200000001) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019012200002239360000000d) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-2019012200002240000000000e) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-2019012200002285860000000f) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-2019012301254122960000000c) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190123012539567600000005) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190123012539567400000004) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190123012539524600000001) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-2019012301253956820000000a) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190123012539568200000009) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190123012539533000000002) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-readonly-20190123012539567700000006) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190123012539568000000007) | |
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-2019012200002992160000001b) | |
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-2019012117480451980000001e) | |
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-2019012117480455080000001f) | |
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-2019012117475972530000001c) | |
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190122000016101300000007) | |
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190121174804563500000022) | |
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-2019012200002237280000000b) | |
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190122000016083500000004) | |
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-runtime-20190122000016090400000006) | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
- destroy | |
-/+ destroy and then create replacement | |
Terraform will perform the following actions: | |
+ aws_iam_role.pie-eks-cassandra-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Cassandra deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-cassandra-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Cassandra SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-infrastructure-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Infrastructure deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-kubernetes-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Kubernetes SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-platform-deployment | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Platform deployment" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ aws_iam_role.pie-eks-platform-sre | |
id: <computed> | |
arn: <computed> | |
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: <computed> | |
description: "Role for EKS Platform SRE" | |
force_detach_policies: "true" | |
max_session_duration: "14400" | |
name: <computed> | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-cassandra-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-cassandra-deployment-rio" | |
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-cassandra-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-cassandra-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-cassandra-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-infrastructure-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-infrastructure-deployment-rio" | |
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-infrastructure-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-kubernetes-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-deployment-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-deployment.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-platform-deployment-rio" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-platform-deployment-rio" | |
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-platform-deployment-rio" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[0] | |
id: <computed> | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[1] | |
id: <computed> | |
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "${var.aws-iam-object-name}" | |
+ module.pie-eks-platform-sre-policies.null_resource.dependency_getter | |
id: <computed> | |
+ module.pie-eks-platform-sre-policies.null_resource.group_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-sre-policies.null_resource.role_dependency_setter | |
id: <computed> | |
+ module.pie-eks-platform-sre.aws_iam_group.target-group | |
id: <computed> | |
arn: <computed> | |
name: "pie-eks-platform-sre" | |
path: "/" | |
unique_id: <computed> | |
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[0] | |
id: <computed> | |
group: "pie-eks-platform-sre" | |
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[1] | |
id: <computed> | |
group: "pie-eks-platform-sre" | |
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0] (new resource required) | |
id: "pie-readonly-20190122003251848800000008" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1] (new resource required) | |
id: "pie-readonly-20190122003251844100000006" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2] (new resource required) | |
id: "pie-readonly-20190122003251839900000004" => <computed> (forces new resource) | |
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly" (forces new resource) | |
role: "pie-readonly" => "pie-readonly" | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[3] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[4] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[5] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[6] | |
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[7] | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0] (new resource required) | |
id: "pie-readonly-2019012301253956820000000a" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1] (new resource required) | |
id: "pie-readonly-20190123012539567400000004" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2] (new resource required) | |
id: "pie-readonly-20190123012539533000000002" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly" (forces new resource) | |
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3] (new resource required) | |
id: "pie-readonly-20190123012539524600000001" => <computed> (forces new resource) | |
group: "pie-readonly" => "pie-readonly" | |
policy_arn: "arn:aws:iam::aws:policy/IAMReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly" (forces new resource) | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[4] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[5] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[6] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[7] | |
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[8] | |
Plan: 55 to add, 0 to change, 17 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-cassandra-sre-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-platform-sre-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-cassandra-deployment-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-cassandra-sre-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 1519095780003015155) | |
module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-platform-deployment-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-platform-deployment-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-kubernetes-sre-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-platform-sre-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 1906254954046923663) | |
module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 5547093361372146479) | |
module.pie-eks-cassandra-deployment-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 4781823114528558145) | |
module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-infrastructure-deployment-policies.null_resource.group_dependency_setter: Creating... | |
module.pie-eks-platform-sre-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-platform-deployment-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-kubernetes-sre-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 6230755250399984865) | |
module.pie-eks-platform-deployment-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 2437658566304854276) | |
module.pie-eks-platform-deployment-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-platform-deployment-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 7342660526567141825) | |
module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter: Creating... | |
module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-infrastructure-deployment-policies.null_resource.group_dependency_setter: Creation complete after 0s (ID: 5902955645060218809) | |
module.pie-eks-platform-deployment-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 1915811339266679465) | |
module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 8646423024574371633) | |
module.pie-eks-platform-sre-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter: Provisioning with 'local-exec'... | |
module.pie-eks-platform-sre-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter (local-exec): Executing: ["/bin/sh" "-c" "echo 0"] | |
module.pie-eks-platform-sre-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter (local-exec): 0 | |
module.pie-eks-platform-sre-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 1263874714281259866) | |
module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter: Creation complete after 0s (ID: 7917069324194584503) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[5]: Destroying... (ID: pie-readonly-20190123012539568200000009) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1]: Destroying... (ID: pie-readonly-20190123012539567400000004) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3]: Destroying... (ID: pie-readonly-20190123012539524600000001) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[8]: Destroying... (ID: pie-readonly-20190123012539567700000006) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2]: Destroying... (ID: pie-readonly-20190123012539533000000002) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0]: Destroying... (ID: pie-readonly-2019012301253956820000000a) | |
module.pie-eks-platform-deployment.aws_iam_group.target-group: Creating... | |
arn: "" => "<computed>" | |
name: "" => "pie-platform-deployment-rio" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-eks-platform-sre.aws_iam_group.target-group: Creating... | |
arn: "" => "<computed>" | |
name: "" => "pie-eks-platform-sre" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-eks-cassandra-deployment.aws_iam_group.target-group: Creating... | |
arn: "" => "<computed>" | |
name: "" => "pie-cassandra-deployment-rio" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-eks-infrastructure-deployment.aws_iam_group.target-group: Creating... | |
arn: "" => "<computed>" | |
name: "" => "pie-infrastructure-deployment-rio" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-eks-platform-deployment.aws_iam_group.target-group: Creation complete after 0s (ID: pie-platform-deployment-rio) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2]: Destruction complete after 0s | |
module.pie-eks-cassandra-deployment.aws_iam_group.target-group: Creation complete after 0s (ID: pie-cassandra-deployment-rio) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[6]: Destroying... (ID: pie-readonly-2019012301254122960000000c) | |
module.pie-eks-platform-sre.aws_iam_group.target-group: Creation complete after 0s (ID: pie-eks-platform-sre) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[7]: Destroying... (ID: pie-readonly-20190123012539568000000007) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[4]: Destroying... (ID: pie-readonly-20190123012539567600000005) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1]: Destroying... (ID: pie-readonly-20190122003251844100000006) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0]: Destruction complete after 0s | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3]: Destruction complete after 0s | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[8]: Destruction complete after 0s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[4]: Destroying... (ID: pie-readonly-20190122003251722800000001) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[5]: Destruction complete after 0s | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1]: Destruction complete after 0s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[3]: Destroying... (ID: pie-readonly-20190122003251752000000002) | |
aws_iam_role.pie-eks-infrastructure-deployment: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Infrastructure deployment" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
aws_iam_role.pie-eks-platform-deployment: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Platform deployment" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
aws_iam_role.pie-eks-kubernetes-sre: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Kubernetes SRE" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-eks-infrastructure-deployment.aws_iam_group.target-group: Creation complete after 0s (ID: pie-infrastructure-deployment-rio) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2]: Destroying... (ID: pie-readonly-20190122003251839900000004) | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[6]: Destruction complete after 0s | |
aws_iam_role.pie-eks-platform-sre: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Platform SRE" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[7]: Destruction complete after 0s | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[4]: Destruction complete after 0s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0]: Destroying... (ID: pie-readonly-20190122003251848800000008) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1]: Destruction complete after 0s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[7]: Destroying... (ID: pie-readonly-20190122003251843300000005) | |
aws_iam_role.pie-eks-cassandra-sre: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Cassandra SRE" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[4]: Destruction complete after 0s | |
aws_iam_role.pie-eks-cassandra-deployment: Creating... | |
arn: "" => "<computed>" | |
assume_role_policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n" | |
create_date: "" => "<computed>" | |
description: "" => "Role for EKS Cassandra deployment" | |
force_detach_policies: "" => "true" | |
max_session_duration: "" => "14400" | |
name: "" => "<computed>" | |
path: "" => "/" | |
unique_id: "" => "<computed>" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[3]: Destruction complete after 0s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[6]: Destroying... (ID: pie-readonly-20190122003251776200000003) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2]: Destruction complete after 1s | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[5]: Destroying... (ID: pie-readonly-20190122003251848100000007) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0]: Destruction complete after 1s | |
module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[0]: Creating... | |
group: "" => "pie-platform-deployment-rio" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[7]: Destruction complete after 1s | |
module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creating... | |
group: "" => "pie-platform-deployment-rio" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2]: Creating... | |
group: "" => "pie-readonly" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[6]: Destruction complete after 1s | |
module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creating... | |
group: "" => "pie-cassandra-deployment-rio" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
aws_iam_role.pie-eks-infrastructure-deployment: Creation complete after 1s (ID: terraform-20190124232442098300000001) | |
aws_iam_role.pie-eks-kubernetes-sre: Creation complete after 1s (ID: terraform-20190124232442101500000003) | |
aws_iam_role.pie-eks-platform-deployment: Creation complete after 1s (ID: terraform-20190124232442099400000002) | |
module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[0]: Creating... | |
group: "" => "pie-cassandra-deployment-rio" | |
module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[1]: Creating... | |
group: "" => "pie-eks-platform-sre" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[0]: Creating... | |
group: "" => "pie-eks-platform-sre" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3]: Creating... | |
group: "" => "pie-readonly" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1]: Creating... | |
group: "" => "pie-readonly" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[5]: Destruction complete after 0s | |
aws_iam_role.pie-eks-platform-sre: Creation complete after 1s (ID: terraform-20190124232442281800000004) | |
module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creating... | |
group: "" => "pie-infrastructure-deployment-rio" | |
policy_arn: "" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" | |
module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[0]: Creating... | |
group: "" => "pie-infrastructure-deployment-rio" | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "pie-readonly" | |
aws_iam_role.pie-eks-cassandra-sre: Creation complete after 1s (ID: terraform-20190124232442359500000005) | |
aws_iam_role.pie-eks-cassandra-deployment: Creation complete after 1s (ID: terraform-20190124232442396300000006) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly" | |
role: "" => "pie-readonly" | |
module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442098300000001" | |
module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-platform-deployment-rio-20190124232443042500000007) | |
module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442098300000001" | |
module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442101500000003" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2]: Creation complete after 1s (ID: pie-readonly-20190124232443044900000008) | |
module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442101500000003" | |
module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-cassandra-deployment-rio-20190124232443109800000009) | |
module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442099400000002" | |
module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442099400000002" | |
module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442281800000004" | |
module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442359500000005" | |
module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-eks-platform-sre-2019012423244322800000000a) | |
module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442396300000006" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-readonly-2019012423244324520000000b) | |
module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: Creating... | |
role: "" => "terraform-20190124232442359500000005" | |
module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3]: Creation complete after 1s (ID: pie-readonly-2019012423244325730000000c) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-readonly-2019012423244330940000000e) | |
module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442396300000006" | |
module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creating... | |
policy_arn: "" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" | |
role: "" => "terraform-20190124232442281800000004" | |
module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: pie-infrastructure-deployment-rio-2019012423244330850000000d) | |
module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442098300000001-2019012423244346300000000f) | |
module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2]: Creation complete after 1s (ID: pie-readonly-20190124232443517100000010) | |
module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442101500000003-20190124232444089400000011) | |
module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442359500000005-20190124232444133600000013) | |
module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442099400000002-20190124232444112500000012) | |
module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442396300000006-20190124232444307900000014) | |
module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]: Creation complete after 1s (ID: terraform-20190124232442281800000004-20190124232444322100000015) | |
Error: Error applying plan: | |
12 error(s) occurred: | |
* module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0]: aws_iam_role_policy_attachment.attach-policy.0: diffs didn't match during apply. This is a bug with Terraform and should be reported as a GitHub Issue. | |
Please include the following information in your report: | |
Terraform Version: 0.11.8 | |
Resource ID: aws_iam_role_policy_attachment.attach-policy.0 | |
Mismatch reason: attribute mismatch: policy_arn | |
Diff One (usually from plan): *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"role":*terraform.ResourceAttrDiff{Old:"pie-readonly", New:"pie-readonly", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, "policy_arn":*terraform.ResourceAttrDiff{Old:"arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess", New:"", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
Diff Two (usually from apply): *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"role":*terraform.ResourceAttrDiff{Old:"", New:"pie-readonly", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
Also include as much context as you can about your config, state, and the steps you performed to trigger this error. | |
* module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442099400000002: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
* module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0]: aws_iam_group_policy_attachment.attach-policy.0: diffs didn't match during apply. This is a bug with Terraform and should be reported as a GitHub Issue. | |
Please include the following information in your report: | |
Terraform Version: 0.11.8 | |
Resource ID: aws_iam_group_policy_attachment.attach-policy.0 | |
Mismatch reason: attribute mismatch: policy_arn | |
Diff One (usually from plan): *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"policy_arn":*terraform.ResourceAttrDiff{Old:"arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess", New:"", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, "group":*terraform.ResourceAttrDiff{Old:"pie-readonly", New:"pie-readonly", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
Diff Two (usually from apply): *terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{"group":*terraform.ResourceAttrDiff{Old:"", New:"pie-readonly", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, Meta:map[string]interface {}(nil)} | |
Also include as much context as you can about your config, state, and the steps you performed to trigger this error. | |
* module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_group_policy_attachment.attach-policy.0: Error attaching policy to IAM group pie-platform-deployment-rio: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachGroupPolicyInput.PolicyArn. | |
* module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442396300000006: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
* module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442359500000005: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
* module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_group_policy_attachment.attach-policy.0: Error attaching policy to IAM group pie-cassandra-deployment-rio: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachGroupPolicyInput.PolicyArn. | |
* module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_group_policy_attachment.attach-policy.0: Error attaching policy to IAM group pie-eks-platform-sre: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachGroupPolicyInput.PolicyArn. | |
* module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_group_policy_attachment.attach-policy.0: Error attaching policy to IAM group pie-infrastructure-deployment-rio: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachGroupPolicyInput.PolicyArn. | |
* module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442098300000001: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
* module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442101500000003: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
* module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]: 1 error(s) occurred: | |
* aws_iam_role_policy_attachment.attach-policy.0: Error attaching policy to IAM Role terraform-20190124232442281800000004: InvalidParameter: 1 validation error(s) found. | |
- minimum field size of 20, AttachRolePolicyInput.PolicyArn. | |
Terraform does not automatically rollback in the face of errors. | |
Instead, your Terraform state file has been partially updated with | |
any resources that successfully completed. Please address the error | |
above and apply again to incrementally change your infrastructure. | |
[root@a2e852b60be1 iam]# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment