Skip to content

Instantly share code, notes, and snippets.

@krishnapmv
Last active February 12, 2021 15:11
Show Gist options
  • Save krishnapmv/4e15b27b932fe9ee4bb8c55a3fc10ed2 to your computer and use it in GitHub Desktop.
Save krishnapmv/4e15b27b932fe9ee4bb8c55a3fc10ed2 to your computer and use it in GitHub Desktop.
Terraform will perform the following actions:
# module.eks-cluster.aws_launch_template.eks will be updated in-place
~ resource "aws_launch_template" "eks" {
arn = "arn:aws:ec2:eu-west-1:946599262305:launch-template/lt-0aefcf71471b1390c"
~ default_version = 3 -> (known after apply)
description = "EKS Launch-Template"
disable_api_termination = false
id = "lt-0aefcf71471b1390c"
~ image_id = "ami-0c3f1f2d65b670aa5" -> "ami-0912a2acd3875f88e"
instance_type = "t2.large"
~ latest_version = 3 -> (known after apply)
name = "eks-launch-template-2021021211141356910000000a"
name_prefix = "eks-launch-template-"
security_group_names = []
tags = {}
update_default_version = true
user_data = "REDACTED"
vpc_security_group_ids = []
block_device_mappings {
device_name = "/dev/xvda"
ebs {
delete_on_termination = "true"
iops = 0
throughput = 0
volume_size = 100
volume_type = "gp2"
}
}
network_interfaces {
device_index = 0
ipv4_address_count = 0
ipv4_addresses = []
ipv6_address_count = 0
ipv6_addresses = []
security_groups = [
"REDACTED",
]
}
}
# module.eks-cluster.module.eks.kubernetes_config_map.aws_auth[0] will be updated in-place
~ resource "kubernetes_config_map" "aws_auth" {
binary_data = {}
~ data = {
- "mapAccounts" = jsonencode([])
- "mapRoles" = <<~EOT
- "groups":
- "system:bootstrappers"
- "system:nodes"
"rolearn": "arn:aws:iam::REDACTED:role/eks-test-custom-ami20210212111413550400000009"
"username": "system:node:{{EC2PrivateDNSName}}"
EOT
- "mapUsers" = <<~EOT
- "groups":
- "system:masters"
"userarn": "arn:aws:iam::REDACTED:user/svc.circleci_kubernetes_config"
"username": "svc.circleci_kubernetes_config"
EOT
} -> (known after apply)
id = "kube-system/aws-auth"
metadata {
annotations = {}
generation = 0
labels = {
"app.kubernetes.io/managed-by" = "Terraform"
"terraform.io/module" = "terraform-aws-modules.eks.aws"
}
name = "aws-auth"
namespace = "kube-system"
resource_version = "891"
self_link = "/api/v1/namespaces/kube-system/configmaps/aws-auth"
uid = "640b7471-895d-4f65-8889-bb818742d77d"
}
}
# module.eks-cluster.module.eks.module.node_groups.aws_eks_node_group.workers["node_group_1"] must be replaced
+/- resource "aws_eks_node_group" "workers" {
~ ami_type = "CUSTOM" -> (known after apply) # forces replacement
~ arn = "arn:aws:eks:eu-west-1:946599262305:nodegroup/eks-test-custom-ami/eks-test-custom-ami-node_group_1-huge-mongoose/68bbcb18-c1a6-f265-389f-b2a3c58d01cd" -> (known after apply)
~ capacity_type = "ON_DEMAND" -> (known after apply)
cluster_name = "eks-test-custom-ami"
~ disk_size = 0 -> (known after apply) # forces replacement
~ id = "eks-test-custom-ami:eks-test-custom-ami-node_group_1-huge-mongoose" -> (known after apply)
instance_types = []
~ labels = {} -> (known after apply)
~ node_group_name = "eks-test-custom-ami-node_group_1-huge-mongoose" -> (known after apply) # forces replacement
node_role_arn = "arn:aws:iam::946599262305:role/eks-test-custom-ami20210212111413550400000009"
~ release_version = "ami-0c3f1f2d65b670aa5" -> (known after apply)
~ resources = [
- {
- autoscaling_groups = [
- {
- name = "eks-68bbcb18-c1a6-f265-389f-b2a3c58d01cd"
},
]
- remote_access_security_group_id = ""
},
] -> (known after apply)
~ status = "ACTIVE" -> (known after apply)
subnet_ids = [
REDACTED
]
~ tags = {
- "Area" = "Platform Services"
- "Environment" = "default"
- "Name" = "eks-test-custom-ami"
- "RepoName" = "REDACTED"
} -> (known after apply)
~ version = "1.18" -> (known after apply)
~ launch_template {
id = "lt-0aefcf71471b1390c"
~ name = "eks-launch-template-2021021211141356910000000a" -> (known after apply)
~ version = "3" -> (known after apply)
}
scaling_config {
desired_size = 3
max_size = 10
min_size = 3
}
}
# module.eks-cluster.module.eks.module.node_groups.random_pet.node_groups["node_group_1"] must be replaced
+/- resource "random_pet" "node_groups" {
~ id = "huge-mongoose" -> (known after apply)
~ keepers = {
- "iam_role_arn" = "arn:aws:iam::946599262305:role/eks-test-custom-ami20210212111413550400000009"
- "instance_type" = "m4.large"
- "key_name" = ""
- "launch_template" = "lt-0aefcf71471b1390c"
- "node_group_name" = "eks-test-custom-ami-node_group_1"
- "source_security_group_ids" = ""
- "subnet_ids" = "subnet-07ab450a6bdbf9261|subnet-08cf7866b92207696|subnet-0ff30651c8936eb73"
} -> (known after apply) # forces replacement
length = 2
separator = "-"
}
Plan: 2 to add, 2 to change, 2 to destroy.
------------------------------------------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment