{ "version": 4, "terraform_version": "1.4.6", "serial": 88, "lineage": "02b2d1c7-fc0c-a6d8-204c-1ba0918efa9f", "outputs": { "configure_kubectl": { "value": "aws eks update-kubeconfig --region us-east-1 --name do-eks-tf-efa", "type": "string" } }, "resources": [ { "mode": "data", "type": "aws_ami", "name": "eks_gpu_node", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "architecture": "x86_64", "arn": "arn:aws:ec2:us-east-1::image/ami-0eb644d80a076026c", "block_device_mappings": [ { "device_name": "/dev/xvda", "ebs": { "delete_on_termination": "true", "encrypted": "false", "iops": "0", "snapshot_id": "snap-0c25f2cdb4062e161", "throughput": "0", "volume_size": "20", "volume_type": "gp2" }, "no_device": "", "virtual_name": "" } ], "boot_mode": "", "creation_date": "2023-05-15T17:36:58.000Z", "deprecation_time": "2025-05-15T17:36:58.000Z", "description": "EKS Kubernetes Worker AMI for Machine Learning Accelerated Workloads on AmazonLinux2 image, (k8s: 1.25.9, containerd: 1.6.*)", "ena_support": true, "executable_users": null, "filter": [ { "name": "name", "values": [ "amazon-eks-gpu-node-1.25-*" ] } ], "hypervisor": "xen", "id": "ami-0eb644d80a076026c", "image_id": "ami-0eb644d80a076026c", "image_location": "amazon/amazon-eks-gpu-node-1.25-v20230513", "image_owner_alias": "amazon", "image_type": "machine", "imds_support": "", "include_deprecated": false, "kernel_id": "", "most_recent": true, "name": "amazon-eks-gpu-node-1.25-v20230513", "name_regex": null, "owner_id": "602401143452", "owners": [ "amazon" ], "platform": "", "platform_details": "Linux/UNIX", "product_codes": [], "public": true, "ramdisk_id": "", "root_device_name": "/dev/xvda", "root_device_type": "ebs", "root_snapshot_id": "snap-0c25f2cdb4062e161", "sriov_net_support": "simple", "state": "available", "state_reason": { "code": "UNSET", "message": "UNSET" }, "tags": {}, "timeouts": null, "tpm_support": "", "usage_operation": "RunInstances", "virtualization_type": "hvm" }, "sensitive_attributes": [] } ] }, { "mode": "data", "type": "aws_availability_zones", "name": "available", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "all_availability_zones": null, "exclude_names": null, "exclude_zone_ids": null, "filter": null, "group_names": [ "us-east-1" ], "id": "us-east-1", "names": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1e", "us-east-1f" ], "state": null, "timeouts": null, "zone_ids": [ "use1-az2", "use1-az4", "use1-az6", "use1-az1", "use1-az3", "use1-az5" ] }, "sensitive_attributes": [] } ] }, { "mode": "data", "type": "aws_eks_cluster_auth", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "do-eks-tf-efa", "name": "do-eks-tf-efa", "token": "k8s-aws-v1.aHR0cHM6Ly9zdHMuYW1hem9uYXdzLmNvbS8_QWN0aW9uPUdldENhbGxlcklkZW50aXR5JlZlcnNpb249MjAxMS0wNi0xNSZYLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFTS0pSQjNLNFlNQ0dKSTVCJTJGMjAyMzA1MTklMkZ1cy1lYXN0LTElMkZzdHMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDIzMDUxOVQwMzQxNTVaJlgtQW16LUV4cGlyZXM9MCZYLUFtei1TaWduZWRIZWFkZXJzPWhvc3QlM0J4LWs4cy1hd3MtaWQmWC1BbXotU2lnbmF0dXJlPTE5MzZlMzFkY2U2MjVlZjJlMGU0MGRmMjAxOGNmZDAxMGMyNzA2NzBjZjBlZGNkNTZmNzg4Y2I5MTc4ZGNmZjE" }, "sensitive_attributes": [] } ] }, { "mode": "data", "type": "http", "name": "efa_device_plugin_yaml", "provider": "provider[\"registry.terraform.io/hashicorp/http\"]", "instances": [ { "schema_version": 0, "attributes": { "body": "apiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: aws-efa-k8s-device-plugin-daemonset\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n name: aws-efa-k8s-device-plugin\n updateStrategy:\n type: RollingUpdate\n template:\n metadata:\n # This annotation is deprecated. Kept here for backward compatibility\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n name: aws-efa-k8s-device-plugin\n spec:\n serviceAccount: default\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n - key: aws.amazon.com/efa\n operator: Exists\n effect: NoSchedule\n # Mark this pod as a critical add-on; when enabled, the critical add-on\n # scheduler reserves resources for critical add-on pods so that they can\n # be rescheduled after a failure.\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n priorityClassName: \"system-node-critical\"\n affinity:\n nodeAffinity:\n # EFA supported instances: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/efa.html#efa-instance-types\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: \"beta.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - g4dn.metal\n - c5n.9xlarge\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n - matchExpressions:\n - key: \"node.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - c5n.9xlarge\n - g4dn.metal\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n hostNetwork: true\n containers:\n - image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efa-k8s-device-plugin:v0.3.3\n imagePullPolicy: Always\n name: aws-efa-k8s-device-plugin\n securityContext:\n allowPrivilegeEscalation: false\n capabilities:\n drop: [\"ALL\"]\n volumeMounts:\n - name: device-plugin\n mountPath: /var/lib/kubelet/device-plugins\n volumes:\n - name: device-plugin\n hostPath:\n path: /var/lib/kubelet/device-plugins\n\n\n", "ca_cert_pem": null, "id": "https://raw.githubusercontent.com/aws-samples/aws-efa-eks/main/manifest/efa-k8s-device-plugin.yml", "insecure": null, "method": null, "request_body": null, "request_headers": null, "request_timeout_ms": null, "response_body": "apiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: aws-efa-k8s-device-plugin-daemonset\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n name: aws-efa-k8s-device-plugin\n updateStrategy:\n type: RollingUpdate\n template:\n metadata:\n # This annotation is deprecated. Kept here for backward compatibility\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n name: aws-efa-k8s-device-plugin\n spec:\n serviceAccount: default\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n - key: aws.amazon.com/efa\n operator: Exists\n effect: NoSchedule\n # Mark this pod as a critical add-on; when enabled, the critical add-on\n # scheduler reserves resources for critical add-on pods so that they can\n # be rescheduled after a failure.\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n priorityClassName: \"system-node-critical\"\n affinity:\n nodeAffinity:\n # EFA supported instances: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/efa.html#efa-instance-types\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: \"beta.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - g4dn.metal\n - c5n.9xlarge\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n - matchExpressions:\n - key: \"node.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - c5n.9xlarge\n - g4dn.metal\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n hostNetwork: true\n containers:\n - image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efa-k8s-device-plugin:v0.3.3\n imagePullPolicy: Always\n name: aws-efa-k8s-device-plugin\n securityContext:\n allowPrivilegeEscalation: false\n capabilities:\n drop: [\"ALL\"]\n volumeMounts:\n - name: device-plugin\n mountPath: /var/lib/kubelet/device-plugins\n volumes:\n - name: device-plugin\n hostPath:\n path: /var/lib/kubelet/device-plugins\n\n\n", "response_headers": { "Accept-Ranges": "bytes", "Access-Control-Allow-Origin": "*", "Cache-Control": "max-age=300", "Content-Security-Policy": "default-src 'none'; style-src 'unsafe-inline'; sandbox", "Content-Type": "text/plain; charset=utf-8", "Date": "Fri, 19 May 2023 03:41:52 GMT", "Etag": "W/\"94d9ad07b1b333df313b01f1e3391d50d4f8ffda81d78916d4c3733ee96a300b\"", "Expires": "Fri, 19 May 2023 03:46:52 GMT", "Source-Age": "0", "Strict-Transport-Security": "max-age=31536000", "Vary": "Authorization,Accept-Encoding,Origin", "Via": "1.1 varnish", "X-Cache": "HIT", "X-Cache-Hits": "1", "X-Content-Type-Options": "nosniff", "X-Fastly-Request-Id": "99f0635823b7207aad2b2894d34b718bf9421e4c", "X-Frame-Options": "deny", "X-Github-Request-Id": "0AD4:20FE:D2341D:F24D24:6466E5FD", "X-Served-By": "cache-bfi-krnt7300071-BFI", "X-Timer": "S1684467712.964975,VS0,VE168", "X-Xss-Protection": "1; mode=block" }, "retry": null, "status_code": 200, "url": "https://raw.githubusercontent.com/aws-samples/aws-efa-eks/main/manifest/efa-k8s-device-plugin.yml" }, "sensitive_attributes": [] } ] }, { "mode": "managed", "type": "aws_placement_group", "name": "efa_pg", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:placement-group/efa_pg", "id": "efa_pg", "name": "efa_pg", "partition_count": 0, "placement_group_id": "pg-06569ba137e8a1cac", "spread_level": "", "strategy": "cluster", "tags": {}, "tags_all": {} }, "sensitive_attributes": [], "private": "bnVsbA==", "create_before_destroy": true } ] }, { "mode": "managed", "type": "helm_release", "name": "k8s_device_plugin", "provider": "provider[\"registry.terraform.io/hashicorp/helm\"]", "instances": [ { "schema_version": 1, "attributes": { "atomic": false, "chart": "nvidia-device-plugin", "cleanup_on_fail": false, "create_namespace": false, "dependency_update": false, "description": null, "devel": null, "disable_crd_hooks": false, "disable_openapi_validation": false, "disable_webhooks": false, "force_update": false, "id": "k8s-device-plugin", "keyring": null, "lint": false, "manifest": null, "max_history": 0, "metadata": [ { "app_version": "0.14.0", "chart": "nvidia-device-plugin", "name": "k8s-device-plugin", "namespace": "kube-system", "revision": 1, "values": "null", "version": "0.14.0" } ], "name": "k8s-device-plugin", "namespace": "kube-system", "pass_credentials": false, "postrender": [], "recreate_pods": false, "render_subchart_notes": true, "replace": false, "repository": "https://nvidia.github.io/k8s-device-plugin", "repository_ca_file": null, "repository_cert_file": null, "repository_key_file": null, "repository_password": null, "repository_username": null, "reset_values": false, "reuse_values": false, "set": [], "set_sensitive": [], "skip_crds": false, "status": "deployed", "timeout": 300, "values": null, "verify": false, "version": "0.14.0", "wait": true, "wait_for_jobs": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "mode": "managed", "type": "kubectl_manifest", "name": "efa_device_plugin", "provider": "provider[\"registry.terraform.io/gavinbunney/kubectl\"]", "instances": [ { "schema_version": 1, "attributes": { "api_version": "apps/v1", "apply_only": false, "force_conflicts": false, "force_new": false, "id": "/apis/apps/v1/namespaces/kube-system/daemonsets/aws-efa-k8s-device-plugin-daemonset", "ignore_fields": null, "kind": "DaemonSet", "live_manifest_incluster": "b3c91185a7229c08374717d51ef47b17f66abdb7ea5c764194dbbdbe44013d45", "live_uid": "69bc8e21-4c8f-4e5e-9e19-7ac0c044fb2c", "name": "aws-efa-k8s-device-plugin-daemonset", "namespace": "kube-system", "override_namespace": null, "sensitive_fields": null, "server_side_apply": false, "timeouts": null, "uid": "69bc8e21-4c8f-4e5e-9e19-7ac0c044fb2c", "validate_schema": true, "wait": null, "wait_for_rollout": true, "yaml_body": "apiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: aws-efa-k8s-device-plugin-daemonset\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n name: aws-efa-k8s-device-plugin\n updateStrategy:\n type: RollingUpdate\n template:\n metadata:\n # This annotation is deprecated. Kept here for backward compatibility\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n name: aws-efa-k8s-device-plugin\n spec:\n serviceAccount: default\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n - key: aws.amazon.com/efa\n operator: Exists\n effect: NoSchedule\n # Mark this pod as a critical add-on; when enabled, the critical add-on\n # scheduler reserves resources for critical add-on pods so that they can\n # be rescheduled after a failure.\n # See https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/\n priorityClassName: \"system-node-critical\"\n affinity:\n nodeAffinity:\n # EFA supported instances: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/efa.html#efa-instance-types\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: \"beta.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - g4dn.metal\n - c5n.9xlarge\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n - matchExpressions:\n - key: \"node.kubernetes.io/instance-type\"\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - c5n.9xlarge\n - g4dn.metal\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n hostNetwork: true\n containers:\n - image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efa-k8s-device-plugin:v0.3.3\n imagePullPolicy: Always\n name: aws-efa-k8s-device-plugin\n securityContext:\n allowPrivilegeEscalation: false\n capabilities:\n drop: [\"ALL\"]\n volumeMounts:\n - name: device-plugin\n mountPath: /var/lib/kubelet/device-plugins\n volumes:\n - name: device-plugin\n hostPath:\n path: /var/lib/kubelet/device-plugins\n\n\n\n", "yaml_body_parsed": "apiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: aws-efa-k8s-device-plugin-daemonset\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n name: aws-efa-k8s-device-plugin\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n name: aws-efa-k8s-device-plugin\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/instance-type\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - g4dn.metal\n - c5n.9xlarge\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n - matchExpressions:\n - key: node.kubernetes.io/instance-type\n operator: In\n values:\n - c5n.18xlarge\n - c5n.metal\n - c5n.9xlarge\n - g4dn.metal\n - i3en.24xlarge\n - i3en.metal\n - inf1.24xlarge\n - m5dn.24xlarge\n - m5n.24xlarge\n - p3dn.24xlarge\n - r5dn.24xlarge\n - r5n.24xlarge\n - p4d.24xlarge\n - hpc6a.48xlarge\n - dl1.24xlarge\n - g5.48xlarge\n - p4de.24xlarge\n - trn1.32xlarge\n containers:\n - image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efa-k8s-device-plugin:v0.3.3\n imagePullPolicy: Always\n name: aws-efa-k8s-device-plugin\n securityContext:\n allowPrivilegeEscalation: false\n capabilities:\n drop:\n - ALL\n volumeMounts:\n - mountPath: /var/lib/kubelet/device-plugins\n name: device-plugin\n hostNetwork: true\n priorityClassName: system-node-critical\n serviceAccount: default\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n - effect: NoSchedule\n key: aws.amazon.com/efa\n operator: Exists\n volumes:\n - hostPath:\n path: /var/lib/kubelet/device-plugins\n name: device-plugin\n updateStrategy:\n type: RollingUpdate\n", "yaml_incluster": "b3c91185a7229c08374717d51ef47b17f66abdb7ea5c764194dbbdbe44013d45" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "data.http.efa_device_plugin_yaml", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "159553542841", "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "159553542841", "user_id": "AIDASKJRB3K47LZAOMIGN" }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "data", "type": "aws_eks_addon_version", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "coredns", "schema_version": 0, "attributes": { "addon_name": "coredns", "id": "coredns", "kubernetes_version": "1.25", "most_recent": true, "version": "v1.9.3-eksbuild.3" }, "sensitive_attributes": [] }, { "index_key": "kube-proxy", "schema_version": 0, "attributes": { "addon_name": "kube-proxy", "id": "kube-proxy", "kubernetes_version": "1.25", "most_recent": true, "version": "v1.25.9-eksbuild.1" }, "sensitive_attributes": [] }, { "index_key": "vpc-cni", "schema_version": 0, "attributes": { "addon_name": "vpc-cni", "id": "vpc-cni", "kubernetes_version": "1.25", "most_recent": true, "version": "v1.12.6-eksbuild.2" }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "data", "type": "aws_iam_policy_document", "name": "assume_role_policy", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2764486067", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSClusterAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n }\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRole" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "eks.amazonaws.com" ], "type": "Service" } ], "resources": [], "sid": "EKSClusterAssumeRole" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "data", "type": "aws_iam_session_context", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "arn:aws:iam::159553542841:user/iankouls", "issuer_arn": "arn:aws:iam::159553542841:user/iankouls", "issuer_id": "", "issuer_name": "", "session_name": "" }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "data", "type": "tls_certificate", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/tls\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "certificates": [ { "cert_pem": "-----BEGIN CERTIFICATE-----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\nVsyuLAOQ1xk4meTKCRlb/weWsKh/NEnfVqn3sF/tM+2MR7cwA130A4w=\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "OU=Starfield Class 2 Certification Authority,O=Starfield Technologies\\, Inc.,C=US", "not_after": "2034-06-28T17:39:16Z", "not_before": "2009-09-02T00:00:00Z", "public_key_algorithm": "RSA", "serial_number": "12037640545166866303", "sha1_fingerprint": "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", "signature_algorithm": "SHA256-RSA", "subject": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----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\nakcjMS9cmvqtmg5iUaQqqcT5NJ0hGA==\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US", "not_after": "2037-12-31T01:00:00Z", "not_before": "2015-05-25T12:00:00Z", "public_key_algorithm": "RSA", "serial_number": "144918191876577076464031512351042010504348870", "sha1_fingerprint": "06b25927c42a721631c1efd9431e648fa62e1e39", "signature_algorithm": "SHA256-RSA", "subject": "CN=Amazon Root CA 1,O=Amazon,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----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\n4zl+EoNaWdpnWndvSpAEkq2P\n-----END CERTIFICATE-----\n", "is_ca": true, "issuer": "CN=Amazon Root CA 1,O=Amazon,C=US", "not_after": "2030-08-23T22:25:30Z", "not_before": "2022-08-23T22:25:30Z", "public_key_algorithm": "RSA", "serial_number": "166129353110899469622597955040406457904926625", "sha1_fingerprint": "414a2060b738c635cc7fc243e052615592830c53", "signature_algorithm": "SHA256-RSA", "subject": "CN=Amazon RSA 2048 M02,O=Amazon,C=US", "version": 3 }, { "cert_pem": "-----BEGIN CERTIFICATE-----\nMIIF7DCCBNSgAwIBAgIQByOkjeOvl//8xMrhlZkruzANBgkqhkiG9w0BAQsFADA8\nMQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRwwGgYDVQQDExNBbWF6b24g\nUlNBIDIwNDggTTAyMB4XDTIzMDUxMzAwMDAwMFoXDTI0MDYxMDIzNTk1OVowKzEp\nMCcGA1UEAxMgb2lkYy5la3MudXMtZWFzdC0xLmFtYXpvbmF3cy5jb20wggEiMA0G\nCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQClT+mO1HZk/Gp/3sS6BO8QDhG0yK53\nE11wkdlUn9HEomcqZ2VVhbEG4ahOZY5MLUqIQViMswUueYFov57zyGnPSnH0IrMu\nmL3/dqxEwP96VPm5ZgbjCfartRfJcuYmmMCoWxocMdTq09ECEjawt47i4FmOLJmH\n+UUnisQgHMvPHtCrfL1WYAgdN3ls4meIFkS1CVHLmoCG9MuponJu3+uqw9UHxPZz\nvGLezHUUSzLE0+b+1Wd6DAPJBZmCa+PBweaRfrlqhhgW+QHcCK7XxlfwMxvzwmdv\nicOBHF7SJM/o3opUvrUf/XJCtCDHuv0GQNxyCcpJImQJ4Ae0MtEihY/rAgMBAAGj\nggL5MIIC9TAfBgNVHSMEGDAWgBTAMVLNWlDDgnx0cc7L6Zz5euuC4jAdBgNVHQ4E\nFgQUeamiamg4o8YroTJziJnlxHJnDdEwKwYDVR0RBCQwIoIgb2lkYy5la3MudXMt\nZWFzdC0xLmFtYXpvbmF3cy5jb20wDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQG\nCCsGAQUFBwMBBggrBgEFBQcDAjA7BgNVHR8ENDAyMDCgLqAshipodHRwOi8vY3Js\nLnIybTAyLmFtYXpvbnRydXN0LmNvbS9yMm0wMi5jcmwwEwYDVR0gBAwwCjAIBgZn\ngQwBAgEwdQYIKwYBBQUHAQEEaTBnMC0GCCsGAQUFBzABhiFodHRwOi8vb2NzcC5y\nMm0wMi5hbWF6b250cnVzdC5jb20wNgYIKwYBBQUHMAKGKmh0dHA6Ly9jcnQucjJt\nMDIuYW1hem9udHJ1c3QuY29tL3IybTAyLmNlcjAMBgNVHRMBAf8EAjAAMIIBfgYK\nKwYBBAHWeQIEAgSCAW4EggFqAWgAdgDuzdBk1dsazsVct520zROiModGfLzs3sNR\nSFlGcR+1mwAAAYgTgMKgAAAEAwBHMEUCIHtTzRueHJdgA2Wq32YkXNXRJ1ZRD2uC\nQCn025Jin2hCAiEAlV/lCQaMq1JoBRlULDV7n9f/VS8+xyJSVgMFRFwFtzsAdgBI\nsONr2qZHNA/lagL6nTDrHFIBy1bdLIHZu7+rOdiEcwAAAYgTgMLXAAAEAwBHMEUC\nIAKsJE1jj4gpyaa2VgkbHFszMoco2rABil1iy2YvVzmTAiEAsuzpO1atz7WIx1CM\nMU9iMqq58yDpLhjQFktRuWamDlsAdgDatr9rP7W2Ip+bwrtca+hwkXFsu1GEhTS9\npD0wSNf7qwAAAYgTgMKjAAAEAwBHMEUCIHuwITeM92ncsbOvXgXPQjLHDLgReknJ\nTUoo4uIlPetJAiEApQ3W+NHlj6/RhckoAxGn4zE1alq+Y3Bk3JUFAvDrR78wDQYJ\nKoZIhvcNAQELBQADggEBAFNUUzuzuuDQMUvefHzllQPg/zbGNeDRZeOomSl1FrxS\nFJ0CA2vznfoTXAJLS2/aWlQT9mR3h6WlxI5XSUaLrzcZi94F+l6Ixn8DJUhfgf+O\nZUxtmBX91AEQ1ccU+Odj2ILrWdSs28J82ODoPlkJ6OqIYo+kEXrUwy8SM2N9iFJw\nHgZNOwzPQ2Ox/ozlRh6/6OUgYZ84j343BoDnNbTQijLBe6HL4pVw4nPKWrUQnTot\nxMymAcBknnb4X4TcmEoJ0CrB1H6FKfe8yASCLjwSC72Os9ADyADMZqTUSOH1V8Vh\nR3Zv4DlLItu8BHaE59teueLM9AW1PBFMci5JiYrgLEM=\n-----END CERTIFICATE-----\n", "is_ca": false, "issuer": "CN=Amazon RSA 2048 M02,O=Amazon,C=US", "not_after": "2024-06-10T23:59:59Z", "not_before": "2023-05-13T00:00:00Z", "public_key_algorithm": "RSA", "serial_number": "9489663917354420509896793514074254267", "sha1_fingerprint": "aaa68bb211d468db8a8a19561ccba2e4043dcc80", "signature_algorithm": "SHA256-RSA", "subject": "CN=oidc.eks.us-east-1.amazonaws.com", "version": 3 } ], "content": null, "id": "5933588ce34e24e9fb40c3565fb0b5993639df67", "url": "https://oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8", "verify_chain": true }, "sensitive_attributes": [] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_cloudwatch_log_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:logs:us-east-1:159553542841:log-group:/aws/eks/do-eks-tf-efa/cluster", "id": "/aws/eks/do-eks-tf-efa/cluster", "kms_key_id": "", "name": "/aws/eks/do-eks-tf-efa/cluster", "name_prefix": "", "retention_in_days": 90, "skip_destroy": false, "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "/aws/eks/do-eks-tf-efa/cluster" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "/aws/eks/do-eks-tf-efa/cluster" } }, "sensitive_attributes": [], "private": "bnVsbA==", "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_ec2_tag", "name": "cluster_primary_security_group", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "Blueprint", "schema_version": 0, "attributes": { "id": "sg-0106e9e99f9c61772,Blueprint", "key": "Blueprint", "resource_id": "sg-0106e9e99f9c61772", "value": "do-eks-tf-efa" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": "GithubRepo", "schema_version": 0, "attributes": { "id": "sg-0106e9e99f9c61772,GithubRepo", "key": "GithubRepo", "resource_id": "sg-0106e9e99f9c61772", "value": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_eks_addon", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "coredns", "schema_version": 0, "attributes": { "addon_name": "coredns", "addon_version": "v1.9.3-eksbuild.3", "arn": "arn:aws:eks:us-east-1:159553542841:addon/do-eks-tf-efa/coredns/aec418ff-429a-8b61-e5f8-298c835d44e7", "cluster_name": "do-eks-tf-efa", "configuration_values": "", "created_at": "2023-05-19T03:12:24Z", "id": "do-eks-tf-efa:coredns", "modified_at": "2023-05-19T03:12:32Z", "preserve": null, "resolve_conflicts": "OVERWRITE", "service_account_role_arn": "", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_eks_addon_version.this", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": "kube-proxy", "schema_version": 0, "attributes": { "addon_name": "kube-proxy", "addon_version": "v1.25.9-eksbuild.1", "arn": "arn:aws:eks:us-east-1:159553542841:addon/do-eks-tf-efa/kube-proxy/f0c418ff-4281-3301-cd20-27c730eab75b", "cluster_name": "do-eks-tf-efa", "configuration_values": "", "created_at": "2023-05-19T03:12:24Z", "id": "do-eks-tf-efa:kube-proxy", "modified_at": "2023-05-19T03:12:56Z", "preserve": null, "resolve_conflicts": "OVERWRITE", "service_account_role_arn": "", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_eks_addon_version.this", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": "vpc-cni", "schema_version": 0, "attributes": { "addon_name": "vpc-cni", "addon_version": "v1.12.6-eksbuild.2", "arn": "arn:aws:eks:us-east-1:159553542841:addon/do-eks-tf-efa/vpc-cni/9ec418ff-4282-4530-8cc7-a2c691498476", "cluster_name": "do-eks-tf-efa", "configuration_values": "", "created_at": "2023-05-19T03:12:24Z", "id": "do-eks-tf-efa:vpc-cni", "modified_at": "2023-05-19T03:12:56Z", "preserve": null, "resolve_conflicts": "OVERWRITE", "service_account_role_arn": "", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "timeouts": { "create": null, "delete": null, "update": null } }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjI0MDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_eks_addon_version.this", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_eks_cluster", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:eks:us-east-1:159553542841:cluster/do-eks-tf-efa", "certificate_authority": [ { "data": "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" } ], "cluster_id": null, "created_at": "2023-05-19 02:59:41.082 +0000 UTC", "enabled_cluster_log_types": [ "api", "audit", "authenticator", "controllerManager", "scheduler" ], "encryption_config": [ { "provider": [ { "key_arn": "arn:aws:kms:us-east-1:159553542841:key/d921f189-0eb9-4e4c-af21-937f2db054f5" } ], "resources": [ "secrets" ] } ], "endpoint": "https://F0C2F81CD0B1421F37C428245CEF97B8.gr7.us-east-1.eks.amazonaws.com", "id": "do-eks-tf-efa", "identity": [ { "oidc": [ { "issuer": "https://oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8" } ] } ], "kubernetes_network_config": [ { "ip_family": "ipv4", "service_ipv4_cidr": "172.20.0.0/16", "service_ipv6_cidr": "" } ], "name": "do-eks-tf-efa", "outpost_config": [], "platform_version": "eks.3", "role_arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002", "status": "ACTIVE", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "timeouts": { "create": null, "delete": null, "update": null }, "version": "1.25", "vpc_config": [ { "cluster_security_group_id": "sg-0106e9e99f9c61772", "endpoint_private_access": true, "endpoint_public_access": true, "public_access_cidrs": [ "0.0.0.0/0" ], "security_group_ids": [ "sg-0602f7940cb353ac1" ], "subnet_ids": [ "subnet-0409593e111fa925c", "subnet-09eafef4d750e3849" ], "vpc_id": "vpc-062ab3985546eda3b" } ] }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxODAwMDAwMDAwMDAwLCJkZWxldGUiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozNjAwMDAwMDAwMDAwfX0=", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_iam_openid_connect_provider", "name": "oidc_provider", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8", "client_id_list": [ "sts.amazonaws.com" ], "id": "arn:aws:iam::159553542841:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-eks-irsa" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-eks-irsa" }, "thumbprint_list": [ "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", "06b25927c42a721631c1efd9431e648fa62e1e39", "414a2060b738c635cc7fc243e052615592830c53", "aaa68bb211d468db8a8a19561ccba2e4043dcc80" ], "url": "oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.data.tls_certificate.this", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_iam_policy", "name": "cluster_encryption", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-cluster-ClusterEncryption20230519025939783400000012", "description": "Cluster encryption policy to allow cluster role to utilize CMK provided", "id": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-cluster-ClusterEncryption20230519025939783400000012", "name": "do-eks-tf-efa-cluster-ClusterEncryption20230519025939783400000012", "name_prefix": "do-eks-tf-efa-cluster-ClusterEncryption", "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"kms:Encrypt\",\"kms:Decrypt\",\"kms:ListGrants\",\"kms:DescribeKey\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:kms:us-east-1:159553542841:key/d921f189-0eb9-4e4c-af21-937f2db054f5\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPASKJRB3K4ZXECLR6Q3", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_role.this", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"eks.amazonaws.com\"},\"Sid\":\"EKSClusterAssumeRole\"}],\"Version\":\"2012-10-17\"}", "create_date": "2023-05-19T02:59:17Z", "description": "", "force_detach_policies": true, "id": "do-eks-tf-efa-cluster-20230519025917177300000002", "inline_policy": [ { "name": "do-eks-tf-efa-cluster", "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"logs:CreateLogGroup\"],\"Effect\":\"Deny\",\"Resource\":\"*\"}]}" } ], "managed_policy_arns": [ "arn:aws:iam::159553542841:policy/do-eks-tf-efa-cluster-ClusterEncryption20230519025939783400000012", "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController" ], "max_session_duration": 3600, "name": "do-eks-tf-efa-cluster-20230519025917177300000002", "name_prefix": "do-eks-tf-efa-cluster-", "path": "/", "permissions_boundary": null, "role_last_used": [ { "last_used_date": "2023-05-19T03:19:16Z", "region": "us-east-1" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AROASKJRB3K4TTQHJFDAL" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "cluster_encryption", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "do-eks-tf-efa-cluster-20230519025917177300000002-20230519025940326800000013", "policy_arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-cluster-ClusterEncryption20230519025939783400000012", "role": "do-eks-tf-efa-cluster-20230519025917177300000002" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_policy.cluster_encryption", "module.eks.aws_iam_role.this", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "AmazonEKSClusterPolicy", "schema_version": 0, "attributes": { "id": "do-eks-tf-efa-cluster-20230519025917177300000002-20230519025918358600000007", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "role": "do-eks-tf-efa-cluster-20230519025917177300000002" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_role.this", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_partition.current" ], "create_before_destroy": true }, { "index_key": "AmazonEKSVPCResourceController", "schema_version": 0, "attributes": { "id": "do-eks-tf-efa-cluster-20230519025917177300000002-20230519025918360700000008", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSVPCResourceController", "role": "do-eks-tf-efa-cluster-20230519025917177300000002" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_role.this", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_security_group", "name": "cluster", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:security-group/sg-0602f7940cb353ac1", "description": "EKS cluster security group", "egress": [], "id": "sg-0602f7940cb353ac1", "ingress": [ { "cidr_blocks": [], "description": "Node groups to cluster API", "from_port": 443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-017d8f7d8aea525b1" ], "self": false, "to_port": 443 } ], "name": "do-eks-tf-efa-cluster-20230519025929335800000009", "name_prefix": "do-eks-tf-efa-cluster-", "owner_id": "159553542841", "revoke_rules_on_delete": false, "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-cluster" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-cluster" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", "dependencies": [ "module.vpc.aws_vpc.this" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_security_group", "name": "node", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:security-group/sg-017d8f7d8aea525b1", "description": "EKS node shared security group", "egress": [ { "cidr_blocks": [ "0.0.0.0/0" ], "description": "Allow all egress", "from_port": 0, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0 }, { "cidr_blocks": [], "description": "Node to node all egress traffic", "from_port": 0, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": true, "to_port": 0 } ], "id": "sg-017d8f7d8aea525b1", "ingress": [ { "cidr_blocks": [], "description": "Cluster API to node 4443/tcp webhook", "from_port": 4443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 4443 }, { "cidr_blocks": [], "description": "Cluster API to node 6443/tcp webhook", "from_port": 6443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 6443 }, { "cidr_blocks": [], "description": "Cluster API to node 8443/tcp webhook", "from_port": 8443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 8443 }, { "cidr_blocks": [], "description": "Cluster API to node 9443/tcp webhook", "from_port": 9443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 9443 }, { "cidr_blocks": [], "description": "Cluster API to node groups", "from_port": 443, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 443 }, { "cidr_blocks": [], "description": "Cluster API to node kubelets", "from_port": 10250, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [ "sg-0602f7940cb353ac1" ], "self": false, "to_port": 10250 }, { "cidr_blocks": [], "description": "Node to node CoreDNS UDP", "from_port": 53, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "udp", "security_groups": [], "self": true, "to_port": 53 }, { "cidr_blocks": [], "description": "Node to node CoreDNS", "from_port": 53, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": true, "to_port": 53 }, { "cidr_blocks": [], "description": "Node to node all ingress traffic", "from_port": 0, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": true, "to_port": 0 }, { "cidr_blocks": [], "description": "Node to node ingress on ephemeral ports", "from_port": 1025, "ipv6_cidr_blocks": [], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": true, "to_port": 65535 } ], "name": "do-eks-tf-efa-node-2023051902592933640000000a", "name_prefix": "do-eks-tf-efa-node-", "owner_id": "159553542841", "revoke_rules_on_delete": false, "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-node", "kubernetes.io/cluster/do-eks-tf-efa": "owned" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-node", "kubernetes.io/cluster/do-eks-tf-efa": "owned" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6OTAwMDAwMDAwMDAwfSwic2NoZW1hX3ZlcnNpb24iOiIxIn0=", "dependencies": [ "module.vpc.aws_vpc.this" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_security_group_rule", "name": "cluster", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "ingress_nodes_443", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node groups to cluster API", "from_port": 443, "id": "sgrule-1384518174", "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "security_group_id": "sg-0602f7940cb353ac1", "security_group_rule_id": "sgr-0393525245d2fbd0a", "self": false, "source_security_group_id": "sg-017d8f7d8aea525b1", "timeouts": null, "to_port": 443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "aws_security_group_rule", "name": "node", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "egress_all", "schema_version": 2, "attributes": { "cidr_blocks": [ "0.0.0.0/0" ], "description": "Allow all egress", "from_port": 0, "id": "sgrule-3018948066", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "-1", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-0514401935576ce19", "self": false, "source_security_group_id": null, "timeouts": null, "to_port": 0, "type": "egress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "egress_self_all", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node all egress traffic", "from_port": 0, "id": "sgrule-2246324743", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "-1", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-013d6e242a7aeb740", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 0, "type": "egress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_443", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node groups", "from_port": 443, "id": "sgrule-1170605318", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-0b78f533ce725155f", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_4443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 4443/tcp webhook", "from_port": 4443, "id": "sgrule-2525668302", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-0ad8d1bc20448bf67", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 4443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_6443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 6443/tcp webhook", "from_port": 6443, "id": "sgrule-1606992984", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-012d352c48ed91ff1", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 6443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_8443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 8443/tcp webhook", "from_port": 8443, "id": "sgrule-1284831353", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-06587cbec89557396", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 8443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_9443_webhook", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node 9443/tcp webhook", "from_port": 9443, "id": "sgrule-674614194", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-0d4f3b7030135db01", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 9443, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_cluster_kubelet", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Cluster API to node kubelets", "from_port": 10250, "id": "sgrule-293272727", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-0dda7dce3ec0baa5d", "self": false, "source_security_group_id": "sg-0602f7940cb353ac1", "timeouts": null, "to_port": 10250, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_nodes_ephemeral", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node ingress on ephemeral ports", "from_port": 1025, "id": "sgrule-1237128495", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-00bb8f899f2667274", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 65535, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_self_all", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node all ingress traffic", "from_port": 0, "id": "sgrule-2942474660", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "-1", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-013d6e242a7aeb740", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 0, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_self_coredns_tcp", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node CoreDNS", "from_port": 53, "id": "sgrule-121202738", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "tcp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-05cc515f634dafa72", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 53, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true }, { "index_key": "ingress_self_coredns_udp", "schema_version": 2, "attributes": { "cidr_blocks": null, "description": "Node to node CoreDNS UDP", "from_port": 53, "id": "sgrule-2741423069", "ipv6_cidr_blocks": null, "prefix_list_ids": [], "protocol": "udp", "security_group_id": "sg-017d8f7d8aea525b1", "security_group_rule_id": "sgr-00d9e4e21a7d9f96e", "self": true, "source_security_group_id": null, "timeouts": null, "to_port": 53, "type": "ingress" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjIifQ==", "dependencies": [ "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.vpc.aws_vpc.this" ], "create_before_destroy": true } ] }, { "module": "module.eks", "mode": "managed", "type": "kubernetes_config_map_v1_data", "name": "aws_auth", "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "data": { "mapAccounts": "[]\n", "mapRoles": "- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::159553542841:role/sys-eks-node-group-20230519025917175700000001\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n- \"groups\":\n - \"system:bootstrappers\"\n - \"system:nodes\"\n \"rolearn\": \"arn:aws:iam::159553542841:role/efa-node-group-2023051902593114180000000c\"\n \"username\": \"system:node:{{EC2PrivateDNSName}}\"\n", "mapUsers": "[]\n" }, "field_manager": "Terraform", "force": true, "id": "kube-system/aws-auth", "metadata": [ { "name": "aws-auth", "namespace": "kube-system" } ] }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.kubernetes_config_map.aws_auth", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.fargate_profile.aws_eks_fargate_profile.this", "module.eks.module.fargate_profile.aws_iam_role.this", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.additional", "module.eks.module.fargate_profile.aws_iam_role_policy_attachment.this", "module.eks.module.fargate_profile.data.aws_caller_identity.current", "module.eks.module.fargate_profile.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.fargate_profile.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_autoscaling_group.this", "module.eks.module.self_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks", "mode": "managed", "type": "time_sleep", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/time\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "create_duration": "30s", "destroy_duration": null, "id": "2023-05-19T03:10:25Z", "triggers": { "cluster_certificate_authority_data": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMvakNDQWVhZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJek1EVXhPVEF6TURVeU5sb1hEVE16TURVeE5qQXpNRFV5Tmxvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTHd4CkFpSC9VZlRqemxVa1VaUHk2bkxYdUVYRFpQU3BZSFpyWk0rSlNUTFRlZkU2b3p4SzgyZUs3cG9Rd3Z1YjJ3b1gKN1c3UllXWXVvUGpRTW81TXpqQzhac2ZXb0Q5MFcwRDV6TnppVzVNSk5Idm03a3pPM3BJaEJvTnBsQVB0VUpSbQpZRlYvWTNDd3FCeVlPbWRTUFAydE1LOFFqVUJRdFFvcWZMcFBHa3FDU0V3TndGeXdaYlJBUmp4MzZGZnk1NS8yCmhDZ3dvZTd3NXM4UENrRUM0SVJ5S1FLMnhoVXpwSXFtcFc1bnRRRy9xWStGd3QyRVZabFFmclU0L0h2T0c5ZGUKRkMydVZUZVdIcGIvNTlRZlBRd1pjWVI0MVBRY001U216OTlBNGljOFkxYmFtK2V6ZVB0U2N6S20rU2pwYlRzZwo1MlNJVDlSbEF5S1J3NERqbjdjQ0F3RUFBYU5aTUZjd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZMR2ZON0ZBT3E3NXhXRENzS0dHM2J3M0Nma0RNQlVHQTFVZEVRUU8KTUF5Q0NtdDFZbVZ5Ym1WMFpYTXdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBSzN2dmFJakNiVktMd0ZBbENMTQpyaVdVNDFyMXFCaEwrSjUwaEZ5V2Z4N1QyK3psc0YzNnBvU2xiWmpYQi9BYWRzSk9uayt4ZWpHcU1hTU9CVTJtCmdGVkp2Y3hSMEhnN2FFK0NtbmRET1BkakpQb3c3cGUyQjFxSmNxdENrUHhyZ2xUVTZoQSs3bHNVOFA3bklFckQKTUxXMXplOXNuUlk2UGFHWHQ1M3FJZmdLaTRiWitjektFVXdxcG5NUlJoZExQK1lDVml2RXpxRDNHak1kUE9WMgpnVGcxbGwzMUtQQUdKNlppZFZnNkJ6K2RYcy9JamdMS09EcXJMcFp5eFVWYUV5M2tDYnA4cTVmTXRBU1dHeUhVClNFWnlFc2tSSVY1TXdQc0l4VCtYQSs0SFc1V1dqbllVRks5NUhnZXpzRkEyWVd5b0RIUlZ3ZTdaTFNWYlVKKzMKZFNrPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", "cluster_endpoint": "https://F0C2F81CD0B1421F37C428245CEF97B8.gr7.us-east-1.eks.amazonaws.com", "cluster_name": "do-eks-tf-efa", "cluster_version": "1.25" } }, "sensitive_attributes": [], "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "159553542841", "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "159553542841", "user_id": "AIDASKJRB3K47LZAOMIGN" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "data", "type": "aws_iam_policy_document", "name": "assume_role_policy", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2560088296", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRole" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "ec2.amazonaws.com" ], "type": "Service" } ], "resources": [], "sid": "EKSNodeAssumeRole" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "managed", "type": "aws_eks_node_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "ami_type": "AL2_x86_64", "arn": "arn:aws:eks:us-east-1:159553542841:nodegroup/do-eks-tf-efa/sys-20230519031025507800000018/4cc418fe-5b9e-2a59-c193-80f73e44456f", "capacity_type": "ON_DEMAND", "cluster_name": "do-eks-tf-efa", "disk_size": 0, "force_update_version": null, "id": "do-eks-tf-efa:sys-20230519031025507800000018", "instance_types": [ "m5.large" ], "labels": {}, "launch_template": [ { "id": "lt-002e827885ac7d975", "name": "sys-20230519031025127100000014", "version": "1" } ], "node_group_name": "sys-20230519031025507800000018", "node_group_name_prefix": "sys-", "node_role_arn": "arn:aws:iam::159553542841:role/sys-eks-node-group-20230519025917175700000001", "release_version": "1.25.9-20230513", "remote_access": [], "resources": [ { "autoscaling_groups": [ { "name": "eks-sys-20230519031025507800000018-4cc418fe-5b9e-2a59-c193-80f73e44456f" } ], "remote_access_security_group_id": "" } ], "scaling_config": [ { "desired_size": 2, "max_size": 5, "min_size": 1 } ], "status": "ACTIVE", "subnet_ids": [ "subnet-0409593e111fa925c", "subnet-09eafef4d750e3849" ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "sys" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "sys" }, "taint": [], "timeouts": { "create": null, "delete": null, "update": null }, "update_config": [ { "max_unavailable": 0, "max_unavailable_percentage": 33 } ], "version": "1.25" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozNjAwMDAwMDAwMDAwLCJkZWxldGUiOjM2MDAwMDAwMDAwMDAsInVwZGF0ZSI6MzYwMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:role/sys-eks-node-group-20230519025917175700000001", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}", "create_date": "2023-05-19T02:59:17Z", "description": "EKS managed node group IAM role", "force_detach_policies": true, "id": "sys-eks-node-group-20230519025917175700000001", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" ], "max_session_duration": 3600, "name": "sys-eks-node-group-20230519025917175700000001", "name_prefix": "sys-eks-node-group-", "path": "/", "permissions_boundary": null, "role_last_used": [ { "last_used_date": "2023-05-19T03:21:31Z", "region": "us-east-1" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AROASKJRB3K47UWD45746" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "additional", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "AmazonSSMManagedInstanceCore", "schema_version": 0, "attributes": { "id": "sys-eks-node-group-20230519025917175700000001-20230519025918153800000006", "policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", "role": "sys-eks-node-group-20230519025917175700000001" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current" ] } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "schema_version": 0, "attributes": { "id": "sys-eks-node-group-20230519025917175700000001-20230519025918019300000004", "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "role": "sys-eks-node-group-20230519025917175700000001" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true }, { "index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "schema_version": 0, "attributes": { "id": "sys-eks-node-group-20230519025917175700000001-20230519025918144900000005", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "role": "sys-eks-node-group-20230519025917175700000001" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true }, { "index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "schema_version": 0, "attributes": { "id": "sys-eks-node-group-20230519025917175700000001-20230519025918005900000003", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "role": "sys-eks-node-group-20230519025917175700000001" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.eks_managed_node_group[\"sys\"]", "mode": "managed", "type": "aws_launch_template", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:launch-template/lt-002e827885ac7d975", "block_device_mappings": [], "capacity_reservation_specification": [], "cpu_options": [], "credit_specification": [], "default_version": 1, "description": "Custom launch template for sys EKS managed node group", "disable_api_stop": false, "disable_api_termination": false, "ebs_optimized": "", "elastic_gpu_specifications": [], "elastic_inference_accelerator": [], "enclave_options": [], "hibernation_options": [], "iam_instance_profile": [], "id": "lt-002e827885ac7d975", "image_id": "", "instance_initiated_shutdown_behavior": "", "instance_market_options": [], "instance_requirements": [], "instance_type": "", "kernel_id": "", "key_name": "", "latest_version": 1, "license_specification": [], "maintenance_options": [], "metadata_options": [ { "http_endpoint": "enabled", "http_protocol_ipv6": "disabled", "http_put_response_hop_limit": 2, "http_tokens": "required", "instance_metadata_tags": "disabled" } ], "monitoring": [ { "enabled": true } ], "name": "sys-20230519031025127100000014", "name_prefix": "sys-", "network_interfaces": [], "placement": [], "private_dns_name_options": [], "ram_disk_id": "", "security_group_names": [], "tag_specifications": [ { "resource_type": "instance", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "sys" } }, { "resource_type": "network-interface", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "sys" } }, { "resource_type": "volume", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "sys" } } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "update_default_version": true, "user_data": "", "vpc_security_group_ids": [ "sg-017d8f7d8aea525b1" ] }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.kms", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "159553542841", "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "159553542841", "user_id": "AIDASKJRB3K47LZAOMIGN" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.kms", "mode": "data", "type": "aws_iam_policy_document", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "869549791", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"KeyAdministration\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:Update*\",\n \"kms:UntagResource\",\n \"kms:TagResource\",\n \"kms:ScheduleKeyDeletion\",\n \"kms:Revoke*\",\n \"kms:Put*\",\n \"kms:List*\",\n \"kms:Get*\",\n \"kms:Enable*\",\n \"kms:Disable*\",\n \"kms:Describe*\",\n \"kms:Delete*\",\n \"kms:Create*\",\n \"kms:CancelKeyDeletion\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::159553542841:user/iankouls\"\n }\n },\n {\n \"Sid\": \"KeyUsage\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002\"\n }\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "kms:CancelKeyDeletion", "kms:Create*", "kms:Delete*", "kms:Describe*", "kms:Disable*", "kms:Enable*", "kms:Get*", "kms:List*", "kms:Put*", "kms:Revoke*", "kms:ScheduleKeyDeletion", "kms:TagResource", "kms:UntagResource", "kms:Update*" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::159553542841:user/iankouls" ], "type": "AWS" } ], "resources": [ "*" ], "sid": "KeyAdministration" }, { "actions": [ "kms:Decrypt", "kms:DescribeKey", "kms:Encrypt", "kms:GenerateDataKey*", "kms:ReEncrypt*" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002" ], "type": "AWS" } ], "resources": [ "*" ], "sid": "KeyUsage" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.kms", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.kms", "mode": "managed", "type": "aws_kms_alias", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "cluster", "schema_version": 0, "attributes": { "arn": "arn:aws:kms:us-east-1:159553542841:alias/eks/do-eks-tf-efa", "id": "alias/eks/do-eks-tf-efa", "name": "alias/eks/do-eks-tf-efa", "name_prefix": "", "target_key_arn": "arn:aws:kms:us-east-1:159553542841:key/d921f189-0eb9-4e4c-af21-937f2db054f5", "target_key_id": "d921f189-0eb9-4e4c-af21-937f2db054f5" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_role.this", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current" ] } ] }, { "module": "module.eks.module.kms", "mode": "managed", "type": "aws_kms_key", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:kms:us-east-1:159553542841:key/d921f189-0eb9-4e4c-af21-937f2db054f5", "bypass_policy_lockout_safety_check": false, "custom_key_store_id": "", "customer_master_key_spec": "SYMMETRIC_DEFAULT", "deletion_window_in_days": null, "description": "do-eks-tf-efa cluster encryption key", "enable_key_rotation": true, "id": "d921f189-0eb9-4e4c-af21-937f2db054f5", "is_enabled": true, "key_id": "d921f189-0eb9-4e4c-af21-937f2db054f5", "key_usage": "ENCRYPT_DECRYPT", "multi_region": false, "policy": "{\"Statement\":[{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:Put*\",\"kms:List*\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::159553542841:user/iankouls\"},\"Resource\":\"*\",\"Sid\":\"KeyAdministration\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002\"},\"Resource\":\"*\",\"Sid\":\"KeyUsage\"}],\"Version\":\"2012-10-17\"}", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.eks.aws_iam_role.this", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "data", "type": "aws_ami", "name": "eks_default", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "architecture": "x86_64", "arn": "arn:aws:ec2:us-east-1::image/ami-0df8a70ed6ebea5ce", "block_device_mappings": [ { "device_name": "/dev/xvda", "ebs": { "delete_on_termination": "true", "encrypted": "false", "iops": "0", "snapshot_id": "snap-0543832c5503b8e60", "throughput": "0", "volume_size": "20", "volume_type": "gp2" }, "no_device": "", "virtual_name": "" } ], "boot_mode": "", "creation_date": "2023-05-15T17:36:59.000Z", "deprecation_time": "2025-05-15T17:36:59.000Z", "description": "EKS Kubernetes Worker AMI with AmazonLinux2 image, (k8s: 1.25.9, containerd: 1.6.*)", "ena_support": true, "executable_users": null, "filter": [ { "name": "name", "values": [ "amazon-eks-node-1.25-v*" ] } ], "hypervisor": "xen", "id": "ami-0df8a70ed6ebea5ce", "image_id": "ami-0df8a70ed6ebea5ce", "image_location": "amazon/amazon-eks-node-1.25-v20230513", "image_owner_alias": "amazon", "image_type": "machine", "imds_support": "", "include_deprecated": false, "kernel_id": "", "most_recent": true, "name": "amazon-eks-node-1.25-v20230513", "name_regex": null, "owner_id": "602401143452", "owners": [ "amazon" ], "platform": "", "platform_details": "Linux/UNIX", "product_codes": [], "public": true, "ramdisk_id": "", "root_device_name": "/dev/xvda", "root_device_type": "ebs", "root_snapshot_id": "snap-0543832c5503b8e60", "sriov_net_support": "simple", "state": "available", "state_reason": { "code": "UNSET", "message": "UNSET" }, "tags": {}, "timeouts": null, "tpm_support": "", "usage_operation": "RunInstances", "virtualization_type": "hvm" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "159553542841", "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "159553542841", "user_id": "AIDASKJRB3K47LZAOMIGN" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "data", "type": "aws_iam_policy_document", "name": "assume_role_policy", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "2560088296", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"EKSNodeAssumeRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "sts:AssumeRole" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [ { "identifiers": [ "ec2.amazonaws.com" ], "type": "Service" } ], "resources": [], "sid": "EKSNodeAssumeRole" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [] } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_autoscaling_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:autoscaling:us-east-1:159553542841:autoScalingGroup:6f65ebbd-3716-4687-88dc-1480ca66f5b1:autoScalingGroupName/efa-2023051903102551510000001a", "availability_zones": [ "us-east-1a" ], "capacity_rebalance": false, "context": "", "default_cooldown": 300, "default_instance_warmup": 0, "desired_capacity": 2, "desired_capacity_type": "", "enabled_metrics": [], "force_delete": false, "force_delete_warm_pool": false, "health_check_grace_period": 300, "health_check_type": "EC2", "id": "efa-2023051903102551510000001a", "initial_lifecycle_hook": [], "instance_refresh": [ { "preferences": [ { "auto_rollback": false, "checkpoint_delay": "", "checkpoint_percentages": [], "instance_warmup": "", "min_healthy_percentage": 66, "skip_matching": false } ], "strategy": "Rolling", "triggers": [] } ], "launch_configuration": "", "launch_template": [ { "id": "lt-0ffb2ceb51975d260", "name": "efa-20230519031025131500000016", "version": "1" } ], "load_balancers": [], "max_instance_lifetime": 0, "max_size": 8, "metrics_granularity": "1Minute", "min_elb_capacity": null, "min_size": 2, "mixed_instances_policy": [], "name": "efa-2023051903102551510000001a", "name_prefix": "efa-", "placement_group": "", "predicted_capacity": 0, "protect_from_scale_in": false, "service_linked_role_arn": "arn:aws:iam::159553542841:role/aws-service-role/autoscaling.amazonaws.com/AWSServiceRoleForAutoScaling", "suspended_processes": [], "tag": [ { "key": "Blueprint", "propagate_at_launch": true, "value": "do-eks-tf-efa" }, { "key": "GithubRepo", "propagate_at_launch": true, "value": "github.com/aws-ia/terraform-aws-eks-blueprints" }, { "key": "Name", "propagate_at_launch": true, "value": "efa" }, { "key": "k8s.io/cluster/do-eks-tf-efa", "propagate_at_launch": true, "value": "owned" }, { "key": "kubernetes.io/cluster/do-eks-tf-efa", "propagate_at_launch": true, "value": "owned" } ], "tags": null, "target_group_arns": [], "termination_policies": [], "timeouts": { "delete": null, "update": null }, "vpc_zone_identifier": [ "subnet-0409593e111fa925c" ], "wait_for_capacity_timeout": "10m", "wait_for_elb_capacity": null, "warm_pool": [], "warm_pool_size": 0 }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjo2MDAwMDAwMDAwMDAsInVwZGF0ZSI6NjAwMDAwMDAwMDAwfX0=", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.aws_launch_template.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_iam_instance_profile", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:instance-profile/efa-node-group-2023051902593463610000000f", "create_date": "2023-05-19T02:59:34Z", "id": "efa-node-group-2023051902593463610000000f", "name": "efa-node-group-2023051902593463610000000f", "name_prefix": "efa-node-group-", "path": "/", "role": "efa-node-group-2023051902593114180000000c", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AIPASKJRB3K4ZLX3ERB32" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_iam_role", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:role/efa-node-group-2023051902593114180000000c", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"ec2.amazonaws.com\"},\"Sid\":\"EKSNodeAssumeRole\"}],\"Version\":\"2012-10-17\"}", "create_date": "2023-05-19T02:59:31Z", "description": "Self managed node group IAM role", "force_detach_policies": true, "id": "efa-node-group-2023051902593114180000000c", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" ], "max_session_duration": 3600, "name": "efa-node-group-2023051902593114180000000c", "name_prefix": "efa-node-group-", "path": "/", "permissions_boundary": null, "role_last_used": [ { "last_used_date": "2023-05-19T03:25:55Z", "region": "us-east-1" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AROASKJRB3K42FM7Z3HDC" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "additional", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "AmazonSSMManagedInstanceCore", "schema_version": 0, "attributes": { "id": "efa-node-group-2023051902593114180000000c-2023051902593453160000000e", "policy_arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore", "role": "efa-node-group-2023051902593114180000000c" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "schema_version": 0, "attributes": { "id": "efa-node-group-2023051902593114180000000c-20230519025935003200000011", "policy_arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", "role": "efa-node-group-2023051902593114180000000c" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true }, { "index_key": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "schema_version": 0, "attributes": { "id": "efa-node-group-2023051902593114180000000c-20230519025934767900000010", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy", "role": "efa-node-group-2023051902593114180000000c" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true }, { "index_key": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "schema_version": 0, "attributes": { "id": "efa-node-group-2023051902593114180000000c-2023051902593452230000000d", "policy_arn": "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy", "role": "efa-node-group-2023051902593114180000000c" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks.module.self_managed_node_group[\"efa\"]", "mode": "managed", "type": "aws_launch_template", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:launch-template/lt-0ffb2ceb51975d260", "block_device_mappings": [ { "device_name": "/dev/xvda", "ebs": [ { "delete_on_termination": "true", "encrypted": "true", "iops": 3000, "kms_key_id": "", "snapshot_id": "", "throughput": 150, "volume_size": 40, "volume_type": "gp3" } ], "no_device": "", "virtual_name": "" } ], "capacity_reservation_specification": [], "cpu_options": [], "credit_specification": [], "default_version": 1, "description": "Custom launch template for efa self managed node group", "disable_api_stop": false, "disable_api_termination": false, "ebs_optimized": "true", "elastic_gpu_specifications": [], "elastic_inference_accelerator": [], "enclave_options": [], "hibernation_options": [], "iam_instance_profile": [ { "arn": "arn:aws:iam::159553542841:instance-profile/efa-node-group-2023051902593463610000000f", "name": "" } ], "id": "lt-0ffb2ceb51975d260", "image_id": "ami-0eb644d80a076026c", "instance_initiated_shutdown_behavior": "", "instance_market_options": [], "instance_requirements": [], "instance_type": "g4dn.metal", "kernel_id": "", "key_name": "", "latest_version": 1, "license_specification": [], "maintenance_options": [], "metadata_options": [ { "http_endpoint": "enabled", "http_protocol_ipv6": "disabled", "http_put_response_hop_limit": 2, "http_tokens": "required", "instance_metadata_tags": "disabled" } ], "monitoring": [ { "enabled": true } ], "name": "efa-20230519031025131500000016", "name_prefix": "efa-", "network_interfaces": [ { "associate_carrier_ip_address": "", "associate_public_ip_address": "false", "delete_on_termination": "true", "description": "EFA interface", "device_index": 0, "interface_type": "efa", "ipv4_address_count": 0, "ipv4_addresses": [], "ipv4_prefix_count": 0, "ipv4_prefixes": [], "ipv6_address_count": 0, "ipv6_addresses": [], "ipv6_prefix_count": 0, "ipv6_prefixes": [], "network_card_index": 0, "network_interface_id": "", "private_ip_address": "", "security_groups": [ "sg-017d8f7d8aea525b1" ], "subnet_id": "" } ], "placement": [ { "affinity": "", "availability_zone": "", "group_name": "efa_pg", "host_id": "", "host_resource_group_arn": "", "partition_number": 0, "spread_domain": "", "tenancy": "" } ], "private_dns_name_options": [], "ram_disk_id": "", "security_group_names": [], "tag_specifications": [ { "resource_type": "instance", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "efa" } }, { "resource_type": "network-interface", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "efa" } }, { "resource_type": "volume", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "efa" } } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "update_default_version": true, "user_data": "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", "vpc_security_group_ids": [] }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "aws_placement_group.efa_pg", "data.aws_ami.eks_gpu_node", "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.module.self_managed_node_group.aws_iam_instance_profile.this", "module.eks.module.self_managed_node_group.aws_iam_role.this", "module.eks.module.self_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.self_managed_node_group.data.aws_ami.eks_default", "module.eks.module.self_managed_node_group.data.aws_caller_identity.current", "module.eks.module.self_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.self_managed_node_group.data.aws_partition.current", "module.eks.module.self_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.eks_blueprints_kubernetes_addons", "mode": "data", "type": "aws_caller_identity", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "account_id": "159553542841", "arn": "arn:aws:iam::159553542841:user/iankouls", "id": "159553542841", "user_id": "AIDASKJRB3K47LZAOMIGN" }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons", "mode": "data", "type": "aws_eks_cluster", "name": "eks_cluster", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:eks:us-east-1:159553542841:cluster/do-eks-tf-efa", "certificate_authority": [ { "data": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMvakNDQWVhZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRJek1EVXhPVEF6TURVeU5sb1hEVE16TURVeE5qQXpNRFV5Tmxvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTHd4CkFpSC9VZlRqemxVa1VaUHk2bkxYdUVYRFpQU3BZSFpyWk0rSlNUTFRlZkU2b3p4SzgyZUs3cG9Rd3Z1YjJ3b1gKN1c3UllXWXVvUGpRTW81TXpqQzhac2ZXb0Q5MFcwRDV6TnppVzVNSk5Idm03a3pPM3BJaEJvTnBsQVB0VUpSbQpZRlYvWTNDd3FCeVlPbWRTUFAydE1LOFFqVUJRdFFvcWZMcFBHa3FDU0V3TndGeXdaYlJBUmp4MzZGZnk1NS8yCmhDZ3dvZTd3NXM4UENrRUM0SVJ5S1FLMnhoVXpwSXFtcFc1bnRRRy9xWStGd3QyRVZabFFmclU0L0h2T0c5ZGUKRkMydVZUZVdIcGIvNTlRZlBRd1pjWVI0MVBRY001U216OTlBNGljOFkxYmFtK2V6ZVB0U2N6S20rU2pwYlRzZwo1MlNJVDlSbEF5S1J3NERqbjdjQ0F3RUFBYU5aTUZjd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0hRWURWUjBPQkJZRUZMR2ZON0ZBT3E3NXhXRENzS0dHM2J3M0Nma0RNQlVHQTFVZEVRUU8KTUF5Q0NtdDFZbVZ5Ym1WMFpYTXdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBSzN2dmFJakNiVktMd0ZBbENMTQpyaVdVNDFyMXFCaEwrSjUwaEZ5V2Z4N1QyK3psc0YzNnBvU2xiWmpYQi9BYWRzSk9uayt4ZWpHcU1hTU9CVTJtCmdGVkp2Y3hSMEhnN2FFK0NtbmRET1BkakpQb3c3cGUyQjFxSmNxdENrUHhyZ2xUVTZoQSs3bHNVOFA3bklFckQKTUxXMXplOXNuUlk2UGFHWHQ1M3FJZmdLaTRiWitjektFVXdxcG5NUlJoZExQK1lDVml2RXpxRDNHak1kUE9WMgpnVGcxbGwzMUtQQUdKNlppZFZnNkJ6K2RYcy9JamdMS09EcXJMcFp5eFVWYUV5M2tDYnA4cTVmTXRBU1dHeUhVClNFWnlFc2tSSVY1TXdQc0l4VCtYQSs0SFc1V1dqbllVRks5NUhnZXpzRkEyWVd5b0RIUlZ3ZTdaTFNWYlVKKzMKZFNrPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" } ], "cluster_id": null, "created_at": "2023-05-19 02:59:41.082 +0000 UTC", "enabled_cluster_log_types": [ "api", "audit", "authenticator", "controllerManager", "scheduler" ], "endpoint": "https://F0C2F81CD0B1421F37C428245CEF97B8.gr7.us-east-1.eks.amazonaws.com", "id": "do-eks-tf-efa", "identity": [ { "oidc": [ { "issuer": "https://oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8" } ] } ], "kubernetes_network_config": [ { "ip_family": "ipv4", "service_ipv4_cidr": "172.20.0.0/16", "service_ipv6_cidr": "" } ], "name": "do-eks-tf-efa", "outpost_config": [], "platform_version": "eks.3", "role_arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-cluster-20230519025917177300000002", "status": "ACTIVE", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "version": "1.25", "vpc_config": [ { "cluster_security_group_id": "sg-0106e9e99f9c61772", "endpoint_private_access": true, "endpoint_public_access": true, "public_access_cidrs": [ "0.0.0.0/0" ], "security_group_ids": [ "sg-0602f7940cb353ac1" ], "subnet_ids": [ "subnet-0409593e111fa925c", "subnet-09eafef4d750e3849" ], "vpc_id": "vpc-062ab3985546eda3b" } ] }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons", "mode": "data", "type": "aws_partition", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "dns_suffix": "amazonaws.com", "id": "aws", "partition": "aws", "reverse_dns_prefix": "com.amazonaws" }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons", "mode": "data", "type": "aws_region", "name": "current", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "description": "US East (N. Virginia)", "endpoint": "ec2.us-east-1.amazonaws.com", "id": "us-east-1", "name": "us-east-1" }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons", "mode": "managed", "type": "time_sleep", "name": "dataplane", "provider": "provider[\"registry.terraform.io/hashicorp/time\"]", "instances": [ { "schema_version": 0, "attributes": { "create_duration": "10s", "destroy_duration": null, "id": "2023-05-19T03:12:33Z", "triggers": { "data_plane_wait_arn": "arn:aws:eks:us-east-1:159553542841:nodegroup/do-eks-tf-efa/sys-20230519031025507800000018/4cc418fe-5b9e-2a59-c193-80f73e44456f", "eks_cluster_id": "do-eks-tf-efa" } }, "sensitive_attributes": [], "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0]", "mode": "data", "type": "aws_iam_policy_document", "name": "aws_efs_csi_driver", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "3445723364", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"AllowDescribeAvailabilityZones\",\n \"Effect\": \"Allow\",\n \"Action\": \"ec2:DescribeAvailabilityZones\",\n \"Resource\": \"*\"\n },\n {\n \"Sid\": \"AllowDescribeFileSystems\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticfilesystem:DescribeMountTargets\",\n \"elasticfilesystem:DescribeFileSystems\",\n \"elasticfilesystem:DescribeAccessPoints\"\n ],\n \"Resource\": [\n \"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\n \"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\"\n ]\n },\n {\n \"Sid\": \"AllowCreateAccessPoint\",\n \"Effect\": \"Allow\",\n \"Action\": \"elasticfilesystem:CreateAccessPoint\",\n \"Resource\": \"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/efs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"TagResource\",\n \"Effect\": \"Allow\",\n \"Action\": \"elasticfilesystem:TagResource\",\n \"Resource\": \"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:RequestTag/efs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"AllowDeleteAccessPoint\",\n \"Effect\": \"Allow\",\n \"Action\": \"elasticfilesystem:DeleteAccessPoint\",\n \"Resource\": \"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\",\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/efs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"AllowTagResource\",\n \"Effect\": \"Allow\",\n \"Action\": \"elasticfilesystem:TagResource\",\n \"Resource\": [\n \"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\n \"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\"\n ],\n \"Condition\": {\n \"StringLike\": {\n \"aws:ResourceTag/efs.csi.aws.com/cluster\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"elasticfilesystem:ClientWrite\",\n \"elasticfilesystem:ClientRootAccess\",\n \"elasticfilesystem:ClientMount\"\n ],\n \"Resource\": \"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\n \"Condition\": {\n \"Bool\": {\n \"elasticfilesystem:AccessedViaMountTarget\": \"true\"\n }\n }\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "ec2:DescribeAvailabilityZones" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "*" ], "sid": "AllowDescribeAvailabilityZones" }, { "actions": [ "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*", "arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*" ], "sid": "AllowDescribeFileSystems" }, { "actions": [ "elasticfilesystem:CreateAccessPoint" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:RequestTag/efs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*" ], "sid": "AllowCreateAccessPoint" }, { "actions": [ "elasticfilesystem:TagResource" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:RequestTag/efs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*" ], "sid": "TagResource" }, { "actions": [ "elasticfilesystem:DeleteAccessPoint" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:ResourceTag/efs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*" ], "sid": "AllowDeleteAccessPoint" }, { "actions": [ "elasticfilesystem:TagResource" ], "condition": [ { "test": "StringLike", "values": [ "true" ], "variable": "aws:ResourceTag/efs.csi.aws.com/cluster" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*", "arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*" ], "sid": "AllowTagResource" }, { "actions": [ "elasticfilesystem:ClientMount", "elasticfilesystem:ClientRootAccess", "elasticfilesystem:ClientWrite" ], "condition": [ { "test": "Bool", "values": [ "true" ], "variable": "elasticfilesystem:AccessedViaMountTarget" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0]", "mode": "managed", "type": "aws_iam_policy", "name": "aws_efs_csi_driver", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-efs-csi-policy", "description": "IAM Policy for AWS EFS CSI Driver", "id": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-efs-csi-policy", "name": "do-eks-tf-efa-efs-csi-policy", "name_prefix": "", "path": "/", "policy": "{\"Statement\":[{\"Action\":\"ec2:DescribeAvailabilityZones\",\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowDescribeAvailabilityZones\"},{\"Action\":[\"elasticfilesystem:DescribeMountTargets\",\"elasticfilesystem:DescribeFileSystems\",\"elasticfilesystem:DescribeAccessPoints\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\"],\"Sid\":\"AllowDescribeFileSystems\"},{\"Action\":\"elasticfilesystem:CreateAccessPoint\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/efs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\"Sid\":\"AllowCreateAccessPoint\"},{\"Action\":\"elasticfilesystem:TagResource\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/efs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\"Sid\":\"TagResource\"},{\"Action\":\"elasticfilesystem:DeleteAccessPoint\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/efs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\",\"Sid\":\"AllowDeleteAccessPoint\"},{\"Action\":\"elasticfilesystem:TagResource\",\"Condition\":{\"StringLike\":{\"aws:ResourceTag/efs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\"arn:aws:elasticfilesystem:us-east-1:159553542841:access-point/*\"],\"Sid\":\"AllowTagResource\"},{\"Action\":[\"elasticfilesystem:ClientWrite\",\"elasticfilesystem:ClientRootAccess\",\"elasticfilesystem:ClientMount\"],\"Condition\":{\"Bool\":{\"elasticfilesystem:AccessedViaMountTarget\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:elasticfilesystem:us-east-1:159553542841:file-system/*\",\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPASKJRB3K4UNH4INVCR", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.data.aws_iam_policy_document.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0].module.helm_addon", "mode": "managed", "type": "helm_release", "name": "addon", "provider": "provider[\"registry.terraform.io/hashicorp/helm\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "atomic": false, "chart": "aws-efs-csi-driver", "cleanup_on_fail": false, "create_namespace": false, "dependency_update": false, "description": "The AWS EFS CSI driver Helm chart deployment configuration", "devel": null, "disable_crd_hooks": false, "disable_openapi_validation": false, "disable_webhooks": false, "force_update": false, "id": "aws-efs-csi-driver", "keyring": "", "lint": false, "manifest": null, "max_history": 0, "metadata": [ { "app_version": "1.4.5", "chart": "aws-efs-csi-driver", "name": "aws-efs-csi-driver", "namespace": "kube-system", "revision": 1, "values": "{\"controller\":{\"serviceAccount\":{\"create\":false,\"name\":\"aws-efs-csi-driver-sa\"}},\"node\":{\"serviceAccount\":{\"create\":false,\"name\":\"aws-efs-csi-driver-sa\"}}}", "version": "2.3.2" } ], "name": "aws-efs-csi-driver", "namespace": "kube-system", "pass_credentials": false, "postrender": [ { "args": [], "binary_path": "" } ], "recreate_pods": false, "render_subchart_notes": true, "replace": false, "repository": "https://kubernetes-sigs.github.io/aws-efs-csi-driver/", "repository_ca_file": null, "repository_cert_file": "", "repository_key_file": "", "repository_password": "", "repository_username": "", "reset_values": false, "reuse_values": false, "set": [ { "name": "controller.serviceAccount.create", "type": "", "value": "false" }, { "name": "controller.serviceAccount.name", "type": "", "value": "aws-efs-csi-driver-sa" }, { "name": "node.serviceAccount.create", "type": "", "value": "false" }, { "name": "node.serviceAccount.name", "type": "", "value": "aws-efs-csi-driver-sa" } ], "set_sensitive": [], "skip_crds": false, "status": "deployed", "timeout": 1200, "values": null, "verify": false, "version": "2.3.2", "wait": true, "wait_for_jobs": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.aws_iam_policy.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.data.aws_iam_policy_document.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.aws_iam_role_policy_attachment.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.kubernetes_namespace_v1.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.kubernetes_secret_v1.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.kubernetes_service_account_v1.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "aws_iam_role", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-aws-efs-csi-driver-sa-irsa", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringLike\":{\"oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8:sub\":\"system:serviceaccount:kube-system:aws-efs-csi-driver-sa\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::159553542841:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2023-05-19T03:12:34Z", "description": "AWS IAM Role for the Kubernetes service account aws-efs-csi-driver-sa.", "force_detach_policies": true, "id": "do-eks-tf-efa-aws-efs-csi-driver-sa-irsa", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::159553542841:policy/do-eks-tf-efa-efs-csi-policy" ], "max_session_duration": 3600, "name": "do-eks-tf-efa-aws-efs-csi-driver-sa-irsa", "name_prefix": "", "path": "/", "permissions_boundary": "", "role_last_used": [ { "last_used_date": "", "region": "" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AROASKJRB3K4SPDMJZW7S" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.aws_iam_policy.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.data.aws_iam_policy_document.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "do-eks-tf-efa-aws-efs-csi-driver-sa-irsa-2023051903123493770000001e", "policy_arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-efs-csi-policy", "role": "do-eks-tf-efa-aws-efs-csi-driver-sa-irsa" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.aws_iam_policy.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.data.aws_iam_policy_document.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "kubernetes_service_account_v1", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "automount_service_account_token": true, "default_secret_name": "", "id": "kube-system/aws-efs-csi-driver-sa", "image_pull_secret": [], "metadata": [ { "annotations": { "eks.amazonaws.com/role-arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-aws-efs-csi-driver-sa-irsa" }, "generate_name": "", "generation": 0, "labels": {}, "name": "aws-efs-csi-driver-sa", "namespace": "kube-system", "resource_version": "1550", "uid": "e7723621-8104-4a6f-bae8-9478cd937c3f" } ], "secret": [], "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.aws_iam_policy.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.data.aws_iam_policy_document.aws_efs_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_efs_csi_driver.module.helm_addon.module.irsa.kubernetes_namespace_v1.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0]", "mode": "data", "type": "aws_iam_policy_document", "name": "aws_fsx_csi_driver", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "id": "3172025836", "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"AllowCreateServiceLinkedRoles\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"iam:PutRolePolicy\",\n \"iam:CreateServiceLinkedRole\",\n \"iam:AttachRolePolicy\"\n ],\n \"Resource\": \"arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*\"\n },\n {\n \"Sid\": \"AllowCreateServiceLinkedRole\",\n \"Effect\": \"Allow\",\n \"Action\": \"iam:CreateServiceLinkedRole\",\n \"Resource\": \"arn:aws:iam::159553542841:role/*\",\n \"Condition\": {\n \"StringLike\": {\n \"iam:AWSServiceName\": \"fsx.amazonaws.com\"\n }\n }\n },\n {\n \"Sid\": \"AllowListBuckets\",\n \"Effect\": \"Allow\",\n \"Action\": \"s3:ListBucket\",\n \"Resource\": \"arn:aws:s3:::*\"\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"fsx:UpdateFileSystem\",\n \"fsx:DeleteFileSystem\",\n \"fsx:CreateFileSystem\"\n ],\n \"Resource\": \"arn:aws:fsx:us-east-1:159553542841:file-system/*\"\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"fsx:TagResource\",\n \"fsx:DescribeFileSystems\"\n ],\n \"Resource\": \"arn:aws:fsx:us-east-1:159553542841:*\"\n }\n ]\n}", "override_json": null, "override_policy_documents": null, "policy_id": null, "source_json": null, "source_policy_documents": null, "statement": [ { "actions": [ "iam:AttachRolePolicy", "iam:CreateServiceLinkedRole", "iam:PutRolePolicy" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*" ], "sid": "AllowCreateServiceLinkedRoles" }, { "actions": [ "iam:CreateServiceLinkedRole" ], "condition": [ { "test": "StringLike", "values": [ "fsx.amazonaws.com" ], "variable": "iam:AWSServiceName" } ], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:iam::159553542841:role/*" ], "sid": "AllowCreateServiceLinkedRole" }, { "actions": [ "s3:ListBucket" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:s3:::*" ], "sid": "AllowListBuckets" }, { "actions": [ "fsx:CreateFileSystem", "fsx:DeleteFileSystem", "fsx:UpdateFileSystem" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:fsx:us-east-1:159553542841:file-system/*" ], "sid": "" }, { "actions": [ "fsx:DescribeFileSystems", "fsx:TagResource" ], "condition": [], "effect": "Allow", "not_actions": [], "not_principals": [], "not_resources": [], "principals": [], "resources": [ "arn:aws:fsx:us-east-1:159553542841:*" ], "sid": "" } ], "version": "2012-10-17" }, "sensitive_attributes": [] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0]", "mode": "managed", "type": "aws_iam_policy", "name": "aws_fsx_csi_driver", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-fsx-csi-policy", "description": "IAM Policy for AWS FSx CSI Driver", "id": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-fsx-csi-policy", "name": "do-eks-tf-efa-fsx-csi-policy", "name_prefix": "", "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"iam:PutRolePolicy\",\"iam:CreateServiceLinkedRole\",\"iam:AttachRolePolicy\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:iam::*:role/aws-service-role/s3.data-source.lustre.fsx.amazonaws.com/*\",\"Sid\":\"AllowCreateServiceLinkedRoles\"},{\"Action\":\"iam:CreateServiceLinkedRole\",\"Condition\":{\"StringLike\":{\"iam:AWSServiceName\":\"fsx.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:iam::159553542841:role/*\",\"Sid\":\"AllowCreateServiceLinkedRole\"},{\"Action\":\"s3:ListBucket\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:s3:::*\",\"Sid\":\"AllowListBuckets\"},{\"Action\":[\"fsx:UpdateFileSystem\",\"fsx:DeleteFileSystem\",\"fsx:CreateFileSystem\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:fsx:us-east-1:159553542841:file-system/*\",\"Sid\":\"\"},{\"Action\":[\"fsx:TagResource\",\"fsx:DescribeFileSystems\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:fsx:us-east-1:159553542841:*\",\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", "policy_id": "ANPASKJRB3K44AOV4IS7L", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.data.aws_iam_policy_document.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0].module.helm_addon", "mode": "managed", "type": "helm_release", "name": "addon", "provider": "provider[\"registry.terraform.io/hashicorp/helm\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "atomic": false, "chart": "aws-fsx-csi-driver", "cleanup_on_fail": false, "create_namespace": false, "dependency_update": false, "description": "The Amazon FSx for Lustre CSI driver Helm chart deployment configuration", "devel": null, "disable_crd_hooks": false, "disable_openapi_validation": false, "disable_webhooks": false, "force_update": false, "id": "aws-fsx-csi-driver", "keyring": "", "lint": false, "manifest": null, "max_history": 0, "metadata": [ { "app_version": "0.9.0", "chart": "aws-fsx-csi-driver", "name": "aws-fsx-csi-driver", "namespace": "kube-system", "revision": 1, "values": "{\"controller\":{\"serviceAccount\":{\"create\":false,\"name\":\"fsx-csi-sa\"}},\"node\":{\"serviceAccount\":{\"create\":false,\"name\":\"fsx-csi-sa\"}}}", "version": "1.5.0" } ], "name": "aws-fsx-csi-driver", "namespace": "kube-system", "pass_credentials": false, "postrender": [ { "args": [], "binary_path": "" } ], "recreate_pods": false, "render_subchart_notes": true, "replace": false, "repository": "https://kubernetes-sigs.github.io/aws-fsx-csi-driver/", "repository_ca_file": null, "repository_cert_file": "", "repository_key_file": "", "repository_password": "", "repository_username": "", "reset_values": false, "reuse_values": false, "set": [ { "name": "controller.serviceAccount.create", "type": "", "value": "false" }, { "name": "controller.serviceAccount.name", "type": "", "value": "fsx-csi-sa" }, { "name": "node.serviceAccount.create", "type": "", "value": "false" }, { "name": "node.serviceAccount.name", "type": "", "value": "fsx-csi-sa" } ], "set_sensitive": [], "skip_crds": false, "status": "deployed", "timeout": 1200, "values": null, "verify": false, "version": "1.5.0", "wait": true, "wait_for_jobs": false }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.aws_iam_policy.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.data.aws_iam_policy_document.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.aws_iam_role_policy_attachment.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.kubernetes_namespace_v1.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.kubernetes_secret_v1.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.kubernetes_service_account_v1.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "aws_iam_role", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-fsx-csi-sa-irsa", "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRoleWithWebIdentity\",\"Condition\":{\"StringLike\":{\"oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8:aud\":\"sts.amazonaws.com\",\"oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8:sub\":\"system:serviceaccount:kube-system:fsx-csi-sa\"}},\"Effect\":\"Allow\",\"Principal\":{\"Federated\":\"arn:aws:iam::159553542841:oidc-provider/oidc.eks.us-east-1.amazonaws.com/id/F0C2F81CD0B1421F37C428245CEF97B8\"}}],\"Version\":\"2012-10-17\"}", "create_date": "2023-05-19T03:12:34Z", "description": "AWS IAM Role for the Kubernetes service account fsx-csi-sa.", "force_detach_policies": true, "id": "do-eks-tf-efa-fsx-csi-sa-irsa", "inline_policy": [], "managed_policy_arns": [ "arn:aws:iam::159553542841:policy/do-eks-tf-efa-fsx-csi-policy" ], "max_session_duration": 3600, "name": "do-eks-tf-efa-fsx-csi-sa-irsa", "name_prefix": "", "path": "/", "permissions_boundary": "", "role_last_used": [ { "last_used_date": "", "region": "" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints" }, "unique_id": "AROASKJRB3K45AMOKEOIG" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.aws_iam_policy.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.data.aws_iam_policy_document.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "aws_iam_role_policy_attachment", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "id": "do-eks-tf-efa-fsx-csi-sa-irsa-2023051903123500780000001f", "policy_arn": "arn:aws:iam::159553542841:policy/do-eks-tf-efa-fsx-csi-policy", "role": "do-eks-tf-efa-fsx-csi-sa-irsa" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.aws_iam_policy.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.data.aws_iam_policy_document.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver[0].module.helm_addon.module.irsa[0]", "mode": "managed", "type": "kubernetes_service_account_v1", "name": "irsa", "provider": "provider[\"registry.terraform.io/hashicorp/kubernetes\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "automount_service_account_token": true, "default_secret_name": "", "id": "kube-system/fsx-csi-sa", "image_pull_secret": [], "metadata": [ { "annotations": { "eks.amazonaws.com/role-arn": "arn:aws:iam::159553542841:role/do-eks-tf-efa-fsx-csi-sa-irsa" }, "generate_name": "", "generation": 0, "labels": {}, "name": "fsx-csi-sa", "namespace": "kube-system", "resource_version": "1551", "uid": "a3a7e813-674a-4821-99ee-acf465403984" } ], "secret": [], "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "data.aws_eks_cluster_auth.this", "module.eks.aws_cloudwatch_log_group.this", "module.eks.aws_eks_cluster.this", "module.eks.aws_iam_policy.cni_ipv6_policy", "module.eks.aws_iam_role.this", "module.eks.aws_iam_role_policy_attachment.this", "module.eks.aws_security_group.cluster", "module.eks.aws_security_group.node", "module.eks.aws_security_group_rule.cluster", "module.eks.aws_security_group_rule.node", "module.eks.data.aws_caller_identity.current", "module.eks.data.aws_iam_policy_document.assume_role_policy", "module.eks.data.aws_iam_policy_document.cni_ipv6_policy", "module.eks.data.aws_iam_session_context.current", "module.eks.data.aws_partition.current", "module.eks.module.eks_managed_node_group.aws_autoscaling_schedule.this", "module.eks.module.eks_managed_node_group.aws_eks_node_group.this", "module.eks.module.eks_managed_node_group.aws_iam_role.this", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.additional", "module.eks.module.eks_managed_node_group.aws_iam_role_policy_attachment.this", "module.eks.module.eks_managed_node_group.aws_launch_template.this", "module.eks.module.eks_managed_node_group.data.aws_caller_identity.current", "module.eks.module.eks_managed_node_group.data.aws_iam_policy_document.assume_role_policy", "module.eks.module.eks_managed_node_group.data.aws_partition.current", "module.eks.module.eks_managed_node_group.module.user_data.data.cloudinit_config.linux_eks_managed_node_group", "module.eks.module.kms.aws_kms_external_key.this", "module.eks.module.kms.aws_kms_key.this", "module.eks.module.kms.data.aws_caller_identity.current", "module.eks.module.kms.data.aws_iam_policy_document.this", "module.eks.module.kms.data.aws_partition.current", "module.eks.time_sleep.this", "module.eks_blueprints_kubernetes_addons.data.aws_caller_identity.current", "module.eks_blueprints_kubernetes_addons.data.aws_eks_cluster.eks_cluster", "module.eks_blueprints_kubernetes_addons.data.aws_partition.current", "module.eks_blueprints_kubernetes_addons.data.aws_region.current", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.aws_iam_policy.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.data.aws_iam_policy_document.aws_fsx_csi_driver", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.aws_iam_role.irsa", "module.eks_blueprints_kubernetes_addons.module.aws_fsx_csi_driver.module.helm_addon.module.irsa.kubernetes_namespace_v1.irsa", "module.eks_blueprints_kubernetes_addons.time_sleep.dataplane", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_default_network_acl", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:network-acl/acl-0378509efec36652f", "default_network_acl_id": "acl-0378509efec36652f", "egress": [ { "action": "allow", "cidr_block": "", "from_port": 0, "icmp_code": 0, "icmp_type": 0, "ipv6_cidr_block": "::/0", "protocol": "-1", "rule_no": 101, "to_port": 0 }, { "action": "allow", "cidr_block": "0.0.0.0/0", "from_port": 0, "icmp_code": 0, "icmp_type": 0, "ipv6_cidr_block": "", "protocol": "-1", "rule_no": 100, "to_port": 0 } ], "id": "acl-0378509efec36652f", "ingress": [ { "action": "allow", "cidr_block": "", "from_port": 0, "icmp_code": 0, "icmp_type": 0, "ipv6_cidr_block": "::/0", "protocol": "-1", "rule_no": 101, "to_port": 0 }, { "action": "allow", "cidr_block": "0.0.0.0/0", "from_port": 0, "icmp_code": 0, "icmp_type": 0, "ipv6_cidr_block": "", "protocol": "-1", "rule_no": 100, "to_port": 0 } ], "owner_id": "159553542841", "subnet_ids": [ "subnet-01099a695410c16c1", "subnet-0409593e111fa925c", "subnet-09eafef4d750e3849", "subnet-0e326bb0189dd3147" ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "module.vpc.aws_vpc.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_default_route_table", "name": "default", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:route-table/rtb-0f6acbe3dc2826009", "default_route_table_id": "rtb-0f6acbe3dc2826009", "id": "rtb-0f6acbe3dc2826009", "owner_id": "159553542841", "propagating_vgws": [], "route": [], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "timeouts": { "create": "5m", "update": "5m" }, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsInVwZGF0ZSI6MzAwMDAwMDAwMDAwfX0=", "dependencies": [ "module.vpc.aws_vpc.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_default_security_group", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:security-group/sg-04934123ae3aee574", "description": "default VPC security group", "egress": [], "id": "sg-04934123ae3aee574", "ingress": [], "name": "default", "name_prefix": "", "owner_id": "159553542841", "revoke_rules_on_delete": false, "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-default" }, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "dependencies": [ "module.vpc.aws_vpc.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_eip", "name": "nat", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "address": null, "allocation_id": "eipalloc-09e1d8bcaddc87b62", "associate_with_private_ip": null, "association_id": "eipassoc-0de7d917f278211cb", "carrier_ip": "", "customer_owned_ip": "", "customer_owned_ipv4_pool": "", "domain": "vpc", "id": "eipalloc-09e1d8bcaddc87b62", "instance": "", "network_border_group": "us-east-1", "network_interface": "eni-0f6b9df57c4dd0ad8", "private_dns": "ip-10-11-48-138.ec2.internal", "private_ip": "10.11.48.138", "public_dns": "ec2-44-195-151-59.compute-1.amazonaws.com", "public_ip": "44.195.151.59", "public_ipv4_pool": "amazon", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-us-east-1a" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-us-east-1a" }, "timeouts": null, "vpc": true }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiZGVsZXRlIjoxODAwMDAwMDAwMDAsInJlYWQiOjkwMDAwMDAwMDAwMCwidXBkYXRlIjozMDAwMDAwMDAwMDB9fQ==", "dependencies": [ "data.aws_availability_zones.available" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_internet_gateway", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:internet-gateway/igw-04ee8a884f7349ac0", "id": "igw-04ee8a884f7349ac0", "owner_id": "159553542841", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjEyMDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_nat_gateway", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "allocation_id": "eipalloc-09e1d8bcaddc87b62", "association_id": "eipassoc-0de7d917f278211cb", "connectivity_type": "public", "id": "nat-0b25ca2363afdf61d", "network_interface_id": "eni-0f6b9df57c4dd0ad8", "private_ip": "10.11.48.138", "public_ip": "44.195.151.59", "subnet_id": "subnet-0e326bb0189dd3147", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-us-east-1a" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-us-east-1a" } }, "sensitive_attributes": [], "private": "bnVsbA==", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_eip.nat", "module.vpc.aws_internet_gateway.this", "module.vpc.aws_subnet.public", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route", "name": "private_nat_gateway", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "id": "r-rtb-0eb3b91845fa7a8151080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "nat-0b25ca2363afdf61d", "network_interface_id": "", "origin": "CreateRoute", "route_table_id": "rtb-0eb3b91845fa7a815", "state": "active", "timeouts": { "create": "5m", "delete": null, "update": null }, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_eip.nat", "module.vpc.aws_internet_gateway.this", "module.vpc.aws_nat_gateway.this", "module.vpc.aws_route_table.private", "module.vpc.aws_subnet.public", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route", "name": "public_internet_gateway", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "carrier_gateway_id": "", "core_network_arn": "", "destination_cidr_block": "0.0.0.0/0", "destination_ipv6_cidr_block": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "igw-04ee8a884f7349ac0", "id": "r-rtb-0db551bdefbbc252c1080289494", "instance_id": "", "instance_owner_id": "", "local_gateway_id": "", "nat_gateway_id": "", "network_interface_id": "", "origin": "CreateRoute", "route_table_id": "rtb-0db551bdefbbc252c", "state": "active", "timeouts": { "create": "5m", "delete": null, "update": null }, "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_internet_gateway.this", "module.vpc.aws_route_table.public", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route_table", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:route-table/rtb-0eb3b91845fa7a815", "id": "rtb-0eb3b91845fa7a815", "owner_id": "159553542841", "propagating_vgws": [], "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "", "instance_id": "", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "nat-0b25ca2363afdf61d", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route_table", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:route-table/rtb-0db551bdefbbc252c", "id": "rtb-0db551bdefbbc252c", "owner_id": "159553542841", "propagating_vgws": [], "route": [ { "carrier_gateway_id": "", "cidr_block": "0.0.0.0/0", "core_network_arn": "", "destination_prefix_list_id": "", "egress_only_gateway_id": "", "gateway_id": "igw-04ee8a884f7349ac0", "instance_id": "", "ipv6_cidr_block": "", "local_gateway_id": "", "nat_gateway_id": "", "network_interface_id": "", "transit_gateway_id": "", "vpc_endpoint_id": "", "vpc_peering_connection_id": "" } ], "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route_table_association", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-01115675dddaa8425", "route_table_id": "rtb-0eb3b91845fa7a815", "subnet_id": "subnet-0409593e111fa925c", "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_route_table.private", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": 1, "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0da408cd20c8e80b4", "route_table_id": "rtb-0eb3b91845fa7a815", "subnet_id": "subnet-09eafef4d750e3849", "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_route_table.private", "module.vpc.aws_subnet.private", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_route_table_association", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-0e7b96f04042d4ae3", "route_table_id": "rtb-0db551bdefbbc252c", "subnet_id": "subnet-0e326bb0189dd3147", "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_route_table.public", "module.vpc.aws_subnet.public", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": 1, "schema_version": 0, "attributes": { "gateway_id": "", "id": "rtbassoc-07a9b7348e3765ffa", "route_table_id": "rtb-0db551bdefbbc252c", "subnet_id": "subnet-01099a695410c16c1", "timeouts": null }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjozMDAwMDAwMDAwMDAsImRlbGV0ZSI6MzAwMDAwMDAwMDAwLCJ1cGRhdGUiOjEyMDAwMDAwMDAwMH19", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_route_table.public", "module.vpc.aws_subnet.public", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_subnet", "name": "private", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:subnet/subnet-0409593e111fa925c", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "availability_zone_id": "use1-az2", "cidr_block": "10.11.0.0/20", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0409593e111fa925c", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "159553542841", "private_dns_hostname_type_on_launch": "ip-name", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private-us-east-1a", "kubernetes.io/role/internal-elb": "1" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private-us-east-1a", "kubernetes.io/role/internal-elb": "1" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true }, { "index_key": 1, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:subnet/subnet-09eafef4d750e3849", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1b", "availability_zone_id": "use1-az4", "cidr_block": "10.11.16.0/20", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-09eafef4d750e3849", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "159553542841", "private_dns_hostname_type_on_launch": "ip-name", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private-us-east-1b", "kubernetes.io/role/internal-elb": "1" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-private-us-east-1b", "kubernetes.io/role/internal-elb": "1" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ], "create_before_destroy": true } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_subnet", "name": "public", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:subnet/subnet-0e326bb0189dd3147", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "availability_zone_id": "use1-az2", "cidr_block": "10.11.48.0/24", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-0e326bb0189dd3147", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "159553542841", "private_dns_hostname_type_on_launch": "ip-name", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public-us-east-1a", "kubernetes.io/role/elb": "1" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public-us-east-1a", "kubernetes.io/role/elb": "1" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] }, { "index_key": 1, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:subnet/subnet-01099a695410c16c1", "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1b", "availability_zone_id": "use1-az4", "cidr_block": "10.11.49.0/24", "customer_owned_ipv4_pool": "", "enable_dns64": false, "enable_lni_at_device_index": 0, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "id": "subnet-01099a695410c16c1", "ipv6_cidr_block": "", "ipv6_cidr_block_association_id": "", "ipv6_native": false, "map_customer_owned_ip_on_launch": false, "map_public_ip_on_launch": false, "outpost_arn": "", "owner_id": "159553542841", "private_dns_hostname_type_on_launch": "ip-name", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public-us-east-1b", "kubernetes.io/role/elb": "1" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa-public-us-east-1b", "kubernetes.io/role/elb": "1" }, "timeouts": null, "vpc_id": "vpc-062ab3985546eda3b" }, "sensitive_attributes": [], "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", "dependencies": [ "data.aws_availability_zones.available", "module.vpc.aws_vpc.this", "module.vpc.aws_vpc_ipv4_cidr_block_association.this" ] } ] }, { "module": "module.vpc", "mode": "managed", "type": "aws_vpc", "name": "this", "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", "instances": [ { "index_key": 0, "schema_version": 1, "attributes": { "arn": "arn:aws:ec2:us-east-1:159553542841:vpc/vpc-062ab3985546eda3b", "assign_generated_ipv6_cidr_block": false, "cidr_block": "10.11.0.0/16", "default_network_acl_id": "acl-0378509efec36652f", "default_route_table_id": "rtb-0f6acbe3dc2826009", "default_security_group_id": "sg-04934123ae3aee574", "dhcp_options_id": "dopt-0374f379", "enable_classiclink": false, "enable_classiclink_dns_support": false, "enable_dns_hostnames": true, "enable_dns_support": true, "enable_network_address_usage_metrics": false, "id": "vpc-062ab3985546eda3b", "instance_tenancy": "default", "ipv4_ipam_pool_id": null, "ipv4_netmask_length": null, "ipv6_association_id": "", "ipv6_cidr_block": "", "ipv6_cidr_block_network_border_group": "", "ipv6_ipam_pool_id": "", "ipv6_netmask_length": 0, "main_route_table_id": "rtb-0f6acbe3dc2826009", "owner_id": "159553542841", "tags": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa" }, "tags_all": { "Blueprint": "do-eks-tf-efa", "GithubRepo": "github.com/aws-ia/terraform-aws-eks-blueprints", "Name": "do-eks-tf-efa" } }, "sensitive_attributes": [], "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ==", "create_before_destroy": true } ] } ], "check_results": null }