Skip to content

Conversation

@NgaNaNa
Copy link
Owner

@NgaNaNa NgaNaNa commented May 24, 2025

No description provided.

@github-actions
Copy link

Terraform Format and Style - DEV 🖌success

Terraform Initialization - DEV ⚙️success

Terraform Validation - DEV 🤖success

Terraform Plan - DEV 📖success

Show Plan

terraform
Acquiring state lock. This may take a few moments...
module.eks.data.aws_caller_identity.current[0]: Reading...
module.eks.data.aws_partition.current[0]: Reading...
module.eks.module.eks_managed_node_group["default"].data.aws_caller_identity.current: Reading...
module.eks.data.aws_iam_policy_document.assume_role_policy[0]: Reading...
module.eks.module.kms.data.aws_partition.current[0]: Reading...
module.eks.module.eks_managed_node_group["default"].data.aws_iam_policy_document.assume_role_policy[0]: Reading...
module.eks.module.kms.data.aws_caller_identity.current[0]: Reading...
module.eks.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/dev-eks/cluster]
module.eks.aws_security_group.cluster[0]: Refreshing state... [id=sg-03a0ce14a5a367739]
module.eks.module.kms.data.aws_partition.current[0]: Read complete after 0s [id=aws]
module.eks.data.aws_partition.current[0]: Read complete after 0s [id=aws]
module.eks.module.eks_managed_node_group["default"].data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2560088296]
module.eks.data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2830595799]
module.eks.module.eks_managed_node_group["default"].data.aws_partition.current: Reading...
module.eks.aws_iam_role.this[0]: Refreshing state... [id=dev-eks-cluster-20250524054557260900000004]
module.eks.module.eks_managed_node_group["default"].data.aws_partition.current: Read complete after 0s [id=aws]
module.eks.module.eks_managed_node_group["default"].aws_iam_role.this[0]: Refreshing state... [id=default-eks-node-group-20250524054557260500000002]
module.eks.aws_security_group.node[0]: Refreshing state... [id=sg-06491bd670a92dea5]
module.eks.data.aws_iam_policy_document.custom[0]: Reading...
module.eks.data.aws_iam_policy_document.custom[0]: Read complete after 0s [id=513122117]
module.eks.aws_iam_policy.custom[0]: Refreshing state... [id=arn:aws:iam::774094062037:policy/dev-eks-cluster-20250524054557260600000003]
module.eks.module.kms.data.aws_caller_identity.current[0]: Read complete after 1s [id=774094062037]
module.eks.data.aws_caller_identity.current[0]: Read complete after 1s [id=774094062037]
module.eks.data.aws_iam_session_context.current[0]: Reading...
module.eks.data.aws_iam_session_context.current[0]: Read complete after 0s [id=arn:aws:iam::774094062037:user/node-app-terraform]
module.eks.module.eks_managed_node_group["default"].data.aws_caller_identity.current: Read complete after 1s [id=774094062037]
module.eks.module.eks_managed_node_group["default"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Refreshing state... [id=default-eks-node-group-20250524054557260500000002-20250524054558040800000009]
module.eks.module.eks_managed_node_group["default"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Refreshing state... [id=default-eks-node-group-20250524054557260500000002-2025052405455805520000000a]
module.eks.module.eks_managed_node_group["default"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Refreshing state... [id=default-eks-node-group-20250524054557260500000002-2025052405455806840000000b]
module.eks.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Refreshing state... [id=dev-eks-cluster-20250524054557260900000004-20250524054557935500000007]
module.eks.aws_iam_role_policy_attachment.custom[0]: Refreshing state... [id=dev-eks-cluster-20250524054557260900000004-20250524054557947300000008]
module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Refreshing state... [id=dev-eks-cluster-20250524054557260900000004-20250524054557930200000006]
module.eks.module.kms.data.aws_iam_policy_document.this[0]: Reading...
module.eks.module.kms.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2504823610]
module.eks.module.kms.aws_kms_key.this[0]: Refreshing state... [id=c7744eda-b2b7-4eff-8160-e0e520581953]
module.eks.aws_security_group_rule.node["ingress_cluster_443"]: Refreshing state... [id=sgrule-3009167558]
module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Refreshing state... [id=sgrule-987965758]
module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Refreshing state... [id=sgrule-2220638530]
module.eks.aws_security_group_rule.node["egress_all"]: Refreshing state... [id=sgrule-2648213200]
module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]: Refreshing state... [id=sgrule-1172287315]
module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Refreshing state... [id=sgrule-3750521648]
module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]: Refreshing state... [id=sgrule-1770964294]
module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Refreshing state... [id=sgrule-3774706313]
module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Refreshing state... [id=sgrule-3783265468]
module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Refreshing state... [id=sgrule-4087434920]
module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]: Refreshing state... [id=sgrule-3119244774]
module.eks.module.kms.aws_kms_alias.this["cluster"]: Refreshing state... [id=alias/eks/dev-eks]
module.eks.aws_iam_policy.cluster_encryption[0]: Refreshing state... [id=arn:aws:iam::774094062037:policy/dev-eks-cluster-ClusterEncryption2025052405462290910000000c]
module.eks.aws_iam_role_policy_attachment.cluster_encryption[0]: Refreshing state... [id=dev-eks-cluster-20250524054557260900000004-2025052405462332820000000d]
module.eks.aws_eks_cluster.this[0]: Refreshing state... [id=dev-eks]
module.eks.data.tls_certificate.this[0]: Reading...
module.eks.aws_eks_access_entry.this["cluster_creator"]: Refreshing state... [id=dev-eks:arn:aws:iam::774094062037:user/node-app-terraform]
module.eks.time_sleep.this[0]: Refreshing state... [id=2025-05-24T05:55:46Z]
module.eks.module.eks_managed_node_group["default"].module.user_data.null_resource.validate_cluster_service_cidr: Refreshing state... [id=1387098901290162955]
module.eks.module.eks_managed_node_group["default"].aws_launch_template.this[0]: Refreshing state... [id=lt-0fa364845cf9bc7ae]
module.eks.module.eks_managed_node_group["default"].aws_eks_node_group.this[0]: Refreshing state... [id=dev-eks:default-20250524062359188000000001]
module.eks.data.tls_certificate.this[0]: Read complete after 0s [id=b46e64a2bd7835199e6dc464f359a6ee7486dcd1]
module.eks.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws:iam::774094062037:oidc-provider/oidc.eks.ap-southeast-2.amazonaws.com/id/1FAF4F7AEE288F22AC5D0C6BBD2DFF03]
module.eks.aws_eks_access_policy_association.this["cluster_creator_admin"]: Refreshing state... [id=dev-eks#arn:aws:iam::774094062037:user/node-app-terraform#arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+/- create replacement and then destroy

Terraform will perform the following actions:

  # module.eks.module.eks_managed_node_group["default"].aws_eks_node_group.this[0] must be replaced
+/- resource "aws_eks_node_group" "this" {
      ~ ami_type               = "AL2_x86_64" -> (known after apply)
      ~ arn                    = "arn:aws:eks:ap-southeast-2:774094062037:nodegroup/dev-eks/default-20250524062359188000000001/dccb807b-3733-99d5-1468-ca465eeaa3a2" -> (known after apply)
      ~ capacity_type          = "ON_DEMAND" -> (known after apply)
      ~ disk_size              = 0 -> (known after apply)
      ~ id                     = "dev-eks:default-20250524062359188000000001" -> (known after apply)
      ~ instance_types         = [ # forces replacement
          ~ "t2.micro" -> "t3.small",
        ]
      - labels                 = {} -> null
      ~ node_group_name        = "default-20250524062359188000000001" -> (known after apply)
      ~ release_version        = "1.29.15-20250519" -> (known after apply)
      ~ resources              = [
          - {
              - autoscaling_groups              = [
                  - {
                      - name = "eks-default-20250524062359188000000001-dccb807b-3733-99d5-1468-ca465eeaa3a2"
                    },
                ]
                # (1 unchanged attribute hidden)
            },
        ] -> (known after apply)
      ~ status                 = "ACTIVE" -> (known after apply)
        tags                   = {
            "Name" = "default"
        }
        # (6 unchanged attributes hidden)

      ~ launch_template {
            id      = "lt-0fa364845cf9bc7ae"
          ~ name    = "default-2025052405554752000000000e" -> (known after apply)
            # (1 unchanged attribute hidden)
        }

      ~ node_repair_config (known after apply)

      ~ update_config {
          - max_unavailable            = 0 -> null
            # (1 unchanged attribute hidden)
        }

        # (2 unchanged blocks hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

*Pushed by: @NgaNaNa, Action: `pull_request`*

@NgaNaNa NgaNaNa merged commit 6fdb222 into main May 24, 2025
1 check passed
@NgaNaNa NgaNaNa deleted the feature/eks-infra branch May 24, 2025 11:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants