Skip to content

Instantly share code, notes, and snippets.

@poojaac
Created March 11, 2022 05:56
Show Gist options
  • Save poojaac/a4587de0f5a11bd18933fa794edad5c7 to your computer and use it in GitHub Desktop.
Save poojaac/a4587de0f5a11bd18933fa794edad5c7 to your computer and use it in GitHub Desktop.
terraform plan output
Initializing modules...
Downloading registry.terraform.io/terraform-aws-modules/acm/aws 3.2.0 for acm...
- acm in .terraform/modules/acm
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_active_directory.git for ad...
- ad in .terraform/modules/ad/terraform
Downloading registry.terraform.io/terraform-aws-modules/alb/aws 6.5.0 for alb...
- alb in .terraform/modules/alb
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for alb_record...
- alb_record in .terraform/modules/alb_record/modules/records
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for alb_sg...
- alb_sg in .terraform/modules/alb_sg
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for api_record...
- api_record in .terraform/modules/api_record/modules/records
Downloading registry.terraform.io/lgallard/cognito-user-pool/aws 0.14.2 for aws_cognito_user_pool...
- aws_cognito_user_pool in .terraform/modules/aws_cognito_user_pool
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for aws_load_balancer_controller...
- aws_load_balancer_controller in .terraform/modules/aws_load_balancer_controller/modules/iam-assumable-role-with-oidc
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for aws_load_balancer_controller_policy...
- aws_load_balancer_controller_policy in .terraform/modules/aws_load_balancer_controller_policy/modules/iam-policy
Downloading registry.terraform.io/trussworks/cloudtrail/aws 4.3.0 for cloudtrail...
- cloudtrail in .terraform/modules/cloudtrail
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for cluster_autoscaler...
- cluster_autoscaler in .terraform/modules/cluster_autoscaler/modules/iam-assumable-role-with-oidc
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for cluster_autoscaler_policy...
- cluster_autoscaler_policy in .terraform/modules/cluster_autoscaler_policy/modules/iam-policy
Downloading registry.terraform.io/terraform-aws-modules/acm/aws 3.2.0 for cognito_acm...
- cognito_acm in .terraform/modules/cognito_acm
Downloading registry.terraform.io/terraform-aws-modules/route53/aws 2.0.0 for console_record...
- console_record in .terraform/modules/console_record/modules/records
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for developer_policy...
- developer_policy in .terraform/modules/developer_policy/modules/iam-policy
Downloading registry.terraform.io/terraform-aws-modules/eks/aws 18.2.4 for eks_cluster...
- eks_cluster in .terraform/modules/eks_cluster
- eks_cluster.eks_managed_node_group in .terraform/modules/eks_cluster/modules/eks-managed-node-group
- eks_cluster.eks_managed_node_group.user_data in .terraform/modules/eks_cluster/modules/_user_data
- eks_cluster.fargate_profile in .terraform/modules/eks_cluster/modules/fargate-profile
- eks_cluster.self_managed_node_group in .terraform/modules/eks_cluster/modules/self-managed-node-group
- eks_cluster.self_managed_node_group.user_data in .terraform/modules/eks_cluster/modules/_user_data
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_fsx.git for fsx...
- fsx in .terraform/modules/fsx/terraform
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for fsx_sg...
- fsx_sg in .terraform/modules/fsx_sg
Downloading registry.terraform.io/terraform-aws-modules/lambda/aws 2.31.0 for lambda_security_group_change_alert...
- lambda_security_group_change_alert in .terraform/modules/lambda_security_group_change_alert
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.2.0 for lambda_sg...
- lambda_sg in .terraform/modules/lambda_sg
Downloading registry.terraform.io/terraform-aws-modules/ec2-instance/aws 3.4.0 for license_server...
- license_server in .terraform/modules/license_server
Downloading registry.terraform.io/terraform-aws-modules/iam/aws 4.7.0 for license_server_policy...
- license_server_policy in .terraform/modules/license_server_policy/modules/iam-policy
Downloading registry.terraform.io/terraform-aws-modules/security-group/aws 4.4.0 for license_server_sg...
- license_server_sg in .terraform/modules/license_server_sg
Downloading registry.terraform.io/terraform-aws-modules/alb/aws 6.2.0 for nlb...
- nlb in .terraform/modules/nlb
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_alarm-baseline...
- secure-baseline_alarm-baseline in .terraform/modules/secure-baseline_alarm-baseline/modules/alarm-baseline
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_ebs-baseline...
- secure-baseline_ebs-baseline in .terraform/modules/secure-baseline_ebs-baseline/modules/ebs-baseline
Downloading registry.terraform.io/nozaq/secure-baseline/aws 0.27.1 for secure-baseline_s3-baseline...
- secure-baseline_s3-baseline in .terraform/modules/secure-baseline_s3-baseline/modules/s3-baseline
Downloading registry.terraform.io/terraform-aws-modules/sns/aws 3.2.0 for sns_security_group_change_alert...
- sns_security_group_change_alert in .terraform/modules/sns_security_group_change_alert
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_spotinst_ocean.git for spotinst_ocean...
- spotinst_ocean in .terraform/modules/spotinst_ocean
Downloading registry.terraform.io/spotinst/ocean-controller/spotinst 0.38.0 for spotinst_ocean.ocean-controller...
- spotinst_ocean.ocean-controller in .terraform/modules/spotinst_ocean.ocean-controller
Downloading registry.terraform.io/terraform-aws-modules/vpc/aws 3.10.0 for vpc...
- vpc in .terraform/modules/vpc
Downloading registry.terraform.io/terraform-aws-modules/vpc/aws 3.12.0 for vpc_endpoints...
- vpc_endpoints in .terraform/modules/vpc_endpoints/modules/vpc-endpoints
Downloading git::https://github.boschdevcloud.com/VVSuite-Dev/terraform_aws_waf_webaclv2.git for waf...
- waf in .terraform/modules/waf/terraform
Initializing the backend...
Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.
Initializing provider plugins...
- Reusing previous version of terraform-aws-modules/http from the dependency lock file
- Reusing previous version of hashicorp/aws from the dependency lock file
- Reusing previous version of hashicorp/cloudinit from the dependency lock file
- Reusing previous version of spotinst/spotinst from the dependency lock file
- Reusing previous version of cyrilgdn/postgresql from the dependency lock file
- Reusing previous version of gavinbunney/kubectl from the dependency lock file
- Reusing previous version of hashicorp/local from the dependency lock file
- Finding hashicorp/tls versions matching ">= 2.2.0"...
- Reusing previous version of hashicorp/external from the dependency lock file
- Reusing previous version of hashicorp/kubernetes from the dependency lock file
- Reusing previous version of hashicorp/null from the dependency lock file
- Reusing previous version of fluxcd/flux from the dependency lock file
- Reusing previous version of integrations/github from the dependency lock file
- Reusing previous version of hashicorp/random from the dependency lock file
- Installing hashicorp/aws v3.74.3...
- Installed hashicorp/aws v3.74.3 (signed by HashiCorp)
- Installing hashicorp/external v2.2.0...
- Installed hashicorp/external v2.2.0 (signed by HashiCorp)
- Installing spotinst/spotinst v1.65.0...
- Installed spotinst/spotinst v1.65.0 (self-signed, key ID D356E7D693D0F6BA)
- Installing hashicorp/kubernetes v2.8.0...
- Installed hashicorp/kubernetes v2.8.0 (signed by HashiCorp)
- Installing hashicorp/null v3.1.0...
- Installed hashicorp/null v3.1.0 (signed by HashiCorp)
- Installing fluxcd/flux v0.11.2...
- Installed fluxcd/flux v0.11.2 (self-signed, key ID D5D3316A880BB5B9)
- Installing integrations/github v4.20.0...
- Installed integrations/github v4.20.0 (signed by a HashiCorp partner, key ID 38027F80D7FD5FB2)
- Installing hashicorp/random v3.1.0...
- Installed hashicorp/random v3.1.0 (signed by HashiCorp)
- Installing terraform-aws-modules/http v2.4.1...
- Installed terraform-aws-modules/http v2.4.1 (self-signed, key ID B2C1C0641B6B0EB7)
- Installing hashicorp/cloudinit v2.2.0...
- Installed hashicorp/cloudinit v2.2.0 (signed by HashiCorp)
- Installing hashicorp/tls v3.1.0...
- Installed hashicorp/tls v3.1.0 (signed by HashiCorp)
- Installing cyrilgdn/postgresql v1.15.0...
- Installed cyrilgdn/postgresql v1.15.0 (self-signed, key ID 3918DD444A3876A6)
- Installing gavinbunney/kubectl v1.13.1...
- Installed gavinbunney/kubectl v1.13.1 (self-signed, key ID AD64217B5ADD572F)
- Installing hashicorp/local v2.1.0...
- Installed hashicorp/local v2.1.0 (signed by HashiCorp)
Partner and community providers are signed by their developers.
If you'd like to know more about provider signing, you can read about it here:
https://www.terraform.io/docs/cli/plugins/signing.html
Terraform has made some changes to the provider dependency selections recorded
in the .terraform.lock.hcl file. Review those changes and commit them to your
version control system if they represent changes you intended to make.
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
mkdir infra
*******************************************
* ACTION: PLAN
* ENV: infra
*******************************************
export TF_LOG_PROVIDER_KUBERNETES=TRACE && terraform plan --var-file=./environments/infra/variables.tfvars -out infra/plan.out
random_string.suffix: Refreshing state... [id=9ebEuuXn]
aws_security_group_rule.workers_ingress_alb_https[0]: Refreshing state... [id=sgrule-4035290231]
aws_ssm_parameter.eks_cluster_id[0]: Refreshing state... [id=/ecs/admin/references/eks-cluster-id]
module.vpc.aws_vpc.this[0]: Refreshing state... [id=vpc-04ed1fe71cb1768d9]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.128.0/19"]: Refreshing state... [id=sgrule-3364777202]
module.eks_cluster.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930446200000007]
aws_security_group_rule.workers_ingress_self[0]: Refreshing state... [id=sgrule-1300890230]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.160.0/19"]: Refreshing state... [id=sgrule-2133535855]
aws_security_group_rule.workers_ingress_nlb_https[0]: Refreshing state... [id=sgrule-2779579824]
aws_security_group_rule.workers_ingress_nlb_http[0]: Refreshing state... [id=sgrule-2260289600]
aws_security_group_rule.workers_ingress_self_https[0]: Refreshing state... [id=sgrule-3038919760]
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930455800000008]
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930440900000005]
aws_security_group_rule.workers_ingress_cluster[0]: Refreshing state... [id=sgrule-4267809150]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.3.0/24"]: Refreshing state... [id=sgrule-1046009596]
module.eks_cluster.aws_iam_policy.cluster_elb_sl_role_creation[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/infra-9ebEuuXn-elb-sl-role-creation20210617055928401400000002]
module.eks_cluster.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003-20210617055930443200000006]
module.eks_cluster.aws_iam_role.cluster[0]: Refreshing state... [id=infra-9ebEuuXn20210617055928402700000003]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.64.0/19"]: Refreshing state... [id=sgrule-4191969721]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.1.0/24"]: Refreshing state... [id=sgrule-2848442325]
aws_security_group_rule.workers_ingress_cluster_https[0]: Refreshing state... [id=sgrule-3079546765]
aws_security_group_rule.workers_egress_internet[0]: Refreshing state... [id=sgrule-2142428300]
aws_security_group_rule.cluster_egress_internet[0]: Refreshing state... [id=sgrule-3642874007]
module.eks_cluster.aws_security_group_rule.cluster_private_access_cidrs_source["10.0.2.0/24"]: Refreshing state... [id=sgrule-2553273672]
aws_security_group_rule.workers_ingress_alb_http[0]: Refreshing state... [id=sgrule-2139738958]
aws_security_group_rule.cluster_https_worker_ingress[0]: Refreshing state... [id=sgrule-2344680062]
aws_cloudwatch_event_rule.securityGroupChangeAlerts[0]: Refreshing state... [id=capture-security-group-events]
aws_kms_key.fsx_key[0]: Refreshing state... [id=9d449e10-accb-4a3e-824a-c7909a20c2ce]
aws_ssm_parameter.fsx_ad_name[0]: Refreshing state... [id=/ecs/infra/references/fsx-ad-name]
module.acm.aws_acm_certificate.this[0]: Refreshing state... [id=arn:aws:acm:eu-central-1:446102611596:certificate/b48041ac-f82c-4b0e-9ab4-2cfaa27913e1]
module.secure-baseline_s3-baseline.aws_s3_account_public_access_block.this: Refreshing state... [id=446102611596]
module.aws_cognito_user_pool.aws_cognito_user_pool.pool[0]: Refreshing state... [id=eu-central-1_aCCErzui2]
module.secure-baseline_ebs-baseline.aws_ebs_encryption_by_default.this[0]: Refreshing state... [id=terraform-20210909040412407800000002]
aws_iam_role.license_server_role[0]: Refreshing state... [id=License-Server-Role]
aws_iam_service_linked_role.autoscaling: Refreshing state... [id=arn:aws:iam::446102611596:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling]
aws_kms_key.eks_secrets[0]: Refreshing state... [id=2486388e-883e-4f78-8ffd-8d69af2037cc]
aws_wafv2_ip_set.custom_ip_set: Refreshing state... [id=b6280fe4-6230-45d8-8d60-a73a3d3c7f59]
module.vpc.aws_iam_role.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=vpc-flow-log-role-20210617033802033000000002]
module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/vpc-flow-log-to-cloudwatch-20210617033802029800000001]
module.cognito_acm.aws_acm_certificate.this[0]: Refreshing state... [id=arn:aws:acm:us-east-1:446102611596:certificate/d4d73301-65da-4e69-9271-a0611ef0e875]
module.lambda_security_group_change_alert.local_file.archive_plan[0]: Refreshing state... [id=150d49cc78a6c12d95b31d3732b3a0f8df5b8acb]
module.lambda_security_group_change_alert.aws_iam_role.lambda[0]: Refreshing state... [id=security-group-change-alert]
aws_iam_role.apigateway_cloudwatch[0]: Refreshing state... [id=api_gateway_cloudwatch_global]
aws_kms_alias.fsx_key_alias[0]: Refreshing state... [id=alias/fsx-key]
module.cloudtrail.aws_iam_role.cloudtrail_cloudwatch_role: Refreshing state... [id=cloudtrail-cloudwatch-logs-role]
module.aws_cognito_user_pool.aws_cognito_resource_server.resource[0]: Refreshing state... [id=eu-central-1_aCCErzui2|backend]
aws_kms_alias.eks_secrets[0]: Refreshing state... [id=alias/eks]
aws_security_group.cluster[0]: Refreshing state... [id=sg-068d218aae0fae801]
module.acm.aws_route53_record.validation[0]: Refreshing state... [id=Z01486513LYZWD5WGZUTS__bb7ca7f0a0c0c84bd5738ddb0628f077.infra.cloudway.etas.com._CNAME]
aws_security_group.workers[0]: Refreshing state... [id=sg-044b7d16e89cab45f]
aws_ssm_parameter.cognito_userpool_id[0]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-id]
module.lambda_security_group_change_alert.null_resource.archive[0]: Refreshing state... [id=5374893334140613166]
module.vpc.aws_internet_gateway.this[0]: Refreshing state... [id=igw-0f5f030721476ee05]
module.vpc.aws_route_table.database[0]: Refreshing state... [id=rtb-0d51f81afb5602ee5]
module.vpc.aws_subnet.intra[0]: Refreshing state... [id=subnet-0fdfdc46447d56b6b]
module.vpc.aws_subnet.intra[1]: Refreshing state... [id=subnet-0fc900420380f46a4]
module.vpc.aws_subnet.intra[2]: Refreshing state... [id=subnet-0897db4885a857f6a]
module.vpc.aws_cloudwatch_log_group.flow_log[0]: Refreshing state... [id=/aws/vpc-flow-log/vpc-04ed1fe71cb1768d9]
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-05121163165ed35b4]
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-025c460c183843d9e]
module.vpc.aws_subnet.public[2]: Refreshing state... [id=subnet-0425271fe3da677ae]
module.vpc.aws_route_table.intra[0]: Refreshing state... [id=rtb-0b8d0fb108b0e40cc]
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-0b02d6b9ab00ed33e]
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-0dc7ec61ef108a0fa]
module.vpc.aws_subnet.private[2]: Refreshing state... [id=subnet-02f052b6119a0305d]
module.vpc.aws_subnet.database[0]: Refreshing state... [id=subnet-04f20cc29f72faf9b]
module.vpc.aws_subnet.database[1]: Refreshing state... [id=subnet-07d9486af54aff64e]
module.vpc.aws_subnet.database[2]: Refreshing state... [id=subnet-0147305f243af3097]
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-08f88cc0d399a0d90]
module.alb.aws_lb_target_group.main[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:targetgroup/infra-2021061703425543700000000b/c4e05c8865943a05]
module.alb_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-0a7eaf01ac1062a40]
module.lambda_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-0f1e9896413b48913]
module.fsx_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-01a266c932d799aef]
module.license_server_sg.aws_security_group.this_name_prefix[0]: Refreshing state... [id=sg-028ebfe4d12e3bf04]
aws_iam_role.workers[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[0]: Refreshing state... [id=5o4peu5sl31271ohm3k2jmdno0]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[5]: Refreshing state... [id=44cqpa5j0bv3ee6nr99q3cue30]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[8]: Refreshing state... [id=5n2spdbv94rdn65ckcjh6m8cgu]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[4]: Refreshing state... [id=7j3srcobdnvflga4dld3e1vss7]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[7]: Refreshing state... [id=66oede9vra01k47lu6fojvmrqo]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[3]: Refreshing state... [id=2qrm3u3m162blro2vohc21q2c3]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[10]: Refreshing state... [id=79c7iame0fd23h6kcv506onk0s]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[9]: Refreshing state... [id=6bada5ns2fi5gtimo6ni98iul3]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[1]: Refreshing state... [id=3qrvtdj09ptcpviep68sgp4ud5]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[11]: Refreshing state... [id=7g4ir6r2jbbd6crk7vl5h9gviq]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[2]: Refreshing state... [id=7tc9hp2hagkarrmo121rs80fl9]
module.aws_cognito_user_pool.aws_cognito_user_pool_client.client[6]: Refreshing state... [id=n4kijp3j08rjfh480e8e4c7vh]
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-0677d55b39c9f6b9b]
module.cloudtrail.aws_iam_policy.cloudtrail_cloudwatch_logs: Refreshing state... [id=arn:aws:iam::446102611596:policy/cloudtrail-cloudwatch-logs-policy]
module.cloudtrail.aws_kms_key.cloudtrail: Refreshing state... [id=320e2987-a581-485c-a13a-d6758bc72645]
module.vpc.aws_route.database_internet_gateway[0]: Refreshing state... [id=r-rtb-0d51f81afb5602ee51080289494]
aws_iam_role_policy_attachment.ssm_managed_policy[0]: Refreshing state... [id=License-Server-Role-20220204133649772500000001]
aws_iam_instance_profile.license_server_profile[0]: Refreshing state... [id=License-Server-Role]
module.vpc.aws_route_table_association.intra[1]: Refreshing state... [id=rtbassoc-0d4dc6b81e42c302a]
module.vpc.aws_route_table_association.intra[2]: Refreshing state... [id=rtbassoc-0d1b23cf9c213cee5]
module.vpc.aws_route_table_association.intra[0]: Refreshing state... [id=rtbassoc-08fdcefc344fd6519]
aws_kms_key.cloudwatch[0]: Refreshing state... [id=e8a79ece-8ec1-42d4-a1a5-16cd3a05e7e5]
module.vpc.aws_db_subnet_group.database[0]: Refreshing state... [id=infra-vpc]
module.cognito_acm.aws_route53_record.validation[0]: Refreshing state... [id=Z01486513LYZWD5WGZUTS__8ca76a05dfba40cad5e88a32e15f7558.auth.infra.cloudway.etas.com._CNAME]
module.vpc.aws_route_table_association.public[2]: Refreshing state... [id=rtbassoc-06c6194e0a9ab70e9]
module.waf.aws_wafv2_web_acl.main[0]: Refreshing state... [id=bc5ffcfe-59f0-4228-8233-e4fcabe14b1d]
module.vpc.aws_route.public_internet_gateway[0]: Refreshing state... [id=r-rtb-08f88cc0d399a0d901080289494]
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-076a73e8a21c3f46b]
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-035071501cf990d91]
module.lambda_security_group_change_alert.aws_s3_bucket_object.lambda_package[0]: Refreshing state... [id=builds/59b4a8bba29815935f2f3cf3caef79d40416ad81c543f859c4e93610e54771c5.zip]
aws_kms_key.ebs[0]: Refreshing state... [id=9bc845b1-c7f1-412f-8dbc-cb6d14943145]
github_repository_file.kustomize: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/kustomization.yaml]
github_repository_file.install: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/gotk-components.yaml]
github_repository_file.sync: Refreshing state... [id=k8s-gitops/clusters/infra/flux-system/gotk-sync.yaml]
module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch[0]: Refreshing state... [id=vpc-flow-log-role-20210617033802033000000002-20210617033821910100000005]
aws_api_gateway_account.this[0]: Refreshing state... [id=api-gateway-account]
aws_iam_role_policy_attachment.apigateway_cloudwatch[0]: Refreshing state... [id=api_gateway_cloudwatch_global-20210621060531543400000001]
module.acm.aws_acm_certificate_validation.this[0]: Refreshing state... [id=2021-06-17 03:38:48 +0000 UTC]
module.lambda_security_group_change_alert.aws_iam_policy.additional_inline[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/security-group-change-alert-inline]
module.sns_security_group_change_alert.aws_sns_topic.this[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:security-group-change-alert]
aws_ssm_parameter.apigateway_public[0]: Refreshing state... [id=/ecs/admin/references/apigw-public-policy]
module.fsx_sg.aws_security_group_rule.egress_with_cidr_blocks[0]: Refreshing state... [id=sgrule-3658870043]
module.license_server_policy.aws_iam_policy.policy[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/License-Server-Policy]
module.license_server_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-1725280012]
aws_network_interface.license_server_eni[0]: Refreshing state... [id=eni-00dcdcd2c43efa166]
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[3]: Refreshing state... [id=sgrule-599535552]
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[0]: Refreshing state... [id=sgrule-647454886]
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[2]: Refreshing state... [id=sgrule-2670448248]
module.license_server_sg.aws_security_group_rule.ingress_with_cidr_blocks[1]: Refreshing state... [id=sgrule-2901582279]
module.vpc.aws_flow_log.this[0]: Refreshing state... [id=fl-0ba22a4ef79b78cf4]
module.alb_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-3197665779]
module.alb_sg.aws_security_group_rule.ingress_rules[0]: Refreshing state... [id=sgrule-2724474891]
module.alb_sg.aws_security_group_rule.ingress_rules[1]: Refreshing state... [id=sgrule-1074680590]
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[1]: Refreshing state... [id=sgrule-3359069194]
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[3]: Refreshing state... [id=sgrule-356029320]
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[2]: Refreshing state... [id=sgrule-870054562]
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[4]: Refreshing state... [id=sgrule-2976329831]
module.fsx_sg.aws_security_group_rule.computed_ingress_with_source_security_group_id[0]: Refreshing state... [id=sgrule-1818818533]
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-0fa6dcc7067308520]
module.vpc.aws_route_table_association.database[2]: Refreshing state... [id=rtbassoc-074c25e5f27a880d8]
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-029921abd7ff92d84]
module.vpc.aws_route_table_association.private[2]: Refreshing state... [id=rtbassoc-086264fcc47d1044c]
module.vpc.aws_route_table_association.database[0]: Refreshing state... [id=rtbassoc-0572fb38f008da79b]
module.cloudtrail.aws_cloudwatch_log_group.cloudtrail: Refreshing state... [id=cloudtrail-events]
module.vpc.aws_route_table_association.database[1]: Refreshing state... [id=rtbassoc-019740ede4b2d1fcd]
module.cloudtrail.aws_kms_alias.cloudtrail: Refreshing state... [id=alias/infra-account-cloud-trail]
module.ad.aws_directory_service_directory.this[0]: Refreshing state... [id=d-9967145ed2]
module.nlb.aws_lb.this[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/net/infra-nlb-internal/1e43fbd8f025d6be]
aws_ssm_parameter.cognito_userpool_clients["qa"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-qa]
aws_kms_alias.cloudwatch[0]: Refreshing state... [id=alias/cloudwatch]
aws_ssm_parameter.cognito_userpool_clients["dev"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-dev]
aws_ssm_parameter.cognito_userpool_clients["infra"]: Refreshing state... [id=/ecs/admin/references/cognito-userpool-clients-infra]
module.vpc.aws_nat_gateway.this[0]: Refreshing state... [id=nat-05ae5273c18f1df41]
aws_kms_alias.ebs[0]: Refreshing state... [id=alias/ebs]
module.cloudtrail.aws_iam_policy_attachment.main: Refreshing state... [id=cloudtrail-cloudwatch-logs-policy-attachment]
module.alb.aws_lb.this[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/app/infra-alb/d1c08aab60d75a12]
module.cognito_acm.aws_acm_certificate_validation.this[0]: Refreshing state... [id=2022-02-16 13:29:44.943 +0000 UTC]
aws_iam_instance_profile.workers[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121529540500000002]
aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529952600000004]
aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529939900000003]
aws_ebs_default_kms_key.ebs: Refreshing state... [id=arn:aws:kms:eu-central-1:446102611596:key/9bc845b1-c7f1-412f-8dbc-cb6d14943145]
aws_iam_role_policy_attachment.workers_AmazonSSMManagedInstanceCore[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617123433922600000001]
aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0]: Refreshing state... [id=infra-9ebEuuXn-workers20210617121527908800000001-20210617121529953100000005]
aws_apigatewayv2_domain_name.api[0]: Refreshing state... [id=api.infra.cloudway.etas.com]
aws_apigatewayv2_domain_name.console[0]: Refreshing state... [id=console.infra.cloudway.etas.com]
module.lambda_security_group_change_alert.aws_cloudwatch_log_group.lambda[0]: Refreshing state... [id=/aws/lambda/security-group-change-alert]
module.eks_cluster.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/infra-9ebEuuXn/cluster]
module.cloudtrail.aws_cloudtrail.main: Refreshing state... [id=infra-account-cloud-trail]
aws_cloudwatch_event_target.securityGroupChangeAlertsTarget[0]: Refreshing state... [id=capture-security-group-events-terraform-20211028124722532800000001]
module.vpc.aws_route.private_nat_gateway[0]: Refreshing state... [id=r-rtb-0677d55b39c9f6b9b1080289494]
module.nlb.aws_lb_target_group.main[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:targetgroup/infra-2021061703424075500000000a/a24b1d893b7a7a10]
module.alb.aws_lb_listener.frontend_https[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c]
module.lambda_security_group_change_alert.aws_iam_role_policy_attachment.additional_inline[0]: Refreshing state... [id=security-group-change-alert-20211028124724373300000002]
module.alb.aws_lb_listener.frontend_http_tcp[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/app/infra-alb/d1c08aab60d75a12/f09189c44157c0b6]
aws_api_gateway_vpc_link.this[0]: Refreshing state... [id=dpmnv2]
module.vpc_endpoints[0].aws_vpc_endpoint.this["execute-api"]: Refreshing state... [id=vpce-03d633f88a2a7e288]
module.lambda_security_group_change_alert.aws_lambda_function.this[0]: Refreshing state... [id=security-group-change-alert]
module.vpc_endpoints[0].aws_vpc_endpoint.this["s3"]: Refreshing state... [id=vpce-0f11f1582ce0fd092]
aws_iam_role_policy_attachment.license_server_policy[0]: Refreshing state... [id=License-Server-Role-20220204133650988100000002]
module.fsx.aws_fsx_windows_file_system.this[0]: Refreshing state... [id=fs-020e442c07fe72a3c]
aws_iam_openid_connect_provider.cognito_oidc_provider[0]: Refreshing state... [id=arn:aws:iam::446102611596:oidc-provider/cognito-idp.eu-central-1.amazonaws.com/eu-central-1_aCCErzui2]
module.waf.aws_wafv2_web_acl_association.alb_list[0]: Refreshing state... [id=arn:aws:wafv2:eu-central-1:446102611596:regional/webacl/infra-waf/bc5ffcfe-59f0-4228-8233-e4fcabe14b1d,arn:aws:elasticloadbalancing:eu-central-1:446102611596:loadbalancer/app/infra-alb/d1c08aab60d75a12]
module.nlb.aws_lb_listener.frontend_https[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener/net/infra-nlb-internal/1e43fbd8f025d6be/80f919529df1f7ab]
module.api_record.aws_route53_record.this["api A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_api.infra.cloudway.etas.com_A]
module.alb.aws_lb_listener_rule.https_listener_rule[0]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/588bb7ae89325fa4]
module.alb.aws_lb_listener_rule.https_listener_rule[1]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/b3726ca3606cf706]
module.alb.aws_lb_listener_rule.https_listener_rule[2]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/2b0a05e1c11bbaf9]
module.alb.aws_lb_listener_rule.https_listener_rule[3]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/90016d8caf36eae8]
module.alb.aws_lb_listener_rule.https_listener_rule[4]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/cd530a7ff29c3f66]
module.alb.aws_lb_listener_rule.https_listener_rule[5]: Refreshing state... [id=arn:aws:elasticloadbalancing:eu-central-1:446102611596:listener-rule/app/infra-alb/d1c08aab60d75a12/b9343542cdca857c/0bf7c593daad64d6]
module.aws_cognito_user_pool.aws_cognito_user_pool_domain.domain[0]: Refreshing state... [id=auth.infra.cloudway.etas.com]
module.console_record.aws_route53_record.this["console A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_console.infra.cloudway.etas.com_A]
module.eks_cluster.aws_eks_cluster.this[0]: Refreshing state... [id=infra-9ebEuuXn]
aws_ssm_parameter.eks_workers_instance_profile_id[0]: Refreshing state... [id=/ecs/admin/references/eks-worker-instance-profile-id]
module.lambda_security_group_change_alert.aws_lambda_permission.unqualified_alias_triggers["AllowExecutionFromSNS"]: Refreshing state... [id=AllowExecutionFromSNS]
module.lambda_security_group_change_alert.aws_iam_policy.logs[0]: Refreshing state... [id=arn:aws:iam::446102611596:policy/security-group-change-alert-logs]
aws_sns_topic_subscription.security_group_sns_subscription[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:security-group-change-alert:603bf661-d00f-4232-8446-080ad0463fd7]
aws_ssm_parameter.fsx_dns_ip[0]: Refreshing state... [id=/ecs/infra/references/fsx-ip]
aws_ssm_parameter.fsx_dns_name[0]: Refreshing state... [id=/ecs/infra/references/fsx-dns-name]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.unauthorized_api_calls[0]: Refreshing state... [id=UnauthorizedAPICalls]
module.secure-baseline_alarm-baseline.aws_sns_topic.alarms[0]: Refreshing state... [id=arn:aws:sns:eu-central-1:446102611596:CISAlarm]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.organizations_changes[0]: Refreshing state... [id=OrganizationsChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.s3_bucket_policy_changes[0]: Refreshing state... [id=S3BucketPolicyChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.vpc_changes[0]: Refreshing state... [id=VPCChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.disable_or_delete_cmk[0]: Refreshing state... [id=DisableOrDeleteCMK]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.security_group_changes[0]: Refreshing state... [id=SecurityGroupChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.root_usage[0]: Refreshing state... [id=RootUsage]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.cloudtrail_cfg_changes[0]: Refreshing state... [id=CloudTrailCfgChanges]
aws_ssm_parameter.apigw_vpc_endpoint_id: Refreshing state... [id=/ecs/admin/references/apigw-vpc-endpoint]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.route_table_changes[0]: Refreshing state... [id=RouteTableChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.no_mfa_console_signin[0]: Refreshing state... [id=NoMFAConsoleSignin]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.iam_changes[0]: Refreshing state... [id=IAMChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.aws_config_changes[0]: Refreshing state... [id=AWSConfigChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.network_gw_changes[0]: Refreshing state... [id=NetworkGWChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.console_signin_failures[0]: Refreshing state... [id=ConsoleSigninFailures]
module.secure-baseline_alarm-baseline.aws_cloudwatch_log_metric_filter.nacl_changes[0]: Refreshing state... [id=NACLChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.unauthorized_api_calls[0]: Refreshing state... [id=UnauthorizedAPICalls]
aws_ssm_parameter.identity_provider_arn[0]: Refreshing state... [id=/ecs/admin/references/oidc-identity-provider-arn]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.organizations_changes[0]: Refreshing state... [id=OrganizationsChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.s3_bucket_policy_changes[0]: Refreshing state... [id=S3BucketPolicyChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.vpc_changes[0]: Refreshing state... [id=VPCChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.disable_or_delete_cmk[0]: Refreshing state... [id=DisableOrDeleteCMK]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.security_group_changes[0]: Refreshing state... [id=SecurityGroupChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.root_usage[0]: Refreshing state... [id=RootUsage]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.cloudtrail_cfg_changes[0]: Refreshing state... [id=CloudTrailCfgChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.iam_changes[0]: Refreshing state... [id=IAMChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.route_table_changes[0]: Refreshing state... [id=RouteTableChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.no_mfa_console_signin[0]: Refreshing state... [id=NoMFAConsoleSignin]
aws_ssm_parameter.apigateway_private[0]: Refreshing state... [id=/ecs/admin/references/apigw-private-policy]
module.eks_cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws:iam::446102611596:oidc-provider/oidc.eks.eu-central-1.amazonaws.com/id/89FB1FD7373869D6E43A56A9DF7EADC9]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.aws_config_changes[0]: Refreshing state... [id=AWSConfigChanges]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.console_signin_failures[0]: Refreshing state... [id=ConsoleSigninFailures]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.network_gw_changes[0]: Refreshing state... [id=NetworkGWChanges]
module.lambda_sg.aws_security_group_rule.egress_rules[0]: Refreshing state... [id=sgrule-2769942118]
module.secure-baseline_alarm-baseline.aws_cloudwatch_metric_alarm.nacl_changes[0]: Refreshing state... [id=NACLChanges]
local_file.kubeconfig: Refreshing state... [id=61f24a7fad4683b165679b4751b2b55704ee73c1]
module.lambda_security_group_change_alert.aws_iam_role_policy_attachment.logs[0]: Refreshing state... [id=security-group-change-alert-20211028124724375500000003]
kubernetes_secret.sealed_secrets_key[0]: Refreshing state... [id=kube-system/sealed-secret-key]
kubernetes_secret.git_credentials[0]: Refreshing state... [id=kube-system/git-credentials]
module.alb_record.aws_route53_record.this[" A"]: Refreshing state... [id=Z01486513LYZWD5WGZUTS_infra.cloudway.etas.com_A]
│ Error: Get "http://localhost/api/v1/namespaces/kube-system/secrets/sealed-secret-key": dial tcp 127.0.0.1:80: connect: connection refused
│ with kubernetes_secret.sealed_secrets_key[0],
│ on k8s_sealed_secrets.tf line 11, in resource "kubernetes_secret" "sealed_secrets_key":
│ 11: resource "kubernetes_secret" "sealed_secrets_key" {
│ Error: Get "http://localhost/api/v1/namespaces/kube-system/secrets/git-credentials": dial tcp 127.0.0.1:80: connect: connection refused
│ with kubernetes_secret.git_credentials[0],
│ on k8s_sealed_secrets.tf line 32, in resource "kubernetes_secret" "git_credentials":
│ 32: resource "kubernetes_secret" "git_credentials" {
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment