Skip to content
This repository was archived by the owner on Jan 13, 2025. It is now read-only.

update prod#25

Merged
Lutonite merged 2 commits intoproductionfrom
main
Aug 7, 2024
Merged

update prod#25
Lutonite merged 2 commits intoproductionfrom
main

Conversation

@Lutonite
Copy link
Copy Markdown
Member

@Lutonite Lutonite commented Aug 7, 2024

Description

Linked Issues

Additional context

@Lutonite Lutonite requested a review from a team as a code owner August 7, 2024 17:03
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Aug 7, 2024

Terraform plan in infrastructure

Plan: 4 to add, 0 to change, 2 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create
-   destroy
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # module.argocd.null_resource.argocd_apply_once is tainted, so must be replaced
-/+ resource "null_resource" "argocd_apply_once" {
!~      id       = "*******************" -> (known after apply)
#        (1 unchanged attribute hidden)
    }

  # module.eks.module.eks.aws_eks_access_entry.this["cicd"] will be created
+   resource "aws_eks_access_entry" "this" {
+       access_entry_arn  = (known after apply)
+       cluster_name      = "presentium"
+       created_at        = (known after apply)
+       id                = (known after apply)
+       kubernetes_groups = [
+           "system:masters",
        ]
+       modified_at       = (known after apply)
+       principal_arn     = "arn:aws:iam::123247571664:role/cicd"
+       tags              = {
+           "karpenter.sh/discovery" = "presentium"
        }
+       tags_all          = {
+           "Terraform"              = "true"
+           "karpenter.sh/discovery" = "presentium"
        }
+       type              = "STANDARD"
+       user_name         = (known after apply)
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["admins_admin"] will be created
+   resource "aws_eks_access_policy_association" "this" {
+       associated_at = (known after apply)
+       cluster_name  = "presentium"
+       id            = (known after apply)
+       modified_at   = (known after apply)
+       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
+       principal_arn = "arn:aws:iam::123247571664:role/PRES-EKS-ADMIN"

+       access_scope {
+           type = "cluster"
        }
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["admins_example"] will be destroyed
  # (because key ["admins_example"] is not in for_each map)
-   resource "aws_eks_access_policy_association" "this" {
-       associated_at = "2024-08-07 16:18:20.056 +0000 UTC" -> null
-       cluster_name  = "presentium" -> null
-       id            = "presentium#arn:aws:iam::123247571664:role/PRES-EKS-ADMIN#arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" -> null
-       modified_at   = "2024-08-07 16:18:20.056 +0000 UTC" -> null
-       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSViewPolicy" -> null
-       principal_arn = "arn:aws:iam::123247571664:role/PRES-EKS-ADMIN" -> null

-       access_scope {
-           namespaces = [] -> null
-           type       = "cluster" -> null
        }
    }

  # module.eks.module.eks.aws_eks_access_policy_association.this["cicd_edit"] will be created
+   resource "aws_eks_access_policy_association" "this" {
+       associated_at = (known after apply)
+       cluster_name  = "presentium"
+       id            = (known after apply)
+       modified_at   = (known after apply)
+       policy_arn    = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSEditPolicy"
+       principal_arn = "arn:aws:iam::123247571664:role/cicd"

+       access_scope {
+           type = "cluster"
        }
    }

Plan: 4 to add, 0 to change, 2 to destroy.

❌ Error applying plan in Apply terraform plan #12

@Lutonite Lutonite merged commit 4d8dba6 into production Aug 7, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant