Created
March 11, 2022 05:56
-
-
Save poojaac/a4587de0f5a11bd18933fa794edad5c7 to your computer and use it in GitHub Desktop.
terraform plan output
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Initializing modules... | |
Downloading registry.terraform.io/terraform-aws-modules/acm/aws 3.2.0 for acm... | |
- acm in .terraform/modules/acm | |
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_active_directory.git for ad... | |
- ad in .terraform/modules/ad/terraform | |
Downloading registry.terraform.io/terraform-aws-modules/alb/aws 6.5.0 for alb... | |
- alb in .terraform/modules/alb | |
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for alb_record... | |
- alb_record in .terraform/modules/alb_record/modules/records | |
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for alb_sg... | |
- alb_sg in .terraform/modules/alb_sg | |
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for api_record... | |
- api_record in .terraform/modules/api_record/modules/records | |
Downloading registry.terraform.io/lgallard/cognito-user-pool/aws 0.14.2 for aws_cognito_user_pool... | |
- aws_cognito_user_pool in .terraform/modules/aws_cognito_user_pool | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for aws_load_balancer_controller... | |
- aws_load_balancer_controller in .terraform/modules/aws_load_balancer_controller/modules/iam-assumable-role-with-oidc | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for aws_load_balancer_controller_policy... | |
- aws_load_balancer_controller_policy in .terraform/modules/aws_load_balancer_controller_policy/modules/iam-policy | |
Downloading registry.terraform.io/trussworks/cloudtrail/aws 4.3.0 for cloudtrail... | |
- cloudtrail in .terraform/modules/cloudtrail | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for cluster_autoscaler... | |
- cluster_autoscaler in .terraform/modules/cluster_autoscaler/modules/iam-assumable-role-with-oidc | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for cluster_autoscaler_policy... | |
- cluster_autoscaler_policy in .terraform/modules/cluster_autoscaler_policy/modules/iam-policy | |
Downloading registry.terraform.io/terraform-aws-modules/acm/aws 3.2.0 for cognito_acm... | |
- cognito_acm in .terraform/modules/cognito_acm | |
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for console_record... | |
- console_record in .terraform/modules/console_record/modules/records | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for developer_policy... | |
- developer_policy in .terraform/modules/developer_policy/modules/iam-policy | |
Downloading registry.terraform.io/terraform-aws-modules/eks/aws 18.2.4 for eks_cluster... | |
- eks_cluster in .terraform/modules/eks_cluster | |
- eks_cluster.eks_managed_node_group in .terraform/modules/eks_cluster/modules/eks-managed-node-group | |
- eks_cluster.eks_managed_node_group.user_data in .terraform/modules/eks_cluster/modules/_user_data | |
- eks_cluster.fargate_profile in .terraform/modules/eks_cluster/modules/fargate-profile | |
- eks_cluster.self_managed_node_group in .terraform/modules/eks_cluster/modules/self-managed-node-group | |
- eks_cluster.self_managed_node_group.user_data in .terraform/modules/eks_cluster/modules/_user_data | |
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_fsx.git for fsx... | |
- fsx in .terraform/modules/fsx/terraform | |
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for fsx_sg... | |
- fsx_sg in .terraform/modules/fsx_sg | |
Downloading registry.terraform.io/terraform-aws-modules/lambda/aws 2.31.0 for lambda_security_group_change_alert... | |
- lambda_security_group_change_alert in .terraform/modules/lambda_security_group_change_alert | |
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.2.0 for lambda_sg... | |
- lambda_sg in .terraform/modules/lambda_sg | |
Downloading registry.terraform.io/terraform-aws-modules/ec2-instance/aws 3.4.0 for license_server... | |
- license_server in .terraform/modules/license_server | |
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for license_server_policy... | |
- license_server_policy in .terraform/modules/license_server_policy/modules/iam-policy | |
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for license_server_sg... | |
- license_server_sg in .terraform/modules/license_server_sg | |
Downloading registry.terraform.io/terraform-aws-modules/alb/aws 6.2.0 for nlb... | |
- nlb in .terraform/modules/nlb | |
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_alarm-baseline... | |
- secure-baseline_alarm-baseline in .terraform/modules/secure-baseline_alarm-baseline/modules/alarm-baseline | |
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_ebs-baseline... | |
- secure-baseline_ebs-baseline in .terraform/modules/secure-baseline_ebs-baseline/modules/ebs-baseline | |
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_s3-baseline... | |
- secure-baseline_s3-baseline in .terraform/modules/secure-baseline_s3-baseline/modules/s3-baseline | |
Downloading registry.terraform.io/terraform-aws-modules/sns/aws 3.2.0 for sns_security_group_change_alert... | |
- sns_security_group_change_alert in .terraform/modules/sns_security_group_change_alert | |
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_spotinst_ocean.git for spotinst_ocean... | |
- spotinst_ocean in .terraform/modules/spotinst_ocean | |
Downloading registry.terraform.io/spotinst/ocean-controller/spotinst 0.38.0 for spotinst_ocean.ocean-controller... | |
- spotinst_ocean.ocean-controller in .terraform/modules/spotinst_ocean.ocean-controller | |
Downloading registry.terraform.io/terraform-aws-modules/vpc/aws 3.10.0 for vpc... | |
- vpc in .terraform/modules/vpc | |
Downloading registry.terraform.io/terraform-aws-modules/vpc/aws 3.12.0 for vpc_endpoints... | |
- vpc_endpoints in .terraform/modules/vpc_endpoints/modules/vpc-endpoints | |
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_waf_webaclv2.git for waf... | |
- waf in .terraform/modules/waf/terraform | |
Initializing the backend... | |
Successfully configured the backend "s3"! Terraform will automatically | |
use this backend unless the backend configuration changes. | |
Initializing provider plugins... | |
- Reusing previous version of terraform-aws-modules/http from the dependency lock file | |
- Reusing previous version of hashicorp/aws from the dependency lock file | |
- Reusing previous version of hashicorp/cloudinit from the dependency lock file | |
- Reusing previous version of spotinst/spotinst from the dependency lock file | |
- Reusing previous version of cyrilgdn/postgresql from the dependency lock file | |
- Reusing previous version of gavinbunney/kubectl from the dependency lock file | |
- Reusing previous version of hashicorp/local from the dependency lock file | |
- Finding hashicorp/tls versions matching ">= 2.2.0"... | |
- Reusing previous version of hashicorp/external from the dependency lock file | |
- Reusing previous version of hashicorp/kubernetes from the dependency lock file | |
- Reusing previous version of hashicorp/null from the dependency lock file | |
- Reusing previous version of fluxcd/flux from the dependency lock file | |
- Reusing previous version of integrations/github from the dependency lock file | |
- Reusing previous version of hashicorp/random from the dependency lock file | |
- Installing hashicorp/aws v3.74.3... | |
- Installed hashicorp/aws v3.74.3 (signed by HashiCorp) | |
- Installing hashicorp/external v2.2.0... | |
- Installed hashicorp/external v2.2.0 (signed by HashiCorp) | |
- Installing spotinst/spotinst v1.65.0... | |
- Installed spotinst/spotinst v1.65.0 (self-signed, key ID D356E7D693D0F6BA) | |
- Installing hashicorp/kubernetes v2.8.0... | |
- Installed hashicorp/kubernetes v2.8.0 (signed by HashiCorp) | |
- Installing hashicorp/null v3.1.0... | |
- Installed hashicorp/null v3.1.0 (signed by HashiCorp) | |
- Installing fluxcd/flux v0.11.2... | |
- Installed fluxcd/flux v0.11.2 (self-signed, key ID D5D3316A880BB5B9) | |
- Installing integrations/github v4.20.0... | |
- Installed integrations/github v4.20.0 (signed by a HashiCorp partner, key ID 38027F80D7FD5FB2) | |
- Installing hashicorp/random v3.1.0... | |
- Installed hashicorp/random v3.1.0 (signed by HashiCorp) | |
- Installing terraform-aws-modules/http v2.4.1... | |
- Installed terraform-aws-modules/http v2.4.1 (self-signed, key ID B2C1C0641B6B0EB7) | |
- Installing hashicorp/cloudinit v2.2.0... | |
- Installed hashicorp/cloudinit v2.2.0 (signed by HashiCorp) | |
- Installing hashicorp/tls v3.1.0... | |
- Installed hashicorp/tls v3.1.0 (signed by HashiCorp) | |
- Installing cyrilgdn/postgresql v1.15.0... | |
- Installed cyrilgdn/postgresql v1.15.0 (self-signed, key ID 3918DD444A3876A6) | |
- Installing gavinbunney/kubectl v1.13.1... | |
- Installed gavinbunney/kubectl v1.13.1 (self-signed, key ID AD64217B5ADD572F) | |
- Installing hashicorp/local v2.1.0... | |
- Installed hashicorp/local v2.1.0 (signed by HashiCorp) | |
Partner and community providers are signed by their developers. | |
If you'd like to know more about provider signing, you can read about it here: | |
https://www.terraform.io/docs/cli/plugins/signing.html | |
Terraform has made some changes to the provider dependency selections recorded | |
in the .terraform.lock.hcl file. Review those changes and commit them to your | |
version control system if they represent changes you intended to make. | |
Terraform has been successfully initialized! | |
You may now begin working with Terraform. Try running "terraform plan" to see | |
any changes that are required for your infrastructure. All Terraform commands | |
should now work. | |
If you ever set or change modules or backend configuration for Terraform, | |
rerun this command to reinitialize your working directory. If you forget, other | |
commands will detect it and remind you to do so if necessary. | |
mkdir infra | |
******************************************* | |
* ACTION: PLAN | |
* ENV: infra | |
******************************************* | |
export TF_LOG_PROVIDER_KUBERNETES=TRACE && terraform plan --var-file=./environments/infra/variables.tfvars -out infra/plan.out | |
random_string.suffix: Refreshing state... [id=9ebEuuXn] | |
aws_security_group_rule.workers_ingress_alb_https[0]: Refreshing state... [id=sgrule-4035290231] | |
aws_ssm_parameter.eks_cluster_id[0]: Refreshing state... [id=/ecs/admin/references/eks-cluster-id] | |
module.vpc.aws_vpc.this[0]: Refreshing state... [id=vpc-04ed1fe71cb1768d9] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.128.0/19"]: Refreshing state... [id=sgrule-3364777202] | |
module.eks_cluster.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930446200000007] | |
aws_security_group_rule.workers_ingress_self[0]: Refreshing state... [id=sgrule-1300890230] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.160.0/19"]: Refreshing state... [id=sgrule-2133535855] | |
aws_security_group_rule.workers_ingress_nlb_https[0]: Refreshing state... [id=sgrule-2779579824] | |
aws_security_group_rule.workers_ingress_nlb_http[0]: Refreshing state... [id=sgrule-2260289600] | |
aws_security_group_rule.workers_ingress_self_https[0]: Refreshing state... [id=sgrule-3038919760] | |
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930455800000008] | |
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930440900000005] | |
aws_security_group_rule.workers_ingress_cluster[0]: Refreshing state... [id=sgrule-4267809150] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.3.0/24"]: Refreshing state... [id=sgrule-1046009596] | |
module.eks_cluster.aws_iam_policy.cluster_elb_sl_role_creation[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/infra-9ebEuuXn-elb-sl-role-creation20210617055928401400000002] | |
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930443200000006] | |
module.eks_cluster.aws_iam_role.cluster[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.64.0/19"]: Refreshing state... [id=sgrule-4191969721] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.1.0/24"]: Refreshing state... [id=sgrule-2848442325] | |
aws_security_group_rule.workers_ingress_cluster_https[0]: Refreshing state... [id=sgrule-3079546765] | |
aws_security_group_rule.workers_egress_internet[0]: Refreshing state... [id=sgrule-2142428300] | |
aws_security_group_rule.cluster_egress_internet[0]: Refreshing state... [id=sgrule-3642874007] | |
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.2.0/24"]: Refreshing state... [id=sgrule-2553273672] | |
aws_security_group_rule.workers_ingress_alb_http[0]: Refreshing state... [id=sgrule-2139738958] | |
aws_security_group_rule.cluster_https_worker_ingress[0]: Refreshing state... [id=sgrule-2344680062] | |
aws_cloudwatch_event_rule.securityGroupChangeAlerts[0]: Refreshing state... [id=capture-security-group-events] | |
aws_kms_key.fsx_key[0]: Refreshing state... [id=9d449e10-accb-4a3e-824a-c7909a20c2ce] | |
aws_ssm_parameter.fsx_ad_name[0]: Refreshing state... [id=/ecs/infra/references/fsx-ad-name] | |
module.acm.aws_acm_certificate.this[0]: Refreshing state... [id=arn:aws:acm:eu-central-1:446102611596:certificate/b48041ac-f82c-4b0e-9ab4-2cfaa27913e1] | |
module.secure-baseline_s3-baseline.aws_s3_account_public_access_block.this: Refreshing state... [id=446102611596] | |
module.aws_cognito_user_pool.aws_cognito_user_pool.pool[0]: Refreshing state... [id=eu-central-1_aCCErzui2] | |
module.secure-baseline_ebs-baseline.aws_ebs_encryption_by_default.this[0]: Refreshing state... [id=terraform-20210909040412407800000002] | |
aws_iam_role.license_server_role[0]: Refreshing state... [id=License-Server-Role] | |
aws_iam_service_linked_role.autoscaling: Refreshing state... [id=arn:aws:iam::446102611596:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling] | |
aws_kms_key.eks_secrets[0]: Refreshing state... [id=2486388e-883e-4f78-8ffd-8d69af2037cc] | |
aws_wafv2_ip_set.custom_ip_set: Refreshing state... [id=b6280fe4-6230-45d8-8d60-a73a3d3c7f59] | |
module.vpc.aws_iam_role.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=vpc-flow-log-role-20210617033802033000000002] | |
module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/vpc-flow-log-to-cloudwatch-20210617033802029800000001] | |
module.cognito_acm.aws_acm_certificate.this[0]: Refreshing state... [id=arn:aws:acm:us-east-1:446102611596:certificate/d4d73301-65da-4e69-9271-a0611ef0e875] | |
module.lambda_security_group_change_alert.local_file.archive_plan[0]: Refreshing state... [id=150d49cc78a6c12d95b31d3732b3a0f8df5b8acb] | |
module.lambda_security_group_change_alert.aws_iam_role.lambda[0]: Refreshing state... [id=security-group-change-alert] | |
aws_iam_role.apigateway_cloudwatch[0]: Refreshing state... [id=api_gateway_cloudwatch_global] | |
aws_kms_alias.fsx_key_alias[0]: Refreshing state... [id=alias/fsx-key] | |
module.cloudtrail.aws_iam_role.cloudtrail_cloudwatch_role: Refreshing state... [id=cloudtrail-cloudwatch-logs-role] | |
module.aws_cognito_user_pool.aws_cognito_resource_server.resource[0]: Refreshing state... [id=eu-central-1_aCCErzui2|backend] | |
aws_kms_alias.eks_secrets[0]: Refreshing state... [id=alias/eks] | |
aws_security_group.cluster[0]: Refreshing state... [id=sg-068d218aae0fae801] | |
module.acm.aws_route53_record.validation[0]: Refreshing state... [id=Z01486513LYZWD5WGZUTS__bb7ca7f0a0c0c84bd5738ddb0628f077.infra.cloudway.etas.com._CNAME] | |
aws_security_group.workers[0]: Refreshing state... [id=sg-044b7d16e89cab45f] | |
aws_ssm_parameter.cognito_userpool_id[0]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-id] | |
module.lambda_security_group_change_alert.null_resource.archive[0]: Refreshing state... [id=5374893334140613166] | |
module.vpc.aws_internet_gateway.this[0]: Refreshing state... [id=igw-0f5f030721476ee05] | |
module.vpc.aws_route_table.database[0]: Refreshing state... [id=rtb-0d51f81afb5602ee5] | |
module.vpc.aws_subnet.intra[0]: Refreshing state... [id=subnet-0fdfdc46447d56b6b] | |
module.vpc.aws_subnet.intra[1]: Refreshing state... [id=subnet-0fc900420380f46a4] | |
module.vpc.aws_subnet.intra[2]: Refreshing state... [id=subnet-0897db4885a857f6a] | |
module.vpc.aws_cloudwatch_log_group.flow_log[0]: Refreshing state... [id=/aws/vpc-flow-log/vpc-04ed1fe71cb1768d9] | |
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-05121163165ed35b4] | |
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-025c460c183843d9e] | |
module.vpc.aws_subnet.public[2]: Refreshing state... [id=subnet-0425271fe3da677ae] | |
module.vpc.aws_route_table.intra[0]: Refreshing state... [id=rtb-0b8d0fb108b0e40cc] | |
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-0b02d6b9ab00ed33e] | |
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-0dc7ec61ef108a0fa] | |
module.vpc.aws_subnet.private[2]: Refreshing state... [id=subnet-02f052b6119a0305d] | |
module.vpc.aws_subnet.database[0]: Refreshing state... [id=subnet-04f20cc29f72faf9b] | |
module.vpc.aws_subnet.database[1]: Refreshing state... [id=subnet-07d9486af54aff64e] | |
module.vpc.aws_subnet.database[2]: Refreshing state... [id=subnet-0147305f243af3097] | |
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-08f88cc0d399a0d90] | |
module.alb.aws_lb_target_group.main[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:targetgroup/infra-2021061703425543700000000b/c4e05c8865943a05] | |
module.alb_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-0a7eaf01ac1062a40] | |
module.lambda_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-0f1e9896413b48913] | |
module.fsx_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-01a266c932d799aef] | |
module.license_server_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-028ebfe4d12e3bf04] | |
aws_iam_role.workers[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[0]: Refreshing state... [id=5o4peu5sl31271ohm3k2jmdno0] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[5]: Refreshing state... [id=44cqpa5j0bv3ee6nr99q3cue30] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[8]: Refreshing state... [id=5n2spdbv94rdn65ckcjh6m8cgu] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[4]: Refreshing state... [id=7j3srcobdnvflga4dld3e1vss7] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[7]: Refreshing state... [id=66oede9vra01k47lu6fojvmrqo] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[3]: Refreshing state... [id=2qrm3u3m162blro2vohc21q2c3] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[10]: Refreshing state... [id=79c7iame0fd23h6kcv506onk0s] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[9]: Refreshing state... [id=6bada5ns2fi5gtimo6ni98iul3] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[1]: Refreshing state... [id=3qrvtdj09ptcpviep68sgp4ud5] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[11]: Refreshing state... [id=7g4ir6r2jbbd6crk7vl5h9gviq] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[2]: Refreshing state... [id=7tc9hp2hagkarrmo121rs80fl9] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[6]: Refreshing state... [id=n4kijp3j08rjfh480e8e4c7vh] | |
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-0677d55b39c9f6b9b] | |
module.cloudtrail.aws_iam_policy.cloudtrail_cloudwatch_logs: Refreshing state... [id=arn:aws:iam::446102611596:policy/cloudtrail-cloudwatch-logs-policy] | |
module.cloudtrail.aws_kms_key.cloudtrail: Refreshing state... [id=320e2987-a581-485c-a13a-d6758bc72645] | |
module.vpc.aws_route.database_internet_gateway[0]: Refreshing state... [id=r-rtb-0d51f81afb5602ee51080289494] | |
aws_iam_role_policy_attachment.ssm_managed_policy[0]: Refreshing state... [id=License-Server-Role-20220204133649772500000001] | |
aws_iam_instance_profile.license_server_profile[0]: Refreshing state... [id=License-Server-Role] | |
module.vpc.aws_route_table_association.intra[1]: Refreshing state... [id=rtbassoc-0d4dc6b81e42c302a] | |
module.vpc.aws_route_table_association.intra[2]: Refreshing state... [id=rtbassoc-0d1b23cf9c213cee5] | |
module.vpc.aws_route_table_association.intra[0]: Refreshing state... [id=rtbassoc-08fdcefc344fd6519] | |
aws_kms_key.cloudwatch[0]: Refreshing state... [id=e8a79ece-8ec1-42d4-a1a5-16cd3a05e7e5] | |
module.vpc.aws_db_subnet_group.database[0]: Refreshing state... [id=infra-vpc] | |
module.cognito_acm.aws_route53_record.validation[0]: Refreshing state... [id=Z01486513LYZWD5WGZUTS__8ca76a05dfba40cad5e88a32e15f7558.auth.infra.cloudway.etas.com._CNAME] | |
module.vpc.aws_route_table_association.public[2]: Refreshing state... [id=rtbassoc-06c6194e0a9ab70e9] | |
module.waf.aws_wafv2_web_acl.main[0]: Refreshing state... [id=bc5ffcfe-59f0-4228-8233-e4fcabe14b1d] | |
module.vpc.aws_route.public_internet_gateway[0]: Refreshing state... [id=r-rtb-08f88cc0d399a0d901080289494] | |
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-076a73e8a21c3f46b] | |
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-035071501cf990d91] | |
module.lambda_security_group_change_alert.aws_s3_bucket_object.lambda_package[0]: Refreshing state... [id=builds/59b4a8bba29815935f2f3cf3caef79d40416ad81c543f859c4e93610e54771c5.zip] | |
aws_kms_key.ebs[0]: Refreshing state... [id=9bc845b1-c7f1-412f-8dbc-cb6d14943145] | |
github_repository_file.kustomize: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/kustomization.yaml] | |
github_repository_file.install: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/gotk-components.yaml] | |
github_repository_file.sync: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/gotk-sync.yaml] | |
module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=vpc-flow-log-role-20210617033802033000000002-20210617033821910100000005] | |
aws_api_gateway_account.this[0]: Refreshing state... [id=api-gateway-account] | |
aws_iam_role_policy_attachment.apigateway_cloudwatch[0]: Refreshing state... [id=api_gateway_cloudwatch_global-20210621060531543400000001] | |
module.acm.aws_acm_certificate_validation.this[0]: Refreshing state... [id=2021-06-17 03:38:48 +0000 UTC] | |
module.lambda_security_group_change_alert.aws_iam_policy.additional_inline[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/security-group-change-alert-inline] | |
module.sns_security_group_change_alert.aws_sns_topic.this[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:security-group-change-alert] | |
aws_ssm_parameter.apigateway_public[0]: Refreshing state... [id=/ecs/admin/references/apigw-public-policy] | |
module.fsx_sg.aws_security_group_rule.egress_with_cidr_blocks[0]: Refreshing state... [id=sgrule-3658870043] | |
module.license_server_policy.aws_iam_policy.policy[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/License-Server-Policy] | |
module.license_server_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-1725280012] | |
aws_network_interface.license_server_eni[0]: Refreshing state... [id=eni-00dcdcd2c43efa166] | |
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[3]: Refreshing state... [id=sgrule-599535552] | |
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[0]: Refreshing state... [id=sgrule-647454886] | |
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[2]: Refreshing state... [id=sgrule-2670448248] | |
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[1]: Refreshing state... [id=sgrule-2901582279] | |
module.vpc.aws_flow_log.this[0]: Refreshing state... [id=fl-0ba22a4ef79b78cf4] | |
module.alb_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-3197665779] | |
module.alb_sg.aws_security_group_rule.ingress_rules[0]: Refreshing state... [id=sgrule-2724474891] | |
module.alb_sg.aws_security_group_rule.ingress_rules[1]: Refreshing state... [id=sgrule-1074680590] | |
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[1]: Refreshing state... [id=sgrule-3359069194] | |
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[3]: Refreshing state... [id=sgrule-356029320] | |
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[2]: Refreshing state... [id=sgrule-870054562] | |
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[4]: Refreshing state... [id=sgrule-2976329831] | |
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[0]: Refreshing state... [id=sgrule-1818818533] | |
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-0fa6dcc7067308520] | |
module.vpc.aws_route_table_association.database[2]: Refreshing state... [id=rtbassoc-074c25e5f27a880d8] | |
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-029921abd7ff92d84] | |
module.vpc.aws_route_table_association.private[2]: Refreshing state... [id=rtbassoc-086264fcc47d1044c] | |
module.vpc.aws_route_table_association.database[0]: Refreshing state... [id=rtbassoc-0572fb38f008da79b] | |
module.cloudtrail.aws_cloudwatch_log_group.cloudtrail: Refreshing state... [id=cloudtrail-events] | |
module.vpc.aws_route_table_association.database[1]: Refreshing state... [id=rtbassoc-019740ede4b2d1fcd] | |
module.cloudtrail.aws_kms_alias.cloudtrail: Refreshing state... [id=alias/infra-account-cloud-trail] | |
module.ad.aws_directory_service_directory.this[0]: Refreshing state... [id=d-9967145ed2] | |
module.nlb.aws_lb.this[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/net/infra-nlb-internal/1e43fbd8f025d6be] | |
aws_ssm_parameter.cognito_userpool_clients["qa"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-qa] | |
aws_kms_alias.cloudwatch[0]: Refreshing state... [id=alias/cloudwatch] | |
aws_ssm_parameter.cognito_userpool_clients["dev"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-dev] | |
aws_ssm_parameter.cognito_userpool_clients["infra"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-infra] | |
module.vpc.aws_nat_gateway.this[0]: Refreshing state... [id=nat-05ae5273c18f1df41] | |
aws_kms_alias.ebs[0]: Refreshing state... [id=alias/ebs] | |
module.cloudtrail.aws_iam_policy_attachment.main: Refreshing state... [id=cloudtrail-cloudwatch-logs-policy-attachment] | |
module.alb.aws_lb.this[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/app/infra-alb/d1c08aab60d75a12] | |
module.cognito_acm.aws_acm_certificate_validation.this[0]: Refreshing state... [id=2022-02-16 13:29:44.943 +0000 UTC] | |
aws_iam_instance_profile.workers[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121529540500000002] | |
aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529952600000004] | |
aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529939900000003] | |
aws_ebs_default_kms_key.ebs: Refreshing state... [id=arn:aws:kms:eu-central-1:446102611596:key/9bc845b1-c7f1-412f-8dbc-cb6d14943145] | |
aws_iam_role_policy_attachment.workers_AmazonSSMManagedInstanceCore[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617123433922600000001] | |
aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529953100000005] | |
aws_apigatewayv2_domain_name.api[0]: Refreshing state... [id=api.infra.cloudway.etas.com] | |
aws_apigatewayv2_domain_name.console[0]: Refreshing state... [id=console.infra.cloudway.etas.com] | |
module.lambda_security_group_change_alert.aws_cloudwatch_log_group.lambda[0]: Refreshing state... [id=/aws/lambda/security-group-change-alert] | |
module.eks_cluster.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/infra-9ebEuuXn/cluster] | |
module.cloudtrail.aws_cloudtrail.main: Refreshing state... [id=infra-account-cloud-trail] | |
aws_cloudwatch_event_target.securityGroupChangeAlertsTarget[0]: Refreshing state... [id=capture-security-group-events-terraform-20211028124722532800000001] | |
module.vpc.aws_route.private_nat_gateway[0]: Refreshing state... [id=r-rtb-0677d55b39c9f6b9b1080289494] | |
module.nlb.aws_lb_target_group.main[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:targetgroup/infra-2021061703424075500000000a/a24b1d893b7a7a10] | |
module.alb.aws_lb_listener.frontend_https[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c] | |
module.lambda_security_group_change_alert.aws_iam_role_policy_attachment.additional_inline[0]: Refreshing state... [id=security-group-change-alert-20211028124724373300000002] | |
module.alb.aws_lb_listener.frontend_http_tcp[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/app/infra-alb/d1c08aab60d75a12/f09189c44157c0b6] | |
aws_api_gateway_vpc_link.this[0]: Refreshing state... [id=dpmnv2] | |
module.vpc_endpoints[0].aws_vpc_endpoint.this["execute-api"]: Refreshing state... [id=vpce-03d633f88a2a7e288] | |
module.lambda_security_group_change_alert.aws_lambda_function.this[0]: Refreshing state... [id=security-group-change-alert] | |
module.vpc_endpoints[0].aws_vpc_endpoint.this["s3"]: Refreshing state... [id=vpce-0f11f1582ce0fd092] | |
aws_iam_role_policy_attachment.license_server_policy[0]: Refreshing state... [id=License-Server-Role-20220204133650988100000002] | |
module.fsx.aws_fsx_windows_file_system.this[0]: Refreshing state... [id=fs-020e442c07fe72a3c] | |
aws_iam_openid_connect_provider.cognito_oidc_provider[0]: Refreshing state... [id=arn:aws:iam::446102611596:oidc-provider/cognito-idp.eu-central-1.amazonaws.com/eu-central-1_aCCErzui2] | |
module.waf.aws_wafv2_web_acl_association.alb_list[0]: Refreshing state... [id=arn:aws:wafv2:eu-central-1:446102611596:regional/webacl/infra-waf/bc5ffcfe-59f0-4228-8233-e4fcabe14b1d,arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/app/infra-alb/d1c08aab60d75a12] | |
module.nlb.aws_lb_listener.frontend_https[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/net/infra-nlb-internal/1e43fbd8f025d6be/80f919529df1f7ab] | |
module.api_record.aws_route53_record.this["api A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_api.infra.cloudway.etas.com_A] | |
module.alb.aws_lb_listener_rule.https_listener_rule[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/588bb7ae89325fa4] | |
module.alb.aws_lb_listener_rule.https_listener_rule[1]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/b3726ca3606cf706] | |
module.alb.aws_lb_listener_rule.https_listener_rule[2]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/2b0a05e1c11bbaf9] | |
module.alb.aws_lb_listener_rule.https_listener_rule[3]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/90016d8caf36eae8] | |
module.alb.aws_lb_listener_rule.https_listener_rule[4]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/cd530a7ff29c3f66] | |
module.alb.aws_lb_listener_rule.https_listener_rule[5]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/0bf7c593daad64d6] | |
module.aws_cognito_user_pool.aws_cognito_user_pool_domain.domain[0]: Refreshing state... [id=auth.infra.cloudway.etas.com] | |
module.console_record.aws_route53_record.this["console A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_console.infra.cloudway.etas.com_A] | |
module.eks_cluster.aws_eks_cluster.this[0]: Refreshing state... [id=infra-9ebEuuXn] | |
aws_ssm_parameter.eks_workers_instance_profile_id[0]: Refreshing state... [id=/ecs/admin/references/eks-worker-instance-profile-id] | |
module.lambda_security_group_change_alert.aws_lambda_permission.unqualified_alias_triggers["AllowExecutionFromSNS"]: Refreshing state... [id=AllowExecutionFromSNS] | |
module.lambda_security_group_change_alert.aws_iam_policy.logs[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/security-group-change-alert-logs] | |
aws_sns_topic_subscription.security_group_sns_subscription[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:security-group-change-alert:603bf661-d00f-4232-8446-080ad0463fd7] | |
aws_ssm_parameter.fsx_dns_ip[0]: Refreshing state... [id=/ecs/infra/references/fsx-ip] | |
aws_ssm_parameter.fsx_dns_name[0]: Refreshing state... [id=/ecs/infra/references/fsx-dns-name] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.unauthorized_api_calls[0]: Refreshing state... [id=UnauthorizedAPICalls] | |
module.secure-baseline_alarm-baseline.aws_sns_topic.alarms[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:CISAlarm] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.organizations_changes[0]: Refreshing state... [id=OrganizationsChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.s3_bucket_policy_changes[0]: Refreshing state... [id=S3BucketPolicyChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.vpc_changes[0]: Refreshing state... [id=VPCChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.disable_or_delete_cmk[0]: Refreshing state... [id=DisableOrDeleteCMK] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.security_group_changes[0]: Refreshing state... [id=SecurityGroupChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.root_usage[0]: Refreshing state... [id=RootUsage] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.cloudtrail_cfg_changes[0]: Refreshing state... [id=CloudTrailCfgChanges] | |
aws_ssm_parameter.apigw_vpc_endpoint_id: Refreshing state... [id=/ecs/admin/references/apigw-vpc-endpoint] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.route_table_changes[0]: Refreshing state... [id=RouteTableChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.no_mfa_console_signin[0]: Refreshing state... [id=NoMFAConsoleSignin] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.iam_changes[0]: Refreshing state... [id=IAMChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.aws_config_changes[0]: Refreshing state... [id=AWSConfigChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.network_gw_changes[0]: Refreshing state... [id=NetworkGWChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.console_signin_failures[0]: Refreshing state... [id=ConsoleSigninFailures] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.nacl_changes[0]: Refreshing state... [id=NACLChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.unauthorized_api_calls[0]: Refreshing state... [id=UnauthorizedAPICalls] | |
aws_ssm_parameter.identity_provider_arn[0]: Refreshing state... [id=/ecs/admin/references/oidc-identity-provider-arn] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.organizations_changes[0]: Refreshing state... [id=OrganizationsChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.s3_bucket_policy_changes[0]: Refreshing state... [id=S3BucketPolicyChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.vpc_changes[0]: Refreshing state... [id=VPCChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.disable_or_delete_cmk[0]: Refreshing state... [id=DisableOrDeleteCMK] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.security_group_changes[0]: Refreshing state... [id=SecurityGroupChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.root_usage[0]: Refreshing state... [id=RootUsage] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.cloudtrail_cfg_changes[0]: Refreshing state... [id=CloudTrailCfgChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.iam_changes[0]: Refreshing state... [id=IAMChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.route_table_changes[0]: Refreshing state... [id=RouteTableChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.no_mfa_console_signin[0]: Refreshing state... [id=NoMFAConsoleSignin] | |
aws_ssm_parameter.apigateway_private[0]: Refreshing state... [id=/ecs/admin/references/apigw-private-policy] | |
module.eks_cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws:iam::446102611596:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/89FB1FD7373869D6E43A56A9DF7EADC9] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.aws_config_changes[0]: Refreshing state... [id=AWSConfigChanges] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.console_signin_failures[0]: Refreshing state... [id=ConsoleSigninFailures] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.network_gw_changes[0]: Refreshing state... [id=NetworkGWChanges] | |
module.lambda_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-2769942118] | |
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.nacl_changes[0]: Refreshing state... [id=NACLChanges] | |
local_file.kubeconfig: Refreshing state... [id=61f24a7fad4683b165679b4751b2b55704ee73c1] | |
module.lambda_security_group_change_alert.aws_iam_role_policy_attachment.logs[0]: Refreshing state... [id=security-group-change-alert-20211028124724375500000003] | |
kubernetes_secret.sealed_secrets_key[0]: Refreshing state... [id=kube-system/sealed-secret-key] | |
kubernetes_secret.git_credentials[0]: Refreshing state... [id=kube-system/git-credentials] | |
module.alb_record.aws_route53_record.this[" A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_infra.cloudway.etas.com_A] | |
╷ | |
│ Error: Get "http://localhost/api/v1/namespaces/kube-system/secrets/sealed-secret-key": dial tcp 127.0.0.1:80: connect: connection refused | |
│ | |
│ with kubernetes_secret.sealed_secrets_key[0], | |
│ on k8s_sealed_secrets.tf line 11, in resource "kubernetes_secret" "sealed_secrets_key": | |
│ 11: resource "kubernetes_secret" "sealed_secrets_key" { | |
│ | |
╵ | |
╷ | |
│ Error: Get "http://localhost/api/v1/namespaces/kube-system/secrets/git-credentials": dial tcp 127.0.0.1:80: connect: connection refused | |
│ | |
│ with kubernetes_secret.git_credentials[0], | |
│ on k8s_sealed_secrets.tf line 32, in resource "kubernetes_secret" "git_credentials": | |
│ 32: resource "kubernetes_secret" "git_credentials" { | |
│ | |
╵ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment