Skip to content

Instantly share code, notes, and snippets.

@jpeach
Created January 24, 2019 23:23
Show Gist options
  • Save jpeach/f19a8538231a1f5b46b5fad2220f020c to your computer and use it in GitHub Desktop.
Save jpeach/f19a8538231a1f5b46b5fad2220f020c to your computer and use it in GitHub Desktop.
[root@a2e852b60be1 iam]# terraform init
Initializing modules...
- module.pie-cassandra-policies
- module.pie-deployment-policies
- module.pie-kubernetes-policies
- module.pie-runtime-policies
- module.pie-deployment-api-policies
- module.pie-readonly-policies
- module.pie-BedrockRole
- module.pie-eks-infrastructure-deployment-policies
- module.pie-eks-platform-deployment-policies
- module.pie-eks-cassandra-deployment-policies
- module.pie-eks-platform-sre-policies
- module.pie-eks-kubernetes-sre-policies
- module.pie-eks-cassandra-sre-policies
- module.pie-cassandra
- module.pie-cassandra-devs
- module.pie-deployment
- module.pie-deployment-api
- module.pie-kubernetes
- module.pie-readonly
- module.pie-rio
- module.pie-runtime
- module.pie-eks-infrastructure-deployment
- module.pie-eks-platform-deployment
- module.pie-eks-cassandra-deployment
- module.pie-eks-platform-sre
Initializing provider plugins...
The following providers do not have any version constraints in configuration,
so the latest version was installed.
To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.
* provider.aws: version = "~> 1.56"
* provider.null: version = "~> 2.0"
* provider.template: version = "~> 2.0"
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
[root@a2e852b60be1 iam]# terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
null_resource.dependency_getter: Refreshing state... (ID: 4138979597822394652)
null_resource.dependency_getter: Refreshing state... (ID: 8903278287492822413)
null_resource.dependency_getter: Refreshing state... (ID: 4536374721421871185)
null_resource.dependency_getter: Refreshing state... (ID: 5228100913465771308)
null_resource.dependency_getter: Refreshing state... (ID: 6451221340327041875)
null_resource.dependency_getter: Refreshing state... (ID: 4392765916973514053)
null_resource.dependency_getter: Refreshing state... (ID: 3001085382042151227)
data.template_file.assume-role-BedrockRole: Refreshing state...
data.template_file.assume-role-policy: Refreshing state...
data.template_file.APIRole: Refreshing state...
data.template_file.assume-role-policy-api: Refreshing state...
aws_iam_role.api_user: Refreshing state... (ID: pie.deployment)
data.aws_iam_group.MFARequired: Refreshing state...
aws_iam_policy.AllowProdRole: Refreshing state... (ID: arn:aws:iam::761099851141:policy/Allow-PROD-Role-Access)
aws_iam_user.robert_evans: Refreshing state... (ID: robert.evans)
aws_iam_policy.EKSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly)
aws_iam_user.alice_park: Refreshing state... (ID: alice.park)
aws_iam_user.yug_veluvali: Refreshing state... (ID: yug.veluvali)
data.aws_iam_group.pie-readonly: Refreshing state...
aws_iam_user.james_peach: Refreshing state... (ID: james.peach)
aws_iam_user.rob_meyer: Refreshing state... (ID: rob.meyer)
aws_iam_user.jiten_shah: Refreshing state... (ID: jiten.shah)
aws_iam_policy.KMSReadOnly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly)
aws_iam_user.eduardo_aguilar: Refreshing state... (ID: eduardo.aguilar)
aws_iam_user.deployment_user: Refreshing state... (ID: pie.deployment)
aws_iam_user.douglas_borg: Refreshing state... (ID: douglas.borg)
aws_iam_policy.EKSAdmin: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-EKS-Admin)
aws_iam_policy.KMSFullAccess: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-KMS-Admin)
aws_iam_group.PIE_API_Deployment: Refreshing state... (ID: PIE_API_Deployment)
aws_iam_user.alexius_ludeman: Refreshing state... (ID: alexius.ludeman)
aws_iam_user.jeff_jirsa: Refreshing state... (ID: jeff.jirsa)
aws_iam_user.andrew_forgue: Refreshing state... (ID: andrew.forgue)
aws_iam_user.vishnu_rangayyan: Refreshing state... (ID: vishnu.rangayyan)
aws_iam_user.kenny_ma: Refreshing state... (ID: kenny.ma)
aws_iam_user.greg_changaris: Refreshing state... (ID: greg.changaris)
aws_iam_user.kai_lam: Refreshing state... (ID: kai.lam)
aws_iam_user.andrew_farmer: Refreshing state... (ID: andrew.farmer)
aws_iam_group.target-group: Refreshing state... (ID: pie-runtime)
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment-api)
aws_iam_group.target-group: Refreshing state... (ID: pie-cassandra)
aws_iam_group.target-group: Refreshing state... (ID: pie-rio)
aws_iam_group.target-group: Refreshing state... (ID: PIE_Cassandra_Devs)
aws_iam_group.target-group: Refreshing state... (ID: pie-kubernetes)
aws_iam_group.target-group: Refreshing state... (ID: pie-deployment)
aws_iam_group.target-group: Refreshing state... (ID: pie-readonly)
aws_iam_role.pie-deployment: Refreshing state... (ID: pie-deployment)
aws_iam_policy.KMSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly)
aws_iam_role.pie-bedrock: Refreshing state... (ID: BedrockRole)
aws_iam_role.pie-runtime: Refreshing state... (ID: pie-runtime)
aws_iam_policy.EKSReadOnly-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly)
aws_iam_role.pie-kubernetes: Refreshing state... (ID: pie-kubernetes)
aws_iam_role.pie-deployment-api: Refreshing state... (ID: pie-deployment-api)
aws_iam_role.pie-readonly: Refreshing state... (ID: pie-readonly)
aws_iam_policy.EKSAdmin-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-EKS-Admin)
aws_iam_role_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: pie.deployment-20190121174739287900000001)
aws_iam_policy.KMSFullAccess-consumer: Refreshing state... (ID: arn:aws:iam::124731268014:policy/PIE-KMS-Admin)
aws_iam_role_policy.KMSFullAccess: Refreshing state... (ID: pie.deployment:Allow-KMS-key-management)
aws_iam_role_policy_attachment.S3Fullaccess: Refreshing state... (ID: pie.deployment-20190121174739310600000003)
aws_iam_role.pie-cassandra: Refreshing state... (ID: pie-cassandra)
aws_iam_role_policy_attachment.EC2Fullaccess: Refreshing state... (ID: pie.deployment-20190121174740440600000004)
aws_iam_role_policy.EKSFullAccess: Refreshing state... (ID: pie.deployment:Allow-EKS-cluster-management)
aws_iam_role_policy_attachment.IAMFullaccess: Refreshing state... (ID: pie.deployment-20190121174739310300000002)
aws_iam_user_group_membership.alice_park-groups: Refreshing state... (ID: terraform-2019012117475247460000000f)
aws_iam_user_group_membership.yug_veluvali-groups: Refreshing state... (ID: terraform-20190121183055604700000004)
aws_iam_user_group_membership.james_peach-groups: Refreshing state... (ID: terraform-20190121183056042600000006)
aws_iam_user_group_membership.robert_evans-groups: Refreshing state... (ID: terraform-20190121174752474600000010)
aws_iam_user_group_membership.rob_meyer-groups: Refreshing state... (ID: terraform-2019012117475964250000001b)
aws_iam_user_group_membership.eduardo_aguilar-groups: Refreshing state... (ID: terraform-20190121174746257900000008)
aws_iam_group_policy_attachment.AmazonDynamoDBFullAccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626940000000b)
aws_iam_group_membership.PIE_API_Group: Refreshing state... (ID: PIE API group membership)
aws_iam_user_group_membership.alexius_ludeman-groups: Refreshing state... (ID: terraform-20190121174740479900000005)
aws_iam_group_policy_attachment.AllowProdRole: Refreshing state... (ID: PIE_API_Deployment-20190121174746265600000009)
aws_iam_user_group_membership.jiten_shah-groups: Refreshing state... (ID: terraform-20190122000022908800000011)
aws_iam_group_policy_attachment.EC2Fullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474626700000000a)
aws_iam_group_policy_attachment.S3Fullaccess: Refreshing state... (ID: PIE_API_Deployment-20190121174741670800000007)
aws_iam_user_group_membership.douglas_borg-groups: Refreshing state... (ID: terraform-20190121174752480200000011)
aws_iam_user_group_membership.jeff_jirsa-groups: Refreshing state... (ID: terraform-20190121183055615600000005)
aws_iam_group_policy_attachment.IAMFullaccess: Refreshing state... (ID: PIE_API_Deployment-2019012117474628190000000c)
aws_iam_user_group_membership.greg_changaris-groups: Refreshing state... (ID: terraform-20190121194136809300000002)
aws_iam_user_group_membership.vishnu_rangayyan-groups: Refreshing state... (ID: terraform-20190121174741508400000006)
aws_iam_user_group_membership.andrew_forgue-groups: Refreshing state... (ID: terraform-20190121194136832200000003)
aws_iam_user_group_membership.kenny_ma-groups: Refreshing state... (ID: terraform-20190121174759021400000019)
aws_iam_user_group_membership.kai_lam-groups: Refreshing state... (ID: terraform-20190110213748910300000001)
aws_iam_user_group_membership.andrew_farmer-groups: Refreshing state... (ID: terraform-20190121194137198200000004)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-rio-20190123012539533200000003)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-rio-20190123012539568100000008)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-rio-2019012301254122840000000b)
data.template_file.PIE-assume-kubernetes-template: Refreshing state...
data.template_file.PIE-assume-deployment-template: Refreshing state...
data.template_file.PIE-assume-deployment-api-template: Refreshing state...
data.template_file.PIE-assume-runtime-template: Refreshing state...
data.template_file.PIE-assume-readonly-template: Refreshing state...
data.template_file.PIE-assume-cassandra-template: Refreshing state...
aws_iam_user_group_membership.pie-deployment-api: Refreshing state... (ID: terraform-20190109222858311100000003)
aws_iam_role_policy_attachment.attach-policy: Refreshing state... (ID: BedrockRole-20190123000407582700000001)
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190122003251843300000005)
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-20190122003251776200000003)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190122003251844100000006)
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190122003251722800000001)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190122003251752000000002)
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190122003251848100000007)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190122003251839900000004)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-20190122003251848800000008)
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190109230009051900000006)
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190109230009048600000005)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190109230009053200000007)
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190109230009048300000003)
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190109230009048400000004)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-20190109230009038500000001)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190109230009041500000002)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190109211630243800000001)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190109223608956000000006)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190109223611040500000015)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190109223610097700000012)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-20190109223608950800000004)
aws_iam_role_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-20190109223608956300000007)
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019010922360896210000000a)
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-20190109223610116700000014)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190109223610081200000011)
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190109223608960100000008)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-2019010922361005810000000f)
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-2019010922361004400000000c)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-20190109223608960600000009)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-2019010922361005690000000e)
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-20190109223120961200000001)
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190109223120992900000007)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-20190109223120968500000002)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-20190109223120975600000004)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-20190109223121040900000008)
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190109223120975500000003)
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-20190109223120984500000006)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190109223120975800000005)
null_resource.group_dependency_setter: Refreshing state... (ID: 4100980539342263196)
aws_iam_policy.PIE-assume-pie-kubernetes: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-kubernetes)
aws_iam_role_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190109223608943300000003)
aws_iam_role_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190109223608938500000001)
aws_iam_role_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-2019010922360999650000000b)
aws_iam_role_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190109223608943000000002)
aws_iam_role_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-20190109223610102600000013)
aws_iam_role_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190109223610075600000010)
aws_iam_role_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-2019010922361004850000000d)
aws_iam_role_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190109223608953100000005)
aws_iam_policy.PIE-assume-pie-deployment: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment)
null_resource.group_dependency_setter: Refreshing state... (ID: 6346616545391941851)
aws_iam_policy.PIE-assume-pie-deployment-api: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-deployment-api)
aws_iam_policy.PIE-assume-pie-runtime: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-runtime)
aws_iam_policy.PIE-assume-pie-readonly: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly)
null_resource.group_dependency_setter: Refreshing state... (ID: 6991837947934083645)
null_resource.group_dependency_setter: Refreshing state... (ID: 4064315673444490507)
null_resource.group_dependency_setter: Refreshing state... (ID: 6484923612879353)
aws_iam_policy.PIE-assume-pie-cassandra: Refreshing state... (ID: arn:aws:iam::761099851141:policy/PIE-assume-pie-cassandra)
null_resource.group_dependency_setter: Refreshing state... (ID: 9214406816689215044)
null_resource.group_dependency_setter: Refreshing state... (ID: 3960533433938890249)
null_resource.role_dependency_setter: Refreshing state... (ID: 8007655905577911863)
null_resource.role_dependency_setter: Refreshing state... (ID: 3103865056339632082)
null_resource.role_dependency_setter: Refreshing state... (ID: 6577477338050065021)
null_resource.role_dependency_setter: Refreshing state... (ID: 5039920784566077236)
null_resource.role_dependency_setter: Refreshing state... (ID: 3579762471513605910)
null_resource.role_dependency_setter: Refreshing state... (ID: 7787071005550107267)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-kubernetes-20190122000016073200000001)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-kubernetes-20190121174752940600000014)
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-kubernetes-20190122000016075900000003)
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-kubernetes-2019012200002239360000000d)
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-kubernetes-2019012200003454910000001d)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-kubernetes-2019012117475244860000000e)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-kubernetes-20190122000029413700000017)
aws_iam_group_policy_attachment.attach-policy[9]: Refreshing state... (ID: pie-kubernetes-2019012200001834140000000a)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-kubernetes-20190121174752503700000013)
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-kubernetes-2019012200002240000000000e)
null_resource.role_dependency_setter: Refreshing state... (ID: 3174389806157649060)
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-20190122000016089400000005)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-20190121174810722800000025)
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-20190122000029497900000019)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-20190121174804554300000020)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-2019012117480451820000001d)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-20190121174805191100000024)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-20190122000016129400000009)
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-20190122000016074600000002)
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-20190122000016120900000008)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-runtime-20190121174804563500000022)
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-runtime-20190122000016083500000004)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-runtime-2019012117475972530000001c)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-runtime-2019012117480451980000001e)
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-runtime-2019012200002992160000001b)
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-runtime-20190122000016090400000006)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-runtime-2019012117480455080000001f)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-runtime-20190122000016101300000007)
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-runtime-2019012200002237280000000b)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-deployment-api-20190121174805103400000023)
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-deployment-api-20190122000028282200000014)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-deployment-api-20190122000029491100000018)
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-deployment-api-20190122000023330400000013)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-deployment-api-20190121174804556100000021)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-deployment-api-20190121174758492300000018)
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-deployment-api-20190122000028722500000016)
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-deployment-api-20190122000022861700000010)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-deployment-api-2019012117475902240000001a)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-readonly-20190123012539524600000001)
aws_iam_group_policy_attachment.attach-policy[6]: Refreshing state... (ID: pie-readonly-2019012301254122960000000c)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-readonly-20190123012539567400000004)
aws_iam_group_policy_attachment.attach-policy[5]: Refreshing state... (ID: pie-readonly-20190123012539568200000009)
aws_iam_group_policy_attachment.attach-policy[8]: Refreshing state... (ID: pie-readonly-20190123012539567700000006)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-readonly-20190123012539533000000002)
aws_iam_group_policy_attachment.attach-policy[7]: Refreshing state... (ID: pie-readonly-20190123012539568000000007)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-readonly-2019012301253956820000000a)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-readonly-20190123012539567600000005)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: pie-cassandra-20190122000028301900000015)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: pie-cassandra-20190121174753632200000016)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: pie-cassandra-20190121174752940900000015)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: PIE_Cassandra_Devs-2019012200002238420000000c)
aws_iam_group_policy_attachment.attach-policy[3]: Refreshing state... (ID: pie-cassandra-2019012200002285860000000f)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055193500000002)
aws_iam_group_policy_attachment.attach-policy[2]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055207900000003)
aws_iam_group_policy_attachment.attach-policy[1]: Refreshing state... (ID: pie-cassandra-20190121174758486900000017)
aws_iam_group_policy_attachment.attach-policy[0]: Refreshing state... (ID: PIE_Cassandra_Devs-20190121183055183000000001)
aws_iam_group_policy_attachment.attach-policy[4]: Refreshing state... (ID: PIE_Cassandra_Devs-20190122000023169300000012)
------------------------------------------------------------------------
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
- destroy
-/+ destroy and then create replacement
Terraform will perform the following actions:
+ aws_iam_role.pie-eks-cassandra-deployment
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Cassandra deployment"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ aws_iam_role.pie-eks-cassandra-sre
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Cassandra SRE"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ aws_iam_role.pie-eks-infrastructure-deployment
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Infrastructure deployment"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ aws_iam_role.pie-eks-kubernetes-sre
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Kubernetes SRE"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ aws_iam_role.pie-eks-platform-deployment
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Platform deployment"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ aws_iam_role.pie-eks-platform-sre
id: <computed>
arn: <computed>
assume_role_policy: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [ \"arn:aws:iam::166025961812:root\", \"arn:aws:iam::761099851141:root\" ]\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}\n"
create_date: <computed>
description: "Role for EKS Platform SRE"
force_detach_policies: "true"
max_session_duration: "14400"
name: <computed>
path: "/"
unique_id: <computed>
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-cassandra-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-cassandra-deployment-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-cassandra-deployment-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-cassandra-deployment-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-cassandra-deployment.aws_iam_group.target-group
id: <computed>
arn: <computed>
name: "pie-cassandra-deployment-rio"
path: "/"
unique_id: <computed>
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[0]
id: <computed>
group: "pie-cassandra-deployment-rio"
+ module.pie-eks-cassandra-deployment.aws_iam_group_policy_attachment.attach-policy[1]
id: <computed>
group: "pie-cassandra-deployment-rio"
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly"
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-cassandra-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-cassandra-sre-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-cassandra-sre-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-cassandra-sre-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-infrastructure-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-infrastructure-deployment-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-infrastructure-deployment-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-infrastructure-deployment-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-infrastructure-deployment.aws_iam_group.target-group
id: <computed>
arn: <computed>
name: "pie-infrastructure-deployment-rio"
path: "/"
unique_id: <computed>
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[0]
id: <computed>
group: "pie-infrastructure-deployment-rio"
+ module.pie-eks-infrastructure-deployment.aws_iam_group_policy_attachment.attach-policy[1]
id: <computed>
group: "pie-infrastructure-deployment-rio"
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly"
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-kubernetes-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-kubernetes-sre-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-kubernetes-sre-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-kubernetes-sre-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-platform-deployment-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-platform-deployment-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-platform-deployment-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-platform-deployment-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-platform-deployment.aws_iam_group.target-group
id: <computed>
arn: <computed>
name: "pie-platform-deployment-rio"
path: "/"
unique_id: <computed>
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[0]
id: <computed>
group: "pie-platform-deployment-rio"
+ module.pie-eks-platform-deployment.aws_iam_group_policy_attachment.attach-policy[1]
id: <computed>
group: "pie-platform-deployment-rio"
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly"
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[0]
id: <computed>
role: "${var.aws-iam-object-name}"
+ module.pie-eks-platform-sre-policies.aws_iam_role_policy_attachment.attach-policy[1]
id: <computed>
policy_arn: "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly"
role: "${var.aws-iam-object-name}"
+ module.pie-eks-platform-sre-policies.null_resource.dependency_getter
id: <computed>
+ module.pie-eks-platform-sre-policies.null_resource.group_dependency_setter
id: <computed>
+ module.pie-eks-platform-sre-policies.null_resource.role_dependency_setter
id: <computed>
+ module.pie-eks-platform-sre.aws_iam_group.target-group
id: <computed>
arn: <computed>
name: "pie-eks-platform-sre"
path: "/"
unique_id: <computed>
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[0]
id: <computed>
group: "pie-eks-platform-sre"
+ module.pie-eks-platform-sre.aws_iam_group_policy_attachment.attach-policy[1]
id: <computed>
group: "pie-eks-platform-sre"
policy_arn: "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly"
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[0] (new resource required)
id: "pie-readonly-20190122003251848800000008" => <computed> (forces new resource)
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource)
role: "pie-readonly" => "pie-readonly"
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[1] (new resource required)
id: "pie-readonly-20190122003251844100000006" => <computed> (forces new resource)
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-EKS-ReadOnly" (forces new resource)
role: "pie-readonly" => "pie-readonly"
-/+ module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[2] (new resource required)
id: "pie-readonly-20190122003251839900000004" => <computed> (forces new resource)
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::124731268014:policy/PIE-KMS-ReadOnly" (forces new resource)
role: "pie-readonly" => "pie-readonly"
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[3]
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[4]
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[5]
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[6]
- module.pie-readonly-policies.aws_iam_role_policy_attachment.attach-policy[7]
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[0] (new resource required)
id: "pie-readonly-2019012301253956820000000a" => <computed> (forces new resource)
group: "pie-readonly" => "pie-readonly"
policy_arn: "arn:aws:iam::aws:policy/AWSDirectConnectReadOnlyAccess" => "" (forces new resource)
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[1] (new resource required)
id: "pie-readonly-20190123012539567400000004" => <computed> (forces new resource)
group: "pie-readonly" => "pie-readonly"
policy_arn: "arn:aws:iam::aws:policy/AmazonDynamoDBReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-EKS-ReadOnly" (forces new resource)
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[2] (new resource required)
id: "pie-readonly-20190123012539533000000002" => <computed> (forces new resource)
group: "pie-readonly" => "pie-readonly"
policy_arn: "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-KMS-ReadOnly" (forces new resource)
-/+ module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[3] (new resource required)
id: "pie-readonly-20190123012539524600000001" => <computed> (forces new resource)
group: "pie-readonly" => "pie-readonly"
policy_arn: "arn:aws:iam::aws:policy/IAMReadOnlyAccess" => "arn:aws:iam::761099851141:policy/PIE-assume-pie-readonly" (forces new resource)
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[4]
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[5]
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[6]
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[7]
- module.pie-readonly.aws_iam_group_policy_attachment.attach-policy[8]
Plan: 55 to add, 0 to change, 17 to destroy.
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
[root@a2e852b60be1 iam]#
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment