From 5b579c00800086838c2f928d679398cba5f4003f Mon Sep 17 00:00:00 2001 From: "Matthew C. Morgan" Date: Fri, 6 Sep 2024 20:57:35 -0400 Subject: [PATCH] new groups --- lab/us-gov-east-1/vpc/_mcmCluster/apply.log | 3643 +++++ lab/us-gov-east-1/vpc/_mcmCluster/destroy.log | 11519 ++++++++++++++++ .../eks-cert-manager/terragrunt.hcl | 3 - .../_mcmCluster/eks-grafana/terragrunt.hcl | 5 + .../vpc/_mcmCluster/eks-loki/terragrunt.hcl | 4 +- .../_mcmCluster/eks-prometheus/terragrunt.hcl | 4 +- 6 files changed, 15171 insertions(+), 7 deletions(-) create mode 100644 lab/us-gov-east-1/vpc/_mcmCluster/apply.log create mode 100644 lab/us-gov-east-1/vpc/_mcmCluster/destroy.log diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/apply.log b/lab/us-gov-east-1/vpc/_mcmCluster/apply.log new file mode 100644 index 0000000..728ae5a --- /dev/null +++ b/lab/us-gov-east-1/vpc/_mcmCluster/apply.log @@ -0,0 +1,3643 @@ +20:36:23.829 STDOUT [eks] terraform_current: data.aws_region.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Reading... +20:36:23.829 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Reading... +20:36:23.830 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Reading... +20:36:23.832 STDOUT [eks] terraform_current: data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +20:36:23.833 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +20:36:23.833 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +20:36:23.833 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +20:36:23.833 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:23.833 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:23.833 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:23.835 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Reading... +20:36:23.835 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Read complete after 0s [id=3064053908] +20:36:23.835 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Reading... +20:36:23.835 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Reading... +20:36:23.835 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Reading... +20:36:23.835 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Reading... +20:36:23.835 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Reading... +20:36:23.838 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Reading... +20:36:23.838 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:23.838 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +20:36:23.838 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Read complete after 0s [id=aws-us-gov] +20:36:23.839 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Reading... +20:36:23.839 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Reading... +20:36:23.839 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Reading... +20:36:23.840 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:23.841 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Reading... +20:36:23.841 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2764486067] +20:36:23.845 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Reading... +20:36:23.845 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Reading... +20:36:23.864 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Read complete after 0s [id=224384469011] +20:36:23.888 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Reading... +20:36:23.894 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.897 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Reading... +20:36:23.898 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Read complete after 0s [id=4196553001] +20:36:23.898 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Read complete after 0s [id=3004485257] +20:36:23.903 STDOUT [eks] terraform_current: data.aws_arn.current: Reading... +20:36:23.905 STDOUT [eks] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +20:36:23.924 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.954 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.954 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.959 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.965 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:23.966 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] +20:36:24.202 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Read complete after 0s [id=us-gov-east-1] +20:36:24.338 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Read complete after 0s [id=vpc-0280f77b373744eaa] +20:36:24.388 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Reading... +20:36:24.401 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Reading... +20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Reading... +20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Reading... +20:36:24.420 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Reading... +20:36:24.516 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Read complete after 1s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] +20:36:24.516 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Reading... +20:36:24.520 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Reading... +20:36:24.520 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +20:36:24.522 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Reading... +20:36:24.523 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2560088296] +20:36:24.524 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Read complete after 1s [id=us-gov-east-1] +20:36:24.529 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Read complete after 1s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +20:36:24.529 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Read complete after 1s [id=us-gov-east-1] +20:36:24.555 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +20:36:24.581 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Read complete after 1s [id=us-gov-east-1] +20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Reading... +20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Reading... +20:36:24.584 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Reading... +20:36:24.688 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Read complete after 0s [id=subnet-02c2250b9ec2dd6a2] +20:36:24.692 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Read complete after 0s [id=subnet-078b228071c609a50] +20:36:24.694 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Read complete after 0s [id=subnet-07a6339be3670fb41] +20:36:26.093 STDOUT [eks] terraform_current: Terraform used the selected providers to generate the following execution +20:36:26.093 STDOUT [eks] terraform_current: plan. Resource actions are indicated with the following symbols: +20:36:26.093 STDOUT [eks] terraform_current:  + create +20:36:26.093 STDOUT [eks] terraform_current:  <= read (data resources) +20:36:26.093 STDOUT [eks] terraform_current: Terraform will perform the following actions: +20:36:26.093 STDOUT [eks] terraform_current:  # data.aws_vpc.dummy_vpc[0] will be read during apply +20:36:26.093 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.093 STDOUT [eks] terraform_current:  <= data "aws_vpc" "dummy_vpc" { +20:36:26.093 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + cidr_block = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + cidr_block_associations = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + default = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + dhcp_options_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + enable_dns_hostnames = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + enable_dns_support = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + enable_network_address_usage_metrics = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + instance_tenancy = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + ipv6_association_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + ipv6_cidr_block = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + main_route_table_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + state = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + tags = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + filter { +20:36:26.093 STDOUT [eks] terraform_current:  + name = "tag:Name" +20:36:26.093 STDOUT [eks] terraform_current:  + values = [ +20:36:26.093 STDOUT [eks] terraform_current:  + "vpc0-dummy", +20:36:26.093 STDOUT [eks] terraform_current:  ] +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  + filter { +20:36:26.093 STDOUT [eks] terraform_current:  + name = "tag:eks-cluster-name" +20:36:26.093 STDOUT [eks] terraform_current:  + values = [ +20:36:26.093 STDOUT [eks] terraform_current:  + "platform-eng-eks-mcm", +20:36:26.093 STDOUT [eks] terraform_current:  ] +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-02c2250b9ec2dd6a2" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-078b228071c609a50" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "container_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/cluster/platform-eng-eks-mcm" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-07a6339be3670fb41" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "shared" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-01e04b945b2bfe1de" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-046047345c5af7fb1" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"] will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "lb_subnets" { +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + key = "kubernetes.io/role/internal-nlb" +20:36:26.093 STDOUT [eks] terraform_current:  + resource_id = "subnet-0e3786cf42e38af3d" +20:36:26.093 STDOUT [eks] terraform_current:  + value = "1" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  # aws_route53_zone.cluster_domain will be created +20:36:26.093 STDOUT [eks] terraform_current:  + resource "aws_route53_zone" "cluster_domain" { +20:36:26.093 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + comment = "platform-eng-eks-mcm EKS Cluster DNS Zone" +20:36:26.093 STDOUT [eks] terraform_current:  + force_destroy = false +20:36:26.093 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +20:36:26.093 STDOUT [eks] terraform_current:  + name_servers = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + primary_name_server = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + tags = { +20:36:26.093 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.093 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +20:36:26.093 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.093 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.093 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.093 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +20:36:26.093 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.093 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.093 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.093 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.093 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.093 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.093 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.093 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.093 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.093 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.093 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.093 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  + zone_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + vpc { +20:36:26.093 STDOUT [eks] terraform_current:  + vpc_id = (known after apply) +20:36:26.093 STDOUT [eks] terraform_current:  + vpc_region = "us-gov-east-1" +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.093 STDOUT [eks] terraform_current:  } +20:36:26.094 STDOUT [eks] terraform_current:  # aws_security_group.additional_eks_cluster_sg will be created +20:36:26.094 STDOUT [eks] terraform_current:  + resource "aws_security_group" "additional_eks_cluster_sg" { +20:36:26.094 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + description = "Managed by Terraform" +20:36:26.094 STDOUT [eks] terraform_current:  + egress = [ +20:36:26.094 STDOUT [eks] terraform_current:  + { +20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ +20:36:26.094 STDOUT [eks] terraform_current:  + "0.0.0.0/0", +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" +20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] +20:36:26.094 STDOUT [eks] terraform_current:  + self = false +20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +20:36:26.094 STDOUT [eks] terraform_current:  }, +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + ingress = [ +20:36:26.094 STDOUT [eks] terraform_current:  + { +20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ +20:36:26.094 STDOUT [eks] terraform_current:  + "148.129.0.0/16", +20:36:26.094 STDOUT [eks] terraform_current:  + "172.16.0.0/12", +20:36:26.094 STDOUT [eks] terraform_current:  + "192.168.0.0/16", +20:36:26.094 STDOUT [eks] terraform_current:  + "10.0.0.0/8", +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 443 +20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] +20:36:26.094 STDOUT [eks] terraform_current:  + self = false +20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 443 +20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +20:36:26.094 STDOUT [eks] terraform_current:  }, +20:36:26.094 STDOUT [eks] terraform_current:  + { +20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" +20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + self = false +20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +20:36:26.094 STDOUT [eks] terraform_current:  }, +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + name = "eks-platform-eng-eks-mcm-cluster" +20:36:26.094 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false +20:36:26.094 STDOUT [eks] terraform_current:  + tags = { +20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-cluster" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.094 STDOUT [eks] terraform_current:  } +20:36:26.094 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-cluster" +20:36:26.094 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.094 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.094 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.094 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.094 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.094 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.094 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.094 STDOUT [eks] terraform_current:  } +20:36:26.094 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" +20:36:26.094 STDOUT [eks] terraform_current:  } +20:36:26.094 STDOUT [eks] terraform_current:  # aws_security_group.all_worker_mgmt will be created +20:36:26.094 STDOUT [eks] terraform_current:  + resource "aws_security_group" "all_worker_mgmt" { +20:36:26.094 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + description = "Managed by Terraform" +20:36:26.094 STDOUT [eks] terraform_current:  + egress = [ +20:36:26.094 STDOUT [eks] terraform_current:  + { +20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ +20:36:26.094 STDOUT [eks] terraform_current:  + "0.0.0.0/0", +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" +20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] +20:36:26.094 STDOUT [eks] terraform_current:  + self = false +20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +20:36:26.094 STDOUT [eks] terraform_current:  }, +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + ingress = [ +20:36:26.094 STDOUT [eks] terraform_current:  + { +20:36:26.094 STDOUT [eks] terraform_current:  + cidr_blocks = [ +20:36:26.094 STDOUT [eks] terraform_current:  + "10.129.32.0/19", +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + from_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  + ipv6_cidr_blocks = [] +20:36:26.094 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.094 STDOUT [eks] terraform_current:  + protocol = "-1" +20:36:26.094 STDOUT [eks] terraform_current:  + security_groups = [] +20:36:26.094 STDOUT [eks] terraform_current:  + self = false +20:36:26.094 STDOUT [eks] terraform_current:  + to_port = 0 +20:36:26.094 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +20:36:26.094 STDOUT [eks] terraform_current:  }, +20:36:26.094 STDOUT [eks] terraform_current:  ] +20:36:26.094 STDOUT [eks] terraform_current:  + name = "eks-platform-eng-eks-mcm-all-worker-mgmt" +20:36:26.094 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.094 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false +20:36:26.094 STDOUT [eks] terraform_current:  + tags = { +20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.094 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.094 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.094 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.094 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.094 STDOUT [eks] terraform_current:  } +20:36:26.094 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.094 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.094 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.094 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" +20:36:26.094 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.094 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.095 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.095 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.095 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.095 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.095 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.095 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  # aws_security_group_rule.allow_sidecar_injection will be created +20:36:26.095 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "allow_sidecar_injection" { +20:36:26.095 STDOUT [eks] terraform_current:  + description = "Webhook container port, from Control Plane" +20:36:26.095 STDOUT [eks] terraform_current:  + from_port = 15017 +20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.095 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + self = false +20:36:26.095 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + to_port = 15017 +20:36:26.095 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  # aws_vpc.vpc will be created +20:36:26.095 STDOUT [eks] terraform_current:  + resource "aws_vpc" "vpc" { +20:36:26.095 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + cidr_block = "192.168.0.0/24" +20:36:26.095 STDOUT [eks] terraform_current:  + default_network_acl_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + default_route_table_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + default_security_group_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + dhcp_options_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + enable_dns_hostnames = false +20:36:26.095 STDOUT [eks] terraform_current:  + enable_dns_support = false +20:36:26.095 STDOUT [eks] terraform_current:  + enable_network_address_usage_metrics = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + instance_tenancy = "default" +20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_association_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_cidr_block = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + ipv6_cidr_block_network_border_group = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + main_route_table_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + tags = { +20:36:26.095 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.095 STDOUT [eks] terraform_current:  + "Name" = "vpc0-dummy" +20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.095 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.095 STDOUT [eks] terraform_current:  + "Name" = "vpc0-dummy" +20:36:26.095 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.095 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.095 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.095 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.095 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.095 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.095 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.095 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.095 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.095 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.095 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  # null_resource.kube_config_create will be created +20:36:26.095 STDOUT [eks] terraform_current:  + resource "null_resource" "kube_config_create" { +20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply +20:36:26.095 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.095 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { +20:36:26.095 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + json = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + minified_json = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  + statement { +20:36:26.095 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.095 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", +20:36:26.095 STDOUT [eks] terraform_current:  ] +20:36:26.095 STDOUT [eks] terraform_current:  + effect = "Allow" +20:36:26.095 STDOUT [eks] terraform_current:  + condition { +20:36:26.095 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.095 STDOUT [eks] terraform_current:  + values = [ +20:36:26.095 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", +20:36:26.095 STDOUT [eks] terraform_current:  ] +20:36:26.095 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.095 STDOUT [eks] terraform_current:  } +20:36:26.095 STDOUT [eks] terraform_current:  + condition { +20:36:26.095 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.096 STDOUT [eks] terraform_current:  + values = [ +20:36:26.096 STDOUT [eks] terraform_current:  + "system:serviceaccount:amazon-cloudwatch:cloudwatch-agent", +20:36:26.096 STDOUT [eks] terraform_current:  ] +20:36:26.096 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  } +20:36:26.096 STDOUT [eks] terraform_current:  + principals { +20:36:26.096 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.096 STDOUT [eks] terraform_current:  + (known after apply), +20:36:26.096 STDOUT [eks] terraform_current:  ] +20:36:26.096 STDOUT [eks] terraform_current:  + type = "Federated" +20:36:26.096 STDOUT [eks] terraform_current:  } +20:36:26.096 STDOUT [eks] terraform_current:  } +20:36:26.096 STDOUT [eks] terraform_current:  } +20:36:26.096 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role.this[0] will be created +20:36:26.096 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.096 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.096 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.096 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-cloudwatch-observability" +20:36:26.096 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.096 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.096 STDOUT [eks] terraform_current:  + tags = { +20:36:26.096 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.096 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.096 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.096 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.096 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.096 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.096 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.096 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.096 STDOUT [eks] terraform_current:  } +20:36:26.096 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.097 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.097 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.097 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.097 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.097 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.097 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.097 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.097 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.097 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.097 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.097 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.097 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.097 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.097 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.097 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.097 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.097 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.097 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.097 STDOUT [eks] terraform_current:  } +20:36:26.097 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  + inline_policy (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  } +20:36:26.097 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"] will be created +20:36:26.097 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { +20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" +20:36:26.097 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-cloudwatch-observability" +20:36:26.097 STDOUT [eks] terraform_current:  } +20:36:26.097 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"] will be created +20:36:26.097 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { +20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy" +20:36:26.097 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-cloudwatch-observability" +20:36:26.097 STDOUT [eks] terraform_current:  } +20:36:26.097 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"] will be read during apply +20:36:26.097 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.097 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.097 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" +20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.097 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.097 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  } +20:36:26.097 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"] will be read during apply +20:36:26.097 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.097 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.097 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" +20:36:26.097 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.097 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.097 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  } +20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"] will be read during apply +20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" +20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  } +20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["coredns"] will be read during apply +20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "coredns" +20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  } +20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"] will be read during apply +20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" +20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  } +20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["kube-proxy"] will be read during apply +20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" +20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.098 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  } +20:36:26.098 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["snapshot-controller"] will be read during apply +20:36:26.098 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.098 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.098 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" +20:36:26.098 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.098 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.098 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.099 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.data.aws_eks_addon_version.this["vpc-cni"] will be read during apply +20:36:26.099 STDOUT [eks] terraform_current:  # (depends on a resource or a module with changes pending) +20:36:26.099 STDOUT [eks] terraform_current:  <= data "aws_eks_addon_version" "this" { +20:36:26.099 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" +20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + kubernetes_version = "1.30" +20:36:26.099 STDOUT [eks] terraform_current:  + most_recent = true +20:36:26.099 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.data.tls_certificate.this[0] will be read during apply +20:36:26.099 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.099 STDOUT [eks] terraform_current:  <= data "tls_certificate" "this" { +20:36:26.099 STDOUT [eks] terraform_current:  + certificates = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + url = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_cloudwatch_log_group.this[0] will be created +20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_cloudwatch_log_group" "this" { +20:36:26.099 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + log_group_class = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + name = "/aws/eks/platform-eng-eks-mcm/cluster" +20:36:26.099 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + retention_in_days = 90 +20:36:26.099 STDOUT [eks] terraform_current:  + skip_destroy = false +20:36:26.099 STDOUT [eks] terraform_current:  + tags = { +20:36:26.099 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.099 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.099 STDOUT [eks] terraform_current:  + "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.099 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.099 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.099 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.099 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.099 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.099 STDOUT [eks] terraform_current:  + "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" +20:36:26.099 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.099 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.099 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.099 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.099 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.099 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.099 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.099 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.099 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.099 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.099 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.099 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.099 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.099 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"] will be created +20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + key = "CostAllocation" +20:36:26.099 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + value = "csvd:infrastructure" +20:36:26.099 STDOUT [eks] terraform_current:  } +20:36:26.099 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"] will be created +20:36:26.099 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.099 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.099 STDOUT [eks] terraform_current:  + key = "Environment" +20:36:26.099 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "dev" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:created_by" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "terraform" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:tf_module_name" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "tfmod-eks" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "boc:tf_module_version" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "0.1.0" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "cluster:size" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "min:2-max:10-desired:2" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "eks-cluster-name" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "platform-eng-eks-mcm" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"] will be created +20:36:26.101 STDOUT [eks] terraform_current:  + resource "aws_ec2_tag" "cluster_primary_security_group" { +20:36:26.101 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + key = "slim:schedule" +20:36:26.101 STDOUT [eks] terraform_current:  + resource_id = (known after apply) +20:36:26.101 STDOUT [eks] terraform_current:  + value = "8:00-17:00" +20:36:26.101 STDOUT [eks] terraform_current:  } +20:36:26.101 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["cluster_creator"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + tags = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" +20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t1"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" +20:36:26.102 STDOUT [eks] terraform_current:  + tags = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" +20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t2"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" +20:36:26.102 STDOUT [eks] terraform_current:  + tags = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" +20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t3"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" +20:36:26.102 STDOUT [eks] terraform_current:  + tags = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" +20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t4"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_entry" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + access_entry_arn = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + kubernetes_groups = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" +20:36:26.102 STDOUT [eks] terraform_current:  + tags = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.102 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.102 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.102 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.102 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.102 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.102 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.102 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  + type = "STANDARD" +20:36:26.102 STDOUT [eks] terraform_current:  + user_name = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"] will be created +20:36:26.102 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { +20:36:26.102 STDOUT [eks] terraform_current:  + associated_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.102 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.102 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.102 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" +20:36:26.102 STDOUT [eks] terraform_current:  + access_scope { +20:36:26.102 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  } +20:36:26.102 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" +20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { +20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" +20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { +20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" +20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { +20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_access_policy_association" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + associated_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.103 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" +20:36:26.103 STDOUT [eks] terraform_current:  + access_scope { +20:36:26.103 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" +20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + tags = { +20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.103 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.103 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.103 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" +20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + tags = { +20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.103 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.103 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.103 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.103 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.103 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.103 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.103 STDOUT [eks] terraform_current:  } +20:36:26.103 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-efs-csi-driver"] will be created +20:36:26.103 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.103 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" +20:36:26.103 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.103 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.103 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.103 STDOUT [eks] terraform_current:  + tags = { +20:36:26.103 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.103 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.103 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["coredns"] will be created +20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "coredns" +20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + tags = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["eks-pod-identity-agent"] will be created +20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" +20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + tags = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.104 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.104 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["kube-proxy"] will be created +20:36:26.104 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.104 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" +20:36:26.104 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + configuration_values = (known after ap +20:36:26.104 STDOUT [eks] terraform_current: ply) +20:36:26.104 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.104 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.104 STDOUT [eks] terraform_current:  + tags = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.104 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.104 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.104 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.104 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.104 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.104 STDOUT [eks] terraform_current:  } +20:36:26.104 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.104 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["snapshot-controller"] will be created +20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.105 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" +20:36:26.105 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.105 STDOUT [eks] terraform_current:  + tags = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["vpc-cni"] will be created +20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_addon" "this" { +20:36:26.105 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" +20:36:26.105 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.105 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.105 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + tags = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_cluster.this[0] will be created +20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_eks_cluster" "this" { +20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + bootstrap_self_managed_addons = true +20:36:26.105 STDOUT [eks] terraform_current:  + certificate_authority = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + cluster_id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + enabled_cluster_log_types = [ +20:36:26.105 STDOUT [eks] terraform_current:  + "api", +20:36:26.105 STDOUT [eks] terraform_current:  + "audit", +20:36:26.105 STDOUT [eks] terraform_current:  + "authenticator", +20:36:26.105 STDOUT [eks] terraform_current:  + "controllerManager", +20:36:26.105 STDOUT [eks] terraform_current:  + "scheduler", +20:36:26.105 STDOUT [eks] terraform_current:  ] +20:36:26.105 STDOUT [eks] terraform_current:  + endpoint = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + identity = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + platform_version = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + role_arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + status = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + tags = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + version = "1.30" +20:36:26.105 STDOUT [eks] terraform_current:  + access_config { +20:36:26.105 STDOUT [eks] terraform_current:  + authentication_mode = "API_AND_CONFIG_MAP" +20:36:26.105 STDOUT [eks] terraform_current:  + bootstrap_cluster_creator_admin_permissions = false +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + encryption_config { +20:36:26.105 STDOUT [eks] terraform_current:  + resources = [ +20:36:26.105 STDOUT [eks] terraform_current:  + "secrets", +20:36:26.105 STDOUT [eks] terraform_current:  ] +20:36:26.105 STDOUT [eks] terraform_current:  + provider { +20:36:26.105 STDOUT [eks] terraform_current:  + key_arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + kubernetes_network_config { +20:36:26.105 STDOUT [eks] terraform_current:  + ip_family = "ipv4" +20:36:26.105 STDOUT [eks] terraform_current:  + service_ipv4_cidr = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + service_ipv6_cidr = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.105 STDOUT [eks] terraform_current:  + upgrade_policy (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + vpc_config { +20:36:26.105 STDOUT [eks] terraform_current:  + cluster_security_group_id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + endpoint_private_access = true +20:36:26.105 STDOUT [eks] terraform_current:  + endpoint_public_access = true +20:36:26.105 STDOUT [eks] terraform_current:  + public_access_cidrs = [ +20:36:26.105 STDOUT [eks] terraform_current:  + "0.0.0.0/0", +20:36:26.105 STDOUT [eks] terraform_current:  ] +20:36:26.105 STDOUT [eks] terraform_current:  + security_group_ids = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + subnet_ids = [ +20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", +20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", +20:36:26.105 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", +20:36:26.105 STDOUT [eks] terraform_current:  ] +20:36:26.105 STDOUT [eks] terraform_current:  + vpc_id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_openid_connect_provider.oidc_provider[0] will be created +20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_iam_openid_connect_provider" "oidc_provider" { +20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + client_id_list = [ +20:36:26.105 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", +20:36:26.105 STDOUT [eks] terraform_current:  ] +20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + tags = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-eks-irsa" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-eks-irsa" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.105 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + thumbprint_list = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + url = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_policy.cluster_encryption[0] will be created +20:36:26.105 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "cluster_encryption" { +20:36:26.105 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + description = "Cluster encryption policy to allow cluster role to utilize CMK provided" +20:36:26.105 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-ClusterEncryption" +20:36:26.105 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.105 STDOUT [eks] terraform_current:  + policy = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + policy_id = (known after apply) +20:36:26.105 STDOUT [eks] terraform_current:  + tags = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.105 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.105 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.105 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.105 STDOUT [eks] terraform_current:  } +20:36:26.105 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.105 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.105 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.105 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.105 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.105 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role.this[0] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + assume_role_policy = jsonencode( +20:36:26.106 STDOUT [eks] terraform_current:  { +20:36:26.106 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.106 STDOUT [eks] terraform_current:  + { +20:36:26.106 STDOUT [eks] terraform_current:  + Action = "sts:AssumeRole" +20:36:26.106 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.106 STDOUT [eks] terraform_current:  + Principal = { +20:36:26.106 STDOUT [eks] terraform_current:  + Service = "eks.amazonaws.com" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + Sid = "EKSClusterAssumeRole" +20:36:26.106 STDOUT [eks] terraform_current:  }, +20:36:26.106 STDOUT [eks] terraform_current:  ] +20:36:26.106 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  ) +20:36:26.106 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-" +20:36:26.106 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.106 STDOUT [eks] terraform_current:  + tags = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + inline_policy { +20:36:26.106 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-cluster" +20:36:26.106 STDOUT [eks] terraform_current:  + policy = jsonencode( +20:36:26.106 STDOUT [eks] terraform_current:  { +20:36:26.106 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.106 STDOUT [eks] terraform_current:  + { +20:36:26.106 STDOUT [eks] terraform_current:  + Action = [ +20:36:26.106 STDOUT [eks] terraform_current:  + "logs:CreateLogGroup", +20:36:26.106 STDOUT [eks] terraform_current:  ] +20:36:26.106 STDOUT [eks] terraform_current:  + Effect = "Deny" +20:36:26.106 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.106 STDOUT [eks] terraform_current:  }, +20:36:26.106 STDOUT [eks] terraform_current:  ] +20:36:26.106 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  ) +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "cluster_encryption" { +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy" +20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController" +20:36:26.106 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.cluster[0] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group" "cluster" { +20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + description = "EKS cluster security group" +20:36:26.106 STDOUT [eks] terraform_current:  + egress = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + ingress = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-cluster-" +20:36:26.106 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false +20:36:26.106 STDOUT [eks] terraform_current:  + tags = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-cluster" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-cluster" +20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.node[0] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group" "node" { +20:36:26.106 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + description = "EKS node shared security group" +20:36:26.106 STDOUT [eks] terraform_current:  + egress = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + ingress = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + name_prefix = "platform-eng-eks-mcm-node-" +20:36:26.106 STDOUT [eks] terraform_current:  + owner_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + revoke_rules_on_delete = false +20:36:26.106 STDOUT [eks] terraform_current:  + tags = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-node" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.106 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.106 STDOUT [eks] terraform_current:  + "Name" = "platform-eng-eks-mcm-node" +20:36:26.106 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.106 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.106 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.106 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.106 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.106 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.106 STDOUT [eks] terraform_current:  + "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +20:36:26.106 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "cluster" { +20:36:26.106 STDOUT [eks] terraform_current:  + description = "Node groups to cluster API" +20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 443 +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + self = false +20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 443 +20:36:26.106 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["egress_all"] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.106 STDOUT [eks] terraform_current:  + cidr_blocks = [ +20:36:26.106 STDOUT [eks] terraform_current:  + "0.0.0.0/0", +20:36:26.106 STDOUT [eks] terraform_current:  ] +20:36:26.106 STDOUT [eks] terraform_current:  + description = "Allow all egress" +20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 0 +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "-1" +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + self = false +20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 0 +20:36:26.106 STDOUT [eks] terraform_current:  + type = "egress" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_443"] will be created +20:36:26.106 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.106 STDOUT [eks] terraform_current:  + description = "Cluster API to node groups" +20:36:26.106 STDOUT [eks] terraform_current:  + from_port = 443 +20:36:26.106 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.106 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + self = false +20:36:26.106 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.106 STDOUT [eks] terraform_current:  + to_port = 443 +20:36:26.106 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.106 STDOUT [eks] terraform_current:  } +20:36:26.106 STDOUT [eks] terraform_current:  # module.clu +20:36:26.108 STDOUT [eks] terraform_current: ster.aws_security_group_rule.node["ingress_cluster_4443_webhook"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 4443/tcp webhook" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 4443 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = false +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 4443 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 6443/tcp webhook" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 6443 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = false +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 6443 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 8443/tcp webhook" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 8443 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = false +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 8443 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node 9443/tcp webhook" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 9443 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = false +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 9443 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Cluster API to node kubelets" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 10250 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = false +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 10250 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node ingress on ephemeral ports" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 80 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = true +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 65535 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node CoreDNS" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 53 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "tcp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = true +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 53 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_security_group_rule" "node" { +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Node to node CoreDNS UDP" +20:36:26.108 STDOUT [eks] terraform_current:  + from_port = 53 +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + prefix_list_ids = [] +20:36:26.108 STDOUT [eks] terraform_current:  + protocol = "udp" +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + security_group_rule_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + self = true +20:36:26.108 STDOUT [eks] terraform_current:  + source_security_group_id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + to_port = 53 +20:36:26.108 STDOUT [eks] terraform_current:  + type = "ingress" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.cluster.time_sleep.this[0] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "time_sleep" "this" { +20:36:26.108 STDOUT [eks] terraform_current:  + create_duration = "30s" +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + triggers = { +20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_certificate_authority_data" = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_endpoint" = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_name" = "platform-eng-eks-mcm" +20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_service_cidr" = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + "cluster_version" = "1.30" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply +20:36:26.108 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.108 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + json = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + minified_json = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + statement { +20:36:26.108 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  + effect = "Allow" +20:36:26.108 STDOUT [eks] terraform_current:  + condition { +20:36:26.108 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.108 STDOUT [eks] terraform_current:  + values = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  + condition { +20:36:26.108 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.108 STDOUT [eks] terraform_current:  + values = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:ebs-csi-controller-sa", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  + principals { +20:36:26.108 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.108 STDOUT [eks] terraform_current:  + (known after apply), +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  + type = "Federated" +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0] will be created +20:36:26.108 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "ebs_csi" { +20:36:26.108 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + description = "Provides permissions to manage EBS volumes via the container storage interface driver" +20:36:26.108 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.108 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_EBS_CSI_Policy-" +20:36:26.108 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.108 STDOUT [eks] terraform_current:  + policy = jsonencode( +20:36:26.108 STDOUT [eks] terraform_current:  { +20:36:26.108 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.108 STDOUT [eks] terraform_current:  + { +20:36:26.108 STDOUT [eks] terraform_current:  + Action = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:ModifyVolume", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:EnableFastSnapshotRestores", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DetachVolume", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeVolumesModifications", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeVolumes", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeTags", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeSnapshots", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeInstances", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:DescribeAvailabilityZones", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:CreateSnapshot", +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:AttachVolume", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.108 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.108 STDOUT [eks] terraform_current:  }, +20:36:26.108 STDOUT [eks] terraform_current:  + { +20:36:26.108 STDOUT [eks] terraform_current:  + Action = "ec2:CreateTags" +20:36:26.108 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.108 STDOUT [eks] terraform_current:  + StringEquals = { +20:36:26.108 STDOUT [eks] terraform_current:  + "ec2:CreateAction" = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "CreateVolume", +20:36:26.108 STDOUT [eks] terraform_current:  + "CreateSnapshot", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  } +20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.108 STDOUT [eks] terraform_current:  + Resource = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:volume/*", +20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:snapshot/*", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  }, +20:36:26.108 STDOUT [eks] terraform_current:  + { +20:36:26.108 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteTags" +20:36:26.108 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.108 STDOUT [eks] terraform_current:  + Resource = [ +20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:volume/*", +20:36:26.108 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:ec2:*:*:snapshot/*", +20:36:26.108 STDOUT [eks] terraform_current:  ] +20:36:26.108 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/ebs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/CSIVolumeName" = "*" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:CreateVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/kubernetes.io/cluster/*" = "owned" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/CSIVolumeName" = "*" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/kubernetes.io/cluster/*" = "owned" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteVolume" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" = "*" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteSnapshot" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/CSIVolumeSnapshotName" = "*" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "ec2:DeleteSnapshot" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  ) +20:36:26.109 STDOUT [eks] terraform_current:  + policy_id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + tags = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.109 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role.this[0] will be created +20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.109 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.109 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-ebs-csi-driver" +20:36:26.109 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.109 STDOUT [eks] terraform_current:  + tags = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.109 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.109 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.109 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + inline_policy (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0] will be created +20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "ebs_csi" { +20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-ebs-csi-driver" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply +20:36:26.109 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.109 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { +20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + json = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + minified_json = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + statement { +20:36:26.109 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.109 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + condition { +20:36:26.109 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.109 STDOUT [eks] terraform_current:  + values = [ +20:36:26.109 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + condition { +20:36:26.109 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.109 STDOUT [eks] terraform_current:  + values = [ +20:36:26.109 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:efs-csi-controller-sa", +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + principals { +20:36:26.109 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.109 STDOUT [eks] terraform_current:  + (known after apply), +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + type = "Federated" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0] will be created +20:36:26.109 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "efs_csi" { +20:36:26.109 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + description = "Provides permissions to manage EFS volumes via the container storage interface driver" +20:36:26.109 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_EFS_CSI_Policy-" +20:36:26.109 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.109 STDOUT [eks] terraform_current:  + policy = jsonencode( +20:36:26.109 STDOUT [eks] terraform_current:  { +20:36:26.109 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = [ +20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeMountTargets", +20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeFileSystems", +20:36:26.109 STDOUT [eks] terraform_current:  + "elasticfilesystem:DescribeAccessPoints", +20:36:26.109 STDOUT [eks] terraform_current:  + "ec2:DescribeAvailabilityZones", +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:CreateAccessPoint" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/efs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:TagResource" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringLike = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:RequestTag/efs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  + { +20:36:26.109 STDOUT [eks] terraform_current:  + Action = "elasticfilesystem:DeleteAccessPoint" +20:36:26.109 STDOUT [eks] terraform_current:  + Condition = { +20:36:26.109 STDOUT [eks] terraform_current:  + StringEquals = { +20:36:26.109 STDOUT [eks] terraform_current:  + "aws:ResourceTag/efs.csi.aws.com/cluster" = "true" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.109 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.109 STDOUT [eks] terraform_current:  }, +20:36:26.109 STDOUT [eks] terraform_current:  ] +20:36:26.109 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  ) +20:36:26.109 STDOUT [eks] terraform_current:  + policy_id = (known after apply) +20:36:26.109 STDOUT [eks] terraform_current:  + tags = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.109 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.109 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.109 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.109 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.109 STDOUT [eks] terraform_current:  } +20:36:26.109 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.109 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.109 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.109 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role.this[0] will be created +20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.110 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-efs-csi-driver" +20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.110 STDOUT [eks] terraform_current:  + tags = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + inline_policy (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0] will be created +20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "efs_csi" { +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-efs-csi-driver" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0] will be read during apply +20:36:26.110 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.110 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + json = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + minified_json = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + statement { +20:36:26.110 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.110 STDOUT [eks] terraform_current:  + "sts:AssumeRoleWithWebIdentity", +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + effect = "Allow" +20:36:26.110 STDOUT [eks] terraform_current:  + condition { +20:36:26.110 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.110 STDOUT [eks] terraform_current:  + values = [ +20:36:26.110 STDOUT [eks] terraform_current:  + "sts.amazonaws.com", +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + condition { +20:36:26.110 STDOUT [eks] terraform_current:  + test = "StringEquals" +20:36:26.110 STDOUT [eks] terraform_current:  + values = [ +20:36:26.110 STDOUT [eks] terraform_current:  + "system:serviceaccount:kube-system:aws-node", +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + variable = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + principals { +20:36:26.110 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.110 STDOUT [eks] terraform_current:  + (known after apply), +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + type = "Federated" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0] will be created +20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_policy" "vpc_cni" { +20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + attachment_count = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + description = "Provides the Amazon VPC CN +20:36:26.110 STDOUT [eks] terraform_current: I Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes" +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = "AmazonEKS_CNI_Policy-" +20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.110 STDOUT [eks] terraform_current:  + policy = jsonencode( +20:36:26.110 STDOUT [eks] terraform_current:  { +20:36:26.110 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.110 STDOUT [eks] terraform_current:  + { +20:36:26.110 STDOUT [eks] terraform_current:  + Action = [ +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:UnassignPrivateIpAddresses", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:ModifyNetworkInterfaceAttribute", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DetachNetworkInterface", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeTags", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeSubnets", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeNetworkInterfaces", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeInstances", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DescribeInstanceTypes", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:DeleteNetworkInterface", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:CreateNetworkInterface", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:AttachNetworkInterface", +20:36:26.110 STDOUT [eks] terraform_current:  + "ec2:AssignPrivateIpAddresses", +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.110 STDOUT [eks] terraform_current:  + Resource = "*" +20:36:26.110 STDOUT [eks] terraform_current:  + Sid = "IPV4" +20:36:26.110 STDOUT [eks] terraform_current:  }, +20:36:26.110 STDOUT [eks] terraform_current:  + { +20:36:26.110 STDOUT [eks] terraform_current:  + Action = "ec2:CreateTags" +20:36:26.110 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.110 STDOUT [eks] terraform_current:  + Resource = "arn:aws-us-gov:ec2:*:*:network-interface/*" +20:36:26.110 STDOUT [eks] terraform_current:  + Sid = "CreateTags" +20:36:26.110 STDOUT [eks] terraform_current:  }, +20:36:26.110 STDOUT [eks] terraform_current:  ] +20:36:26.110 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  ) +20:36:26.110 STDOUT [eks] terraform_current:  + policy_id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + tags = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role.this[0] will be created +20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.110 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + assume_role_policy = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.110 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-vpc-cni" +20:36:26.110 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.110 STDOUT [eks] terraform_current:  + tags = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.110 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.110 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.110 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.110 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.110 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.110 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.110 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.110 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  + inline_policy (known after apply) +20:36:26.110 STDOUT [eks] terraform_current:  } +20:36:26.110 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0] will be created +20:36:26.110 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "vpc_cni" { +20:36:26.110 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + role = "platform-eng-eks-mcm-vpc-cni" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_eks_node_group" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + ami_type = "BOTTLEROCKET_x86_64" +20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + capacity_type = "ON_DEMAND" +20:36:26.111 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + disk_size = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + instance_types = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "t3.xlarge", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + node_group_name = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + node_group_name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" +20:36:26.111 STDOUT [eks] terraform_current:  + node_role_arn = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + release_version = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + resources = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + status = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + subnet_ids = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", +20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", +20:36:26.111 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + version = "1.30" +20:36:26.111 STDOUT [eks] terraform_current:  + launch_template { +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + version = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + scaling_config { +20:36:26.111 STDOUT [eks] terraform_current:  + desired_size = 2 +20:36:26.111 STDOUT [eks] terraform_current:  + max_size = 10 +20:36:26.111 STDOUT [eks] terraform_current:  + min_size = 2 +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + timeouts {} +20:36:26.111 STDOUT [eks] terraform_current:  + update_config { +20:36:26.111 STDOUT [eks] terraform_current:  + max_unavailable_percentage = 33 +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + assume_role_policy = jsonencode( +20:36:26.111 STDOUT [eks] terraform_current:  { +20:36:26.111 STDOUT [eks] terraform_current:  + Statement = [ +20:36:26.111 STDOUT [eks] terraform_current:  + { +20:36:26.111 STDOUT [eks] terraform_current:  + Action = "sts:AssumeRole" +20:36:26.111 STDOUT [eks] terraform_current:  + Effect = "Allow" +20:36:26.111 STDOUT [eks] terraform_current:  + Principal = { +20:36:26.111 STDOUT [eks] terraform_current:  + Service = "ec2.amazonaws.com" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + Sid = "EKSNodeAssumeRole" +20:36:26.111 STDOUT [eks] terraform_current:  }, +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + Version = "2012-10-17" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  ) +20:36:26.111 STDOUT [eks] terraform_current:  + create_date = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + description = "EKS managed node group IAM role" +20:36:26.111 STDOUT [eks] terraform_current:  + force_detach_policies = true +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + managed_policy_arns = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + max_session_duration = 3600 +20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" +20:36:26.111 STDOUT [eks] terraform_current:  + path = "/" +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + inline_policy (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" +20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" +20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_iam_role_policy_attachment" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" +20:36:26.111 STDOUT [eks] terraform_current:  + role = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0] will be created +20:36:26.111 STDOUT [eks] terraform_current:  + resource "aws_launch_template" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + default_version = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + description = "Custom launch template for eks-platform-eng-eks-mcm-nodegroup EKS managed node group" +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + latest_version = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + name_prefix = "node_group-" +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.111 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.111 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + update_default_version = true +20:36:26.111 STDOUT [eks] terraform_current:  + vpc_security_group_ids = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +20:36:26.111 STDOUT [eks] terraform_current:  + block_device_mappings { +20:36:26.111 STDOUT [eks] terraform_current:  + device_name = "/dev/xvda" +20:36:26.111 STDOUT [eks] terraform_current:  + ebs { +20:36:26.111 STDOUT [eks] terraform_current:  + delete_on_termination = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + encrypted = "true" +20:36:26.111 STDOUT [eks] terraform_current:  + iops = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" +20:36:26.111 STDOUT [eks] terraform_current:  + throughput = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + volume_size = 100 +20:36:26.111 STDOUT [eks] terraform_current:  + volume_type = "gp3" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + metadata_options { +20:36:26.111 STDOUT [eks] terraform_current:  + http_endpoint = "enabled" +20:36:26.111 STDOUT [eks] terraform_current:  + http_protocol_ipv6 = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + http_put_response_hop_limit = 2 +20:36:26.111 STDOUT [eks] terraform_current:  + http_tokens = "required" +20:36:26.111 STDOUT [eks] terraform_current:  + instance_metadata_tags = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + monitoring { +20:36:26.111 STDOUT [eks] terraform_current:  + enabled = true +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { +20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "instance" +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { +20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "network-interface" +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + tag_specifications { +20:36:26.111 STDOUT [eks] terraform_current:  + resource_type = "volume" +20:36:26.111 STDOUT [eks] terraform_current:  + tags = { +20:36:26.111 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.111 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.111 STDOUT [eks] terraform_current:  + "Name" = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.111 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.111 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.111 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.111 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  # module.cluster.module.kms.data.aws_iam_policy_document.this[0] will be read during apply +20:36:26.111 STDOUT [eks] terraform_current:  # (config refers to values not yet known) +20:36:26.111 STDOUT [eks] terraform_current:  <= data "aws_iam_policy_document" "this" { +20:36:26.111 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + json = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + minified_json = (known after apply) +20:36:26.111 STDOUT [eks] terraform_current:  + override_policy_documents = [] +20:36:26.111 STDOUT [eks] terraform_current:  + source_policy_documents = [] +20:36:26.111 STDOUT [eks] terraform_current:  + statement { +20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:*", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + resources = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "*", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + sid = "Default" +20:36:26.111 STDOUT [eks] terraform_current:  + principals { +20:36:26.111 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:iam::224384469011:root", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + type = "AWS" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + statement { +20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:CancelKeyDeletion", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Create*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Delete*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Describe*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Disable*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Enable*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Get*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ImportKeyMaterial", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:List*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Put*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ReplicateKey", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Revoke*", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:ScheduleKeyDeletion", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:TagResource", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:UntagResource", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Update*", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + resources = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "*", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + sid = "KeyAdministration" +20:36:26.111 STDOUT [eks] terraform_current:  + principals { +20:36:26.111 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform", +20:36:26.111 STDOUT [eks] terraform_current:  ] +20:36:26.111 STDOUT [eks] terraform_current:  + type = "AWS" +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  } +20:36:26.111 STDOUT [eks] terraform_current:  + statement { +20:36:26.111 STDOUT [eks] terraform_current:  + actions = [ +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:Decrypt", +20:36:26.111 STDOUT [eks] terraform_current:  + "kms:DescribeKey", +20:36:26.112 STDOUT [eks] terraform_current:  + "kms:Encrypt", +20:36:26.112 STDOUT [eks] terraform_current:  + "kms:GenerateDataKey*", +20:36:26.112 STDOUT [eks] terraform_current:  + "kms:ReEncrypt*", +20:36:26.112 STDOUT [eks] terraform_current:  ] +20:36:26.112 STDOUT [eks] terraform_current:  + resources = [ +20:36:26.112 STDOUT [eks] terraform_current:  + "*", +20:36:26.112 STDOUT [eks] terraform_current:  ] +20:36:26.112 STDOUT [eks] terraform_current:  + sid = "KeyUsage" +20:36:26.112 STDOUT [eks] terraform_current:  + principals { +20:36:26.112 STDOUT [eks] terraform_current:  + identifiers = [ +20:36:26.112 STDOUT [eks] terraform_current:  + (known after apply), +20:36:26.112 STDOUT [eks] terraform_current:  ] +20:36:26.112 STDOUT [eks] terraform_current:  + type = "AWS" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_alias.this["cluster"] will be created +20:36:26.112 STDOUT [eks] terraform_current:  + resource "aws_kms_alias" "this" { +20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + name = "alias/eks/platform-eng-eks-mcm" +20:36:26.112 STDOUT [eks] terraform_current:  + name_prefix = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + target_key_arn = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + target_key_id = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_key.this[0] will be created +20:36:26.112 STDOUT [eks] terraform_current:  + resource "aws_kms_key" "this" { +20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + bypass_policy_lockout_safety_check = false +20:36:26.112 STDOUT [eks] terraform_current:  + customer_master_key_spec = "SYMMETRIC_DEFAULT" +20:36:26.112 STDOUT [eks] terraform_current:  + description = "platform-eng-eks-mcm cluster encryption key" +20:36:26.112 STDOUT [eks] terraform_current:  + enable_key_rotation = true +20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + is_enabled = true +20:36:26.112 STDOUT [eks] terraform_current:  + key_id = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + key_usage = "ENCRYPT_DECRYPT" +20:36:26.112 STDOUT [eks] terraform_current:  + multi_region = false +20:36:26.112 STDOUT [eks] terraform_current:  + policy = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + rotation_period_in_days = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + tags = { +20:36:26.112 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.112 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.112 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.112 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.112 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.112 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.112 STDOUT [eks] terraform_current:  + "CostAllocation" = "csvd:infrastructure" +20:36:26.112 STDOUT [eks] terraform_current:  + "Environment" = "dev" +20:36:26.112 STDOUT [eks] terraform_current:  + "Organization" = "census:ocio:csvd" +20:36:26.112 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.112 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.112 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.112 STDOUT [eks] terraform_current:  + "ProjectNumber" = "fs0000000078" +20:36:26.112 STDOUT [eks] terraform_current:  + "Terraform" = "true" +20:36:26.112 STDOUT [eks] terraform_current:  + "Terragrunt" = "true" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.112 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.112 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.112 STDOUT [eks] terraform_current:  + "created_by" = "matthew.c.morgan@census.gov" +20:36:26.112 STDOUT [eks] terraform_current:  + "created_for" = "matthew.c.morgan@census.gov" +20:36:26.112 STDOUT [eks] terraform_current:  + "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.112 STDOUT [eks] terraform_current:  + "eks-cluster-name" = "platform-eng-eks-mcm" +20:36:26.112 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.112 STDOUT [eks] terraform_current:  + "terraform-aws-modules" = "eks" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr will be created +20:36:26.112 STDOUT [eks] terraform_current:  + resource "null_resource" "validate_cluster_service_cidr" { +20:36:26.112 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current: Plan: 81 to add, 0 to change, 0 to destroy. +20:36:26.112 STDOUT [eks] terraform_current:  +20:36:26.112 STDOUT [eks] terraform_current: Changes to Outputs: +20:36:26.112 STDOUT [eks] terraform_current:  + access_entries = { +20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t1 = { +20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] +20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { +20:36:26.112 STDOUT [eks] terraform_current:  + admin = { +20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { +20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t2 = { +20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] +20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { +20:36:26.112 STDOUT [eks] terraform_current:  + admin = { +20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { +20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t3 = { +20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] +20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { +20:36:26.112 STDOUT [eks] terraform_current:  + admin = { +20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { +20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + inf-terraform-t4 = { +20:36:26.112 STDOUT [eks] terraform_current:  + kubernetes_groups = [] +20:36:26.112 STDOUT [eks] terraform_current:  + policy_associations = { +20:36:26.112 STDOUT [eks] terraform_current:  + admin = { +20:36:26.112 STDOUT [eks] terraform_current:  + access_scope = { +20:36:26.112 STDOUT [eks] terraform_current:  + type = "cluster" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  } +20:36:26.112 STDOUT [eks] terraform_current:  + cloudwatch_log_group_arn = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + cloudwatch_log_group_name = "/aws/eks/platform-eng-eks-mcm/cluster" +20:36:26.112 STDOUT [eks] terraform_current:  + cluster_addons = { +20:36:26.112 STDOUT [eks] terraform_current:  + amazon-cloudwatch-observability = { +20:36:26.112 STDOUT [eks] terraform_current:  + addon_name = "amazon-cloudwatch-observability" +20:36:26.112 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.112 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.112 STDOUT [eks] terraform_current:  + configuration_values +20:36:26.114 STDOUT [eks] terraform_current:  = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + tags = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.114 STDOUT [eks] terraform_current:  + create = null +20:36:26.114 STDOUT [eks] terraform_current:  + delete = null +20:36:26.114 STDOUT [eks] terraform_current:  + update = null +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + aws-ebs-csi-driver = { +20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "aws-ebs-csi-driver" +20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + tags = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.114 STDOUT [eks] terraform_current:  + create = null +20:36:26.114 STDOUT [eks] terraform_current:  + delete = null +20:36:26.114 STDOUT [eks] terraform_current:  + update = null +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + aws-efs-csi-driver = { +20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "aws-efs-csi-driver" +20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + tags = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.114 STDOUT [eks] terraform_current:  + create = null +20:36:26.114 STDOUT [eks] terraform_current:  + delete = null +20:36:26.114 STDOUT [eks] terraform_current:  + update = null +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + coredns = { +20:36:26.114 STDOUT [eks] terraform_current:  + addon_name = "coredns" +20:36:26.114 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.114 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.114 STDOUT [eks] terraform_current:  + service_account_role_arn = null +20:36:26.114 STDOUT [eks] terraform_current:  + tags = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.114 STDOUT [eks] terraform_current:  } +20:36:26.114 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.114 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.114 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.114 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.114 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.114 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.114 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.114 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.114 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.114 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.114 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.115 STDOUT [eks] terraform_current:  + create = null +20:36:26.115 STDOUT [eks] terraform_current:  + delete = null +20:36:26.115 STDOUT [eks] terraform_current:  + update = null +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + eks-pod-identity-agent = { +20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "eks-pod-identity-agent" +20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null +20:36:26.115 STDOUT [eks] terraform_current:  + tags = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.115 STDOUT [eks] terraform_current:  + create = null +20:36:26.115 STDOUT [eks] terraform_current:  + delete = null +20:36:26.115 STDOUT [eks] terraform_current:  + update = null +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + kube-proxy = { +20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "kube-proxy" +20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null +20:36:26.115 STDOUT [eks] terraform_current:  + tags = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.115 STDOUT [eks] terraform_current:  + create = null +20:36:26.115 STDOUT [eks] terraform_current:  + delete = null +20:36:26.115 STDOUT [eks] terraform_current:  + update = null +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + snapshot-controller = { +20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "snapshot-controller" +20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = null +20:36:26.115 STDOUT [eks] terraform_current:  + tags = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.115 STDOUT [eks] terraform_current:  + create = null +20:36:26.115 STDOUT [eks] terraform_current:  + delete = null +20:36:26.115 STDOUT [eks] terraform_current:  + update = null +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + vpc-cni = { +20:36:26.115 STDOUT [eks] terraform_current:  + addon_name = "vpc-cni" +20:36:26.115 STDOUT [eks] terraform_current:  + addon_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + configuration_values = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + created_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + modified_at = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + preserve = true +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts = null +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_create = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + resolve_conflicts_on_update = "OVERWRITE" +20:36:26.115 STDOUT [eks] terraform_current:  + service_account_role_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + tags = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + tags_all = { +20:36:26.115 STDOUT [eks] terraform_current:  + CostAllocation = "csvd:infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + Environment = "dev" +20:36:26.115 STDOUT [eks] terraform_current:  + Organization = "census:ocio:csvd" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Identifier" = "fs0000000078:csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Name" = "csvd_platformbaseline" +20:36:26.115 STDOUT [eks] terraform_current:  + "Project Role" = "csvd_platformbaseline_mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + ProjectNumber = "fs0000000078" +20:36:26.115 STDOUT [eks] terraform_current:  + Terraform = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + Terragrunt = "true" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:created_by" = "terraform" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_name" = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + "boc:tf_module_version" = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + "cluster:size" = "min:2-max:10-desired:2" +20:36:26.115 STDOUT [eks] terraform_current:  + created_by = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_for = "matthew.c.morgan@census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +20:36:26.115 STDOUT [eks] terraform_current:  + eks-cluster-name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + "slim:schedule" = "8:00-17:00" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + timeouts = { +20:36:26.115 STDOUT [eks] terraform_current:  + create = null +20:36:26.115 STDOUT [eks] terraform_current:  + delete = null +20:36:26.115 STDOUT [eks] terraform_current:  + update = null +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_certificate_authority_data = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_endpoint = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_fqdn = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_iam_role = { +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + name = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_identity_providers = {} +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_name = "platform-eng-eks-mcm" +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_oidc_issuer_url = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_platform_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_primary_security_group_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_security_group_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_security_group_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_status = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_tls_certificate_sha1_fingerprint = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + cluster_version = "1.30" +20:36:26.115 STDOUT [eks] terraform_current:  + ebs_csi_irsa_role = { +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-ebs-csi-driver" +20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + efs_csi_irsa_role = { +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-efs-csi-driver" +20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + eks_managed_node_groups = { +20:36:26.115 STDOUT [eks] terraform_current:  + node_group = { +20:36:26.115 STDOUT [eks] terraform_current:  + autoscaling_group_schedule_arns = {} +20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_name = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + iam_role_unique_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_latest_version = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + launch_template_name = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_autoscaling_group_names = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_labels = null +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_resources = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_status = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_taints = [] +20:36:26.115 STDOUT [eks] terraform_current:  + platform = "bottlerocket" +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + eks_managed_node_groups_autoscaling_group_names = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + fargate_profiles = {} +20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + kms_key_policy = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + module_name = "tfmod-eks" +20:36:26.115 STDOUT [eks] terraform_current:  + module_version = "0.1.0" +20:36:26.115 STDOUT [eks] terraform_current:  + node_group_name = "eks-platform-eng-eks-mcm-nodegroup" +20:36:26.115 STDOUT [eks] terraform_current:  + node_security_group_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + node_security_group_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + oidc_provider = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + oidc_provider_arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + security_group_all_worker_mgmt_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + self_managed_node_groups = {} +20:36:26.115 STDOUT [eks] terraform_current:  + self_managed_node_groups_autoscaling_group_names = [] +20:36:26.115 STDOUT [eks] terraform_current:  + subnets = [ +20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-02c2250b9ec2dd6a2", +20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-078b228071c609a50", +20:36:26.115 STDOUT [eks] terraform_current:  + "subnet-07a6339be3670fb41", +20:36:26.115 STDOUT [eks] terraform_current:  ] +20:36:26.115 STDOUT [eks] terraform_current:  + vpc_cidr_block = "10.129.32.0/19" +20:36:26.115 STDOUT [eks] terraform_current:  + vpc_cni_irsa_role = { +20:36:26.115 STDOUT [eks] terraform_current:  + arn = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  + name = "platform-eng-eks-mcm-vpc-cni" +20:36:26.115 STDOUT [eks] terraform_current:  + unique_id = (known after apply) +20:36:26.115 STDOUT [eks] terraform_current:  } +20:36:26.115 STDOUT [eks] terraform_current:  + vpc_id = "vpc-0280f77b373744eaa" +20:36:27.630 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Creating... +20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Creating... +20:36:27.631 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Creating... +20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Creating... +20:36:27.631 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Creating... +20:36:27.631 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Creating... +20:36:27.633 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Creating... +20:36:27.633 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Creating... +20:36:27.633 STDOUT [eks] terraform_current: aws_vpc.vpc: Creating... +20:36:27.633 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Creating... +20:36:27.941 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Creation complete after 0s [id=/aws/eks/platform-eng-eks-mcm/cluster] +20:36:27.947 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Creating... +20:36:27.958 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Creation complete after 0s [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] +20:36:27.958 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Creation complete after 0s [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] +20:36:27.961 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Creating... +20:36:27.969 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Creation complete after 0s [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] +20:36:27.972 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Creation complete after 0s [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] +20:36:27.979 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Creating... +20:36:27.979 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Creating... +20:36:27.979 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Creating... +20:36:28.186 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Creation complete after 0s [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] +20:36:28.194 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Creating... +20:36:28.198 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Creation complete after 0s [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] +20:36:28.256 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240907003627635100000003] +20:36:28.267 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240907003627635200000004] +20:36:28.300 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240907003627632900000001] +20:36:28.589 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002] +20:36:28.592 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Creating... +20:36:28.592 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Creating... +20:36:28.594 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Reading... +20:36:28.598 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1934007884] +20:36:28.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Creating... +20:36:28.702 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Creation complete after 1s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007] +20:36:28.705 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Creating... +20:36:28.705 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Creating... +20:36:28.706 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Creating... +20:36:28.816 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-20240907003628712500000008] +20:36:28.837 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-20240907003628723100000009] +20:36:28.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362882530000000a] +20:36:28.942 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362883730000000b] +20:36:28.979 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Creation complete after 0s [id=eks-platform-eng-eks-mcm-nodegroup-20240907003628196300000007-2024090700362887610000000c] +20:36:29.062 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Creation complete after 1s [id=sg-0fd55e5058cd2677d] +20:36:29.074 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Creation complete after 1s [id=sg-0f3ca09ad07865927] +20:36:29.089 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Creating... +20:36:29.093 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Creating... +20:36:29.410 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Creation complete after 0s [id=sgrule-2299018117] +20:36:29.413 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Creating... +20:36:29.428 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Creation complete after 0s [id=sgrule-191202013] +20:36:29.430 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Creating... +20:36:29.435 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Creation complete after 1s [id=sg-00833fe3577afbae0] +20:36:29.438 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Creating... +20:36:29.742 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Creation complete after 1s [id=sgrule-4277482607] +20:36:29.748 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Creating... +20:36:30.084 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Creation complete after 1s [id=sgrule-859369245] +20:36:30.093 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Creating... +20:36:30.410 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Creation complete after 1s [id=sgrule-2589198244] +20:36:30.744 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Creation complete after 2s [id=sgrule-2966606245] +20:36:31.079 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Creation complete after 2s [id=sgrule-1685007660] +20:36:31.407 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Creation complete after 2s [id=sgrule-2042941422] +20:36:31.525 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Creation complete after 2s [id=sg-06757ae44cebc7fd7] +20:36:31.774 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Creation complete after 3s [id=sgrule-463651738] +20:36:32.101 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Creation complete after 3s [id=sgrule-1078615059] +20:36:32.443 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Creation complete after 2s [id=sgrule-344814154] +20:36:37.634 STDOUT [eks] terraform_current: aws_vpc.vpc: Still creating... [10s elapsed] +20:36:38.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Still creating... [10s elapsed] +20:36:38.877 STDOUT [eks] terraform_current: aws_vpc.vpc: Creation complete after 11s [id=vpc-07a5a7a13612a5565] +20:36:38.880 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Reading... +20:36:39.200 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Read complete after 0s [id=vpc-07a5a7a13612a5565] +20:36:39.204 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Creating... +20:36:48.618 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Still creating... [20s elapsed] +20:36:49.205 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still creating... [10s elapsed] +20:36:57.177 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Creation complete after 28s [id=0d6f9045-d0cc-46f3-b042-590989aefffb] +20:36:57.528 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Creating... +20:36:57.528 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Creating... +20:36:57.533 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Creating... +20:36:57.599 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Creation complete after 0s [id=alias/eks/platform-eng-eks-mcm] +20:36:57.901 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Creation complete after 0s [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090700365752970000000e] +20:36:57.904 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Creating... +20:36:58.150 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Creation complete after 0s [id=platform-eng-eks-mcm-cluster-20240907003627634600000002-2024090700365802610000000f] +20:36:59.206 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still creating... [20s elapsed] +20:37:00.832 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Creation complete after 22s [id=Z00602022QKF5QYJB3EHW] +20:37:07.534 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [10s elapsed] +20:37:17.535 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [20s elapsed] +20:37:27.536 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [30s elapsed] +20:37:37.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [40s elapsed] +20:37:47.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [50s elapsed] +20:37:57.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m0s elapsed] +20:38:07.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m10s elapsed] +20:38:17.537 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m20s elapsed] +20:38:27.538 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m30s elapsed] +20:38:37.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m40s elapsed] +20:38:47.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [1m50s elapsed] +20:38:57.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m0s elapsed] +20:39:07.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m10s elapsed] +20:39:17.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m20s elapsed] +20:39:27.539 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m30s elapsed] +20:39:37.540 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m40s elapsed] +20:39:47.540 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [2m50s elapsed] +20:39:57.541 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m0s elapsed] +20:40:07.541 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m10s elapsed] +20:40:17.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m20s elapsed] +20:40:27.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m30s elapsed] +20:40:37.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m40s elapsed] +20:40:47.542 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [3m50s elapsed] +20:40:57.543 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m0s elapsed] +20:41:07.543 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m10s elapsed] +20:41:17.544 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m20s elapsed] +20:41:27.545 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m30s elapsed] +20:41:37.546 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m40s elapsed] +20:41:47.546 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [4m50s elapsed] +20:41:57.547 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m0s elapsed] +20:42:07.547 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m10s elapsed] +20:42:17.548 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m20s elapsed] +20:42:27.548 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m30s elapsed] +20:42:37.549 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m40s elapsed] +20:42:47.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [5m50s elapsed] +20:42:57.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m0s elapsed] +20:43:07.550 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m10s elapsed] +20:43:17.551 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m20s elapsed] +20:43:27.552 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m30s elapsed] +20:43:37.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m40s elapsed] +20:43:47.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still creating... [6m50s elapsed] +20:43:49.449 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Creation complete after 6m51s [id=platform-eng-eks-mcm] +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Reading... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Creating... +20:43:49.860 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Creating... +20:43:49.863 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Creating... +20:43:50.005 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Read complete after 0s [id=a7b75161712f0d7327a9fabac7ee5068c8ef141d] +20:43:50.011 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Creating... +20:43:50.224 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Creation complete after 0s [id=sg-00878a7372f72223b,Environment] +20:43:50.228 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Creating... +20:43:50.245 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Creation complete after 0s [id=sg-00878a7372f72223b,CostAllocation] +20:43:50.249 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Creating... +20:43:50.256 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:created_by] +20:43:50.257 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:tf_module_name] +20:43:50.258 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Creating... +20:43:50.267 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Creating... +20:43:50.296 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Creation complete after 0s [id=sg-00878a7372f72223b,eks-cluster-name] +20:43:50.305 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Creating... +20:43:50.405 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Creation complete after 0s [id=sg-00878a7372f72223b,boc:tf_module_version] +20:43:50.411 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Creating... +20:43:50.418 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Creation complete after 0s [id=sg-00878a7372f72223b,slim:schedule] +20:43:50.429 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Creation complete after 0s [id=sg-00878a7372f72223b,cluster:size] +20:43:50.686 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Creation complete after 1s [id=sgrule-571632456] +20:43:50.759 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] +20:43:50.935 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Creation complete after 1s [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/C36794D61CFC51D01D74FBFF97A44D38] +20:43:50.940 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +20:43:50.940 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +20:43:50.942 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +20:43:50.942 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +20:43:50.942 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=419231759] +20:43:50.943 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=518548488] +20:43:50.943 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2245877119] +20:43:50.943 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=465870769] +20:43:50.950 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Creating... +20:43:50.950 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Creating... +20:43:50.952 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Creating... +20:43:50.952 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Creating... +20:43:51.285 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] +20:43:51.360 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Creation complete after 1s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] +20:43:51.514 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-cloudwatch-observability] +20:43:51.518 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Creating... +20:43:51.519 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Creating... +20:43:51.587 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-vpc-cni] +20:43:51.593 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Creating... +20:43:51.659 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-efs-csi-driver] +20:43:51.666 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Creating... +20:43:51.681 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Creation complete after 2s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] +20:43:51.697 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Creation complete after 1s [id=platform-eng-eks-mcm-ebs-csi-driver] +20:43:51.705 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Creating... +20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Reading... +20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Reading... +20:43:51.705 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Reading... +20:43:51.767 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Creation complete after 0s [id=platform-eng-eks-mcm-cloudwatch-observability-20240907004351648000000010] +20:43:51.768 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Creation complete after 0s [id=platform-eng-eks-mcm-cloudwatch-observability-20240907004351667600000011] +20:43:51.769 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Reading... +20:43:51.770 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Reading... +20:43:51.802 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Creation complete after 2s [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] +20:43:51.804 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Reading... +20:43:51.820 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Creation complete after 0s [id=platform-eng-eks-mcm-vpc-cni-20240907004351718200000012] +20:43:51.822 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Reading... +20:43:51.885 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Read complete after 0s [id=vpc-cni] +20:43:51.888 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Reading... +20:43:51.901 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Creation complete after 0s [id=platform-eng-eks-mcm-efs-csi-driver-20240907004351800300000013] +20:43:51.906 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Creating... +20:43:51.965 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Creation complete after 0s [id=platform-eng-eks-mcm-ebs-csi-driver-20240907004351856300000014] +20:43:51.968 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Creating... +20:43:51.971 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Read complete after 0s [id=aws-efs-csi-driver] +20:43:51.974 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Creating... +20:43:51.985 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Read complete after 0s [id=aws-ebs-csi-driver] +20:43:51.988 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Creating... +20:43:51.998 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Read complete after 0s [id=snapshot-controller] +20:43:52.001 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Creating... +20:43:52.083 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Read complete after 0s [id=amazon-cloudwatch-observability] +20:43:52.223 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Read complete after 0s [id=kube-proxy] +20:43:52.258 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Read complete after 0s [id=eks-pod-identity-agent] +20:43:52.314 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Read complete after 0s [id=coredns] +20:43:52.856 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +20:43:52.872 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +20:43:52.931 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +20:43:53.148 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +20:43:53.441 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Creation complete after 1s [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +20:44:00.267 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [10s elapsed] +20:44:10.269 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [20s elapsed] +20:44:20.271 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Still creating... [30s elapsed] +20:44:20.300 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Creation complete after 30s [id=2024-09-07T00:44:20Z] +20:44:20.658 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Creating... +20:44:20.660 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Creation complete after 0s [id=2664883768492982935] +20:44:20.672 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Creating... +20:44:20.921 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Creation complete after 0s [id=lt-0e12d0e62cc58bc63] +20:44:20.930 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Creating... +20:44:30.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [10s elapsed] +20:44:40.929 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [20s elapsed] +20:44:50.930 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [30s elapsed] +20:45:00.931 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [40s elapsed] +20:45:10.931 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [50s elapsed] +20:45:20.932 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m0s elapsed] +20:45:30.933 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m10s elapsed] +20:45:40.933 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m20s elapsed] +20:45:50.934 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m30s elapsed] +20:46:00.935 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still creating... [1m40s elapsed] +20:46:08.647 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Creation complete after 1m48s [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240907004420932200000017] +20:46:09.137 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Creating... +20:46:09.137 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Creating... +20:46:09.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Creating... +20:46:19.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [10s elapsed] +20:46:19.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [10s elapsed] +20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [10s elapsed] +20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [10s elapsed] +20:46:19.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [10s elapsed] +20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [10s elapsed] +20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [10s elapsed] +20:46:19.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [10s elapsed] +20:46:29.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [20s elapsed] +20:46:29.139 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [20s elapsed] +20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [20s elapsed] +20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [20s elapsed] +20:46:29.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [20s elapsed] +20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [20s elapsed] +20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [20s elapsed] +20:46:29.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [20s elapsed] +20:46:39.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [30s elapsed] +20:46:39.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [30s elapsed] +20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [30s elapsed] +20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [30s elapsed] +20:46:39.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [30s elapsed] +20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [30s elapsed] +20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [30s elapsed] +20:46:39.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [30s elapsed] +20:46:49.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Still creating... [40s elapsed] +20:46:49.140 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Still creating... [40s elapsed] +20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Still creating... [40s elapsed] +20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [40s elapsed] +20:46:49.141 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still creating... [40s elapsed] +20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Still creating... [40s elapsed] +20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [40s elapsed] +20:46:49.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [40s elapsed] +20:46:53.750 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Creation complete after 45s [id=platform-eng-eks-mcm:aws-efs-csi-driver] +20:46:54.180 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Creation complete after 45s [id=platform-eng-eks-mcm:eks-pod-identity-agent] +20:46:54.180 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Creation complete after 45s [id=platform-eng-eks-mcm:kube-proxy] +20:46:54.181 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Creation complete after 45s [id=platform-eng-eks-mcm:vpc-cni] +20:46:54.181 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Creation complete after 45s [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] +20:46:59.142 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Still creating... [50s elapsed] +20:46:59.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Still creating... [50s elapsed] +20:46:59.143 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Still creating... [50s elapsed] +20:47:03.841 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Creation complete after 55s [id=platform-eng-eks-mcm:snapshot-controller] +20:47:03.985 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Creation complete after 55s [id=platform-eng-eks-mcm:aws-ebs-csi-driver] +20:47:04.170 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Creation complete after 55s [id=platform-eng-eks-mcm:coredns] +20:47:04.186 STDOUT [eks] terraform_current: null_resource.kube_config_create: Creating... +20:47:04.189 STDOUT [eks] terraform_current: null_resource.kube_config_create: Provisioning with 'local-exec'... +20:47:04.189 STDOUT [eks] terraform_current: null_resource.kube_config_create (local-exec): Executing: ["/bin/bash" "-c" "aws eks --region us-gov-east-1 update-kubeconfig --name platform-eng-eks-mcm --profile=224384469011-lab-dev-gov && export KUBE_CONFIG_PATH=~/.kube/config && export KUBERNETES_MASTER=~/.kube/config"] +20:47:04.962 STDOUT [eks] terraform_current: null_resource.kube_config_create (local-exec): The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session run aws sso login with the corresponding profile. diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log b/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log new file mode 100644 index 0000000..aff791b --- /dev/null +++ b/lab/us-gov-east-1/vpc/_mcmCluster/destroy.log @@ -0,0 +1,11519 @@ +19:53:39.458 STDOUT [eks-metrics-server] terraform_current: data.kubernetes_namespace.kube_system: Reading... +19:53:40.209 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:53:40.209 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:53:40.219 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:53:40.219 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_region.current: Reading... +19:53:40.230 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:53:40.230 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:53:40.243 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:40.245 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:53:40.245 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:40.252 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_arn.current: Reading... +19:53:40.264 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:40.264 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Refreshing state... [id=platform-eng-eks-mcm/metrics-server] +19:53:40.374 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:53:40.392 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:53:40.395 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:53:40.396 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:53:40.396 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:53:40.422 STDOUT [eks-metrics-server] terraform_current: data.kubernetes_namespace.kube_system: Read complete after 1s [id=kube-system] +19:53:40.452 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:53:40.499 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Refreshing state... [id=platform-eng-eks-mcm/metrics-server] +19:53:40.499 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Refreshing state... [id=7262007232490788094] +19:53:40.506 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 1s [id=us-gov-east-1c] +19:53:40.557 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 1s [id=us-gov-east-1b] +19:53:40.584 STDOUT [eks-metrics-server] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] +19:53:40.607 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Refreshing state... [id=metrics-server] +19:53:41.083 STDOUT [eks-karpenter] terraform_current: data.aws_caller_identity.current: Reading... +19:53:41.083 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_region.current: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: data.aws_subnets.container_subnets: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: data.aws_iam_roles.roles: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_caller_identity.current: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_partition.current: Reading... +19:53:41.095 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_region.current: Reading... +19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:41.106 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller_assume_role[0]: Reading... +19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:53:41.117 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller_assume_role[0]: Read complete after 0s [id=3815944313] +19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Refreshing state... [id=KarpenterHealthEvent-20240906232348266800000006] +19:53:41.128 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Refreshing state... [id=KarpenterInstanceRebalance-20240906232348258700000004] +19:53:41.128 STDOUT [eks-karpenter] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:41.139 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Refreshing state... [id=KarpenterInstanceStateChange-20240906232348256000000001] +19:53:41.159 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:41.159 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Refreshing state... [id=KarpenterSpotInterrupt-20240906232348258200000003] +19:53:41.188 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:41.190 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Refreshing state... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] +19:53:41.225 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:53:41.226 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.node_assume_role[0]: Reading... +19:53:41.229 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.node_assume_role[0]: Read complete after 0s [id=2560088296] +19:53:41.231 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Refreshing state... [id=KarpenterController-20240906232348260000000005] +19:53:41.282 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:53:41.290 STDOUT [eks-karpenter] terraform_current: data.aws_arn.current: Reading... +19:53:41.298 STDOUT [eks-karpenter] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:41.305 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_arn.current: Reading... +19:53:41.308 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:41.344 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002] +19:53:41.344 STDOUT [eks-karpenter] terraform_current: data.aws_subnets.container_subnets: Read complete after 0s [id=us-gov-east-1] +19:53:41.354 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:53:41.354 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:53:41.363 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:53:41.363 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Refreshing state... [id=subnet-07a6339be3670fb41,karpenter.sh/discovery] +19:53:41.369 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Refreshing state... [id=subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery] +19:53:41.384 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Refreshing state... [id=subnet-078b228071c609a50,karpenter.sh/discovery] +19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Refreshing state... [id=KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget] +19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:53:41.409 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.queue[0]: Reading... +19:53:41.421 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.queue[0]: Read complete after 0s [id=2362613586] +19:53:41.430 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Refreshing state... [id=KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget] +19:53:41.454 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:53:41.466 STDOUT [eks-karpenter] terraform_current: data.aws_iam_roles.roles: Read complete after 0s [id=us-gov-east-1] +19:53:41.466 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Refreshing state... [id=KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget] +19:53:41.466 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Refreshing state... [id=KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget] +19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] +19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Refreshing state... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] +19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Refreshing state... [id=platform-eng-eks-mcm/karpenter/controller] +19:53:41.477 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/bitnami/kubectl] +19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Refreshing state... [id=7033227500110577822] +19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Refreshing state... [id=8319382030182575774] +19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Refreshing state... [id=platform-eng-eks-mcm/karpenter/controller] +19:53:41.680 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/bitnami/kubectl] +19:53:41.755 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.kubectl_image: Reading... +19:53:41.755 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.karpenter_image: Reading... +19:53:41.800 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Refreshing state... [id=a-eswqyfnqnzveqqrv9] +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v033[0]: Reading... +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008] +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a] +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v1[0]: Reading... +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b] +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002] +19:53:41.854 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Refreshing state... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009] +19:53:41.886 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v1[0]: Read complete after 0s [id=1075048438] +19:53:41.886 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.v033[0]: Read complete after 0s [id=312113173] +19:53:41.899 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.kubectl_image: Read complete after 0s [id=sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951] +19:53:41.910 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller[0]: Reading... +19:53:41.914 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Refreshing state... [id=platform-eng-eks-mcm-karpenter-instance-profile] +19:53:41.919 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.data.aws_iam_policy_document.controller[0]: Read complete after 0s [id=312113173] +19:53:41.919 STDOUT [eks-karpenter] terraform_current: data.aws_ecr_image.karpenter_image: Read complete after 0s [id=sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02] +19:53:41.921 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c] +19:53:41.950 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Refreshing state... [id=karpenter] +19:53:42.232 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Refreshing state... [id=KarpenterController-20240906232348260000000005-2024090623241427070000000d] +19:53:44.215 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Refreshing state... [id=/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class] +19:53:44.349 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Refreshing state... [id=loki] +19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_region.current: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_caller_identity.current: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_caller_identity.current: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.empty: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:53:45.225 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:53:45.230 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.empty: Read complete after 0s [id=1132004489] +19:53:45.241 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:53:45.241 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:45.241 STDOUT [eks-loki] terraform_current: module.images.data.aws_region.current: Reading... +19:53:45.241 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_region.current: Reading... +19:53:45.241 STDOUT [eks-loki] terraform_current: data.aws_caller_identity.current: Reading... +19:53:45.257 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:45.257 STDOUT [eks-loki] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:45.263 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:45.263 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_partition.current: Reading... +19:53:45.265 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:53:45.268 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +19:53:45.278 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1893037846] +19:53:45.278 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-loki] +19:53:45.293 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:45.314 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_arn.current: Reading... +19:53:45.325 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:45.327 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:45.353 STDOUT [eks-loki] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:45.353 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_admin: Reading... +19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] +19:53:45.373 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_admin: Read complete after 0s [id=2059337135] +19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.data.aws_arn.current: Reading... +19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki] +19:53:45.373 STDOUT [eks-loki] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:45.373 STDOUT [eks-loki] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:45.377 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] +19:53:45.377 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki-canary] +19:53:45.388 STDOUT [eks-loki] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:53:45.400 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Refreshing state... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] +19:53:45.400 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:53:45.411 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Refreshing state... [id=platform-eng-eks-mcm/memcached] +19:53:45.534 STDOUT [eks-metrics-server] terraform_current: Terraform used the selected providers to generate the following execution +19:53:45.534 STDOUT [eks-metrics-server] terraform_current: plan. Resource actions are indicated with the following symbols: +19:53:45.534 STDOUT [eks-metrics-server] terraform_current:  - destroy +19:53:45.534 STDOUT [eks-metrics-server] terraform_current: Terraform will perform the following actions: +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  # helm_release.metrics_server will be destroyed +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - resource "helm_release" "metrics_server" { +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - atomic = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - chart = "metrics-server" -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - cleanup_on_fail = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - create_namespace = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - dependency_update = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_crd_hooks = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_openapi_validation = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - disable_webhooks = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - force_update = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - id = "metrics-server" -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - lint = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - max_history = 0 -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - metadata = [ +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - { +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - app_version = "0.7.1" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - chart = "metrics-server" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - first_deployed = 1725664959 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - last_deployed = 1725664959 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - name = "metrics-server" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - namespace = "kube-system" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - notes = <<-EOT +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  * Metrics Server * +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  Chart version: 3.12.1 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  App version: 0.7.1 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  Image tag: 224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server:v0.7.1 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  *********************************************************************** +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  EOT +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - revision = 1 +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - values = jsonencode( +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  { +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - apiService = { +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - create = true +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - extraArgs = [ +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - "--kubelet-preferred-address-types=InternalIP", +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ] +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - image = { +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - tag = "v0.7.1" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ) +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - version = "3.12.1" +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  }, +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  ] -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - name = "metrics-server" -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - namespace = "kube-system" -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - pass_credentials = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - recreate_pods = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - render_subchart_notes = true -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - replace = false -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - repository = "https://kubernetes-sigs.github.io/metrics-server" -> null +19:53:45.536 STDOUT [eks-metrics-server] terraform_current:  - reset_values = false -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - reuse_values = false -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - skip_crds = false -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - status = "deployed" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - timeout = 300 -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - verify = false -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - version = "3.12.1" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - wait = true -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - wait_for_jobs = false -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "apiService.create" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "true" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "extraArgs[0]" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "--kubelet-preferred-address-types=InternalIP" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "image.repository" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - set { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "image.tag" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - value = "v0.7.1" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # (1 unchanged attribute hidden) +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"] will be destroyed +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - policy = jsonencode( +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - rules = [ +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - action = { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - type = "expire" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - description = "keep 5 images" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - rulePriority = 1 +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - selection = { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - countNumber = 5 +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - countType = "imageCountMoreThan" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tagStatus = "any" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  }, +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  ] +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  ) -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - registry_id = "224384469011" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - repository = "platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.aws_ecr_repository.image_repos["metrics-server"] will be destroyed +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - force_delete = true -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - name = "platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - registry_id = "224384469011" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tags = { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Environment" = "application" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/metrics-server" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:created_by" = "terraform" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - tags_all = { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Environment" = "application" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/metrics-server" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Terraform" = "true" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "Terragrunt" = "true" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:created_by" = "terraform" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - encryption_configuration { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - encryption_type = "KMS" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - image_scanning_configuration { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - scan_on_push = true -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  # module.images.null_resource.copy_images["metrics-server#v0.7.1"] will be destroyed +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - resource "null_resource" "copy_images" { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - id = "7262007232490788094" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - triggers = { +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - "region" = "us-gov-east-1" +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  } +19:53:45.537 STDOUT [eks-metrics-server] terraform_current: Plan: 0 to add, 0 to change, 4 to destroy. +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  +19:53:45.537 STDOUT [eks-metrics-server] terraform_current: Changes to Outputs: +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - module_name = "tfmod-metrics-server" -> null +19:53:45.537 STDOUT [eks-metrics-server] terraform_current:  - module_version = "0.0.1" -> null +19:53:45.578 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prom/memcached-exporter] +19:53:45.584 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_policy_combined: Reading... +19:53:45.589 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.key_policy_combined: Read complete after 0s [id=2059337135] +19:53:45.594 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:53:45.608 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:53:45.608 STDOUT [eks-loki] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] +19:53:45.610 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:53:45.610 STDOUT [eks-loki] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Reading... +19:53:45.612 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Refreshing state... [id=48acfe83-618e-417e-82d1-498592f8da65] +19:53:45.656 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:53:45.716 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Refreshing state... [id=3148087180813738972] +19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Refreshing state... [id=platform-eng-eks-mcm/memcached] +19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prom/memcached-exporter] +19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] +19:53:45.730 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Refreshing state... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] +19:53:45.753 STDOUT [eks-loki] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:53:45.756 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] +19:53:45.759 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki] +19:53:45.786 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/loki-canary] +19:53:45.788 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Refreshing state... [id=4475259168260390874] +19:53:45.788 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Refreshing state... [id=2003059566474709841] +19:53:45.791 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Refreshing state... [id=6793409878383401785] +19:53:45.823 STDOUT [eks-loki] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Read complete after 0s [id=inf-logs-224384469011-us-gov-east-1] +19:53:45.827 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Refreshing state... [id=1971792497354324149] +19:53:45.847 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Refreshing state... [id=7168708508218564438] +19:53:45.847 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Refreshing state... [id=2400534705754070951] +19:53:45.872 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.encrypted-object-manager[0]: Reading... +19:53:45.872 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm-loki] +19:53:45.874 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.encrypted-object-manager[0]: Read complete after 0s [id=4130806941] +19:53:45.900 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003] +19:53:45.911 STDOUT [eks-loki] terraform_current: helm_release.loki: Refreshing state... [id=loki] +19:53:45.994 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Refreshing state... [id=/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.s3-bucket-owner[0]: Reading... +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.this: Reading... +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.this: Read complete after 0s [id=3656115763] +19:53:46.066 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.data.aws_iam_policy_document.s3-bucket-owner[0]: Read complete after 0s [id=2997069216] +19:53:46.067 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Refreshing state... [id=2024-09-06T23:29:22Z] +19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001] +19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.bucket_policy_combined: Reading... +19:53:46.082 STDOUT [eks-loki] terraform_current: module.loki_s3.data.aws_iam_policy_document.bucket_policy_combined: Read complete after 0s [id=3656115763] +19:53:46.119 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Destroying... [id=metrics-server] +19:53:46.122 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.127 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Refreshing state... [id=platform-eng-eks-mcm-loki-20240906232733624100000004] +19:53:46.272 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:46.328 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Refreshing state... [id=2024-09-06T23:29:53Z] +19:53:46.336 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Refreshing state... [id=platform-eng-eks-mcm-loki-20240906232732670800000002] +19:53:46.350 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-loki,private] +19:53:48.202 STDOUT [eks-karpenter] terraform_current: Terraform used the selected providers to generate the following execution +19:53:48.202 STDOUT [eks-karpenter] terraform_current: plan. Resource actions are indicated with the following symbols: +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - destroy +19:53:48.202 STDOUT [eks-karpenter] terraform_current: Terraform will perform the following actions: +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be destroyed +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-02c2250b9ec2dd6a2" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be destroyed +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-078b228071c609a50,karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-078b228071c609a50" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be destroyed +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "subnet-07a6339be3670fb41,karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/discovery" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource_id = "subnet-07a6339be3670fb41" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # aws_iam_instance_profile.karpenter_node_instance_profile will be destroyed +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_instance_profile" "karpenter_node_instance_profile" { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:instance-profile/platform-eng-eks-mcm-karpenter-instance-profile" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:49Z" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm-karpenter-instance-profile" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-karpenter-instance-profile" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AIPATIPS3JAJWSGL362TA" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # helm_release.karpenter will be destroyed +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - resource "helm_release" "karpenter" { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - atomic = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - chart = "karpenter" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - cleanup_on_fail = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - create_namespace = true -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - dependency_update = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - description = "Kubernetes Node Autoscaling: built for flexibility, performance, and simplicity" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_crd_hooks = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_openapi_validation = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - disable_webhooks = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - force_update = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - id = "karpenter" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - lint = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - max_history = 0 -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - metadata = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - app_version = "1.0.1" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - chart = "karpenter" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - first_deployed = 1725665114 +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - last_deployed = 1725665114 +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "karpenter" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - namespace = "karpenter" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - revision = 1 +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - values = jsonencode( +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - affinity = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - nodeAffinity = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - requiredDuringSchedulingIgnoredDuringExecution = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - nodeSelectorTerms = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - matchExpressions = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "karpenter.sh/nodepool" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - operator = "DoesNotExist" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - matchExpressions = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - key = "eks.amazonaws.com/nodegroup" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - operator = "In" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - values = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "eks-platform-eng-eks-mcm-nodegroup", +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - podAntiAffinity = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - requiredDuringSchedulingIgnoredDuringExecution = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - topologyKey = "kubernetes.io/hostname" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - controller = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - env = [ +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "AWS_REGION" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "us-gov-east-1" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - image = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - digest = "sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tag = "1.0.1" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - postInstallHook = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - image = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - digest = "sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - tag = "1.30.4" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - serviceAccount = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - annotations = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - settings = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - clusterEndpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - clusterName = "platform-eng-eks-mcm" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - featureGates = { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - spotToSpotConsolidation = true +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - interruptionQueue = "Karpenter-platform-eng-eks-mcm" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - isolatedVPC = true +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - version = "1.0.1" +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  ] -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "karpenter" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - namespace = "karpenter" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - pass_credentials = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - recreate_pods = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - render_subchart_notes = true -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - replace = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - repository = "oci://public.ecr.aws/karpenter" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - reset_values = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - reuse_values = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - skip_crds = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - status = "deployed" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - timeout = 300 -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - verify = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - version = "1.0.1" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - wait = true -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - wait_for_jobs = false -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].key" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "karpenter.sh/nodepool" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[0].matchExpressions[0].operator" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "DoesNotExist" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].key" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "eks.amazonaws.com/nodegroup" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].operator" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "In" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms[1].matchExpressions[0].values[0]" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "eks-platform-eng-eks-mcm-nodegroup" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "affinity.podAntiAffinity.requiredDuringSchedulingIgnoredDuringExecution[0].topologyKey" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "kubernetes.io/hostname" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.env[0].name" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "AWS_REGION" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.env[0].value" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "us-gov-east-1" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.digest" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  - value = "sha256:63f98949a9a89707ec45e48f39ae216c6833140a2401e958e18e641488b9ba02" -> null +19:53:48.202 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.repository" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "controller.image.tag" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "1.0.1" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.digest" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "sha256:da695e26c8b3db7b9c8ae4159a55cfc2e55fc1608da5469b06d34ba20a8a0951" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.repository" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "postInstallHook.image.tag" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "1.30.4" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.clusterEndpoint" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.clusterName" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "platform-eng-eks-mcm" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.featureGates.spotToSpotConsolidation" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "true" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.interruptionQueue" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "Karpenter-platform-eng-eks-mcm" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - set { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "settings.isolatedVPC" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - value = "true" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # kubectl_manifest.karpenter_ec2_node_class will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "kubectl_manifest" "karpenter_ec2_node_class" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - api_version = "karpenter.k8s.aws/v1" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - apply_only = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_conflicts = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_new = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kind = "EC2NodeClass" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_manifest_incluster = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_uid = "2cca7490-0118-4130-9a53-fb28e960a75d" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-karpenter-node-class" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - server_side_apply = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - uid = "2cca7490-0118-4130-9a53-fb28e960a75d" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - validate_schema = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - wait_for_rollout = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body_parsed = <<-EOT +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  apiVersion: karpenter.k8s.aws/v1 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: EC2NodeClass +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadata: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  annotations: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubernetes.io/description: EC2NodeClass for running Bottlerocket nodes +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-karpenter-node-class +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  amiFamily: Bottlerocket +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  amiSelectorTerms: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - alias: bottlerocket@latest +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  detailedMonitoring: true +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  instanceProfile: platform-eng-eks-mcm-karpenter-instance-profile +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  instanceStorePolicy: RAID0 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubelet: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionHard: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 5% +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 10% +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 10% +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionMaxPodGracePeriod: 60 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionSoft: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 500Mi +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 15% +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 15% +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  evictionSoftGracePeriod: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  memory.available: 1m +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.available: 1m30s +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodefs.inodesFree: 2m +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  imageGCHighThresholdPercent: 85 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  imageGCLowThresholdPercent: 80 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadataOptions: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpEndpoint: enabled +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpProtocolIPv6: enabled +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpPutResponseHopLimit: 2 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  httpTokens: required +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  securityGroupSelectorTerms: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  Name: platform-eng-eks-mcm-node +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  subnetSelectorTerms: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  Name: '*-container-*' +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  EOT -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_incluster = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # kubectl_manifest.karpenter_node_pool will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "kubectl_manifest" "karpenter_node_pool" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - api_version = "karpenter.sh/v1" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - apply_only = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_conflicts = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_new = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kind = "NodePool" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_manifest_incluster = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - live_uid = "1b95faf2-f2a6-4c07-8956-4a6c6de4b659" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm-node-pool-general" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - server_side_apply = false -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - uid = "1b95faf2-f2a6-4c07-8956-4a6c6de4b659" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - validate_schema = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - wait_for_rollout = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_body_parsed = <<-EOT +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  apiVersion: karpenter.sh/v1 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: NodePool +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  metadata: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  annotations: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kubernetes.io/description: General purpose NodePool for generic workloads +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-node-pool-general +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  disruption: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  consolidateAfter: 1h +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  consolidationPolicy: WhenEmptyOrUnderutilized +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  expireAfter: 1h +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  template: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  spec: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  nodeClassRef: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  group: karpenter.k8s.aws +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  kind: EC2NodeClass +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  name: platform-eng-eks-mcm-karpenter-node-class +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  requirements: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: kubernetes.io/arch +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - amd64 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: kubernetes.io/os +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - linux +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.sh/capacity-type +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - on-demand +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - spot +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.k8s.aws/instance-category +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: In +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - c +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - m +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - r +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - t +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - key: karpenter.k8s.aws/instance-generation +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  operator: Gt +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  values: +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "2" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  EOT -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - yaml_incluster = (sensitive value) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rules = [ +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - action = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - type = "expire" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - description = "keep 5 images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rulePriority = 1 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - selection = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countNumber = 5 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countType = "imageCountMoreThan" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tagStatus = "any" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository = "platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rules = [ +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - action = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - type = "expire" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - description = "keep 5 images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - rulePriority = 1 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - selection = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countNumber = 5 +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - countType = "imageCountMoreThan" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tagStatus = "any" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository = "platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_repository.image_repos["bitnami/kubectl"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_delete = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/bitnami/kubectl" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/bitnami/kubectl" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/bitnami/kubectl" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_configuration { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_type = "KMS" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_scanning_configuration { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - scan_on_push = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.aws_ecr_repository.image_repos["karpenter/controller"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - force_delete = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - name = "platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - registry_id = "224384469011" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/karpenter/controller" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/karpenter/controller" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Environment" = "application" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/karpenter/controller" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:created_by" = "terraform" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_configuration { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - encryption_type = "KMS" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - image_scanning_configuration { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - scan_on_push = true -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "null_resource" "copy_images" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "8319382030182575774" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - triggers = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "region" = "us-gov-east-1" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.images.null_resource.copy_images["karpenter/controller#1.0.1"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - resource "null_resource" "copy_images" { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - id = "7033227500110577822" -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - triggers = { +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  - "region" = "us-gov-east-1" +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.203 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"] will be destroyed +19:53:48.203 STDOUT [eks-karpenter] terraform_current:   +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterHealthEvent-20240906232348266800000006" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - AWS health event" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "AWS Health Event", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.health", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterHealthEvent-20240906232348266800000006" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterHealthEvent-20240906232348266800000006" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterHealthEvent-" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"] will be destroyed +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterInstanceRebalance-20240906232348258700000004" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 instance rebalance recommendation" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Instance Rebalance Recommendation", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceRebalance-20240906232348258700000004" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterInstanceRebalance-20240906232348258700000004" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterInstanceRebalance-" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"] will be destroyed +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterInstanceStateChange-20240906232348256000000001" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 instance state-change notification" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Instance State-change Notification", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceStateChange-20240906232348256000000001" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterInstanceStateChange-20240906232348256000000001" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterInstanceStateChange-" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"] will be destroyed +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_rule" "this" { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:events:us-gov-east-1:224384469011:rule/KarpenterSpotInterrupt-20240906232348258200000003" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter interrupt - EC2 spot instance interruption warning" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_pattern = jsonencode( +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - detail-type = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "EC2 Spot Instance Interruption Warning", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - source = [ +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "aws.ec2", +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterSpotInterrupt-20240906232348258200000003" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - is_enabled = true -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterSpotInterrupt-20240906232348258200000003" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterSpotInterrupt-" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - state = "ENABLED" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ClusterName" = "platform-eng-eks-mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"] will be destroyed +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget" -> null +19:53:48.214 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterHealthEvent-20240906232348266800000006" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterInstanceRebalance-20240906232348258700000004" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterInstanceStateChange-20240906232348256000000001" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_cloudwatch_event_target" "this" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - event_bus_name = "default" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - force_destroy = false -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - rule = "KarpenterSpotInterrupt-20240906232348258200000003" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - target_id = "KarpenterInterruptionQueueTarget" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # (3 unchanged attributes hidden) +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_eks_access_entry.node[0] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_eks_access_entry" "node" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/Karpenter-platform-eng-eks-mcm-20240906232348257500000002/3ec8e4d3-b820-8574-2ff6-36a2dfede510" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - created_at = "2024-09-06T23:24:39Z" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - kubernetes_groups = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "system:nodes", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - modified_at = "2024-09-06T23:24:39Z" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - type = "EC2_LINUX" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - user_name = "system:node:{{EC2PrivateDNSName}}" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_eks_pod_identity_association" "karpenter" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - association_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:podidentityassociation/platform-eng-eks-mcm/a-eswqyfnqnzveqqrv9" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - association_id = "a-eswqyfnqnzveqqrv9" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "a-eswqyfnqnzveqqrv9" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - namespace = "kube-system" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - role_arn = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - service_account = "karpenter" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_policy.controller[0] will be destroyed +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_policy" "controller" { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - attachment_count = 1 -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter controller IAM policy" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterController-2024090623241372970000000c" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterController-" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Statement = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:RunInstances", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateFleet", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*::snapshot/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*::image/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:subnet/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:security-group/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedEC2InstanceActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:RunInstances", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateLaunchTemplate", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateFleet", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.sh/nodepool" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:network-interface/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:fleet/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedEC2InstanceActionsWithTags" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ec2:CreateTags" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:CreateAction" = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "RunInstances", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "CreateFleet", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "CreateLaunchTemplate", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.sh/nodepool" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:spot-instances-request/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:network-interface/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:fleet/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedResourceCreationTagging" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ec2:CreateTags" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ForAllValues:StringEquals" = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:TagKeys" = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "karpenter.sh/nodeclaim", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Name", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.sh/nodepool" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:ec2:*:*:instance/*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedResourceTagging" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:TerminateInstances", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DeleteLaunchTemplate", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.sh/nodepool" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:launch-template/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:ec2:*:*:instance/*", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedDeletion" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSubnets", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSpotPriceHistory", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeSecurityGroups", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeLaunchTemplates", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstances", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstanceTypes", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeInstanceTypeOfferings", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeImages", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ec2:DescribeAvailabilityZones", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestedRegion" = "us-gov-east-1" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowRegionalReadActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "ssm:GetParameter" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:ssm:us-gov-east-1::parameter/aws/service/*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowSSMReadActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "pricing:GetProducts" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowPricingReadActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:ReceiveMessage", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:GetQueueUrl", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:GetQueueAttributes", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "sqs:DeleteMessage", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowInterruptionQueueActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:PassRole" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:PassedToService" = "ec2.amazonaws.com" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowPassingInstanceRole" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:CreateInstanceProfile" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/topology.kubernetes.io/region" = "us-gov-east-1" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.k8s.aws/ec2nodeclass" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileCreationActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:TagInstanceProfile" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/topology.kubernetes.io/region" = "us-gov-east-1" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:RequestTag/karpenter.k8s.aws/ec2nodeclass" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileTagActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:RemoveRoleFromInstanceProfile", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:DeleteInstanceProfile", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "iam:AddRoleToInstanceProfile", +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/topology.kubernetes.io/region" = "us-gov-east-1" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - StringLike = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass" = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowScopedInstanceProfileActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "iam:GetInstanceProfile" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "*" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowInstanceProfileReadActions" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Action = "eks:DescribeCluster" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Sid = "AllowAPIServerEndpointDiscovery" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - policy_id = "ANPATIPS3JAJ2NGAKPGOF" -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.215 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.216 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.216 STDOUT [eks-karpenter] terraform_current:  - +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  "created_by" = "matthew.c.morgan@census.gov" +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role.controller[0] will be destroyed +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role" "controller" { +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/KarpenterController-20240906232348260000000005" -> null +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - assume_role_policy = jsonencode( +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Statement = [ +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Action = [ +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "sts:TagSession", +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - "sts:AssumeRole", +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Principal = { +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  - Service = "pods.eks.amazonaws.com" +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.246 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:karpenter:karpenter" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:48Z" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - description = "Karpenter controller IAM role" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - force_detach_policies = true -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterController-20240906232348260000000005" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - managed_policy_arns = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_session_duration = 3600 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "KarpenterController-20240906232348260000000005" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "KarpenterController-" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AROATIPS3JAJZ4M75TL3A" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (1 unchanged attribute hidden) +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role.node[0] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role" "node" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - assume_role_policy = jsonencode( +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sts:AssumeRole" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = "ec2.amazonaws.com" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "EKSNodeAssumeRole" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - create_date = "2024-09-06T23:23:48Z" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - force_detach_policies = true -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - managed_policy_arns = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedInstanceCore", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_session_duration = 3600 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name_prefix = "Karpenter-platform-eng-eks-mcm-" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - path = "/" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - unique_id = "AROATIPS3JAJ4WSLDKX5Q" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (2 unchanged attributes hidden) +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.controller[0] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "controller" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "KarpenterController-20240906232348260000000005-2024090623241427070000000d" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "KarpenterController-20240906232348260000000005" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_iam_role_policy_attachment" "node_additional" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonSSMManagedInstanceCore" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - role = "Karpenter-platform-eng-eks-mcm-20240906232348257500000002" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_sqs_queue.this[0] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_sqs_queue" "this" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - arn = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - content_based_deduplication = false -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - delay_seconds = 0 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - fifo_queue = false -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - kms_data_key_reuse_period_seconds = 300 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - max_message_size = 262144 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - message_retention_seconds = 300 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - name = "Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:SendMessage" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "sqs.amazonaws.com", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "events.amazonaws.com", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "SqsWrite" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:*" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "aws:SecureTransport" = "false" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Deny" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = "*" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "DenyHTTP" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - receive_wait_time_seconds = 0 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - sqs_managed_sse_enabled = true -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags = {} -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - tags_all = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terraform" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "Terragrunt" = "true" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - url = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - visibility_timeout_seconds = 30 -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # (6 unchanged attributes hidden) +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  # module.karpenter_resources.aws_sqs_queue_policy.this[0] will be destroyed +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - resource "aws_sqs_queue_policy" "this" { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - id = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - policy = jsonencode( +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Statement = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:SendMessage" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Allow" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Service = [ +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "sqs.amazonaws.com", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "events.amazonaws.com", +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "SqsWrite" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Action = "sqs:*" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Condition = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - StringEquals = { +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - "aws:SecureTransport" = "false" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Effect = "Deny" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Principal = "*" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Resource = "arn:aws-us-gov:sqs:us-gov-east-1:224384469011:Karpenter-platform-eng-eks-mcm" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Sid = "DenyHTTP" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  }, +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ] +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - Version = "2012-10-17" +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  ) -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - queue_url = "https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  } +19:53:48.247 STDOUT [eks-karpenter] terraform_current: Plan: 0 to add, 0 to change, 33 to destroy. +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  +19:53:48.247 STDOUT [eks-karpenter] terraform_current: Changes to Outputs: +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - module_name = "tfmod-karpenter" -> null +19:53:48.247 STDOUT [eks-karpenter] terraform_current:  - module_version = "0.0.2" -> null +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_caller_identity.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_region.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_partition.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.empty: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: data.aws_caller_identity.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:53:48.345 STDOUT [eks-tempo] terraform_current: module.images.data.aws_region.current: Reading... +19:53:48.353 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:53:48.353 STDOUT [eks-tempo] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:53:48.353 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.empty: Read complete after 0s [id=1132004489] +19:53:48.365 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster_auth.cluster_auth: Reading... +19:53:48.365 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_region.current: Reading... +19:53:48.376 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster.cluster: Reading... +19:53:48.376 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_caller_identity.current: Reading... +19:53:48.376 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:53:48.376 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster_auth.cluster_auth: Read complete after 0s [id=platform-eng-eks-mcm] +19:53:48.377 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:53:48.381 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:53:48.392 STDOUT [eks-tempo] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:48.400 STDOUT [eks-tempo] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Reading... +19:53:48.423 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:48.453 STDOUT [eks-tempo] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:48.458 STDOUT [eks-tempo] terraform_current: module.images.data.aws_arn.current: Reading... +19:53:48.458 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Refreshing state... [id=platform-eng-eks-mcm/tempo] +19:53:48.460 STDOUT [eks-tempo] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:48.496 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:53:48.508 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 1s [id=us-gov-east-1] +19:53:48.508 STDOUT [eks-tempo] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 1s [id=us-gov-east-1] +19:53:48.508 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:48.508 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_arn.current: Reading... +19:53:48.514 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:53:48.515 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:53:48.519 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_admin: Reading... +19:53:48.527 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_admin: Read complete after 0s [id=2059337135] +19:53:48.528 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_policy_combined: Reading... +19:53:48.530 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.key_policy_combined: Read complete after 0s [id=2059337135] +19:53:48.531 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Refreshing state... [id=009b63d6-497f-4139-9c8c-7cae709ed71b] +19:53:48.580 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:53:48.580 STDOUT [eks-tempo] terraform_current: data.aws_s3_bucket.s3_server_access_logs: Read complete after 1s [id=inf-logs-224384469011-us-gov-east-1] +19:53:48.627 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Refreshing state... [id=platform-eng-eks-mcm/tempo] +19:53:48.627 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Refreshing state... [id=154927662841800702] +19:53:48.632 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:53:48.644 STDOUT [eks-tempo] terraform_current: data.aws_eks_cluster.cluster: Read complete after 1s [id=platform-eng-eks-mcm] +19:53:48.647 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.this[0]: Reading... +19:53:48.650 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2457411343] +19:53:48.654 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo] +19:53:48.664 STDOUT [eks-tempo] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:53:48.704 STDOUT [eks-tempo] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] +19:53:48.750 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm-tempo] +19:53:48.750 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.encrypted-object-manager[0]: Reading... +19:53:48.753 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.encrypted-object-manager[0]: Read complete after 0s [id=1780885925] +19:53:48.755 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003] +19:53:48.886 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Destroying... [id=/apis/karpenter.sh/v1/nodepools/platform-eng-eks-mcm-node-pool-general] +19:53:49.051 STDOUT [eks-metrics-server] terraform_current: helm_release.metrics_server: Destruction complete after 3s +19:53:49.058 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Destroying... [id=platform-eng-eks-mcm/metrics-server] +19:53:49.084 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Destroying... [id=7262007232490788094] +19:53:49.087 STDOUT [eks-metrics-server] terraform_current: module.images.null_resource.copy_images["metrics-server#v0.7.1"]: Destruction complete after 0s +19:53:49.129 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo-20240906232934771300000004] +19:53:49.224 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["metrics-server"]: Destruction complete after 0s +19:53:49.227 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Refreshing state... [id=2024-09-06T23:31:23Z] +19:53:49.227 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Destroying... [id=platform-eng-eks-mcm/metrics-server] +19:53:49.238 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Refreshing state... [id=tempo] +19:53:49.238 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.s3-bucket-owner[0]: Reading... +19:53:49.256 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.this: Reading... +19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.data.aws_iam_policy_document.s3-bucket-owner[0]: Read complete after 0s [id=4142807449] +19:53:49.257 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.282 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.this: Read complete after 0s [id=143145154] +19:53:49.283 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001] +19:53:49.296 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.bucket_policy_combined: Reading... +19:53:49.307 STDOUT [eks-tempo] terraform_current: module.tempo-s3.data.aws_iam_policy_document.bucket_policy_combined: Read complete after 0s [id=143145154] +19:53:49.321 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.384 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:49.421 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Refreshing state... [id=2024-09-06T23:31:53Z] +19:53:49.445 STDOUT [eks-metrics-server] terraform_current: module.images.aws_ecr_repository.image_repos["metrics-server"]: Destruction complete after 0s +19:53:49.449 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Refreshing state... [id=v-s3-platform-eng-eks-mcm-tempo,private] +19:53:49.554 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Refreshing state... [id=platform-eng-eks-mcm-tempo-20240906232923578800000002] +19:53:49.698 STDOUT [eks-metrics-server] terraform_current:  +19:53:49.698 STDOUT [eks-metrics-server] terraform_current: Destroy complete! Resources: 4 destroyed. +19:53:49.698 STDOUT [eks-metrics-server] terraform_current:  +19:53:49.746 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/Karpenter-platform-eng-eks-mcm-20240906232348257500000002] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349117600000009] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Destroying... [id=KarpenterController-20240906232348260000000005-2024090623241427070000000d] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-20240906232349108100000008] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destroying... [id=subnet-02c2250b9ec2dd6a2,karpenter.sh/discovery] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destroying... [id=subnet-07a6339be3670fb41,karpenter.sh/discovery] +19:53:49.748 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Destroying... [id=platform-eng-eks-mcm-karpenter-instance-profile] +19:53:49.759 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Destroying... [id=KarpenterHealthEvent-20240906232348266800000006-KarpenterInterruptionQueueTarget] +19:53:49.759 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Destroying... [id=a-eswqyfnqnzveqqrv9] +19:53:49.909 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["health_event"]: Destruction complete after 0s +19:53:49.912 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923830000000b] +19:53:49.923 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_node_pool: Destruction complete after 1s +19:53:49.926 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Destroying... [id=KarpenterInstanceRebalance-20240906232348258700000004-KarpenterInterruptionQueueTarget] +19:53:49.970 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_rebalance"]: Destruction complete after 0s +19:53:49.972 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Destroying... [id=KarpenterInstanceStateChange-20240906232348256000000001-KarpenterInterruptionQueueTarget] +19:53:49.988 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destruction complete after 0s +19:53:49.990 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destroying... [id=subnet-078b228071c609a50,karpenter.sh/discovery] +19:53:49.994 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destruction complete after 0s +19:53:49.996 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Destroying... [id=KarpenterSpotInterrupt-20240906232348258200000003-KarpenterInterruptionQueueTarget] +19:53:50.014 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["instance_state_change"]: Destruction complete after 0s +19:53:50.015 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002-2024090623234923000000000a] +19:53:50.054 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_target.this["spot_interrupt"]: Destruction complete after 0s +19:53:50.056 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Destroying... [id=/apis/karpenter.k8s.aws/v1/ec2nodeclasses/platform-eng-eks-mcm-karpenter-node-class] +19:53:50.128 STDOUT [eks-karpenter] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destruction complete after 0s +19:53:50.130 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Destroying... [id=KarpenterInstanceRebalance-20240906232348258700000004] +19:53:50.141 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]: Destruction complete after 0s +19:53:50.146 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Destroying... [id=KarpenterHealthEvent-20240906232348266800000006] +19:53:50.146 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.controller[0]: Destruction complete after 0s +19:53:50.148 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Destroying... [id=KarpenterInstanceStateChange-20240906232348256000000001] +19:53:50.154 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]: Destruction complete after 0s +19:53:50.155 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Destroying... [id=KarpenterSpotInterrupt-20240906232348258200000003] +19:53:50.163 STDOUT [eks-karpenter] terraform_current: kubectl_manifest.karpenter_ec2_node_class: Destruction complete after 0s +19:53:50.166 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/KarpenterController-2024090623241372970000000c] +19:53:50.200 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_rebalance"]: Destruction complete after 0s +19:53:50.208 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["health_event"]: Destruction complete after 0s +19:53:50.220 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Destroying... [id=karpenter] +19:53:50.266 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["instance_state_change"]: Destruction complete after 0s +19:53:50.270 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_cloudwatch_event_rule.this["spot_interrupt"]: Destruction complete after 0s +19:53:50.282 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]: Destruction complete after 0s +19:53:50.283 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]: Destruction complete after 0s +19:53:50.302 STDOUT [eks-karpenter] terraform_current: aws_iam_instance_profile.karpenter_node_instance_profile: Destruction complete after 0s +19:53:50.410 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_access_entry.node[0]: Destruction complete after 0s +19:53:50.411 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Destroying... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] +19:53:50.474 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_policy.controller[0]: Destruction complete after 0s +19:53:50.474 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_eks_pod_identity_association.karpenter[0]: Destruction complete after 0s +19:53:50.476 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Destroying... [id=Karpenter-platform-eng-eks-mcm-20240906232348257500000002] +19:53:50.947 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.node[0]: Destruction complete after 1s +19:53:53.977 STDOUT [eks-karpenter] terraform_current: helm_release.karpenter: Destruction complete after 4s +19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Destroying... [id=8319382030182575774] +19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Destroying... [id=platform-eng-eks-mcm/karpenter/controller] +19:53:53.981 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Destroying... [id=platform-eng-eks-mcm/bitnami/kubectl] +19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["bitnami/kubectl#1.30.4"]: Destruction complete after 0s +19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Destroying... [id=7033227500110577822] +19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.images.null_resource.copy_images["karpenter/controller#1.0.1"]: Destruction complete after 0s +19:53:53.986 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Destroying... [id=KarpenterController-20240906232348260000000005] +19:53:54.152 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["bitnami/kubectl"]: Destruction complete after 0s +19:53:54.163 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["karpenter/controller"]: Destruction complete after 0s +19:53:54.166 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Destroying... [id=platform-eng-eks-mcm/karpenter/controller] +19:53:54.166 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Destroying... [id=platform-eng-eks-mcm/bitnami/kubectl] +19:53:54.366 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["bitnami/kubectl"]: Destruction complete after 0s +19:53:54.375 STDOUT [eks-karpenter] terraform_current: module.images.aws_ecr_repository.image_repos["karpenter/controller"]: Destruction complete after 0s +19:53:54.523 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_iam_role.controller[0]: Destruction complete after 1s +19:53:55.517 STDOUT [eks-tempo] terraform_current: Terraform used the selected providers to generate the following execution +19:53:55.517 STDOUT [eks-tempo] terraform_current: plan. Resource actions are indicated with the following symbols: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - destroy +19:53:55.517 STDOUT [eks-tempo] terraform_current: Terraform will perform the following actions: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # helm_release.tempo will be destroyed +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - resource "helm_release" "tempo" { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - atomic = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - chart = "tempo" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - cleanup_on_fail = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - create_namespace = true -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - dependency_update = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_crd_hooks = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_openapi_validation = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - disable_webhooks = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - force_update = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - id = "tempo" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - lint = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - max_history = 0 -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - metadata = [ +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - app_version = "2.5.0" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - chart = "tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - first_deployed = 1725665374 +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - last_deployed = 1725665374 +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - namespace = "tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - revision = 1 +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - values = jsonencode( +19:53:55.517 STDOUT [eks-tempo] terraform_current:  { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - persistence = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - storageClassName = "gp3-encrypted" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - replicas = 3 +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - serviceAccount = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - annotations = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - tempo = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - extraEnv = [ +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "JAEGER_AGENT_PORT" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "9411" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - metricsGenerator = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - enabled = true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - remoteWriteUrl = "http://prometheus-server.prometheus:9090/api/v1/write" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - persistence = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - accessModes = [ +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - "ReadWriteOnce", +19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - enabled = true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - size = "10Gi" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - receivers = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - zipkin = null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reportingEnabled = false +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - serviceAccount = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - create = true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - storage = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - trace = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - backend = "s3" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - s3 = { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - endpoint = "s3.us-gov-east-1.amazonaws.com" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - insecure = false +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - tag = "2.5.0" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  ) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - version = "1.10.1" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - namespace = "tempo" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - pass_credentials = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - recreate_pods = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - render_subchart_notes = true -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - replace = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reset_values = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - reuse_values = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - skip_crds = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - status = "deployed" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - timeout = 60 -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - values = [ +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - <<-EOT +19:53:55.517 STDOUT [eks-tempo] terraform_current:  tempo: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # storage: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # trace: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # backend: s3 +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # s3: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # insecure: false +19:53:55.517 STDOUT [eks-tempo] terraform_current:  extraEnv: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name: JAEGER_AGENT_PORT +19:53:55.517 STDOUT [eks-tempo] terraform_current:  value: "9411" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  receivers: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  zipkin: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # metricsGenerator: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # enabled: true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # reportingEnabled: false +19:53:55.517 STDOUT [eks-tempo] terraform_current:  +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # serviceAccount: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # create: true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # name: "tempo" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # persistence: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # enabled: true +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # accessModes: +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # - ReadWriteOnce +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # size: 10Gi +19:53:55.517 STDOUT [eks-tempo] terraform_current:  +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # name = "tempo.receivers.zipkin[]" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # value = "" +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  EOT, +19:53:55.517 STDOUT [eks-tempo] terraform_current:  ] -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - verify = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - version = "1.10.1" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - wait = true -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - wait_for_jobs = false -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "persistence.storageClassName" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "gp3-encrypted" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "replicas" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "3" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.metricsGenerator.enabled" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.metricsGenerator.remoteWriteUrl" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "http://prometheus-server.prometheus:9090/api/v1/write" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.accessModes[0]" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "ReadWriteOnce" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.enabled" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.persistence.size" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "10Gi" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - name = "tempo.reportingEnabled" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - value = "false" -> null +19:53:55.517 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.517 STDOUT [eks-tempo] terraform_current:  } +19:53:55.517 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.repository" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.serviceAccount.create" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "true" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.serviceAccount.name" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.backend" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "s3" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.bucket" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.endpoint" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "s3.us-gov-east-1.amazonaws.com" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.storage.trace.s3.insecure" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "false" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - set { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "tempo.tag" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - value = "2.5.0" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["tempo"] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.518 STDOUT [eks-tempo] terraform_current:  { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rules = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - action = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - type = "expire" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "keep 5 images" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rulePriority = 1 +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - selection = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - countNumber = 5 +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - countType = "imageCountMoreThan" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tagStatus = "any" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - registry_id = "224384469011" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - repository = "platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.aws_ecr_repository.image_repos["tempo"] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - force_delete = true -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - registry_id = "224384469011" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Environment" = "application" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Environment" = "application" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - encryption_configuration { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - encryption_type = "KMS" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - image_scanning_configuration { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - scan_on_push = true -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.images.null_resource.copy_images["tempo#2.5.0"] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "null_resource" "copy_images" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "154927662841800702" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - triggers = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "region" = "us-gov-east-1" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_policy" "encrypted-object-manager" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - attachment_count = 1 -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "Allow the role to read/write encrypted data using the kms keys." -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name_prefix = "AmazonEKS_encrypted-object-manager-" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.518 STDOUT [eks-tempo] terraform_current:  { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:ReEncrypt*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:GenerateDataKey", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:Encrypt", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:DescribeKey", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "kms:Decrypt", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_id = "ANPATIPS3JAJR3KXC62NX" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = {} -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_policy" "s3-bucket-owner" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - attachment_count = 1 -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "Allow the role to add/remove/change objects in the s3 bucket." -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name_prefix = "AmazonEKS_s3-bucket-owner-" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.518 STDOUT [eks-tempo] terraform_current:  { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:PutObject*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:PutBucketVersioning", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:List*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:GetObject*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:GetBucket*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:DeleteObject*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "s3:AbortMultipartUpload", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_id = "ANPATIPS3JAJ7DZAG4ED6" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = {} -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role.this[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role" "this" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - assume_role_policy = jsonencode( +19:53:55.518 STDOUT [eks-tempo] terraform_current:  { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Condition = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - StringEquals = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:tempo:tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Principal = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - create_date = "2024-09-06T23:29:21Z" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - force_detach_policies = true -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - managed_policy_arns = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001", +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - max_session_duration = 3600 -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - path = "/" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - unique_id = "AROATIPS3JAJYIU6TPZIG" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (3 unchanged attributes hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role_policy_attachment" "encrypted-object-manager" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo-20240906232934771300000004" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - role = "platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_iam_role_policy_attachment" "s3-bucket-owner" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "platform-eng-eks-mcm-tempo-20240906232923578800000002" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - role = "platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_kms_alias.key[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_kms_alias" "key" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - target_key_id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_kms_key.key[0] will be destroyed +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - resource "aws_kms_key" "key" { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - bypass_policy_lockout_safety_check = false -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - description = "KMS CMK for S3 bucket platform-eng-eks-mcm-tempo" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - enable_key_rotation = true -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - is_enabled = true -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - key_id = "009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - multi_region = false -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.518 STDOUT [eks-tempo] terraform_current:  { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Action = "kms:*" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Effect = "Allow" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Principal = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Resource = "*" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Sid = "BuiltinKMSAdminRoles" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } +19:53:55.518 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - rotation_period_in_days = 365 -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-tempo" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.518 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  # (2 unchanged attributes hidden) +19:53:55.519 STDOUT [eks-tempo] terraform_current:  } +19:53:55.519 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket.this will be destroyed +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket" "this" { +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - arn = "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket_domain_name = "v-s3-platform-eng-eks-mcm-tempo.s3.amazonaws.com" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - bucket_regional_domain_name = "v-s3-platform-eng-eks-mcm-tempo.s3.us-gov-east-1.amazonaws.com" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - force_destroy = false -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - hosted_zone_id = "Z2NIFVYYW2VKV1" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - object_lock_enabled = false -> null +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.519 STDOUT [eks-tempo] terraform_current:  { +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Action = "s3:*" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Condition = { +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - Bool = { +19:53:55.519 STDOUT [eks-tempo] terraform_current:  - "aws:SecureTransport" = "false" +19:53:55.519 STDOUT [eks-tempo] terraform_current:  } +19:53:55.519 STDOUT [eks-tempo] terraform_current:  } +19:53:55.519 STDOUT [eks-tempo] terraform_current:  +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Effect = "Deny" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Principal = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - AWS = "*" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Resource = [ +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Sid = "enforceSSL" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - region = "us-gov-east-1" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - request_payer = "BucketOwner" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - tags = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - tags_all = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Terraform" = "true" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "Terragrunt" = "true" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:created_by" = "terraform" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_name" = "tfmod-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "boc:tf_module_version" = "0.0.1" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (2 unchanged attributes hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grant { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - permissions = [ +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "FULL_CONTROL", +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - type = "CanonicalUser" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - logging { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-tempo/" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - server_side_encryption_configuration { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket_key_enabled = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - apply_server_side_encryption_by_default { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - sse_algorithm = "aws:kms" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - versioning { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - enabled = false -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - mfa_delete = false -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_acl.this[0] will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_acl" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - acl = "private" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo,private" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - access_control_policy { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grant { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - permission = "FULL_CONTROL" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - grantee { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - type = "CanonicalUser" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (3 unchanged attributes hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - owner { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_logging.this will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_logging" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-tempo/" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_ownership_controls.this will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_ownership_controls" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - object_ownership = "BucketOwnerPreferred" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_policy.policy[0] will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_policy" "policy" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - policy = jsonencode( +19:53:55.521 STDOUT [eks-tempo] terraform_current:  { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Statement = [ +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Action = "s3:*" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Condition = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Bool = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "aws:SecureTransport" = "false" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Effect = "Deny" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Principal = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - AWS = "*" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Resource = [ +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo/*", +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-tempo", +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Sid = "enforceSSL" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  }, +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ] +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - Version = "2012-10-17" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  ) -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_public_access_block.this will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_public_access_block" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - block_public_acls = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - block_public_policy = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - ignore_public_acls = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - restrict_public_buckets = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_server_side_encryption_configuration" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - rule { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket_key_enabled = true -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - apply_server_side_encryption_by_default { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/009b63d6-497f-4139-9c8c-7cae709ed71b" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - sse_algorithm = "aws:kms" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.aws_s3_bucket_versioning.this will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "aws_s3_bucket_versioning" "this" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-tempo" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - versioning_configuration { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - status = "Suspended" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # (1 unchanged attribute hidden) +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.time_sleep.acl_delay will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "time_sleep" "acl_delay" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - create_duration = "30s" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - destroy_duration = "30s" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2024-09-06T23:31:53Z" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - triggers = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "public_access_block" = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current:  # module.tempo-s3.time_sleep.policy_delay will be destroyed +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - resource "time_sleep" "policy_delay" { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - create_duration = "120s" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - destroy_duration = "30s" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - id = "2024-09-06T23:31:23Z" -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - triggers = { +19:53:55.521 STDOUT [eks-tempo] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-tempo" +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } -> null +19:53:55.521 STDOUT [eks-tempo] terraform_current:  } +19:53:55.521 STDOUT [eks-tempo] terraform_current: Plan: 0 to add, 0 to change, 21 to destroy. +19:53:55.521 STDOUT [eks-tempo] terraform_current:  +19:53:56.025 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Destroying... [id=154927662841800702] +19:53:56.027 STDOUT [eks-tempo] terraform_current: module.images.null_resource.copy_images["tempo#2.5.0"]: Destruction complete after 0s +19:53:56.058 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Destroying... [id=tempo] +19:53:56.505 STDOUT [eks-loki] terraform_current: Terraform used the selected providers to generate the following execution +19:53:56.505 STDOUT [eks-loki] terraform_current: plan. Resource actions are indicated with the following symbols: +19:53:56.505 STDOUT [eks-loki] terraform_current:  - destroy +19:53:56.505 STDOUT [eks-loki] terraform_current: Terraform will perform the following actions: +19:53:56.522 STDOUT [eks-loki] terraform_current:  # helm_release.loki will be destroyed +19:53:56.522 STDOUT [eks-loki] terraform_current:  - resource "helm_release" "loki" { +19:53:56.522 STDOUT [eks-loki] terraform_current:  - atomic = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - chart = "loki" -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - cleanup_on_fail = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - create_namespace = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - dependency_update = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_crd_hooks = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_openapi_validation = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - disable_webhooks = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - force_update = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - id = "loki" -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - lint = false -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - max_history = 0 -> null +19:53:56.522 STDOUT [eks-loki] terraform_current:  - metadata = [ +19:53:56.522 STDOUT [eks-loki] terraform_current:  - { +19:53:56.522 STDOUT [eks-loki] terraform_current:  - app_version = "3.1.1" +19:53:56.522 STDOUT [eks-loki] terraform_current:  - chart = "loki" +19:53:56.522 STDOUT [eks-loki] terraform_current:  - first_deployed = 1725665251 +19:53:56.522 STDOUT [eks-loki] terraform_current:  - last_deployed = 1725665251 +19:53:56.522 STDOUT [eks-loki] terraform_current:  - name = "loki" +19:53:56.522 STDOUT [eks-loki] terraform_current:  - namespace = "loki" +19:53:56.522 STDOUT [eks-loki] terraform_current:  - notes = <<-EOT +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  Welcome to Grafana Loki +19:53:56.522 STDOUT [eks-loki] terraform_current:  Chart version: 6.10.2 +19:53:56.522 STDOUT [eks-loki] terraform_current:  Chart Name: loki +19:53:56.522 STDOUT [eks-loki] terraform_current:  Loki version: 3.1.1 +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  ** Please be patient while the chart is being deployed ** +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  Tip: +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  Watch the deployment status using the command: kubectl get pods -w --namespace loki +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  If pods are taking too long to schedule make sure pod affinity can be fulfilled in the current cluster. +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  Installed components: +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  * gateway +19:53:56.522 STDOUT [eks-loki] terraform_current:  * read +19:53:56.522 STDOUT [eks-loki] terraform_current:  * write +19:53:56.522 STDOUT [eks-loki] terraform_current:  * backend +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  Sending logs to Loki +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  Loki has been configured with a gateway (nginx) to support reads and writes from a single component. +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  You can send logs from inside the cluster using the cluster DNS: +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  http://loki-gateway.loki.svc.cluster.local/loki/api/v1/push +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  You can test to send data from outside the cluster by port-forwarding the gateway to your local machine: +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  kubectl port-forward --namespace loki svc/loki-gateway 3100:80 & +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  And then using http://127.0.0.1:3100/loki/api/v1/push URL as shown below: +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` +19:53:56.522 STDOUT [eks-loki] terraform_current:  curl -H "Content-Type: application/json" -XPOST -s "http://127.0.0.1:3100/loki/api/v1/push" \ +19:53:56.522 STDOUT [eks-loki] terraform_current:  --data-raw "{\"streams\": [{\"stream\": {\"job\": \"test\"}, \"values\": [[\"$(date +%s)000000000\", \"fizzbuzz\"]]}]}" \ +19:53:56.522 STDOUT [eks-loki] terraform_current:  -H X-Scope-OrgId:foo +19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  Then verify that Loki did received the data using the following command: +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` +19:53:56.522 STDOUT [eks-loki] terraform_current:  curl "http://127.0.0.1:3100/loki/api/v1/query_range" --data-urlencode 'query={job="test"}' -H X-Scope-OrgId:foo | jq .data.result +19:53:56.522 STDOUT [eks-loki] terraform_current:  ``` +19:53:56.522 STDOUT [eks-loki] terraform_current:  +19:53:56.522 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.522 STDOUT [eks-loki] terraform_current:  Connecting Grafana to Loki +19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  If Grafana operates within the cluster, you'll set up a new Loki datasource by utilizing the following URL: +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  http://loki-gateway.loki.svc.cluster.local/ +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.523 STDOUT [eks-loki] terraform_current:  Multi-tenancy +19:53:56.523 STDOUT [eks-loki] terraform_current:  *********************************************************************** +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  Loki is configured with auth enabled (multi-tenancy) and expects tenant headers (`X-Scope-OrgID`) to be set for all API calls. +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  You must configure Grafana's Loki datasource using the `HTTP Headers` section with the `X-Scope-OrgID` to target a specific tenant. +19:53:56.523 STDOUT [eks-loki] terraform_current:  For each tenant, you can create a different datasource. +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  The agent of your choice must also be configured to propagate this header. +19:53:56.523 STDOUT [eks-loki] terraform_current:  For example, when using Promtail you can use the `tenant` stage. https://grafana.com/docs/loki/latest/send-data/promtail/stages/tenant/ +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  When not provided with the `X-Scope-OrgID` while auth is enabled, Loki will reject reads and writes with a 404 status code `no org id`. +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  You can also use a reverse proxy, to automatically add the `X-Scope-OrgID` header as suggested by https://grafana.com/docs/loki/latest/operations/authentication/ +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  For more information, read our documentation about multi-tenancy: https://grafana.com/docs/loki/latest/operations/multi-tenancy/ +19:53:56.523 STDOUT [eks-loki] terraform_current:  +19:53:56.523 STDOUT [eks-loki] terraform_current:  > When using curl you can pass `X-Scope-OrgId` header using `-H X-Scope-OrgId:foo` option, where foo can be replaced with the tenant of your choice. +19:53:56.523 STDOUT [eks-loki] terraform_current:  EOT +19:53:56.523 STDOUT [eks-loki] terraform_current:  - revision = 1 +19:53:56.523 STDOUT [eks-loki] terraform_current:  - values = jsonencode( +19:53:56.523 STDOUT [eks-loki] terraform_current:  { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - backend = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - persistence = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - storageClass = "gp3-encrypted" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - compactor = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - compaction_interval = "10m" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_delete_delay = "2h" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_delete_worker_count = 150 +19:53:56.523 STDOUT [eks-loki] terraform_current:  - retention_enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  - shared_store = "s3" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - working_directory = "/loki/compactor" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - distributor = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - gateway = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/nginx-unprivileged" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.25.2-alpine" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - global = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - ingester = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - loki = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - analytics = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - reporting_enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - auth_enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "3.1.1" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - limits_config = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - ingestion_rate_strategy = "local" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_global_streams_per_user = 5000 +19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_query_parallelism = 32 +19:53:56.523 STDOUT [eks-loki] terraform_current:  - max_streams_per_user = 10000 +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - provisioner = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "v1.7.0" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - schemaConfig = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - configs = [ +19:53:56.523 STDOUT [eks-loki] terraform_current:  - { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - from = "2024-04-01" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - index = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - period = "24h" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - prefix = "loki_sb_index_" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - object_store = "s3" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - schema = "v13" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - store = "tsdb" +19:53:56.523 STDOUT [eks-loki] terraform_current:  }, +19:53:56.523 STDOUT [eks-loki] terraform_current:  ] +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - storage = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - bucketNames = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - admin = "platform-eng-eks-mcm-loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - chunks = "platform-eng-eks-mcm-loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - ruler = "platform-eng-eks-mcm-loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - region = "us-gov-east-1" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = "s3://us-gov-east-1" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - type = "s3" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - storage_config = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - aws = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - s3 = "s3://us-gov-east-1/platform-eng-eks-mcm-loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - lokiCanary = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki-canary" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "3.0.0" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - memberlist = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - service = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - publishNotReadyAddresses = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - memcached = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.6.23-alpine" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - memcachedExporter = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "v0.14.4" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - monitoring = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - dashboards = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - lokiCanary = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - rules = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - selfMonitoring = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - serviceMonitor = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - querier = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - queryFrontend = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - read = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - serviceAccount = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - annotations = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - "eks.amazonaws.com/role-arn" = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - sidecar = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - image = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - tag = "1.27.4" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - test = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = false +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - write = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - autoscaling = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - enabled = true +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - extraVolumes = [ +19:53:56.523 STDOUT [eks-loki] terraform_current:  - { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  }, +19:53:56.523 STDOUT [eks-loki] terraform_current:  ] +19:53:56.523 STDOUT [eks-loki] terraform_current:  - extraVolumesMounts = [ +19:53:56.523 STDOUT [eks-loki] terraform_current:  - { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - mountPath = "/loki" +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "data" +19:53:56.523 STDOUT [eks-loki] terraform_current:  }, +19:53:56.523 STDOUT [eks-loki] terraform_current:  ] +19:53:56.523 STDOUT [eks-loki] terraform_current:  - persistence = { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - storageClass = "gp3-encrypted" +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  ) +19:53:56.523 STDOUT [eks-loki] terraform_current:  - version = "6.10.2" +19:53:56.523 STDOUT [eks-loki] terraform_current:  }, +19:53:56.523 STDOUT [eks-loki] terraform_current:  ] -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - namespace = "loki" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - pass_credentials = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - recreate_pods = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - render_subchart_notes = true -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - replace = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - reset_values = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - reuse_values = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - skip_crds = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - status = "deployed" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - timeout = 900 -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - verify = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - version = "6.10.2" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - wait = true -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - wait_for_jobs = false -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "backend.autoscaling.enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "backend.persistence.storageClass" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "gp3-encrypted" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.compaction_interval" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "10m" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_delete_delay" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "2h" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_delete_worker_count" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "150" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.retention_enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.shared_store" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "compactor.working_directory" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "/loki/compactor" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "distributor.autoscaling.enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "gateway.image.repository" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "gateway.image.tag" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "1.25.2-alpine" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "global.image.registry" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "ingester.autoscaling.enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.analytics.reporting_enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.auth_enabled" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.image.repository" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.image.tag" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "3.1.1" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.ingestion_rate_strategy" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "local" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_global_streams_per_user" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "5000" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_query_parallelism" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "32" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.limits_config.max_streams_per_user" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "10000" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.provisioner.image.repository" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.523 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.523 STDOUT [eks-loki] terraform_current:  - name = "loki.provisioner.image.tag" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  - value = "v1.7.0" -> null +19:53:56.523 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.523 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].from" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "2024-04-01" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].index.period" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "24h" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].index.prefix" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "loki_sb_index_" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].object_store" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].schema" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "v13" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.schemaConfig.configs[0].store" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "tsdb" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.admin" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.chunks" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.bucketNames.ruler" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm-loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.s3.region" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "us-gov-east-1" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.s3.s3" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3://us-gov-east-1" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage.type" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "loki.storage_config.aws.s3" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "s3://us-gov-east-1/platform-eng-eks-mcm-loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "lokiCanary.image.repository" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "lokiCanary.image.tag" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "3.0.0" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memberlist.service.publishNotReadyAddresses" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcached.image.repository" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcached.image.tag" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "1.6.23-alpine" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcachedExporter.image.repository" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "memcachedExporter.image.tag" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "v0.14.4" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.dashboards.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.lokiCanary.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.rules.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.selfMonitoring.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "monitoring.serviceMonitor.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "querier.autoscaling.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "queryFrontend.autoscaling.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "read.autoscaling.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "sidecar.image.repository" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "sidecar.image.tag" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "1.27.4" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "test.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "false" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.autoscaling.enabled" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "true" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumesMounts[0].mountPath" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "/loki" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.524 STDOUT [eks-loki] terraform_current:  } +19:53:56.524 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.524 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumesMounts[0].name" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  - value = "data" -> null +19:53:56.524 STDOUT [eks-loki] terraform_current:  [90 +19:53:56.565 STDOUT [eks-loki] terraform_current: m# (1 unchanged attribute hidden) +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "write.extraVolumes[0].name" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - value = "loki" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - set { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "write.persistence.storageClass" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - value = "gp3-encrypted" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # kubernetes_namespace.ns[0] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "kubernetes_namespace" "ns" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "loki" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - wait_for_default_service_account = false -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - metadata { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - annotations = {} -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - generation = 0 -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - labels = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - "istio-injection" = "enabled" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - name = "loki" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource_version = "4559" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - uid = "30ded0be-5ee5-4531-9366-7c7f39b3b3de" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["memcached"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/memcached" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.565 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.565 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  }, +19:53:56.565 STDOUT [eks-loki] terraform_current:  ] +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/memcached" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"] will be destroyed +19:53:56.565 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.565 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.565 STDOUT [eks-loki] terraform_current:  { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - rules = [ +19:53:56.565 STDOUT [eks-loki] terraform_current:  - { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - action = { +19:53:56.565 STDOUT [eks-loki] terraform_current:  - type = "expire" +19:53:56.565 STDOUT [eks-loki] terraform_current:  } +19:53:56.565 STDOUT [eks-loki] terraform_current:  - description = "keep 5 images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - rulePriority = 1 +19:53:56.566 STDOUT [eks-loki] terraform_current:  - selection = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - countNumber = 5 +19:53:56.566 STDOUT [eks-loki] terraform_current:  - countType = "imageCountMoreThan" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tagStatus = "any" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  }, +19:53:56.566 STDOUT [eks-loki] terraform_current:  ] +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository = "platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/enterprise-logs-provisioner" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/loki"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/loki" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/loki-canary"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/loki-canary" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki-canary" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/loki-canary" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/nginx-unprivileged" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/nginx-unprivileged" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/nginx-unprivileged" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kiwigrid/k8s-sidecar" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kiwigrid/k8s-sidecar" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kiwigrid/k8s-sidecar" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["memcached"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/memcached" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/memcached" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/memcached" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/memcached" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/memcached" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/memcached" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  } +19:53:56.566 STDOUT [eks-loki] terraform_current:  # module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"] will be destroyed +19:53:56.566 STDOUT [eks-loki] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - force_delete = true -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - registry_id = "224384469011" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prom/memcached-exporter" -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prom/memcached-exporter" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.566 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.566 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Environment" = "application" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prom/memcached-exporter" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.566 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - encryption_configuration { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - encryption_type = "KMS" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  - image_scanning_configuration { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - scan_on_push = true -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"] will be destroyed +19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "2400534705754070951" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/loki#3.1.1"] will be destroyed +19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "7168708508218564438" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"] will be destroyed +19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "3148087180813738972" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"] will be destroyed +19:53:56.567 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - id = "2003059566474709841" -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.567 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.567 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.567 STDOUT [eks-loki] terraform_current:  } +19:53:56.567 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["kiwigrid/k8 +19:53:56.574 STDOUT [eks-loki] terraform_current: s-sidecar#1.27.4"] will be destroyed +19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "4475259168260390874" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["memcached#1.6.23-alpine"] will be destroyed +19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "6793409878383401785" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"] will be destroyed +19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "null_resource" "copy_images" { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "1971792497354324149" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "region" = "us-gov-east-1" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0] will be destroyed +19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_policy" "encrypted-object-manager" { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - attachment_count = 1 -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - description = "Allow the role to read/write encrypted data using the kms keys." -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - name = "AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - name_prefix = "AmazonEKS_encrypted-object-manager-" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - path = "/" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.574 STDOUT [eks-loki] terraform_current:  { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.574 STDOUT [eks-loki] terraform_current:  - { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Action = [ +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:ReEncrypt*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:GenerateDataKey", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:Encrypt", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:DescribeKey", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "kms:Decrypt", +19:53:56.574 STDOUT [eks-loki] terraform_current:  ] +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" +19:53:56.574 STDOUT [eks-loki] terraform_current:  }, +19:53:56.574 STDOUT [eks-loki] terraform_current:  ] +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy_id = "ANPATIPS3JAJZ5Y2OHUVI" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags = {} -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0] will be destroyed +19:53:56.574 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_policy" "s3-bucket-owner" { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - attachment_count = 1 -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - description = "Allow the role to add/remove/change objects in the s3 bucket." -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - name = "AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - name_prefix = "AmazonEKS_s3-bucket-owner-" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - path = "/" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.574 STDOUT [eks-loki] terraform_current:  { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.574 STDOUT [eks-loki] terraform_current:  - { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Action = [ +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:PutObject*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:PutBucketVersioning", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:List*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:GetObject*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:GetBucket*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:DeleteObject*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "s3:AbortMultipartUpload", +19:53:56.574 STDOUT [eks-loki] terraform_current:  ] +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Resource = [ +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", +19:53:56.574 STDOUT [eks-loki] terraform_current:  ] +19:53:56.574 STDOUT [eks-loki] terraform_current:  }, +19:53:56.574 STDOUT [eks-loki] terraform_current:  ] +19:53:56.574 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - policy_id = "ANPATIPS3JAJ7FVLF7FGM" -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags = {} -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.574 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.574 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.574 STDOUT [eks-loki] terraform_current:  } +19:53:56.574 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role.this[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role" "this" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - assume_role_policy = jsonencode( +19:53:56.575 STDOUT [eks-loki] terraform_current:  { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Condition = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - StringEquals = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:loki:loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  }, +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - create_date = "2024-09-06T23:27:20Z" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - force_detach_policies = true -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - managed_policy_arns = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003", +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001", +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - max_session_duration = 3600 -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - name = "platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - path = "/" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - unique_id = "AROATIPS3JAJT5A42O76D" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (3 unchanged attributes hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role_policy_attachment" "encrypted-object-manager" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki-20240906232733624100000004" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - role = "platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_iam_role_policy_attachment" "s3-bucket-owner" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "platform-eng-eks-mcm-loki-20240906232732670800000002" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - role = "platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_kms_alias.key[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_kms_alias" "key" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_key_id = "48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_kms_key.key[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_kms_key" "key" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bypass_policy_lockout_safety_check = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - description = "KMS CMK for S3 bucket platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - enable_key_rotation = true -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - is_enabled = true -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - key_id = "48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - multi_region = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.575 STDOUT [eks-loki] terraform_current:  { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "kms:*" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Allow" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Resource = "*" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Sid = "BuiltinKMSAdminRoles" +19:53:56.575 STDOUT [eks-loki] terraform_current:  }, +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - rotation_period_in_days = 365 -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (2 unchanged attributes hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket.this will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket" "this" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - arn = "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_domain_name = "v-s3-platform-eng-eks-mcm-loki.s3.amazonaws.com" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_regional_domain_name = "v-s3-platform-eng-eks-mcm-loki.s3.us-gov-east-1.amazonaws.com" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - force_destroy = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - hosted_zone_id = "Z2NIFVYYW2VKV1" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - object_lock_enabled = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.575 STDOUT [eks-loki] terraform_current:  { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Action = "s3:*" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Condition = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Bool = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "aws:SecureTransport" = "false" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Effect = "Deny" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Principal = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - AWS = "*" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Resource = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Sid = "enforceSSL" +19:53:56.575 STDOUT [eks-loki] terraform_current:  }, +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - region = "us-gov-east-1" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - request_payer = "BucketOwner" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - tags_all = { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Name" = "v-s3-platform-eng-eks-mcm-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Organization" = "census:ocio:csvd" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terraform" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "Terragrunt" = "true" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:created_by" = "terraform" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_name" = "tfmod-loki" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "boc:tf_module_version" = "0.0.2" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:53:56.575 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (2 unchanged attributes hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  - grant { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - permissions = [ +19:53:56.575 STDOUT [eks-loki] terraform_current:  - "FULL_CONTROL", +19:53:56.575 STDOUT [eks-loki] terraform_current:  ] -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - type = "CanonicalUser" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - logging { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-loki/" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - server_side_encryption_configuration { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - rule { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket_key_enabled = true -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - apply_server_side_encryption_by_default { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - sse_algorithm = "aws:kms" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - versioning { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - enabled = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - mfa_delete = false -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_acl.this[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_acl" "this" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - acl = "private" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki,private" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  - access_control_policy { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - grant { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - permission = "FULL_CONTROL" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - grantee { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - type = "CanonicalUser" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (3 unchanged attributes hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  - owner { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "2556558a9cdb2c897c1b2e56fcedd67ffd0719e0005dccec8d3f9412968e30ce" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_logging.this will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_logging" "this" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_bucket = "inf-logs-224384469011-us-gov-east-1" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - target_prefix = "s3/v-s3-platform-eng-eks-mcm-loki/" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_ownership_controls.this will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_ownership_controls" "this" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - rule { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - object_ownership = "BucketOwnerPreferred" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  } +19:53:56.575 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_policy.policy[0] will be destroyed +19:53:56.575 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_policy" "policy" { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.575 STDOUT [eks-loki] terraform_current:  - policy = jsonencode( +19:53:56.575 STDOUT [eks-loki] terraform_current:  { +19:53:56.575 STDOUT [eks-loki] terraform_current:  - Statement = [ +19:53:56.576 STDOUT [eks-loki] terraform_current:  - { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Action = "s3:*" +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Condition = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Bool = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "aws:SecureTransport" = "false" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Effect = "Deny" +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Principal = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - AWS = "*" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Resource = [ +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki/*", +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "arn:aws-us-gov:s3:::v-s3-platform-eng-eks-mcm-loki", +19:53:56.576 STDOUT [eks-loki] terraform_current:  ] +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Sid = "enforceSSL" +19:53:56.576 STDOUT [eks-loki] terraform_current:  }, +19:53:56.576 STDOUT [eks-loki] terraform_current:  ] +19:53:56.576 STDOUT [eks-loki] terraform_current:  - Version = "2012-10-17" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  ) -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_public_access_block.this will be destroyed +19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_public_access_block" "this" { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - block_public_acls = true -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - block_public_policy = true -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - ignore_public_acls = true -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - restrict_public_buckets = true -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this will be destroyed +19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_server_side_encryption_configuration" "this" { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.576 STDOUT [eks-loki] terraform_current:  - rule { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket_key_enabled = true -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - apply_server_side_encryption_by_default { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - kms_master_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/48acfe83-618e-417e-82d1-498592f8da65" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - sse_algorithm = "aws:kms" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.aws_s3_bucket_versioning.this will be destroyed +19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "aws_s3_bucket_versioning" "this" { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - bucket = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "v-s3-platform-eng-eks-mcm-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.576 STDOUT [eks-loki] terraform_current:  - versioning_configuration { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - status = "Suspended" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  # (1 unchanged attribute hidden) +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.time_sleep.acl_delay will be destroyed +19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "time_sleep" "acl_delay" { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - create_duration = "30s" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - destroy_duration = "30s" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "2024-09-06T23:29:53Z" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-loki" +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "public_access_block" = "v-s3-platform-eng-eks-mcm-loki" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current:  # module.loki_s3.time_sleep.policy_delay will be destroyed +19:53:56.576 STDOUT [eks-loki] terraform_current:  - resource "time_sleep" "policy_delay" { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - create_duration = "120s" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - destroy_duration = "30s" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - id = "2024-09-06T23:29:22Z" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - triggers = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - "bucket" = "v-s3-platform-eng-eks-mcm-loki" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  } +19:53:56.576 STDOUT [eks-loki] terraform_current: Plan: 0 to add, 0 to change, 40 to destroy. +19:53:56.576 STDOUT [eks-loki] terraform_current:  +19:53:56.576 STDOUT [eks-loki] terraform_current: Changes to Outputs: +19:53:56.576 STDOUT [eks-loki] terraform_current:  - gateway_internal_endpoint = { +19:53:56.576 STDOUT [eks-loki] terraform_current:  - hostname = "loki-gateway.loki.svc.cluster.local" +19:53:56.576 STDOUT [eks-loki] terraform_current:  - portNumber = "80" +19:53:56.576 STDOUT [eks-loki] terraform_current:  - url = "http://loki-gateway.loki.svc.cluster.local:80/" +19:53:56.576 STDOUT [eks-loki] terraform_current:  } -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - module_name = "tfmod-loki" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - module_version = "0.0.2" -> null +19:53:56.576 STDOUT [eks-loki] terraform_current:  - rwo_storage_class = "gp3-encrypted" -> null +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destroying... [id=platform-eng-eks-mcm-tempo-20240906232923578800000002] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo,private] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm-tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Destroying... [id=platform-eng-eks-mcm/tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:53:56.738 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destroying... [id=platform-eng-eks-mcm-tempo-20240906232934771300000004] +19:53:56.745 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_acl.this[0]: Destruction complete after 0s +19:53:56.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Destroying... [id=2024-09-06T23:31:53Z] +19:53:56.859 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_alias.key[0]: Destruction complete after 0s +19:53:56.898 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["tempo"]: Destruction complete after 0s +19:53:56.903 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Destroying... [id=platform-eng-eks-mcm/tempo] +19:53:57.067 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_logging.this: Destruction complete after 0s +19:53:57.099 STDOUT [eks-tempo] terraform_current: module.images.aws_ecr_repository.image_repos["tempo"]: Destruction complete after 0s +19:53:57.166 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destruction complete after 0s +19:53:57.168 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232923002900000001] +19:53:57.168 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destruction complete after 0s +19:53:57.170 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232934209600000003] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Destroying... [id=1971792497354324149] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Destroying... [id=4475259168260390874] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Destroying... [id=2003059566474709841] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Destroying... [id=7168708508218564438] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Destroying... [id=6793409878383401785] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Destroying... [id=2400534705754070951] +19:53:57.249 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Destroying... [id=3148087180813738972] +19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["prom/memcached-exporter#v0.14.4"]: Destruction complete after 0s +19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["kiwigrid/k8s-sidecar#1.27.4"]: Destruction complete after 0s +19:53:57.252 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki-canary#3.0.0"]: Destruction complete after 0s +19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/enterprise-logs-provisioner#v1.7.0"]: Destruction complete after 0s +19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/loki#3.1.1"]: Destruction complete after 0s +19:53:57.261 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["memcached#1.6.23-alpine"]: Destruction complete after 0s +19:53:57.270 STDOUT [eks-loki] terraform_current: module.images.null_resource.copy_images["grafana/nginx-unprivileged#1.25.2-alpine"]: Destruction complete after 0s +19:53:57.286 STDOUT [eks-loki] terraform_current: helm_release.loki: Destroying... [id=loki] +19:53:57.420 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_versioning.this: Destruction complete after 0s +19:53:57.475 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.s3-bucket-owner[0]: Destruction complete after 0s +19:53:57.486 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_policy.encrypted-object-manager[0]: Destruction complete after 0s +19:53:57.559 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_ownership_controls.this: Destruction complete after 1s +19:53:57.789 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_server_side_encryption_configuration.this: Destruction complete after 1s +19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Destroying... [id=platform-eng-eks-mcm/memcached] +19:53:57.911 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Destroying... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] +19:53:57.911 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki] +19:53:57.920 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki-canary] +19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:57.920 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Destroying... [id=platform-eng-eks-mcm/prom/memcached-exporter] +19:53:57.920 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destroying... [id=platform-eng-eks-mcm-loki-20240906232733624100000004] +19:53:57.952 STDOUT [eks-tempo] terraform_current: helm_release.tempo: Destruction complete after 2s +19:53:57.958 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-tempo] +19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki"]: Destruction complete after 0s +19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["memcached"]: Destruction complete after 0s +19:53:58.068 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/nginx-unprivileged"]: Destruction complete after 0s +19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destroying... [id=platform-eng-eks-mcm-loki-20240906232732670800000002] +19:53:58.072 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-loki,private] +19:53:58.075 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_acl.this[0]: Destruction complete after 0s +19:53:58.077 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prom/memcached-exporter"]: Destruction complete after 0s +19:53:58.077 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Destroying... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] +19:53:58.079 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm-loki] +19:53:58.081 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/loki-canary"]: Destruction complete after 0s +19:53:58.082 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Destroying... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] +19:53:58.133 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/enterprise-logs-provisioner"]: Destruction complete after 0s +19:53:58.136 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Destroying... [id=2024-09-06T23:29:53Z] +19:53:58.138 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kiwigrid/k8s-sidecar"]: Destruction complete after 0s +19:53:58.140 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Destroying... [id=platform-eng-eks-mcm/grafana/nginx-unprivileged] +19:53:58.198 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_alias.key[0]: Destruction complete after 0s +19:53:58.199 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Destroying... [id=platform-eng-eks-mcm/kiwigrid/k8s-sidecar] +19:53:58.281 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_logging.this: Destruction complete after 0s +19:53:58.283 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki-canary] +19:53:58.337 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.encrypted-object-manager[0]: Destruction complete after 0s +19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/nginx-unprivileged"]: Destruction complete after 0s +19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Destroying... [id=platform-eng-eks-mcm/grafana/loki] +19:53:58.337 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Destroying... [id=platform-eng-eks-mcm/prom/memcached-exporter] +19:53:58.402 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["kiwigrid/k8s-sidecar"]: Destruction complete after 0s +19:53:58.404 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Destroying... [id=platform-eng-eks-mcm/grafana/enterprise-logs-provisioner] +19:53:58.433 STDOUT [eks-tempo] terraform_current: module.tempo-irsa-role.aws_iam_role.this[0]: Destruction complete after 0s +19:53:58.468 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role_policy_attachment.s3-bucket-owner[0]: Destruction complete after 0s +19:53:58.470 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Destroying... [id=platform-eng-eks-mcm/memcached] +19:53:58.472 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_ownership_controls.this: Destruction complete after 0s +19:53:58.473 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_encrypted-object-manager-20240906232733101400000003] +19:53:58.478 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki-canary"]: Destruction complete after 0s +19:53:58.479 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_s3-bucket-owner-20240906232732146300000001] +19:53:58.512 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["prom/memcached-exporter"]: Destruction complete after 1s +19:53:58.551 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/loki"]: Destruction complete after 1s +19:53:58.556 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_versioning.this: Destruction complete after 1s +19:53:58.581 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/enterprise-logs-provisioner"]: Destruction complete after 1s +19:53:58.651 STDOUT [eks-loki] terraform_current: module.images.aws_ecr_repository.image_repos["memcached"]: Destruction complete after 1s +19:53:58.789 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.encrypted-object-manager[0]: Destruction complete after 1s +19:53:58.789 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_policy.s3-bucket-owner[0]: Destruction complete after 1s +19:53:58.933 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_server_side_encryption_configuration.this: Destruction complete after 1s +19:54:00.411 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Still destroying... [id=https://sqs.us-gov-east-1.amazonaws.com...4469011/Karpenter-platform-eng-eks-mcm, 10s elapsed] +19:54:03.499 STDOUT [eks-loki] terraform_current: helm_release.loki: Destruction complete after 6s +19:54:03.519 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Destroying... [id=loki] +19:54:03.519 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-loki] +19:54:03.984 STDOUT [eks-loki] terraform_current: module.loki_irsa_role.aws_iam_role.this[0]: Destruction complete after 0s +19:54:06.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 10s elapsed] +19:54:08.137 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 10s elapsed] +19:54:10.412 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Still destroying... [id=https://sqs.us-gov-east-1.amazonaws.com...4469011/Karpenter-platform-eng-eks-mcm, 20s elapsed] +19:54:13.524 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 10s elapsed] +19:54:15.763 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue_policy.this[0]: Destruction complete after 26s +19:54:15.979 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Destroying... [id=https://sqs.us-gov-east-1.amazonaws.com/224384469011/Karpenter-platform-eng-eks-mcm] +19:54:16.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 20s elapsed] +19:54:17.913 STDOUT [eks-karpenter] terraform_current: module.karpenter_resources.aws_sqs_queue.this[0]: Destruction complete after 2s +19:54:18.070 STDOUT [eks-karpenter] terraform_current:  +19:54:18.070 STDOUT [eks-karpenter] terraform_current: Destroy complete! Resources: 33 destroyed. +19:54:18.070 STDOUT [eks-karpenter] terraform_current:  +19:54:18.138 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 20s elapsed] +19:54:23.525 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 20s elapsed] +19:54:26.746 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:31:53Z, 30s elapsed] +19:54:26.783 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.acl_delay: Destruction complete after 30s +19:54:26.985 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:54:27.326 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_public_access_block.this: Destruction complete after 0s +19:54:27.327 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:54:27.610 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket_policy.policy[0]: Destruction complete after 1s +19:54:27.613 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Destroying... [id=009b63d6-497f-4139-9c8c-7cae709ed71b] +19:54:27.614 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Destroying... [id=2024-09-06T23:31:23Z] +19:54:27.763 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_kms_key.key[0]: Destruction complete after 0s +19:54:28.142 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Still destroying... [id=2024-09-06T23:29:53Z, 30s elapsed] +19:54:28.167 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.acl_delay: Destruction complete after 30s +19:54:28.370 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:54:28.740 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_public_access_block.this: Destruction complete after 1s +19:54:28.743 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:54:29.013 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket_policy.policy[0]: Destruction complete after 0s +19:54:29.017 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Destroying... [id=2024-09-06T23:29:22Z] +19:54:29.020 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Destroying... [id=48acfe83-618e-417e-82d1-498592f8da65] +19:54:29.174 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_kms_key.key[0]: Destruction complete after 0s +19:54:33.527 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 30s elapsed] +19:54:37.615 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 10s elapsed] +19:54:39.018 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 10s elapsed] +19:54:43.527 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 40s elapsed] +19:54:47.616 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 20s elapsed] +19:54:49.019 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 20s elapsed] +19:54:53.529 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 50s elapsed] +19:54:57.617 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:31:23Z, 30s elapsed] +19:54:57.644 STDOUT [eks-tempo] terraform_current: module.tempo-s3.time_sleep.policy_delay: Destruction complete after 30s +19:54:57.829 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Destroying... [id=v-s3-platform-eng-eks-mcm-tempo] +19:54:58.148 STDOUT [eks-tempo] terraform_current: module.tempo-s3.aws_s3_bucket.this: Destruction complete after 0s +19:54:58.304 STDOUT [eks-tempo] terraform_current:  +19:54:58.304 STDOUT [eks-tempo] terraform_current: Destroy complete! Resources: 21 destroyed. +19:54:58.304 STDOUT [eks-tempo] terraform_current:  +19:54:59.020 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Still destroying... [id=2024-09-06T23:29:22Z, 30s elapsed] +19:54:59.050 STDOUT [eks-loki] terraform_current: module.loki_s3.time_sleep.policy_delay: Destruction complete after 30s +19:54:59.212 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Destroying... [id=v-s3-platform-eng-eks-mcm-loki] +19:54:59.524 STDOUT [eks-loki] terraform_current: module.loki_s3.aws_s3_bucket.this: Destruction complete after 1s +19:55:03.533 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m0s elapsed] +19:55:05.744 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=prometheus] +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_region.current: Reading... +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:55:06.494 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:55:06.500 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:55:06.500 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:55:06.529 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 1s [id=224384469011] +19:55:06.532 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_arn.current: Reading... +19:55:06.543 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/node-exporter] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/alertmanager] +19:55:06.574 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/pushgateway] +19:55:06.637 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 1s [id=us-gov-east-1] +19:55:06.656 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 1s [id=us-gov-east-1] +19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:55:06.665 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:55:06.717 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:55:06.771 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Refreshing state... [id=8630798188061012409] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Refreshing state... [id=6933699179229132418] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/node-exporter] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/pushgateway] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/prometheus] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/alertmanager] +19:55:06.810 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Refreshing state... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] +19:55:06.815 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Refreshing state... [id=4907547390444109840] +19:55:06.829 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Refreshing state... [id=8179388785829298469] +19:55:06.829 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Refreshing state... [id=4204319747607986992] +19:55:06.832 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Refreshing state... [id=438977600877449532] +19:55:06.837 STDOUT [eks-prometheus] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 1s [id=lab-dev-gov] +19:55:06.896 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Refreshing state... [id=prometheus] +19:55:12.690 STDOUT [eks-prometheus] terraform_current: Terraform used the selected providers to generate the following execution +19:55:12.690 STDOUT [eks-prometheus] terraform_current: plan. Resource actions are indicated with the following symbols: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - destroy +19:55:12.690 STDOUT [eks-prometheus] terraform_current: Terraform will perform the following actions: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # helm_release.prometheus will be destroyed +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - resource "helm_release" "prometheus" { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - atomic = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - chart = "prometheus" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - cleanup_on_fail = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - create_namespace = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - dependency_update = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_crd_hooks = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_openapi_validation = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - disable_webhooks = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - force_update = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - id = "prometheus" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - lint = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - max_history = 0 -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - metadata = [ +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - app_version = "v2.53.1" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - chart = "prometheus" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - first_deployed = 1725665292 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - last_deployed = 1725665292 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - namespace = "prometheus" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - notes = <<-EOT +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=alertmanager,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9093 to use your application" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9093:80 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus-pushgateway,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl port-forward $POD_NAME 9091 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9091 to use your application" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus server can be accessed via port 80 on the following DNS name from within your cluster: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-server.prometheus.svc.cluster.local +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the Prometheus server URL by running these commands in the same shell: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9090 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus alertmanager can be accessed via port 9093 on the following DNS name from within your cluster: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-alertmanager.prometheus.svc.cluster.local +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the Alertmanager URL by running these commands in the same shell: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=alertmanager,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9093 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ################################################################################# +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### WARNING: Pod Security Policy has been disabled by default since ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### it deprecated after k8s 1.25+. use ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### (index .Values "prometheus-node-exporter" "rbac" ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### . "pspEnabled") with (index .Values ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### "prometheus-node-exporter" "rbac" "pspAnnotations") ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ###### in case you still need it. ##### +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ################################################################################# +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The Prometheus PushGateway can be accessed via port 9091 on the following DNS name from within your cluster: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  prometheus-prometheus-pushgateway.prometheus.svc.cluster.local +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  Get the PushGateway URL by running these commands in the same shell: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app=prometheus-pushgateway,component=pushgateway" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl --namespace prometheus port-forward $POD_NAME 9091 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  For more information on running Prometheus, visit: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  https://prometheus.io/ +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  1. Get the application URL by running these commands: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  export POD_NAME=$(kubectl get pods --namespace prometheus -l "app.kubernetes.io/name=prometheus-node-exporter,app.kubernetes.io/instance=prometheus" -o jsonpath="{.items[0].metadata.name}") +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  echo "Visit http://127.0.0.1:9100 to use your application" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kubectl port-forward --namespace prometheus $POD_NAME 9100 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  kube-state-metrics is a simple service that listens to the Kubernetes API server and generates metrics about the state of the objects. +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The exposed metrics can be found here: +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  https://github.com/kubernetes/kube-state-metrics/blob/master/docs/README.md#exposed-metrics +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  The metrics are exported on the HTTP endpoint /metrics on the listening port. +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  In your case, prometheus-kube-state-metrics.prometheus.svc.cluster.local:8080/metrics +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  They are served either as plaintext or protobuf depending on the Accept header. +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  They are designed to be consumed either by Prometheus itself or by a scraper that is compatible with scraping a Prometheus client endpoint. +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  EOT +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - revision = 1 +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - values = jsonencode( +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - alertmanager = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - configmapReload = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.75.2" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.27.0" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - persistence = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - storageClass = "gp3-encrypted" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - configmapReload = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v0.75.2" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - kube-state-metrics = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/kube-state-metrics" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v2.13.0" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus-node-exporter = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/node-exporter" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v1.8.2" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - prometheus-pushgateway = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v1.9.0" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - server = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - image = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - tag = "v2.53.1" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - persistentVolume = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - storageClass = "gp3-encrypted" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - web = { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - enable-remote-write-receiver = "" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - version = "25.25.0" +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  ] -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - namespace = "prometheus" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - pass_credentials = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - recreate_pods = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - render_subchart_notes = true -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - replace = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - repository = "https://prometheus-community.github.io/helm-charts" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - reset_values = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - reuse_values = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - skip_crds = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - status = "deployed" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - timeout = 300 -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - verify = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - version = "25.25.0" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - wait = true -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - wait_for_jobs = false -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.configmapReload.image.repository" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.configmapReload.image.tag" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "v0.75.2" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.image.repository" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.image.tag" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "v0.27.0" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "alertmanager.persistence.storageClass" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "gp3-encrypted" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - name = "configmapReload.prometheus.image.repository" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.690 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "configmapReload.prometheus.image.tag" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v0.75.2" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.registry" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.repository" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "kube-state-metrics.image.tag" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v2.13.0" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.registry" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.repository" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-node-exporter.image.tag" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v1.8.2" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-pushgateway.image.repository" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus-pushgateway.image.tag" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v1.9.0" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.image.repository" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.image.tag" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "v2.53.1" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.persistentVolume.storageClass" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - value = "gp3-encrypted" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - set { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "server.web.enable-remote-write-receiver" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (2 unchanged attributes hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # kubernetes_namespace.ns will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "kubernetes_namespace" "ns" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "prometheus" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - wait_for_default_service_account = false -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - metadata { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - annotations = {} -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - generation = 0 -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - labels = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "istio-injection" = "enabled" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "prometheus" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource_version = "4570" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - uid = "4fa15265-3517-4e13-aed7-e37d94e8c321" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # (1 unchanged attribute hidden) +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - policy = jsonencode( +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rules = [ +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - action = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - type = "expire" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - description = "keep 5 images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - rulePriority = 1 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - selection = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countNumber = 5 +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - countType = "imageCountMoreThan" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tagStatus = "any" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  }, +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ] +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  ) -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository = "platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/alertmanager" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tags = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/alertmanager" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/alertmanager" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"] will be destroyed +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.691 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/kube-state-metrics" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/kube-state-metrics" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/kube-state-metrics" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"] will be destroyed +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/node-exporter" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags  +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/node-exporter" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/node-exporter" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/prometheus"] will be destroyed +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus" -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.692 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/prometheus-config-reloader" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus-config-reloader" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/prometheus-config-reloader" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - force_delete = true -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - name = "platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - registry_id = "224384469011" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/prometheus/pushgateway" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/pushgateway" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - tags_all = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Environment" = "application" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/prometheus/pushgateway" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Organization" = "census:ocio:csvd" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terraform" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "Terragrunt" = "true" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:created_by" = "terraform" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - encryption_type = "KMS" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - image_scanning_configuration { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - scan_on_push = true -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "8630798188061012409" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "6933699179229132418" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "4907547390444109840" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "4204319747607986992" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "8179388785829298469" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  # module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"] will be destroyed +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - resource "null_resource" "copy_images" { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - id = "438977600877449532" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - triggers = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - "region" = "us-gov-east-1" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } +19:55:12.693 STDOUT [eks-prometheus] terraform_current: Plan: 0 to add, 0 to change, 20 to destroy. +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  +19:55:12.693 STDOUT [eks-prometheus] terraform_current: Changes to Outputs: +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - alertmanager_headless_internal_endpoint = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-alertmanager-headless.prometheus.svc.cluster.local" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9093 +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-alertmanager.prometheus.svc.cluster.local:9093/" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - alertmanager_internal_endpoint = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-alertmanager.prometheus.svc.cluster.local" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9093 +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-alertmanager.prometheus.svc.cluster.local:9093/" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - module_name = "tfmod-prometheus" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - module_version = "0.0.2" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - prometheus_namespace = "prometheus" -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - prometheus_server_internal_endpoint = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-server.prometheus.svc.cluster.local" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9090 +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-server.prometheus.svc.cluster.local:9090/" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - pushgateway_internal_endpoint = { +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - hostname = "prometheus-prometheus-pushgateway.prometheus.svc.cluster.local" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - port_number = 9091 +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  - url = "http://prometheus-prometheus-pushgateway.prometheus.svc.cluster.local:9091/" +19:55:12.693 STDOUT [eks-prometheus] terraform_current:  } -> null +19:55:13.256 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Destroying... [id=prometheus] +19:55:13.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m10s elapsed] +19:55:23.255 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Still destroying... [id=prometheus, 10s elapsed] +19:55:23.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m20s elapsed] +19:55:23.707 STDOUT [eks-prometheus] terraform_current: helm_release.prometheus: Destruction complete after 11s +19:55:23.716 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Destroying... [id=prometheus] +19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] +19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Destroying... [id=platform-eng-eks-mcm/prometheus/alertmanager] +19:55:23.725 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Destroying... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Destroying... [id=4907547390444109840] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Destroying... [id=438977600877449532] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Destroying... [id=8179388785829298469] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Destroying... [id=8630798188061012409] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Destroying... [id=4204319747607986992] +19:55:23.732 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Destroying... [id=6933699179229132418] +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus#v2.53.1"]: Destruction complete after 0s +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/kube-state-metrics#v2.13.0"]: Destruction complete after 0s +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/node-exporter#v1.8.2"]: Destruction complete after 0s +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/pushgateway#v1.9.0"]: Destruction complete after 0s +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/prometheus-config-reloader#v0.75.2"]: Destruction complete after 0s +19:55:23.735 STDOUT [eks-prometheus] terraform_current: module.images.null_resource.copy_images["prometheus/alertmanager#v0.27.0"]: Destruction complete after 0s +19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus] +19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Destroying... [id=platform-eng-eks-mcm/prometheus/node-exporter] +19:55:23.737 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Destroying... [id=platform-eng-eks-mcm/prometheus/pushgateway] +19:55:23.872 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/alertmanager"]: Destruction complete after 0s +19:55:23.873 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus-config-reloader"]: Destruction complete after 0s +19:55:23.875 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/kube-state-metrics"]: Destruction complete after 0s +19:55:23.880 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/pushgateway"]: Destruction complete after 0s +19:55:23.892 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/node-exporter"]: Destruction complete after 0s +19:55:23.892 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["prometheus/prometheus"]: Destruction complete after 0s +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Destroying... [id=platform-eng-eks-mcm/prometheus/kube-state-metrics] +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Destroying... [id=platform-eng-eks-mcm/prometheus/node-exporter] +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Destroying... [id=platform-eng-eks-mcm/prometheus/pushgateway] +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus] +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Destroying... [id=platform-eng-eks-mcm/prometheus/prometheus-config-reloader] +19:55:23.900 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Destroying... [id=platform-eng-eks-mcm/prometheus/alertmanager] +19:55:24.098 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/kube-state-metrics"]: Destruction complete after 0s +19:55:24.118 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/node-exporter"]: Destruction complete after 0s +19:55:24.118 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/pushgateway"]: Destruction complete after 0s +19:55:24.119 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus-config-reloader"]: Destruction complete after 0s +19:55:24.127 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/prometheus"]: Destruction complete after 0s +19:55:24.130 STDOUT [eks-prometheus] terraform_current: module.images.aws_ecr_repository.image_repos["prometheus/alertmanager"]: Destruction complete after 0s +19:55:33.534 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m30s elapsed] +19:55:33.716 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Still destroying... [id=prometheus, 10s elapsed] +19:55:37.441 STDOUT [eks-prometheus] terraform_current: kubernetes_namespace.ns: Destruction complete after 13s +19:55:37.679 STDOUT [eks-prometheus] terraform_current:  +19:55:37.679 STDOUT [eks-prometheus] terraform_current: Destroy complete! Resources: 20 destroyed. +19:55:37.679 STDOUT [eks-prometheus] terraform_current:  +19:55:43.539 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m40s elapsed] +19:55:53.540 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 1m50s elapsed] +19:56:03.540 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 2m0s elapsed] +19:56:13.541 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Still destroying... [id=loki, 2m10s elapsed] +19:56:17.700 STDOUT [eks-loki] terraform_current: kubernetes_namespace.ns[0]: Destruction complete after 2m14s +19:56:17.989 STDOUT [eks-loki] terraform_current:  +19:56:17.989 STDOUT [eks-loki] terraform_current: Destroy complete! Resources: 40 destroyed. +19:56:17.989 STDOUT [eks-loki] terraform_current:  +19:56:23.209 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=grafana] +19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:56:23.943 STDOUT [eks-grafana] terraform_current: module.images.data.aws_region.current: Reading... +19:56:23.952 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:56:23.952 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:56:23.972 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:56:23.972 STDOUT [eks-grafana] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:56:23.989 STDOUT [eks-grafana] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.data.aws_arn.current: Reading... +19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/curl] +19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/busybox] +19:56:23.996 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/grafana] +19:56:23.999 STDOUT [eks-grafana] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/matthew.c.morgan@census.gov] +19:56:24.091 STDOUT [eks-grafana] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:56:24.110 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:56:24.114 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:56:24.177 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:56:24.214 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/curl] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Refreshing state... [id=3613762253667554703] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/grafana] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Refreshing state... [id=7103419918200909936] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Refreshing state... [id=platform-eng-eks-mcm/grafana/busybox] +19:56:24.237 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Refreshing state... [id=708020167642995718] +19:56:24.259 STDOUT [eks-grafana] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:56:24.305 STDOUT [eks-grafana] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] +19:56:24.330 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Refreshing state... [id=grafana] +19:56:29.797 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Refreshing state... [id=grafana.grafana-8080] +19:56:31.234 STDOUT [eks-grafana] terraform_current: Terraform used the selected providers to generate the following execution +19:56:31.234 STDOUT [eks-grafana] terraform_current: plan. Resource actions are indicated with the following symbols: +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - destroy +19:56:31.234 STDOUT [eks-grafana] terraform_current: Terraform will perform the following actions: +19:56:31.234 STDOUT [eks-grafana] terraform_current:  # helm_release.grafana will be destroyed +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - resource "helm_release" "grafana" { +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - atomic = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - chart = "grafana" -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - cleanup_on_fail = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - create_namespace = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - dependency_update = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_crd_hooks = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_openapi_validation = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - disable_webhooks = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - force_update = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - id = "grafana" -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - lint = false -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - max_history = 0 -> null +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - metadata = [ +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - { +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - app_version = "11.1.5" +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - chart = "grafana" +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - first_deployed = 1725665183 +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - last_deployed = 1725665183 +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - name = "grafana" +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" +19:56:31.234 STDOUT [eks-grafana] terraform_current:  - notes = <<-EOT +19:56:31.235 STDOUT [eks-grafana] terraform_current:  1. Get your 'admin' user password by running: +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  kubectl get secret --namespace grafana grafana -o jsonpath="{.data.admin-password}" | base64 --decode ; echo +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  2. The Grafana server can be accessed via port 80 on the following DNS name from within your cluster: +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  grafana.grafana.svc.cluster.local +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  Get the Grafana URL to visit by running these commands in the same shell: +19:56:31.235 STDOUT [eks-grafana] terraform_current:  export POD_NAME=$(kubectl get pods --namespace grafana -l "app.kubernetes.io/name=grafana,app.kubernetes.io/instance=grafana" -o jsonpath="{.items[0].metadata.name}") +19:56:31.235 STDOUT [eks-grafana] terraform_current:  kubectl --namespace grafana port-forward $POD_NAME 3000 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  +19:56:31.235 STDOUT [eks-grafana] terraform_current:  3. Login with the password from step 1 and the username: admin +19:56:31.235 STDOUT [eks-grafana] terraform_current:  EOT +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - revision = 1 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - values = jsonencode( +19:56:31.235 STDOUT [eks-grafana] terraform_current:  { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - downloadDashboardsImage = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/curl" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "7.85.0" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - global = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - autoscaling = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - serviceMonitor = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - image = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/grafana" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "11.1.5" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - initChownData = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - image = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/busybox" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - tag = "1.31.1" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - persistence = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = true +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - storageClassName = "gp3-encrypted" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - testFramework = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - enabled = false +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  ) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "8.5.0" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  }, +19:56:31.235 STDOUT [eks-grafana] terraform_current:  ] -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - pass_credentials = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - recreate_pods = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - render_subchart_notes = true -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - replace = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = "https://grafana.github.io/helm-charts" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reset_values = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reuse_values = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - skip_crds = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - status = "deployed" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - timeout = 300 -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - verify = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "8.5.0" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait = true -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_jobs = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.registry" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.repository" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "downloadDashboardsImage.tag" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "7.85.0" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "global.autoscaling.enabled" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "global.serviceMonitor.enabled" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.registry" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.repository" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "image.tag" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "11.1.5" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.registry" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.repository" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "initChownData.image.tag" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "1.31.1" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "persistence.enabled" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "true" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "persistence.storageClassName" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "gp3-encrypted" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "testFramework.enabled" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "false" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # kubernetes_namespace.ns will be destroyed +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource "kubernetes_namespace" "ns" { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - id = "grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_default_service_account = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - metadata { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - annotations = {} -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - generation = 0 -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - labels = { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - "istio-injection" = "enabled" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource_version = "3886" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - uid = "9c3fd8db-1baa-4de6-8c42-dcb47984136a" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # module.grafana_ingress.helm_release.ingress will be destroyed +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - resource "helm_release" "ingress" { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - atomic = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - chart = "service-ingress" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - cleanup_on_fail = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - create_namespace = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - dependency_update = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_crd_hooks = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_openapi_validation = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - disable_webhooks = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - force_update = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - id = "grafana.grafana-8080" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - lint = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - max_history = 0 -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - metadata = [ +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - app_version = "1.0.0" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - chart = "service-ingress" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - first_deployed = 1725665222 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - last_deployed = 1725665222 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana.grafana-8080" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - revision = 1 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - values = jsonencode( +19:56:31.235 STDOUT [eks-grafana] terraform_current:  { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - certificateIssuer = "clusterissuer" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - istioNamespace = "istio-system" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - publicDomain = "dev.lab.csp2.census.gov" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - publicHostname = "grafana" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - serviceHostname = "grafana.grafana.svc.cluster.local" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - servicePortNumber = 8080 +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  ) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "1.0.0" +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  }, +19:56:31.235 STDOUT [eks-grafana] terraform_current:  ] -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "grafana.grafana-8080" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - pass_credentials = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - recreate_pods = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - render_subchart_notes = true -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - replace = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - repository = ".terraform/modules/grafana_ingress/charts" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reset_values = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - reuse_values = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - skip_crds = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - status = "deployed" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - timeout = 300 -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - verify = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - version = "1.0.0" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait = true -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - wait_for_jobs = false -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "certificateIssuer" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "clusterissuer" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "istioNamespace" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "istio-system" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.235 STDOUT [eks-grafana] terraform_current:  } +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - name = "publicDomain" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  - value = "dev.lab.csp2.census.gov" -> null +19:56:31.235 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "publicHostname" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "serviceHostname" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "grafana.grafana.svc.cluster.local" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - set { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "servicePortNumber" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - value = "8080" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # (1 unchanged attribute hidden) +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( +19:56:31.236 STDOUT [eks-grafana] terraform_current:  { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( +19:56:31.236 STDOUT [eks-grafana] terraform_current:  { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - policy = jsonencode( +19:56:31.236 STDOUT [eks-grafana] terraform_current:  { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rules = [ +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - action = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - type = "expire" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - description = "keep 5 images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - rulePriority = 1 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - selection = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countNumber = 5 +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - countType = "imageCountMoreThan" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tagStatus = "any" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  }, +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ] +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  ) -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository = "platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/busybox"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/busybox" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/busybox" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/busybox" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/curl"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/curl" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/curl" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/curl" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.aws_ecr_repository.image_repos["grafana/grafana"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - force_delete = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - name = "platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - registry_id = "224384469011" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/grafana/grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/grafana" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - tags_all = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Environment" = "application" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/grafana/grafana" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:created_by" = "terraform" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - encryption_type = "KMS" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - image_scanning_configuration { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - scan_on_push = true -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/busybox#1.31.1"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "708020167642995718" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/curl#7.85.0"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "3613762253667554703" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current:  # module.images.null_resource.copy_images["grafana/grafana#11.1.5"] will be destroyed +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - resource "null_resource" "copy_images" { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - id = "7103419918200909936" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - triggers = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - "region" = "us-gov-east-1" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } +19:56:31.236 STDOUT [eks-grafana] terraform_current: Plan: 0 to add, 0 to change, 12 to destroy. +19:56:31.236 STDOUT [eks-grafana] terraform_current:  +19:56:31.236 STDOUT [eks-grafana] terraform_current: Changes to Outputs: +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - internal_endpoint = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - hostname = "grafana.grafana.svc.cluster.local" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - port_number = "80" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - url = "https://grafana.grafana.svc.cluster.local:80/" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - module_name = "tfmod-grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - module_version = "0.0.2" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - namespace = "grafana" -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - public_endpoint = { +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - hostname = "grafana.dev.lab.csp2.census.gov" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - port_number = "80" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - url = "https://grafana.dev.lab.csp2.census.gov:80/" +19:56:31.236 STDOUT [eks-grafana] terraform_current:  } -> null +19:56:31.236 STDOUT [eks-grafana] terraform_current:  - secret_name = "grafana" -> null +19:56:31.762 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Destroying... [id=grafana.grafana-8080] +19:56:33.468 STDOUT [eks-grafana] terraform_current: module.grafana_ingress.helm_release.ingress: Destruction complete after 1s +19:56:33.479 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Destroying... [id=grafana] +19:56:41.677 STDOUT [eks-grafana] terraform_current: helm_release.grafana: Destruction complete after 9s +19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Destroying... [id=708020167642995718] +19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Destroying... [id=3613762253667554703] +19:56:41.687 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Destroying... [id=7103419918200909936] +19:56:41.703 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Destroying... [id=platform-eng-eks-mcm/grafana/busybox] +19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/grafana#11.1.5"]: Destruction complete after 0s +19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/curl#7.85.0"]: Destruction complete after 0s +19:56:41.710 STDOUT [eks-grafana] terraform_current: module.images.null_resource.copy_images["grafana/busybox#1.31.1"]: Destruction complete after 0s +19:56:41.711 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Destroying... [id=grafana] +19:56:41.716 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Destroying... [id=platform-eng-eks-mcm/grafana/curl] +19:56:41.716 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Destroying... [id=platform-eng-eks-mcm/grafana/grafana] +19:56:41.845 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/busybox"]: Destruction complete after 0s +19:56:41.877 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/curl"]: Destruction complete after 0s +19:56:41.880 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["grafana/grafana"]: Destruction complete after 0s +19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Destroying... [id=platform-eng-eks-mcm/grafana/busybox] +19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Destroying... [id=platform-eng-eks-mcm/grafana/grafana] +19:56:41.886 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Destroying... [id=platform-eng-eks-mcm/grafana/curl] +19:56:42.087 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/grafana"]: Destruction complete after 0s +19:56:42.094 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/busybox"]: Destruction complete after 0s +19:56:42.097 STDOUT [eks-grafana] terraform_current: module.images.aws_ecr_repository.image_repos["grafana/curl"]: Destruction complete after 0s +19:56:48.990 STDOUT [eks-grafana] terraform_current: kubernetes_namespace.ns: Destruction complete after 7s +19:56:48.998 STDOUT [eks-grafana] terraform_current:  +19:56:48.998 STDOUT [eks-grafana] terraform_current: Destroy complete! Resources: 12 destroyed. +19:56:48.998 STDOUT [eks-grafana] terraform_current:  +19:56:57.191 STDOUT [eks-istio] terraform_current: data.kubernetes_service.apiserver: Reading... +19:56:57.191 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Refreshing state... [id=istio-system] +19:56:58.092 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Refreshing state... [id=operators] +19:56:58.095 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-restricted-access"]: Reading... +19:56:58.095 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-full-access"]: Reading... +19:56:58.119 STDOUT [eks-istio] terraform_current: data.kubernetes_service.apiserver: Read complete after 1s [id=default/kubernetes] +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_region.current: Reading... +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:56:58.131 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:56:58.144 STDOUT [eks-istio] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:56:58.156 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:56:58.163 STDOUT [eks-istio] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Refreshing state... [id=platform-eng-eks-mcm/istio/proxyv2] +19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Refreshing state... [id=platform-eng-eks-mcm/istio/pilot] +19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.data.aws_arn.current: Reading... +19:56:58.174 STDOUT [eks-istio] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:56:58.262 STDOUT [eks-istio] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:56:58.291 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:56:58.303 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:56:58.357 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:56:58.405 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:56:58.436 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-restricted-access"]: Read complete after 0s [id=https://s3.us-west-2.amazonaws.com/amazon-eks/docs/eks-console-restricted-access.yaml] +19:56:58.437 STDOUT [eks-config] terraform_current: data.http.cluster_roles["eks-console-full-access"]: Read complete after 0s [id=https://s3.us-west-2.amazonaws.com/amazon-eks/docs/eks-console-full-access.yaml] +19:56:58.450 STDOUT [eks-istio] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:56:58.471 STDOUT [eks-config] terraform_current: data.kubectl_file_documents.access_documents["eks-console-full-access"]: Reading... +19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Refreshing state... [id=6525359393711592378] +19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Refreshing state... [id=4423650552927619903] +19:56:58.471 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Refreshing state... [id=platform-eng-eks-mcm/istio/proxyv2] +19:56:58.504 STDOUT [eks-config] terraform_current: data.kubectl_file_documents.access_documents["eks-console-full-access"]: Read complete after 0s [id=956b80201e25dc34091aeb0fecdb622c338e3317d8ed6a4ec8729d40b2d57696] +19:56:58.504 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Refreshing state... [id=platform-eng-eks-mcm/istio/pilot] +19:56:58.504 STDOUT [eks-istio] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] +19:56:58.505 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding] +19:56:58.505 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole] +19:56:58.580 STDOUT [eks-istio] terraform_current: helm_release.base: Refreshing state... [id=istio-base] +19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_region.current: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: data.aws_ebs_default_kms_key.current: Reading... +19:56:59.005 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.data.aws_security_group.sg["sg-0117da2c13b4caf21"]: Reading... +19:56:59.029 STDOUT [eks-config] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:56:59.041 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:56:59.072 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:56:59.072 STDOUT [eks-config] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:56:59.072 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Refreshing state... [id=815b2daf-8e10-42cd-a038-00424726df2e] +19:56:59.084 STDOUT [eks-config] terraform_current: module.images.data.aws_arn.current: Reading... +19:56:59.087 STDOUT [eks-config] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:56:59.124 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/kubectl] +19:56:59.181 STDOUT [eks-config] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:56:59.192 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:56:59.203 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:56:59.203 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:56:59.214 STDOUT [eks-config] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] +19:56:59.225 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:56:59.236 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.data.aws_security_group.sg["sg-0117da2c13b4caf21"]: Read complete after 0s [id=sg-0117da2c13b4caf21] +19:56:59.258 STDOUT [eks-config] terraform_current: data.aws_kms_key.ebs_key: Reading... +19:56:59.266 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:56:59.278 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:56:59.300 STDOUT [eks-config] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:56:59.320 STDOUT [eks-config] terraform_current: data.aws_kms_key.ebs_key: Read complete after 0s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] +19:56:59.331 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Refreshing state... [id=gp3-encrypted] +19:56:59.331 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Refreshing state... [id=gp2-encrypted] +19:56:59.342 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Refreshing state... [id=1086192723359257187] +19:56:59.342 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Refreshing state... [id=platform-eng-eks-mcm/kubectl] +19:56:59.395 STDOUT [eks-config] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] +19:56:59.396 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Refreshing state... [id=fs-01737a6222633f706] +19:56:59.396 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Refreshing state... [id=alias/k-kms-platform-eng-eks-mcm] +19:56:59.671 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Refreshing state... [id=fsmt-06c0f6fe90e4a1ddc] +19:56:59.671 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Refreshing state... [id=fsmt-0eb95a734315675b7] +19:56:59.672 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Refreshing state... [id=fsmt-029ae74adf10349bb] +19:57:00.009 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Refreshing state... [id=efs] +19:57:01.419 STDOUT [eks-istio] terraform_current: helm_release.istiod: Refreshing state... [id=istiod] +19:57:01.760 STDOUT [eks-config] terraform_current: Terraform used the selected providers to generate the following execution +19:57:01.760 STDOUT [eks-config] terraform_current: plan. Resource actions are indicated with the following symbols: +19:57:01.760 STDOUT [eks-config] terraform_current:  - destroy +19:57:01.760 STDOUT [eks-config] terraform_current: Terraform will perform the following actions: +19:57:01.760 STDOUT [eks-config] terraform_current:  # kubectl_manifest.deploy_cluster_roles[0] will be destroyed +19:57:01.760 STDOUT [eks-config] terraform_current:  - resource "kubectl_manifest" "deploy_cluster_roles" { +19:57:01.760 STDOUT [eks-config] terraform_current:  - api_version = "rbac.authorization.k8s.io/v1" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - apply_only = false -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - force_conflicts = false -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - force_new = false -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - id = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - kind = "ClusterRoleBinding" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - live_manifest_incluster = (sensitive value) -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - live_uid = "7541edf2-80f3-444d-9d20-cfec8e83ec82" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - name = "eks-console-dashboard-full-access-binding" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - server_side_apply = false -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - uid = "7541edf2-80f3-444d-9d20-cfec8e83ec82" -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - validate_schema = true -> null +19:57:01.760 STDOUT [eks-config] terraform_current:  - wait_for_rollout = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body = (sensitive value) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body_parsed = <<-EOT +19:57:01.761 STDOUT [eks-config] terraform_current:  apiVersion: rbac.authorization.k8s.io/v1 +19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRoleBinding +19:57:01.761 STDOUT [eks-config] terraform_current:  metadata: +19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-binding +19:57:01.761 STDOUT [eks-config] terraform_current:  roleRef: +19:57:01.761 STDOUT [eks-config] terraform_current:  apiGroup: rbac.authorization.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRole +19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-clusterrole +19:57:01.761 STDOUT [eks-config] terraform_current:  subjects: +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroup: rbac.authorization.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  kind: Group +19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-group +19:57:01.761 STDOUT [eks-config] terraform_current:  EOT -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_incluster = (sensitive value) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # kubectl_manifest.deploy_cluster_roles[1] will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubectl_manifest" "deploy_cluster_roles" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - api_version = "rbac.authorization.k8s.io/v1" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - apply_only = false -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - force_conflicts = false -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - force_new = false -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - kind = "ClusterRole" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - live_manifest_incluster = (sensitive value) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - live_uid = "131c1dda-c901-4b0a-829e-d1553480694c" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "eks-console-dashboard-full-access-clusterrole" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - server_side_apply = false -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "131c1dda-c901-4b0a-829e-d1553480694c" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - validate_schema = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - wait_for_rollout = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body = (sensitive value) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_body_parsed = <<-EOT +19:57:01.761 STDOUT [eks-config] terraform_current:  apiVersion: rbac.authorization.k8s.io/v1 +19:57:01.761 STDOUT [eks-config] terraform_current:  kind: ClusterRole +19:57:01.761 STDOUT [eks-config] terraform_current:  metadata: +19:57:01.761 STDOUT [eks-config] terraform_current:  name: eks-console-dashboard-full-access-clusterrole +19:57:01.761 STDOUT [eks-config] terraform_current:  rules: +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - "" +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - nodes +19:57:01.761 STDOUT [eks-config] terraform_current:  - namespaces +19:57:01.761 STDOUT [eks-config] terraform_current:  - pods +19:57:01.761 STDOUT [eks-config] terraform_current:  - configmaps +19:57:01.761 STDOUT [eks-config] terraform_current:  - endpoints +19:57:01.761 STDOUT [eks-config] terraform_current:  - events +19:57:01.761 STDOUT [eks-config] terraform_current:  - limitranges +19:57:01.761 STDOUT [eks-config] terraform_current:  - persistentvolumeclaims +19:57:01.761 STDOUT [eks-config] terraform_current:  - podtemplates +19:57:01.761 STDOUT [eks-config] terraform_current:  - replicationcontrollers +19:57:01.761 STDOUT [eks-config] terraform_current:  - resourcequotas +19:57:01.761 STDOUT [eks-config] terraform_current:  - secrets +19:57:01.761 STDOUT [eks-config] terraform_current:  - serviceaccounts +19:57:01.761 STDOUT [eks-config] terraform_current:  - services +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - apps +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - deployments +19:57:01.761 STDOUT [eks-config] terraform_current:  - daemonsets +19:57:01.761 STDOUT [eks-config] terraform_current:  - statefulsets +19:57:01.761 STDOUT [eks-config] terraform_current:  - replicasets +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - batch +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - jobs +19:57:01.761 STDOUT [eks-config] terraform_current:  - cronjobs +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - coordination.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - leases +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - discovery.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - endpointslices +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - events.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - events +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - extensions +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - daemonsets +19:57:01.761 STDOUT [eks-config] terraform_current:  - deployments +19:57:01.761 STDOUT [eks-config] terraform_current:  - ingresses +19:57:01.761 STDOUT [eks-config] terraform_current:  - networkpolicies +19:57:01.761 STDOUT [eks-config] terraform_current:  - replicasets +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - networking.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - ingresses +19:57:01.761 STDOUT [eks-config] terraform_current:  - networkpolicies +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - policy +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - poddisruptionbudgets +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - rbac.authorization.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - rolebindings +19:57:01.761 STDOUT [eks-config] terraform_current:  - roles +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  - apiGroups: +19:57:01.761 STDOUT [eks-config] terraform_current:  - storage.k8s.io +19:57:01.761 STDOUT [eks-config] terraform_current:  resources: +19:57:01.761 STDOUT [eks-config] terraform_current:  - csistoragecapacities +19:57:01.761 STDOUT [eks-config] terraform_current:  verbs: +19:57:01.761 STDOUT [eks-config] terraform_current:  - get +19:57:01.761 STDOUT [eks-config] terraform_current:  - list +19:57:01.761 STDOUT [eks-config] terraform_current:  EOT -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - yaml_incluster = (sensitive value) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_namespace.operators will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_namespace" "operators" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "operators" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - wait_for_default_service_account = false -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { +19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "operators" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2519" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "0ffec718-19a2-4d34-897f-09cb62301588" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.ebs_encrypted will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "ebs_encrypted" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "gp2-encrypted" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [] -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "encrypted" = "true" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "fsType" = "ext4" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "kmsKeyId" = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "type" = "gp2" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "kubernetes.io/aws-ebs" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { +19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "storageclass.kubernetes.io/is-default-class" = "false" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "gp2-encrypted" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2517" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "e912e5b9-930d-4a9f-abad-8e8011c95a68" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.efs_sc will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "efs_sc" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "efs" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [ +19:57:01.761 STDOUT [eks-config] terraform_current:  - "tls", +19:57:01.761 STDOUT [eks-config] terraform_current:  ] -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "directoryPerms" = "700" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "fileSystemId" = "fs-01737a6222633f706" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "provisioningMode" = "efs-ap" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "efs.csi.aws.com" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { +19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "efs" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "3159" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "49079b9c-cd8c-4e44-b32a-104d94e0de03" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # kubernetes_storage_class.gp3_encrypted will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "kubernetes_storage_class" "gp3_encrypted" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - allow_volume_expansion = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "gp3-encrypted" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - mount_options = [] -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - parameters = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "encrypted" = "true" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "fsType" = "ext4" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "kmsKeyId" = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "type" = "gp3" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - reclaim_policy = "Delete" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - storage_provisioner = "ebs.csi.aws.com" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - volume_binding_mode = "Immediate" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - metadata { +19:57:01.761 STDOUT [eks-config] terraform_current:  - annotations = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "storageclass.kubernetes.io/is-default-class" = "true" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - generation = 0 -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - labels = {} -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "gp3-encrypted" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource_version = "2518" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - uid = "afec93df-4b89-4fc8-9bcc-dd00dbd058bd" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["kubectl"] will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - policy = jsonencode( +19:57:01.761 STDOUT [eks-config] terraform_current:  { +19:57:01.761 STDOUT [eks-config] terraform_current:  - rules = [ +19:57:01.761 STDOUT [eks-config] terraform_current:  - { +19:57:01.761 STDOUT [eks-config] terraform_current:  - action = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - type = "expire" +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  - description = "keep 5 images" +19:57:01.761 STDOUT [eks-config] terraform_current:  - rulePriority = 1 +19:57:01.761 STDOUT [eks-config] terraform_current:  - selection = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - countNumber = 5 +19:57:01.761 STDOUT [eks-config] terraform_current:  - countType = "imageCountMoreThan" +19:57:01.761 STDOUT [eks-config] terraform_current:  - tagStatus = "any" +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  }, +19:57:01.761 STDOUT [eks-config] terraform_current:  ] +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  ) -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - registry_id = "224384469011" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - repository = "platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.aws_ecr_repository.image_repos["kubectl"] will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - force_delete = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - name = "platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - registry_id = "224384469011" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kubectl" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - tags = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Environment" = "application" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kubectl" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - tags_all = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Environment" = "application" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/kubectl" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:01.761 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - encryption_configuration { +19:57:01.761 STDOUT [eks-config] terraform_current:  - encryption_type = "KMS" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  - image_scanning_configuration { +19:57:01.761 STDOUT [eks-config] terraform_current:  - scan_on_push = true -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.761 STDOUT [eks-config] terraform_current:  # module.images.null_resource.copy_images["kubectl#1.30.4"] will be destroyed +19:57:01.761 STDOUT [eks-config] terraform_current:  - resource "null_resource" "copy_images" { +19:57:01.761 STDOUT [eks-config] terraform_current:  - id = "1086192723359257187" -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  - triggers = { +19:57:01.761 STDOUT [eks-config] terraform_current:  - "region" = "us-gov-east-1" +19:57:01.761 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.761 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_efs_file_system.fs will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_file_system" "fs" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - creation_token = "v-efs-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - encrypted = true -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - name = "v-efs-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - number_of_mount_targets = 3 -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - performance_mode = "generalPurpose" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - provisioned_throughput_in_mibps = 0 -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - size_in_bytes = [ +19:57:01.762 STDOUT [eks-config] terraform_current:  - { +19:57:01.762 STDOUT [eks-config] terraform_current:  - value = 6144 +19:57:01.762 STDOUT [eks-config] terraform_current:  - value_in_ia = 0 +19:57:01.762 STDOUT [eks-config] terraform_current:  - value_in_standard = 6144 +19:57:01.762 STDOUT [eks-config] terraform_current:  }, +19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - tags = { +19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "v-efs-platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - tags_all = { +19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "v-efs-platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - throughput_mode = "bursting" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  # (2 unchanged attributes hidden) +19:57:01.762 STDOUT [eks-config] terraform_current:  - protection { +19:57:01.762 STDOUT [eks-config] terraform_current:  - replication_overwrite = "ENABLED" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_kms_alias.key[0] will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_kms_alias" "key" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/k-kms-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "alias/k-kms-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - name = "alias/k-kms-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - target_key_id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  # (1 unchanged attribute hidden) +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_fs.aws_kms_key.key[0] will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_kms_key" "key" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - bypass_policy_lockout_safety_check = false -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - description = "KMS CMK for EFS v-efs-platform-eng-eks-mcm" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - enable_key_rotation = true -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - is_enabled = true -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - key_id = "815b2daf-8e10-42cd-a038-00424726df2e" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - multi_region = false -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - policy = jsonencode( +19:57:01.762 STDOUT [eks-config] terraform_current:  { +19:57:01.762 STDOUT [eks-config] terraform_current:  - Id = "key-default-1" +19:57:01.762 STDOUT [eks-config] terraform_current:  - Statement = [ +19:57:01.762 STDOUT [eks-config] terraform_current:  - { +19:57:01.762 STDOUT [eks-config] terraform_current:  - Action = "kms:*" +19:57:01.762 STDOUT [eks-config] terraform_current:  - Effect = "Allow" +19:57:01.762 STDOUT [eks-config] terraform_current:  - Principal = { +19:57:01.762 STDOUT [eks-config] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  - Resource = "*" +19:57:01.762 STDOUT [eks-config] terraform_current:  - Sid = "Enable IAM User Permissions" +19:57:01.762 STDOUT [eks-config] terraform_current:  }, +19:57:01.762 STDOUT [eks-config] terraform_current:  ] +19:57:01.762 STDOUT [eks-config] terraform_current:  - Version = "2012-10-17" +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  ) -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - rotation_period_in_days = 365 -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - tags = { +19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - tags_all = { +19:57:01.762 STDOUT [eks-config] terraform_current:  - "CostAllocation" = "census:csvd:platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Environment" = "dev" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Name" = "k-kms-platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terraform" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "Terragrunt" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:created_by" = "terraform" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "boc:tf_module_version" = "0.0.3" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "efs.csi.aws.com/cluster" = "true" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:57:01.762 STDOUT [eks-config] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:57:01.762 STDOUT [eks-config] terraform_current:  } -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  # (2 unchanged attributes hidden) +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[0] will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az1" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1a" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-029ae74adf10349bb" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.54.5" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1a.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0c359f03ae8785130" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ +19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", +19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-02c2250b9ec2dd6a2" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[1] will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az3" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1c" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-06c0f6fe90e4a1ddc" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.63.88" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1c.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0120a768536edb21a" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ +19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", +19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-078b228071c609a50" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current:  # module.efs.module.efs_mnt.aws_efs_mount_target.mount[2] will be destroyed +19:57:01.762 STDOUT [eks-config] terraform_current:  - resource "aws_efs_mount_target" "mount" { +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_id = "usge1-az2" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - availability_zone_name = "us-gov-east-1b" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - dns_name = "fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_arn = "arn:aws-us-gov:elasticfilesystem:us-gov-east-1:224384469011:file-system/fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - file_system_id = "fs-01737a6222633f706" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - id = "fsmt-0eb95a734315675b7" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - ip_address = "10.129.59.54" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - mount_target_dns_name = "us-gov-east-1b.fs-01737a6222633f706.efs.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - network_interface_id = "eni-0c4d84da0e07564f5" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - owner_id = "224384469011" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - security_groups = [ +19:57:01.762 STDOUT [eks-config] terraform_current:  - "sg-0117da2c13b4caf21", +19:57:01.762 STDOUT [eks-config] terraform_current:  ] -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - subnet_id = "subnet-07a6339be3670fb41" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  } +19:57:01.762 STDOUT [eks-config] terraform_current: Plan: 0 to add, 0 to change, 15 to destroy. +19:57:01.762 STDOUT [eks-config] terraform_current:  +19:57:01.762 STDOUT [eks-config] terraform_current: Changes to Outputs: +19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_full_path = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/kubectl:1.30.4" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_registry = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_repository = "platform-eng-eks-mcm/kubectl" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - kubectl_image_tag = "1.30.4" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - module_name = "tfmod-eks-configuration" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - module_version = "0.0.3" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - rwo_storage_class = "gp3-encrypted" -> null +19:57:01.762 STDOUT [eks-config] terraform_current:  - rwx_storage_class = "efs" -> null +19:57:02.481 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Destroying... [id=1086192723359257187] +19:57:02.482 STDOUT [eks-config] terraform_current: module.images.null_resource.copy_images["kubectl#1.30.4"]: Destruction complete after 0s +19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Destroying... [id=operators] +19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Destroying... [id=gp3-encrypted] +19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Destroying... [id=gp2-encrypted] +19:57:02.508 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Destroying... [id=efs] +19:57:02.510 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Destroying... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/eks-console-dashboard-full-access-clusterrole] +19:57:02.510 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Destroying... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/eks-console-dashboard-full-access-binding] +19:57:02.989 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Destroying... [id=platform-eng-eks-mcm/kubectl] +19:57:03.142 STDOUT [eks-config] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["kubectl"]: Destruction complete after 0s +19:57:03.152 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Destroying... [id=platform-eng-eks-mcm/kubectl] +19:57:03.189 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Refreshing state... [id=istio-egressgateway] +19:57:03.193 STDOUT [eks-istio] terraform_current: helm_release.ingress: Refreshing state... [id=istio-ingressgateway] +19:57:03.363 STDOUT [eks-config] terraform_current: module.images.aws_ecr_repository.image_repos["kubectl"]: Destruction complete after 0s +19:57:03.448 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[0]: Destruction complete after 0s +19:57:03.463 STDOUT [eks-config] terraform_current: kubectl_manifest.deploy_cluster_roles[1]: Destruction complete after 0s +19:57:03.484 STDOUT [eks-config] terraform_current: kubernetes_storage_class.efs_sc: Destruction complete after 0s +19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Destroying... [id=alias/k-kms-platform-eng-eks-mcm] +19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Destroying... [id=fsmt-0eb95a734315675b7] +19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Destroying... [id=fsmt-029ae74adf10349bb] +19:57:03.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Destroying... [id=fsmt-06c0f6fe90e4a1ddc] +19:57:03.490 STDOUT [eks-config] terraform_current: kubernetes_storage_class.gp3_encrypted: Destruction complete after 1s +19:57:03.490 STDOUT [eks-config] terraform_current: kubernetes_storage_class.ebs_encrypted: Destruction complete after 0s +19:57:03.596 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_alias.key[0]: Destruction complete after 1s +19:57:07.847 STDOUT [eks-istio] terraform_current: Terraform used the selected providers to generate the following execution +19:57:07.847 STDOUT [eks-istio] terraform_current: plan. Resource actions are indicated with the following symbols: +19:57:07.847 STDOUT [eks-istio] terraform_current:  - destroy +19:57:07.847 STDOUT [eks-istio] terraform_current: Terraform will perform the following actions: +19:57:07.847 STDOUT [eks-istio] terraform_current:  # helm_release.base will be destroyed +19:57:07.847 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "base" { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - atomic = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "base" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - force_update = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - id = "istio-base" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - lint = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - metadata = [ +19:57:07.847 STDOUT [eks-istio] terraform_current:  - { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "base" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665094 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665094 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-base" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT +19:57:07.847 STDOUT [eks-istio] terraform_current:  Istio base successfully installed! +19:57:07.847 STDOUT [eks-istio] terraform_current:  +19:57:07.847 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: +19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm status istio-base -n istio-system +19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm get all istio-base -n istio-system +19:57:07.847 STDOUT [eks-istio] terraform_current:  EOT +19:57:07.847 STDOUT [eks-istio] terraform_current:  - revision = 1 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - values = jsonencode({}) +19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" +19:57:07.847 STDOUT [eks-istio] terraform_current:  }, +19:57:07.847 STDOUT [eks-istio] terraform_current:  ] -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-base" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - replace = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - timeout = 300 -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - verify = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait = true -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  } +19:57:07.847 STDOUT [eks-istio] terraform_current:  # helm_release.egress[0] will be destroyed +19:57:07.847 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "egress" { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - atomic = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - force_update = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - id = "istio-egressgateway" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - lint = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - metadata = [ +19:57:07.847 STDOUT [eks-istio] terraform_current:  - { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - chart = "gateway" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665113 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665113 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-egressgateway" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" +19:57:07.847 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT +19:57:07.847 STDOUT [eks-istio] terraform_current:  "istio-egressgateway" successfully installed! +19:57:07.847 STDOUT [eks-istio] terraform_current:  +19:57:07.847 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: +19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm status istio-egressgateway -n istio-system +19:57:07.847 STDOUT [eks-istio] terraform_current:  $ helm get all istio-egressgateway -n istio-system +19:57:07.847 STDOUT [eks-istio] terraform_current:  +19:57:07.847 STDOUT [eks-istio] terraform_current:  Next steps: +19:57:07.847 STDOUT [eks-istio] terraform_current:  * Deploy an HTTP Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ +19:57:07.847 STDOUT [eks-istio] terraform_current:  * Deploy an HTTPS Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/ +19:57:07.847 STDOUT [eks-istio] terraform_current:  EOT +19:57:07.847 STDOUT [eks-istio] terraform_current:  - revision = 1 +19:57:07.847 STDOUT [eks-istio] terraform_current:  - values = jsonencode( +19:57:07.847 STDOUT [eks-istio] terraform_current:  { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - service = { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - type = "ClusterIP" +19:57:07.847 STDOUT [eks-istio] terraform_current:  } +19:57:07.847 STDOUT [eks-istio] terraform_current:  } +19:57:07.847 STDOUT [eks-istio] terraform_current:  ) +19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" +19:57:07.847 STDOUT [eks-istio] terraform_current:  }, +19:57:07.847 STDOUT [eks-istio] terraform_current:  ] -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "istio-egressgateway" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - replace = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - timeout = 90 -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - verify = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait = true -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.847 STDOUT [eks-istio] terraform_current:  - name = "service.type" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  - value = "ClusterIP" -> null +19:57:07.847 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.847 STDOUT [eks-istio] terraform_current:  } +19:57:07.847 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  # helm_release.ingress will be destroyed +19:57:07.848 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "ingress" { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - atomic = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "gateway" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - force_update = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - id = "istio-ingressgateway" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - lint = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - metadata = [ +19:57:07.848 STDOUT [eks-istio] terraform_current:  - { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "gateway" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665114 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665114 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "istio-ingressgateway" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT +19:57:07.848 STDOUT [eks-istio] terraform_current:  "istio-ingressgateway" successfully installed! +19:57:07.848 STDOUT [eks-istio] terraform_current:  +19:57:07.848 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: +19:57:07.848 STDOUT [eks-istio] terraform_current:  $ helm status istio-ingressgateway -n istio-system +19:57:07.848 STDOUT [eks-istio] terraform_current:  $ helm get all istio-ingressgateway -n istio-system +19:57:07.848 STDOUT [eks-istio] terraform_current:  +19:57:07.848 STDOUT [eks-istio] terraform_current:  Next steps: +19:57:07.848 STDOUT [eks-istio] terraform_current:  * Deploy an HTTP Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ +19:57:07.848 STDOUT [eks-istio] terraform_current:  * Deploy an HTTPS Gateway: https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/ +19:57:07.848 STDOUT [eks-istio] terraform_current:  EOT +19:57:07.848 STDOUT [eks-istio] terraform_current:  - revision = 1 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - values = jsonencode( +19:57:07.848 STDOUT [eks-istio] terraform_current:  { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - service = { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - annotations = { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags" = "Name=platform-eng-eks-mcm-istio-ingress,boc:tf_module_name=tfmod-istio,boc:tf_module_version=1.0.3,eks-cluster-name=platform-eng-eks-mcm" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-internal" = "true" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - "service.beta.kubernetes.io/aws-load-balancer-type" = "nlb" +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - ports = [ +19:57:07.848 STDOUT [eks-istio] terraform_current:  - { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "http2" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 80 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 80 +19:57:07.848 STDOUT [eks-istio] terraform_current:  }, +19:57:07.848 STDOUT [eks-istio] terraform_current:  - { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "https" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 443 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 443 +19:57:07.848 STDOUT [eks-istio] terraform_current:  }, +19:57:07.848 STDOUT [eks-istio] terraform_current:  - { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "status-port" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - port = 15021 +19:57:07.848 STDOUT [eks-istio] terraform_current:  - protocol = "TCP" +19:57:07.848 STDOUT [eks-istio] terraform_current:  - targetPort = 15021 +19:57:07.848 STDOUT [eks-istio] terraform_current:  }, +19:57:07.848 STDOUT [eks-istio] terraform_current:  ] +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  ) +19:57:07.848 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" +19:57:07.848 STDOUT [eks-istio] terraform_current:  }, +19:57:07.848 STDOUT [eks-istio] terraform_current:  ] -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "istio-ingressgateway" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - replace = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - timeout = 90 -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - verify = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - wait = true -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-additional-resource-tags" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "Name=platform-eng-eks-mcm-istio-ingress\\,boc:tf_module_name=tfmod-istio\\,boc:tf_module_version=1.0.3\\,eks-cluster-name=platform-eng-eks-mcm" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-internal" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - type = "string" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "true" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.annotations.service\\.beta\\.kubernetes\\.io/aws-load-balancer-type" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "nlb" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].name" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "http2" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].port" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "80" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].protocol" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[0].targetPort" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "80" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].name" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "https" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].port" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "443" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].protocol" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[1].targetPort" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "443" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].name" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "status-port" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].port" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "15021" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].protocol" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "TCP" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - name = "service.ports[2].targetPort" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - value = "15021" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  } +19:57:07.848 STDOUT [eks-istio] terraform_current:  # helm_release.istiod will be destroyed +19:57:07.848 STDOUT [eks-istio] terraform_current:  - resource "helm_release" "istiod" { +19:57:07.848 STDOUT [eks-istio] terraform_current:  - atomic = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - chart = "istiod" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - cleanup_on_fail = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - create_namespace = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - dependency_update = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_crd_hooks = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_openapi_validation = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - disable_webhooks = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - force_update = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - id = "istiod" -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - lint = false -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - max_history = 0 -> null +19:57:07.848 STDOUT [eks-istio] terraform_current:  - metadata = [ +19:57:07.848 STDOUT [eks-istio] terraform_current:  - { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - app_version = "1.22.1" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - chart = "istiod" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - first_deployed = 1725665099 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - last_deployed = 1725665099 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istiod" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - notes = <<-EOT +19:57:07.849 STDOUT [eks-istio] terraform_current:  "istiod" successfully installed! +19:57:07.849 STDOUT [eks-istio] terraform_current:  +19:57:07.849 STDOUT [eks-istio] terraform_current:  To learn more about the release, try: +19:57:07.849 STDOUT [eks-istio] terraform_current:  $ helm status istiod -n istio-system +19:57:07.849 STDOUT [eks-istio] terraform_current:  $ helm get all istiod -n istio-system +19:57:07.849 STDOUT [eks-istio] terraform_current:  +19:57:07.849 STDOUT [eks-istio] terraform_current:  Next steps: +19:57:07.849 STDOUT [eks-istio] terraform_current:  * Deploy a Gateway: https://istio.io/latest/docs/setup/additional-setup/gateway/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  * Try out our tasks to get started on common configurations: +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/traffic-management +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/security/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/tasks/policy-enforcement/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  * Review the list of actively supported releases, CVE publications and our hardening guide: +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/releases/supported-releases/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/news/security/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  * https://istio.io/latest/docs/ops/best-practices/security/ +19:57:07.849 STDOUT [eks-istio] terraform_current:  +19:57:07.849 STDOUT [eks-istio] terraform_current:  For further documentation see https://istio.io website +19:57:07.849 STDOUT [eks-istio] terraform_current:  EOT +19:57:07.849 STDOUT [eks-istio] terraform_current:  - revision = 1 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - values = jsonencode( +19:57:07.849 STDOUT [eks-istio] terraform_current:  { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - global = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - hub = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - proxy = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - proxy_init = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - globalproxy = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - excludeIPRanges = "172.20.0.1/32" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - meshConfig = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - accessLogFile = "/dev/stdout" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - enableTracing = true +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - pilot = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - image = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot:1.22.1" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - telemetry = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - enabled = true +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  ) +19:57:07.849 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" +19:57:07.849 STDOUT [eks-istio] terraform_current:  }, +19:57:07.849 STDOUT [eks-istio] terraform_current:  ] -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istiod" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - namespace = "istio-system" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - pass_credentials = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - recreate_pods = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - render_subchart_notes = true -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - replace = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "https://istio-release.storage.googleapis.com/charts" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - reset_values = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - reuse_values = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - skip_crds = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - status = "deployed" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - timeout = 300 -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - verify = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - version = "1.22.1" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait = true -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait_for_jobs = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.hub" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.proxy.image" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "global.proxy_init.image" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2:1.22.1" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "globalproxy.excludeIPRanges" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "172.20.0.1/32" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "meshConfig.accessLogFile" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "/dev/stdout" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "meshConfig.enableTracing" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "true" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "pilot.image" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot:1.22.1" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - set { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "telemetry.enabled" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - value = "true" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  # kubernetes_namespace.ns will be destroyed +19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "kubernetes_namespace" "ns" { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "istio-system" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - wait_for_default_service_account = false -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - metadata { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - annotations = {} -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - generation = 0 -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - labels = {} -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - name = "istio-system" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource_version = "3104" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - uid = "cdbfe103-865b-4c34-93ce-ae9d8db996c6" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  # (1 unchanged attribute hidden) +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"] will be destroyed +19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - policy = jsonencode( +19:57:07.849 STDOUT [eks-istio] terraform_current:  { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - rules = [ +19:57:07.849 STDOUT [eks-istio] terraform_current:  - { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - action = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - type = "expire" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - description = "keep 5 images" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - rulePriority = 1 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - selection = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - countNumber = 5 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - countType = "imageCountMoreThan" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - tagStatus = "any" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  }, +19:57:07.849 STDOUT [eks-istio] terraform_current:  ] +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  ) -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"] will be destroyed +19:57:07.849 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - policy = jsonencode( +19:57:07.849 STDOUT [eks-istio] terraform_current:  { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - rules = [ +19:57:07.849 STDOUT [eks-istio] terraform_current:  - { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - action = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - type = "expire" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  - description = "keep 5 images" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - rulePriority = 1 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - selection = { +19:57:07.849 STDOUT [eks-istio] terraform_current:  - countNumber = 5 +19:57:07.849 STDOUT [eks-istio] terraform_current:  - countType = "imageCountMoreThan" +19:57:07.849 STDOUT [eks-istio] terraform_current:  - tagStatus = "any" +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  }, +19:57:07.849 STDOUT [eks-istio] terraform_current:  ] +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.849 STDOUT [eks-istio] terraform_current:  ) -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  - repository = "platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.849 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_repository.image_repos["istio/pilot"] will be destroyed +19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - force_delete = true -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - name = "platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/pilot" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/pilot" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags_all = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/pilot" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terraform" = "true" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terragrunt" = "true" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_configuration { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_type = "KMS" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_scanning_configuration { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - scan_on_push = true -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.aws_ecr_repository.image_repos["istio/proxyv2"] will be destroyed +19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - force_delete = true -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - name = "platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - registry_id = "224384469011" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/istio/proxyv2" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/proxyv2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - tags_all = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Environment" = "application" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/istio/proxyv2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terraform" = "true" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "Terragrunt" = "true" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:created_by" = "terraform" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_configuration { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - encryption_type = "KMS" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  - image_scanning_configuration { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - scan_on_push = true -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.null_resource.copy_images["istio/pilot#1.22.1"] will be destroyed +19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "null_resource" "copy_images" { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "6525359393711592378" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - triggers = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "region" = "us-gov-east-1" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current:  # module.images.null_resource.copy_images["istio/proxyv2#1.22.1"] will be destroyed +19:57:07.877 STDOUT [eks-istio] terraform_current:  - resource "null_resource" "copy_images" { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - id = "4423650552927619903" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - triggers = { +19:57:07.877 STDOUT [eks-istio] terraform_current:  - "region" = "us-gov-east-1" +19:57:07.877 STDOUT [eks-istio] terraform_current:  } -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  } +19:57:07.877 STDOUT [eks-istio] terraform_current: Plan: 0 to add, 0 to change, 11 to destroy. +19:57:07.877 STDOUT [eks-istio] terraform_current:  +19:57:07.877 STDOUT [eks-istio] terraform_current: Changes to Outputs: +19:57:07.877 STDOUT [eks-istio] terraform_current:  - module_name = "tfmod-istio" -> null +19:57:07.877 STDOUT [eks-istio] terraform_current:  - module_version = "1.0.3" -> null +19:57:08.412 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Destroying... [id=istio-egressgateway] +19:57:08.412 STDOUT [eks-istio] terraform_current: helm_release.ingress: Destroying... [id=istio-ingressgateway] +19:57:09.851 STDOUT [eks-config] terraform_current: kubernetes_namespace.operators: Destruction complete after 8s +19:57:10.733 STDOUT [eks-istio] terraform_current: helm_release.egress[0]: Destruction complete after 3s +19:57:12.747 STDOUT [eks-istio] terraform_current: helm_release.ingress: Destruction complete after 5s +19:57:12.758 STDOUT [eks-istio] terraform_current: helm_release.istiod: Destroying... [id=istiod] +19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Still destroying... [id=fsmt-029ae74adf10349bb, 10s elapsed] +19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Still destroying... [id=fsmt-06c0f6fe90e4a1ddc, 10s elapsed] +19:57:13.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Still destroying... [id=fsmt-0eb95a734315675b7, 10s elapsed] +19:57:15.639 STDOUT [eks-istio] terraform_current: helm_release.istiod: Destruction complete after 3s +19:57:15.641 STDOUT [eks-istio] terraform_current: helm_release.base: Destroying... [id=istio-base] +19:57:16.477 STDOUT [eks-istio] terraform_current: helm_release.base: Destruction complete after 0s +19:57:16.491 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Destroying... [id=istio-system] +19:57:16.491 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Destroying... [id=4423650552927619903] +19:57:16.496 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Destroying... [id=platform-eng-eks-mcm/istio/proxyv2] +19:57:16.496 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Destroying... [id=platform-eng-eks-mcm/istio/pilot] +19:57:16.501 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Destroying... [id=6525359393711592378] +19:57:16.501 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/proxyv2#1.22.1"]: Destruction complete after 1s +19:57:16.502 STDOUT [eks-istio] terraform_current: module.images.null_resource.copy_images["istio/pilot#1.22.1"]: Destruction complete after 0s +19:57:16.657 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/proxyv2"]: Destruction complete after 1s +19:57:16.657 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["istio/pilot"]: Destruction complete after 1s +19:57:16.659 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Destroying... [id=platform-eng-eks-mcm/istio/pilot] +19:57:16.659 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Destroying... [id=platform-eng-eks-mcm/istio/proxyv2] +19:57:16.860 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/pilot"]: Destruction complete after 0s +19:57:16.866 STDOUT [eks-istio] terraform_current: module.images.aws_ecr_repository.image_repos["istio/proxyv2"]: Destruction complete after 0s +19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Still destroying... [id=fsmt-0eb95a734315675b7, 20s elapsed] +19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Still destroying... [id=fsmt-06c0f6fe90e4a1ddc, 20s elapsed] +19:57:23.486 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Still destroying... [id=fsmt-029ae74adf10349bb, 20s elapsed] +19:57:23.741 STDOUT [eks-istio] terraform_current: kubernetes_namespace.ns: Destruction complete after 8s +19:57:23.975 STDOUT [eks-istio] terraform_current:  +19:57:23.975 STDOUT [eks-istio] terraform_current: Destroy complete! Resources: 11 destroyed. +19:57:23.975 STDOUT [eks-istio] terraform_current:  +19:57:25.004 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[2]: Destruction complete after 22s +19:57:25.213 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[1]: Destruction complete after 22s +19:57:25.213 STDOUT [eks-config] terraform_current: module.efs.module.efs_mnt.aws_efs_mount_target.mount[0]: Destruction complete after 22s +19:57:25.214 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Destroying... [id=fs-01737a6222633f706] +19:57:27.346 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_efs_file_system.fs: Destruction complete after 2s +19:57:27.350 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Destroying... [id=815b2daf-8e10-42cd-a038-00424726df2e] +19:57:27.500 STDOUT [eks-config] terraform_current: module.efs.module.efs_fs.aws_kms_key.key[0]: Destruction complete after 0s +19:57:27.657 STDOUT [eks-config] terraform_current:  +19:57:27.657 STDOUT [eks-config] terraform_current: Destroy complete! Resources: 15 destroyed. +19:57:27.657 STDOUT [eks-config] terraform_current:  +19:57:31.969 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Refreshing state... [id=ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23] +19:57:31.971 STDOUT [eks-cert-manager] terraform_current: data.kubernetes_namespace.cert_manager: Reading... +19:57:31.971 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Refreshing state... [id=cert-manager] +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_region.current: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_longterm: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_region.current: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_caller_identity.current: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_caller_identity.current: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_iam_account_alias.current: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zones.zones: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Reading... +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:57:32.597 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_region.current: Reading... +19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_authorization_token.token: Reading... +19:57:32.600 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:57:32.601 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_lifecycle_policy_document.any: Read complete after 0s +19:57:32.601 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_shortterm: Reading... +19:57:32.603 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_caller_identity.current: Reading... +19:57:32.627 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:57:32.629 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_arn.current: Reading... +19:57:32.631 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:57:32.634 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Refreshing state... [id=64d67b231f99677dca495c34e105cc607fd6fb57] +19:57:32.658 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:57:32.660 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_arn.current: Reading... +19:57:32.661 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:57:32.690 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:57:32.692 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_arn.current: Reading... +19:57:32.692 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:57:32.696 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] +19:57:32.696 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] +19:57:32.697 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] +19:57:32.728 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_ecr_authorization_token.token: Read complete after 0s [id=us-gov-east-1] +19:57:32.730 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] +19:57:32.730 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_longterm: Read complete after 0s [id=/enterprise/pki/ca1] +19:57:32.735 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.aws_ssm_parameter.ca_shortterm: Read complete after 0s [id=/enterprise/pki/ca2] +19:57:32.739 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Refreshing state... [id=arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020] +19:57:32.744 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zones.zones: Read complete after 0s [id=us-gov-east-1] +19:57:32.746 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Reading... +19:57:32.746 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Reading... +19:57:32.798 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1a"]: Read complete after 0s [id=us-gov-east-1a] +19:57:32.800 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Reading... +19:57:32.823 STDOUT [eks-cert-manager] terraform_current: data.kubernetes_namespace.cert_manager: Read complete after 1s [id=cert-manager] +19:57:32.850 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1b"]: Read complete after 0s [id=us-gov-east-1b] +19:57:32.889 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_availability_zone.zone["us-gov-east-1c"]: Read complete after 0s [id=us-gov-east-1c] +19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] +19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] +19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] +19:57:32.914 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Refreshing state... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] +19:57:32.926 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Refreshing state... [id=2605876329532083347] +19:57:32.927 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Refreshing state... [id=6900975909197805264] +19:57:32.927 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Refreshing state... [id=5737089486470790152] +19:57:32.930 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Refreshing state... [id=2232048202721537040] +19:57:32.936 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.certificate: Reading... +19:57:32.936 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.issuer: Reading... +19:57:32.940 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.issuer: Read complete after 0s [id=b773586549574e6a4a47ab72d74da2043c8ae7b7] +19:57:32.941 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Refreshing state... [id=cert-manager/ca-key-pair] +19:57:32.943 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.data.tls_certificate.certificate: Read complete after 0s [id=971422b009668a7b3039123ee42dc789659e7cb1] +19:57:32.946 STDOUT [eks-cert-manager] terraform_current: module.images.data.aws_iam_account_alias.current: Read complete after 0s [id=lab-dev-gov] +19:57:32.988 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Refreshing state... [id=cert-manager] +19:57:36.509 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/clusterissuer] +19:57:38.827 STDOUT [eks-cert-manager] terraform_current: Terraform used the selected providers to generate the following execution +19:57:38.827 STDOUT [eks-cert-manager] terraform_current: plan. Resource actions are indicated with the following symbols: +19:57:38.827 STDOUT [eks-cert-manager] terraform_current:  - destroy +19:57:38.827 STDOUT [eks-cert-manager] terraform_current: Terraform will perform the following actions: +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # helm_release.cert_manager will be destroyed +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - resource "helm_release" "cert_manager" { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - atomic = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - chart = "cert-manager" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - cleanup_on_fail = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - create_namespace = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - dependency_update = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_crd_hooks = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_openapi_validation = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - disable_webhooks = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - force_update = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - lint = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - max_history = 0 -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - metadata = [ +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - app_version = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - chart = "cert-manager" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - first_deployed = 1725664989 +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - last_deployed = 1725664989 +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - notes = <<-EOT +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ⚠️ WARNING: `installCRDs` is deprecated, use `crds.enabled` instead. +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  cert-manager v1.15.1 has been deployed successfully! +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  In order to begin issuing certificates, you will need to set up a ClusterIssuer +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  or Issuer resource (for example, by creating a 'letsencrypt-staging' issuer). +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  More information on the different types of issuers and how to configure them +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  can be found in our documentation: +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  https://cert-manager.io/docs/configuration/ +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  For information on how to configure cert-manager to automatically provision +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  Certificates for Ingress resources, take a look at the `ingress-shim` +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  documentation: +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  https://cert-manager.io/docs/usage/ingress/ +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  EOT +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - revision = 1 +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - values = jsonencode( +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - cainjector = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - extraArgs = [ +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - "--enable-certificate-owner-ref=true", +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ] +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - installCRDs = true +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - startupapicheck = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - webhook = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - image = { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - tag = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - version = "v1.15.1" +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  }, +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  ] -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - pass_credentials = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - recreate_pods = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - render_subchart_notes = true -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - replace = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - repository = "https://charts.jetstack.io" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - reset_values = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - reuse_values = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - skip_crds = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - status = "deployed" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - timeout = 180 -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - verify = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - version = "v1.15.1" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - wait = true -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - wait_for_jobs = false -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cainjector.image.repository" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "cainjector.image.tag" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "extraArgs" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "{--enable-certificate-owner-ref=true}" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "image.repository" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "image.tag" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "installCRDs" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "true" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "startupapicheck.image.repository" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "startupapicheck.image.tag" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "webhook.image.repository" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - set { +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - name = "webhook.image.tag" -> null +19:57:38.828 STDOUT [eks-cert-manager] terraform_current:  - value = "v1.15.1" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubectl_manifest.clusterissuer will be destroyed +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubectl_manifest" "clusterissuer" { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - api_version = "cert-manager.io/v1" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - apply_only = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - force_conflicts = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - force_new = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "/apis/cert-manager.io/v1/clusterissuers/clusterissuer" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - kind = "ClusterIssuer" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - live_manifest_incluster = (sensitive value) -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - live_uid = "0098f82c-b5f2-4c51-bf2f-e1bd670a3737" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "clusterissuer" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - server_side_apply = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "0098f82c-b5f2-4c51-bf2f-e1bd670a3737" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - validate_schema = true -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_rollout = true -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_body = (sensitive value) -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_body_parsed = <<-EOT +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  apiVersion: cert-manager.io/v1 +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  kind: ClusterIssuer +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  metadata: +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  name: clusterissuer +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  spec: +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  ca: +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  secretName: ca-key-pair +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - yaml_incluster = (sensitive value) -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubernetes_namespace.cert_manager will be destroyed +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubernetes_namespace" "cert_manager" { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_default_service_account = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - metadata { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - annotations = {} -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - generation = 0 -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - labels = {} -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "cert-manager" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource_version = "2533" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "b8d5bbdc-a1a6-4bac-88a9-4f1848e0ac3b" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # kubernetes_secret.ca_key_pair will be destroyed +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "kubernetes_secret" "ca_key_pair" { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - binary_data = (sensitive value) -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - data = (sensitive value) -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "cert-manager/ca-key-pair" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - immutable = false -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - type = "Opaque" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - wait_for_service_account_token = true -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - metadata { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - annotations = {} -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - generation = 0 -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - labels = {} -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - name = "ca-key-pair" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - namespace = "cert-manager" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource_version = "2543" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - uid = "869445dd-f6c4-43b5-ae5c-aa7b8c11d811" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # (1 unchanged attribute hidden) +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"] will be destroyed +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - rules = [ +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - action = { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - selection = { +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.829 STDOUT [eks-cert-manager] terraform_current:  }, +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"] will be destroyed +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"] will be destroyed +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"] will be destroyed +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_lifecycle_policy" "images_all" { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - policy = jsonencode( +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rules = [ +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - action = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - type = "expire" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - description = "keep 5 images" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - rulePriority = 1 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - selection = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countNumber = 5 +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - countType = "imageCountMoreThan" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tagStatus = "any" +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  }, +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ] +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  ) -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"] will be destroyed +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-cainjector" -> null +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - tags = { +19:57:38.830 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-cainjector" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-cainjector" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"] will be destroyed +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-controller" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags = { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-controller" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-controller" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"] will be destroyed +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags = { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { +19:57:38.831 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"] will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_ecr_repository" "image_repos" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:ecr:us-gov-east-1:224384469011:repository/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - force_delete = true -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_tag_mutability = "IMMUTABLE" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - name = "platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - registry_id = "224384469011" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - repository_url = "224384469011.dkr.ecr.us-gov-east-1.amazonaws.com/platform-eng-eks-mcm/jetstack/cert-manager-webhook" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - tags = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-webhook" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - tags_all = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Environment" = "application" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Name" = "ecr_platform-eng-eks-mcm/jetstack/cert-manager-webhook" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Organization" = "census:ocio:csvd" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Terraform" = "true" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "Terragrunt" = "true" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:created_by" = "terraform" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_name" = "aws-ecr-copy-images" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "boc:tf_module_version" = "2.2.2" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - encryption_configuration { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - encryption_type = "KMS" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - kms_key = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/fd2f3d15-890f-46ff-96f4-5bb201bff33c" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - image_scanning_configuration { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - scan_on_push = true -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"] will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "2605876329532083347" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"] will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "2232048202721537040" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"] will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "6900975909197805264" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"] will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "null_resource" "copy_images" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - id = "5737089486470790152" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - triggers = { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - "region" = "us-gov-east-1" +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate will be destroyed +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - resource "aws_acmpca_certificate" "certificate" { +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - arn = "arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020" -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - certificate = <<-EOT +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MIIFLTCCAxWgAwIBAgIQTKJiJ5KAUWQYMbzZ64QgIDANBgkqhkiG9w0BAQwFADBk +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MQswCQYDVQQGEwJVUzEbMBkGA1UEChMSVS5TLiBDZW5zdXMgQnVyZWF1MQwwCgYD +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  VQQLEwNQS0kxKjAoBgNVBAMTIVVTIENlbnN1cyBCdXJlYXUgQVdTIExhYiB1Z2Ux +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  IENBMTAeFw0yNDA5MDYyMjIyMzFaFw0yNTA5MDYyMzIyMzBaMGcxCzAJBgNVBAYT +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  AlVTMRswGQYDVQQKExJVLlMuIENlbnN1cyBCdXJlYXUxEDAOBgNVBAsTB1BLSS1F +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  S1MxKTAnBgNVBAMTIHVnZTEgcGxhdGZvcm0tZW5nLWVrcy1tY20gSXNzdWVyMIIB +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6DU8ZcRedb/rwbFWrn7XBYpH +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  FSaGgTCCN68DGPsjoiThCo7NUn2k5WzPgCsfXWYEc3tMEmUWk/z7oFp0WrD89mPN +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  HByyAQNr7h2fW5h55T0A0OLn1wxJrw/1HzJEZno73kRnbsN+0094KQ/dFD+Oqh8E +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  1WEOaZvZdfT7/VCm8a/ycVRWAcvF9U1LTgRawpkRqN7ddLzT2CICBxiQIWUQxeh0 +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  Ztc84DSemOTUHFPgbG/0ThEkseI1Za1ZHt6AOqAr0xX3o1Jh9M5TlC8VAk3iaO3p +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  kah0TmmBI/zSbxvSsfBYvF9Ms0b5rF0nb1s7FjBQSWyEL5VQ5eAfhMhRdFzf/QID +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  AQABo4HXMIHUMBIGA1UdEwEB/wQIMAYBAf8CAQAwHwYDVR0jBBgwFoAUBOav+Lwa +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  3brgrfOD4xjQAf8wVPEwHQYDVR0OBBYEFBQFbFadZMVMZ84uqsycTtrkImjeMA4G +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  A1UdDwEB/wQEAwIBhjBuBgNVHR8EZzBlMGOgYaBfhl1odHRwOi8vY3JsLmNhMS11 +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  Z2UxLnNlcnZpY2VzLmxhYi5jc3AyLmNlbnN1cy5nb3YvY3JsL2U5Mjg1ODdlLWMy +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  NTQtNGE4Ny1hMmMzLTMxYTk3MmU3NmQyMS5jcmwwDQYJKoZIhvcNAQEMBQADggIB +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  ALg6MNuv6sUjqyxaI7LS0MztsfWHdgllwv6Ym7ht+Mhm75JMYEns4Hzvo3p7YA4D +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  HM80JUtsPbpkfx/dR00i3CB14IXXG9qFDcQxX2I5jzBp9qdhDFtv5qpjK2wzfQ0e +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  LUP5V3x4wA631rIfzdlc2zN36ZvW9Go2mmq9AK5bPcGdxrO3D3tgNltD4k/SnugY +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  hrYikLpGYsG64dGCfQlV/MsOT2lxEudIsJj+00St2o29+G/p2WJFSo0bId4b9hN6 +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  oldH0cP3k8/UGNN0RtvYvl4vHHv5rN3VCNxidacnZfx+qY09UKdQXVoc7dkhcyWo +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  OxeKaleQtnP4mkwnTG2z5037kh2o2A5MCWbJk1+tfIs07bnVHEVNHrHH8a7SdRTC +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  MCOivSCpTeOScFgvJoG9QvjHCV97TmbzmdhqHLwL+yoaWSCxiRWVPPb3Ejlc/or6 +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  aWnDFIikqlhT7xhEo26GjbBZmEVzxgLVFW7o0yU5noAvF8ECyvS2sMMyYWyNXD4j +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  JfHuY12tXHzf06TXOWHLrvV4I+KvmzKKa5PwAcnOtEr8l4LCSUQpfbVqY2q6dN+N +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  0SWjWZGTZRYnTBTadXGG+m9E4rmuIqg6PGfhVHUy3wk00oN37DRs+M5pVuAAhwPl +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  CPoXAmYzdUL25G4eqUvsTwzHc0+aM+eHPnEhdXyKtWwP +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.832 STDOUT [eks-cert-manager] terraform_current:  - certificate_authority_arn = (sensitive value) -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - certificate_chain = <<-EOT +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIGBTCCBO2gAwIBAgITHQAAABsMiYV6sE/qtAAAAAAAGzANBgkqhkiG9w0BAQsF +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ADBpMRMwEQYKCZImiZPyLGQBGRYDZ292MRYwFAYKCZImiZPyLGQBGRYGY2Vuc3Vz +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MRMwEQYKCZImiZPyLGQBGRYDZWFkMSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  IExBQiBDQSBTdWIxMB4XDTI0MDMwNTIxMTI1N1oXDTI2MDMwNTIxMTI1N1owZDEL +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3VzIEJ1cmVhdTEMMAoGA1UE +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CxMDUEtJMSowKAYDVQQDEyFVUyBDZW5zdXMgQnVyZWF1IEFXUyBMYWIgdWdlMSBD +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  QTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDpDDwrxM3gdUOcgkRw +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  jl4XcWB/w9Fo/+cM2FcVpR6phaRn44cG6NE/vCEt8qcDWf54wvtCQR+EKtnZhy7J +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Wo7WBsLFV/j7Mo6gJ/Z2S4do8TQTATSCpfcibdlQjPTUYZH6VHoZ/VN8IeKacebB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  yyDgxbB8xCRC9GATuvDNcab9bVWrJvannyQWaml6x9zrdcoYULXeU2EFUemyODK3 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  a7f6Wm//dPzLSeUWENVn/szAX12QswAp14b52h8o7JEDkRBPwGja5DEDzVaHQlHU +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5o+3mt0caZy1Ngr7lQUO7f9Uq1XRjUrgDF1XCv4HB0FX9n2XSYit1Bf/kuOydNn5 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  J1tSzsB0GNBPrU8QHXhIPxf4XqalhHCCMJ06ruh5Jdsyjh7hz/YxwgTWgcRgPyrG +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  dg6jglG3NUZs+61OPPzC40Le7027NbW0K2OeB07ppoJmJdLoWBwHHq0JKR3CFSjj +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5+DLMErqGgEIwgGzrE4aTiexciv2cusiliznfpOl0ayrMpN8J/ao2/f1ydJNHBG0 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  TUh/04gSuxW+XbwVL1JEuhqfVu4Wm4FYaf9GiKi3YXdkH0rnmuo3tr3ha/rwK4VW +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  7oIRHtQIHCam2rlDQcRZPZLQ9cgfVpgrc0LGEJqkEonPukCn67IuiC5XFmLgwepu +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  W3fcoNQbzG4ee1LvmgxaUMFOSwIDAQABo4IBqTCCAaUwDwYDVR0TAQH/BAUwAwEB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  /zAdBgNVHQ4EFgQUBOav+Lwa3brgrfOD4xjQAf8wVPEwHwYDVR0jBBgwFoAUUUW5 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Srfrs/8PDbuag0EDT4eEYQYwYwYDVR0fBFwwWjBYoFagVIZSaHR0cDovL3BraWxh +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Yi50Y28uY2Vuc3VzLmdvdi9DZXJ0RW5yb2xsL1VTJTIwQ2Vuc3VzJTIwQnVyZWF1 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  JTIwTEFCJTIwQ0ElMjBTdWIxLmNybDCBnwYIKwYBBQUHAQEEgZIwgY8wXgYIKwYB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BQUHMAKGUmh0dHA6Ly9wa2lsYWIudGNvLmNlbnN1cy5nb3YvQ2VydEVucm9sbC9V +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  UyUyMENlbnN1cyUyMEJ1cmVhdSUyMExBQiUyMENBJTIwU3ViMS5jcnQwLQYIKwYB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BQUHMAGGIWh0dHA6Ly9wa2lsYWIudGNvLmNlbnN1cy5nb3Yvb2NzcDAOBgNVHQ8B +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Af8EBAMCAYYwOwYJKwYBBAGCNxUHBC4wLAYkKwYBBAGCNxUIgsWocoS3x02FpZM6 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  g730MYeJ81kupIYlquFUAgFkAgECMA0GCSqGSIb3DQEBCwUAA4IBAQCMqDYPtg8q +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BOQHE/eol1ADAhfv0YLOi9hyyBFhx0FzoGykewMsPTrnqzKzbEwHJ2+DozLstN+v +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  9dBu+X7KigaA/4d/tGwigFyMwatHOmpNUPdVx6jYXsEWRo4iVRD4PnNGI0MyPY+E +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  +42PIjf+MrSWEGADJNC2yH1Wh7ufmA7y1m559fayjBftSv5dFozeVVbd7f2f2A70 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5t7yPsQ5SOjhltTA4nkJNCkz5Q3U9GY3t2ndJQBZUeuJK76GXUuqTGmyTEZrNDrC +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CcbiV0mhZPwWo7nOcQ6XVzaw3QBvyr3ymePbffos+sHIxisJcxFmrB6rVk5gbMVB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  zypvBHAkVAeP +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIEfTCCA2WgAwIBAgITGwAAAAYT1yV2z7sOjgAAAAAABjANBgkqhkiG9w0BAQsF +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ADAnMSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1IExhYiBSb290IENBMB4XDTIx +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MTEyNjIwMTYxOVoXDTI2MTEyNjIwMjYxOVowaTETMBEGCgmSJomT8ixkARkWA2dv +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  djEWMBQGCgmSJomT8ixkARkWBmNlbnN1czETMBEGCgmSJomT8ixkARkWA2VhZDEl +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MCMGA1UEAxMcVVMgQ2Vuc3VzIEJ1cmVhdSBMQUIgQ0EgU3ViMTCCASIwDQYJKoZI +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  hvcNAQEBBQADggEPADCCAQoCggEBAKrCmRIvbSY/bdBqsyWoFz48+6wOO7ogTjOy +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  gq4Wg9u+aCo/Q8GRqJblXlwoi4gwFkkuUWzYNo8AqOOKja963vWNEMoGbBxSuD2y +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cuil9lH8Jj3IzXfRk/GxrvUdDS5Py44BkuxDgGHf+bH0oqR8cnSetRRG4QTNYaiX +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  eamnFDZ+eTvMIUGR2POWW2ug/7Q7XhFqjgbQmiBc5CAM5cEOTv5PxYwasukhfh+N +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  qla3eGFAoBNcExPM6P3HC3BEc6XGPV3C/zGyUCx8C9/NQJg4P/5fzbD6fbvi4QT0 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cjN04wycaPrtbFGvFfx0hPIiGe8wx2AwKOLNFY0x5Dev6i9/XmkCAwEAAaOCAV4w +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  ggFaMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRRRblKt+uz/w8Nu5qDQQNP +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  h4RhBjAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS4tDTlYPaCI9CLxl/V9DgWkf1rRzBg +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BgNVHR8EWTBXMFWgU6BRhk9odHRwOi8vcGtpLnRjby5jZW5zdXMuZ292L0NlcnRF +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bnJvbGwvVVMlMjBDZW5zdXMlMjBCdXJlYXUlMjBMYWIlMjBSb290JTIwQ0EuY3Js +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MGsGCCsGAQUFBwEBBF8wXTBbBggrBgEFBQcwAoZPaHR0cDovL3BraS50Y28uY2Vu +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  c3VzLmdvdi9DZXJ0RW5yb2xsL1VTJTIwQ2Vuc3VzJTIwQnVyZWF1JTIwTGFiJTIw +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Um9vdCUyMENBLmNydDANBgkqhkiG9w0BAQsFAAOCAQEAfmW2+ziP9KZROJCRLqCp +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  CrGp/1SSaB0ujzWQsptkPuRPeANxjHckpuwoyI79/x8N/U5ms07huAmIPkQCTZ9X +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  N9seXVWpC13/KHpyAL39yi2FFrusdhWs2KzTK1VJ0j/zezxEmo74SH/xVhgWgmk0 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  asuYCFrnrjQuBE8HeulkLdJaP0FEjHfjtyS3jpobXonEqL1n26R+2dUf3NmMCkeU +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  n6BRAgntlwRkcN1vsaNfkmAEY6G8+4pjq5Nsw+/VPu/QryXqr9REcG61ZsVGPDE4 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  xbjL7J7IPjhShfwUPkjPwavjrgMSG6zhnvCIB3goOKNw1C4I/xvEwMDVUmxdQkOi +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  +g== +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIIDKTCCAhGgAwIBAgIQcOQ4n0XKkatBwiq9ZSN+PDANBgkqhkiG9w0BAQsFADAn +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MSUwIwYDVQQDExxVUyBDZW5zdXMgQnVyZWF1IExhYiBSb290IENBMB4XDTIxMDEy +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  NTE1MjMyN1oXDTMxMDEyNTE1MzMyNFowJzElMCMGA1UEAxMcVVMgQ2Vuc3VzIEJ1 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  cmVhdSBMYWIgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  AOLx6Ja6IHWtN/LhfNBJI/xVcE9sFhDzhWrevbCl1Yjm/4o2mPl4xa3D8XqsPwHd +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  2U5tekSUHQaKbNpUpNrKmjPnvW3CoddP+pnGvEnngG1ufkjFj58Oc8s48mJZd79j +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BDfe7HohLTA6eCrYUvftPLv408ZSeCRIJEinokiS5TEBCie0Sg7qthSxOeBAdfmY +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  R48jrDE1aeu0RCZoQOj9eGLCUOGpQf8FDCe7kzOeAZQtpGXIaoZyJ1H0iZJ/1Tss +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  KCwqN43LfIdFoPmdJqVxcSFUMnzA+TI7oZc7Omih3EP6kWtTC/snUHk2dApANdL6 +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  fmVTntPAmKS+UKzU3flYEt8CAwEAAaNRME8wCwYDVR0PBAQDAgGGMA8GA1UdEwEB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  /wQFMAMBAf8wHQYDVR0OBBYEFLi0NOVg9oIj0IvGX9X0OBaR/WtHMBAGCSsGAQQB +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  gjcVAQQDAgEAMA0GCSqGSIb3DQEBCwUAA4IBAQBzBeiQ6mFoGfUSYE+JFwsG4+sQ +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  7673ysWEN+3ZpQibkzVuTCKMv/2h1HaspX7UBpbjlFI2OCfPk3vF71rXE9T458+H +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5/FzeWrgBaSwglIotNwV17ObaHtVFjtkOHo5Tm5DW28Xf1bskkez8cIo2mgPqSxX +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  5SN2P3eW4nj95mqNN/LOOybBoHbWaIZPy5R74QweJ/rPVYpex9psD5lSoJxgjZcr +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  wVXx/61oHNfghAB1xQu3z3COHUKq8xszlOeb3KxxRPLPW28Ue4FvWYosaVMOo6eu +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  FSIHxFZu9sxCG2fhS0VgYEFWuXnfYGn8gBE3tbFZxnJklnnzPmnNUXGpurgE +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - certificate_signing_request = <<-EOT +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE REQUEST----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIICrDCCAZQCAQAwZzELMAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3Vz +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  IEJ1cmVhdTEQMA4GA1UECxMHUEtJLUVLUzEpMCcGA1UEAxMgdWdlMSBwbGF0Zm9y +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bS1lbmctZWtzLW1jbSBJc3N1ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  AoIBAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+A +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  Kx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/Uf +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtO +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  BFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdv +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  WzsWMFBJbIQvlVDl4B+EyFF0XN/9AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  KLfR5S5rDetfEuQjRWokkA8B9iF0PRfAyRcdTLxsN81skAyjRfpzTl/pbPZDEt0T +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  rGZf46C8IoPkAyaiTC1fqyEhnwkqE3g9CaGJK/watA9gsum5+Dk1Q9p3MyijqOSn +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  eherNpXl7B6KzKjQ2ASzfxEwWSCuQa9j1Lkk6+jdhXedqQW9UNyos1MJk5VKZKDg +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  zDi9KMy26geUdFvpZ9++hh+R5qd0JaWsIb2Ml+xmh6Gme3oidKLhV3kmeExDX7iJ +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  QO1Zui0cYtDgNftm5t7uPFvBNIR97hgklFn+3LxBVxGQE0nsN3/HV9bgfCwGcPka +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  bGTYXnS0SDFxNU0NjSvg9w== +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE REQUEST----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - id = "arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020" -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - signing_algorithm = "SHA384WITHRSA" -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - template_arn = (sensitive value) -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - validity { +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - type = "DAYS" -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - value = "365" -> null +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.tls_cert_request.certificate will be destroyed +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - resource "tls_cert_request" "certificate" { +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  - cert_request_pem = <<-EOT +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN CERTIFICATE REQUEST----- +19:57:38.833 STDOUT [eks-cert-manager] terraform_current:  MIICrDCCAZQCAQAwZzELMAkGA1UEBhMCVVMxGzAZBgNVBAoTElUuUy4gQ2Vuc3Vz +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  IEJ1cmVhdTEQMA4GA1UECxMHUEtJLUVLUzEpMCcGA1UEAxMgdWdlMSBwbGF0Zm9y +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  bS1lbmctZWtzLW1jbSBJc3N1ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  AoIBAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+A +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  Kx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/Uf +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  MkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtO +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  BFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdv +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  WzsWMFBJbIQvlVDl4B+EyFF0XN/9AgMBAAGgADANBgkqhkiG9w0BAQsFAAOCAQEA +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  KLfR5S5rDetfEuQjRWokkA8B9iF0PRfAyRcdTLxsN81skAyjRfpzTl/pbPZDEt0T +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  rGZf46C8IoPkAyaiTC1fqyEhnwkqE3g9CaGJK/watA9gsum5+Dk1Q9p3MyijqOSn +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  eherNpXl7B6KzKjQ2ASzfxEwWSCuQa9j1Lkk6+jdhXedqQW9UNyos1MJk5VKZKDg +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  zDi9KMy26geUdFvpZ9++hh+R5qd0JaWsIb2Ml+xmh6Gme3oidKLhV3kmeExDX7iJ +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  QO1Zui0cYtDgNftm5t7uPFvBNIR97hgklFn+3LxBVxGQE0nsN3/HV9bgfCwGcPka +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  bGTYXnS0SDFxNU0NjSvg9w== +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----END CERTIFICATE REQUEST----- +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - dns_names = [] -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - id = "64d67b231f99677dca495c34e105cc607fd6fb57" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - ip_addresses = [] -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - key_algorithm = "RSA" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem = (sensitive value) -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - uris = [] -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - subject { +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - common_name = "uge1 platform-eng-eks-mcm Issuer" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - country = "US" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - organization = "U.S. Census Bureau" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - organizational_unit = "PKI-EKS" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  # module.subordinate_ca.module.certificate.tls_private_key.certificate will be destroyed +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - resource "tls_private_key" "certificate" { +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - algorithm = "RSA" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - ecdsa_curve = "P224" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - id = "ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_openssh = (sensitive value) -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem = (sensitive value) -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - private_key_pem_pkcs8 = (sensitive value) -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_fingerprint_md5 = "75:af:85:36:87:41:a7:e6:da:d8:40:94:0a:92:c9:68" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_fingerprint_sha256 = "SHA256:TVuwWEMd0s3nqCHfp5zWj+pA23hz5SKWHkZ6N2Kh2YE" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_openssh = <<-EOT +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDoNTxlxF51v+vBsVauftcFikcVJoaBMII3rwMY+yOiJOEKjs1SfaTlbM+AKx9dZgRze0wSZRaT/PugWnRasPz2Y80cHLIBA2vuHZ9bmHnlPQDQ4ufXDEmvD/UfMkRmejveRGduw37TT3gpD90UP46qHwTVYQ5pm9l19Pv9UKbxr/JxVFYBy8X1TUtOBFrCmRGo3t10vNPYIgIHGJAhZRDF6HRm1zzgNJ6Y5NQcU+Bsb/ROESSx4jVlrVke3oA6oCvTFfejUmH0zlOULxUCTeJo7emRqHROaYEj/NJvG9Kx8Fi8X0yzRvmsXSdvWzsWMFBJbIQvlVDl4B+EyFF0XN/9 +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - public_key_pem = <<-EOT +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----BEGIN PUBLIC KEY----- +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6DU8ZcRedb/rwbFWrn7X +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  BYpHFSaGgTCCN68DGPsjoiThCo7NUn2k5WzPgCsfXWYEc3tMEmUWk/z7oFp0WrD8 +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  9mPNHByyAQNr7h2fW5h55T0A0OLn1wxJrw/1HzJEZno73kRnbsN+0094KQ/dFD+O +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  qh8E1WEOaZvZdfT7/VCm8a/ycVRWAcvF9U1LTgRawpkRqN7ddLzT2CICBxiQIWUQ +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  xeh0Ztc84DSemOTUHFPgbG/0ThEkseI1Za1ZHt6AOqAr0xX3o1Jh9M5TlC8VAk3i +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  aO3pkah0TmmBI/zSbxvSsfBYvF9Ms0b5rF0nb1s7FjBQSWyEL5VQ5eAfhMhRdFzf +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  /QIDAQAB +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  -----END PUBLIC KEY----- +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  EOT -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - rsa_bits = 2048 -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  } +19:57:38.834 STDOUT [eks-cert-manager] terraform_current: Plan: 0 to add, 0 to change, 19 to destroy. +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  +19:57:38.834 STDOUT [eks-cert-manager] terraform_current: Changes to Outputs: +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - cluster_issuer_name = "cert-manager" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - module_name = "tfmod-cert-mgr" -> null +19:57:38.834 STDOUT [eks-cert-manager] terraform_current:  - module_version = "0.0.2" -> null +19:57:39.447 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Destroying... [id=/apis/cert-manager.io/v1/clusterissuers/clusterissuer] +19:57:40.304 STDOUT [eks-cert-manager] terraform_current: kubectl_manifest.clusterissuer: Destruction complete after 1s +19:57:40.309 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Destroying... [id=cert-manager/ca-key-pair] +19:57:40.312 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Destroying... [id=cert-manager] +19:57:41.171 STDOUT [eks-cert-manager] terraform_current: kubernetes_secret.ca_key_pair: Destruction complete after 1s +19:57:41.180 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Destroying... [id=arn:aws-us-gov:acm-pca:us-gov-east-1:269222635945:certificate-authority/e928587e-c254-4a87-a2c3-31a972e76d21/certificate/4ca26227928051641831bcd9eb842020] +19:57:41.409 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.aws_acmpca_certificate.certificate: Destruction complete after 0s +19:57:41.412 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Destroying... [id=64d67b231f99677dca495c34e105cc607fd6fb57] +19:57:41.413 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_cert_request.certificate: Destruction complete after 0s +19:57:41.414 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Destroying... [id=ae6e5b5654c32ad1098e6ad42a22c7d99cf18f23] +19:57:41.415 STDOUT [eks-cert-manager] terraform_current: module.subordinate_ca.module.certificate.tls_private_key.certificate: Destruction complete after 0s +19:57:46.620 STDOUT [eks-cert-manager] terraform_current: helm_release.cert_manager: Destruction complete after 7s +19:57:46.621 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] +19:57:46.622 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Destroying... [id=6900975909197805264] +19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Destroying... [id=5737089486470790152] +19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] +19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Destroying... [id=2605876329532083347] +19:57:46.627 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Destroying... [id=cert-manager] +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-webhook#v1.15.1"]: Destruction complete after 0s +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-startupapicheck#v1.15.1"]: Destruction complete after 0s +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Destroying... [id=2232048202721537040] +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] +19:57:46.628 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-cainjector#v1.15.1"]: Destruction complete after 0s +19:57:46.629 STDOUT [eks-cert-manager] terraform_current: module.images.null_resource.copy_images["jetstack/cert-manager-controller#v1.15.1"]: Destruction complete after 0s +19:57:46.766 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-controller"]: Destruction complete after 0s +19:57:46.772 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-startupapicheck"]: Destruction complete after 0s +19:57:46.773 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-webhook"]: Destruction complete after 0s +19:57:46.773 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_lifecycle_policy.images_all["jetstack/cert-manager-cainjector"]: Destruction complete after 0s +19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-controller] +19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-cainjector] +19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-startupapicheck] +19:57:46.775 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Destroying... [id=platform-eng-eks-mcm/jetstack/cert-manager-webhook] +19:57:46.972 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-webhook"]: Destruction complete after 0s +19:57:46.973 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-startupapicheck"]: Destruction complete after 0s +19:57:46.976 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-controller"]: Destruction complete after 0s +19:57:46.979 STDOUT [eks-cert-manager] terraform_current: module.images.aws_ecr_repository.image_repos["jetstack/cert-manager-cainjector"]: Destruction complete after 0s +19:57:53.076 STDOUT [eks-cert-manager] terraform_current: kubernetes_namespace.cert_manager: Destruction complete after 6s +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: ╷ +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ Warning: Helm uninstall returned an information message +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │  +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ These resources were kept due to the resource policy: +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] certificaterequests.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] certificates.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] challenges.acme.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] clusterissuers.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] issuers.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │ [CustomResourceDefinition] orders.acme.cert-manager.io +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: │  +19:57:53.249 STDOUT [eks-cert-manager] terraform_current: ╵ +19:57:53.312 STDOUT [eks-cert-manager] terraform_current:  +19:57:53.312 STDOUT [eks-cert-manager] terraform_current: Destroy complete! Resources: 19 destroyed. +19:57:53.312 STDOUT [eks-cert-manager] terraform_current:  +19:58:03.325 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Reading... +19:58:03.325 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Reading... +19:58:03.325 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Reading... +19:58:03.325 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Reading... +19:58:03.325 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Reading... +19:58:03.325 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Reading... +19:58:03.325 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Reading... +19:58:03.325 STDOUT [eks] terraform_current: data.aws_region.current: Reading... +19:58:03.325 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Reading... +19:58:03.327 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Reading... +19:58:03.329 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:03.329 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_partition.current[0]: Read complete after 0s [id=aws-us-gov] +19:58:03.329 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.329 STDOUT [eks] terraform_current: data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.330 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Reading... +19:58:03.330 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Reading... +19:58:03.331 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/platform-eng-eks-mcm/cluster] +19:58:03.331 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:03.331 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Reading... +19:58:03.334 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Reading... +19:58:03.334 STDOUT [eks] terraform_current: module.cluster.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:03.334 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Reading... +19:58:03.335 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.efs_csi[0]: Read complete after 0s [id=3064053908] +19:58:03.337 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Reading... +19:58:03.337 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:03.338 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Reading... +19:58:03.338 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.339 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Reading... +19:58:03.340 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:03.340 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Reading... +19:58:03.341 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.342 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Reading... +19:58:03.357 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_caller_identity.current[0]: Read complete after 0s [id=224384469011] +19:58:03.358 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Reading... +19:58:03.387 STDOUT [eks] terraform_current: data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.390 STDOUT [eks] terraform_current: aws_vpc.vpc: Refreshing state... [id=vpc-06a2a192783bb40aa] +19:58:03.418 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.418 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Reading... +19:58:03.420 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_region.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.421 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Reading... +19:58:03.423 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2764486067] +19:58:03.446 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001] +19:58:03.448 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.450 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.452 STDOUT [eks] terraform_current: data.aws_arn.current: Reading... +19:58:03.453 STDOUT [eks] terraform_current: data.aws_arn.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:58:03.453 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004] +19:58:03.454 STDOUT [eks] terraform_current: module.cluster.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.455 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Reading... +19:58:03.457 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.vpc_cni[0]: Read complete after 0s [id=3004485257] +19:58:03.459 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Reading... +19:58:03.460 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:03.465 STDOUT [eks] terraform_current: data.aws_ebs_default_kms_key.current: Read complete after 0s [id=us-gov-east-1] +19:58:03.466 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.ebs_csi[0]: Read complete after 0s [id=4196553001] +19:58:03.674 STDOUT [eks] terraform_current: data.aws_iam_roles.roles: Read complete after 1s [id=us-gov-east-1] +19:58:03.815 STDOUT [eks] terraform_current: data.aws_vpc.eks_vpc: Read complete after 1s [id=vpc-0280f77b373744eaa] +19:58:03.920 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Reading... +19:58:03.920 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003] +19:58:03.923 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Reading... +19:58:03.924 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Reading... +19:58:03.928 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Reading... +19:58:03.940 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Reading... +19:58:04.029 STDOUT [eks] terraform_current: data.aws_kms_key.ebs_key: Read complete after 0s [id=e0543b2b-c3f1-49a5-bfa7-87eec859be03] +19:58:04.031 STDOUT [eks] terraform_current: data.aws_subnets.container_subnets: Read complete after 0s [id=us-gov-east-1] +19:58:04.031 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002] +19:58:04.037 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Refreshing state... [id=sg-0117da2c13b4caf21] +19:58:04.041 STDOUT [eks] terraform_current: module.cluster.data.aws_iam_session_context.current: Read complete after 0s [id=arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/morga471] +19:58:04.042 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Refreshing state... [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:04.048 STDOUT [eks] terraform_current: data.aws_subnets.subnets: Read complete after 0s [id=us-gov-east-1] +19:58:04.049 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Refreshing state... [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:04.052 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Refreshing state... [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:04.098 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Refreshing state... [id=sg-0b4880f2bae65a949] +19:58:04.101 STDOUT [eks] terraform_current: data.aws_subnets.lb_subnets: Read complete after 0s [id=us-gov-east-1] +19:58:04.101 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Refreshing state... [id=sg-0ebcc111357300f20] +19:58:04.111 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Reading... +19:58:04.113 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Reading... +19:58:04.133 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Reading... +19:58:04.149 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Reading... +19:58:04.152 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009] +19:58:04.181 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008] +19:58:04.189 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-078b228071c609a50"]: Read complete after 0s [id=subnet-078b228071c609a50] +19:58:04.190 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Refreshing state... [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] +19:58:04.197 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Refreshing state... [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] +19:58:04.250 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Refreshing state... [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] +19:58:04.261 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-07a6339be3670fb41"]: Read complete after 0s [id=subnet-07a6339be3670fb41] +19:58:04.261 STDOUT [eks] terraform_current: data.aws_subnet.subnets["subnet-02c2250b9ec2dd6a2"]: Read complete after 0s [id=subnet-02c2250b9ec2dd6a2] +19:58:04.265 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Reading... +19:58:04.265 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Reading... +19:58:04.267 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_partition.current: Read complete after 0s [id=aws-us-gov] +19:58:04.271 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Refreshing state... [id=sg-0fac44214371189c5] +19:58:04.276 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Refreshing state... [id=sgrule-2139797237] +19:58:04.277 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Refreshing state... [id=sgrule-2399073099] +19:58:04.292 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Reading... +19:58:04.296 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Refreshing state... [id=sgrule-155164117] +19:58:04.296 STDOUT [eks] terraform_current: module.cluster.module.kms.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2915671129] +19:58:04.299 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Refreshing state... [id=sgrule-1825999572] +19:58:04.301 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_caller_identity.current: Read complete after 0s [id=224384469011] +19:58:04.302 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Refreshing state... [id=sgrule-1028926182] +19:58:04.309 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Refreshing state... [id=sgrule-1630915307] +19:58:04.362 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Refreshing state... [id=sgrule-142063903] +19:58:04.413 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Refreshing state... [id=sgrule-2908765754] +19:58:04.418 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Refreshing state... [id=sgrule-3683901971] +19:58:04.426 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Refreshing state... [id=sgrule-3066614115] +19:58:04.433 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Reading... +19:58:04.433 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Refreshing state... [id=sgrule-2999123215] +19:58:04.434 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].data.aws_iam_policy_document.assume_role_policy[0]: Read complete after 0s [id=2560088296] +19:58:04.437 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Refreshing state... [id=548a1f15-3b65-467e-b6cf-4e1aa13bb9fc] +19:58:04.451 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007] +19:58:04.483 STDOUT [eks] terraform_current: data.aws_vpc.dummy_vpc[0]: Read complete after 0s [id=vpc-06a2a192783bb40aa] +19:58:04.485 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Refreshing state... [id=Z0123131367CLDFLTDGZ4] +19:58:04.581 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Refreshing state... [id=alias/eks/platform-eng-eks-mcm] +19:58:04.582 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e] +19:58:04.583 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Refreshing state... [id=platform-eng-eks-mcm] +19:58:04.798 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Refreshing state... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f] +19:58:04.803 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b] +19:58:04.803 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a] +19:58:04.804 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Refreshing state... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c] +19:58:04.851 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] +19:58:04.852 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] +19:58:04.852 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] +19:58:04.854 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] +19:58:04.906 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Refreshing state... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] +19:58:04.909 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Reading... +19:58:04.909 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,CostAllocation] +19:58:04.914 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:created_by] +19:58:05.047 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,cluster:size] +19:58:05.053 STDOUT [eks] terraform_current: module.cluster.data.tls_certificate.this[0]: Read complete after 0s [id=a7b75161712f0d7327a9fabac7ee5068c8ef141d] +19:58:05.054 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,slim:schedule] +19:58:05.056 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,Environment] +19:58:05.067 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,eks-cluster-name] +19:58:05.114 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:tf_module_name] +19:58:05.122 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Refreshing state... [id=sg-08e15e3b8fb3384d2,boc:tf_module_version] +19:58:05.133 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Refreshing state... [id=2024-09-06T23:19:27Z] +19:58:05.139 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Refreshing state... [id=sgrule-3033127033] +19:58:05.162 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926] +19:58:05.169 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Refreshing state... [id=4612407423035214643] +19:58:05.188 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Refreshing state... [id=lt-0cab502ac2f52bb98] +19:58:05.279 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +19:58:05.279 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +19:58:05.282 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +19:58:05.282 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Reading... +19:58:05.282 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3292555451] +19:58:05.283 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3983450380] +19:58:05.283 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=4013958737] +19:58:05.283 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=1901716639] +19:58:05.283 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability] +19:58:05.286 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-ebs-csi-driver] +19:58:05.286 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-efs-csi-driver] +19:58:05.287 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Refreshing state... [id=platform-eng-eks-mcm-vpc-cni] +19:58:05.328 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Refreshing state... [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017] +19:58:05.596 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Refreshing state... [id=platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011] +19:58:05.601 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Refreshing state... [id=platform-eng-eks-mcm-vpc-cni-20240906231859418300000013] +19:58:05.612 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Refreshing state... [id=platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010] +19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Reading... +19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Reading... +19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Reading... +19:58:05.622 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Reading... +19:58:05.642 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Reading... +19:58:05.700 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Reading... +19:58:05.701 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Reading... +19:58:05.723 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Reading... +19:58:05.801 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["eks-pod-identity-agent"]: Read complete after 0s [id=eks-pod-identity-agent] +19:58:05.802 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012] +19:58:05.858 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["coredns"]: Read complete after 0s [id=coredns] +19:58:05.859 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Refreshing state... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014] +19:58:05.863 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["kube-proxy"]: Read complete after 0s [id=kube-proxy] +19:58:05.870 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["snapshot-controller"]: Read complete after 0s [id=snapshot-controller] +19:58:05.884 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["amazon-cloudwatch-observability"]: Read complete after 0s [id=amazon-cloudwatch-observability] +19:58:05.885 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-efs-csi-driver"]: Read complete after 0s [id=aws-efs-csi-driver] +19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:06.146 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Refreshing state... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:06.234 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["vpc-cni"]: Read complete after 0s [id=vpc-cni] +19:58:06.336 STDOUT [eks] terraform_current: module.cluster.data.aws_eks_addon_version.this["aws-ebs-csi-driver"]: Read complete after 0s [id=aws-ebs-csi-driver] +19:58:06.338 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Refreshing state... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] +19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Refreshing state... [id=platform-eng-eks-mcm:vpc-cni] +19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Refreshing state... [id=platform-eng-eks-mcm:aws-efs-csi-driver] +19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Refreshing state... [id=platform-eng-eks-mcm:eks-pod-identity-agent] +19:58:06.339 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Refreshing state... [id=platform-eng-eks-mcm:aws-ebs-csi-driver] +19:58:06.495 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Refreshing state... [id=platform-eng-eks-mcm:snapshot-controller] +19:58:06.496 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Refreshing state... [id=platform-eng-eks-mcm:coredns] +19:58:06.511 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Refreshing state... [id=platform-eng-eks-mcm:kube-proxy] +19:58:10.334 STDOUT [eks] terraform_current: null_resource.kube_config_create: Refreshing state... [id=1982734664315419478] +19:58:12.137 STDOUT [eks] terraform_current: Terraform used the selected providers to generate the following execution +19:58:12.137 STDOUT [eks] terraform_current: plan. Resource actions are indicated with the following symbols: +19:58:12.137 STDOUT [eks] terraform_current:  - destroy +19:58:12.137 STDOUT [eks] terraform_current: Terraform will perform the following actions: +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-02c2250b9ec2dd6a2" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-078b228071c609a50"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-078b228071c609a50" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "container_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/cluster/platform-eng-eks-mcm" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-07a6339be3670fb41" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "shared" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-01e04b945b2bfe1de" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-046047345c5af7fb1" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"] will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "lb_subnets" { +19:58:12.137 STDOUT [eks] terraform_current:  - id = "subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - key = "kubernetes.io/role/internal-nlb" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - resource_id = "subnet-0e3786cf42e38af3d" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - value = "1" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_route53_zone.cluster_domain will be destroyed +19:58:12.137 STDOUT [eks] terraform_current:  - resource "aws_route53_zone" "cluster_domain" { +19:58:12.137 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:route53:::hostedzone/Z0123131367CLDFLTDGZ4" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - comment = "platform-eng-eks-mcm EKS Cluster DNS Zone" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - force_destroy = false -> null +19:58:12.137 STDOUT [eks] terraform_current:  - id = "Z0123131367CLDFLTDGZ4" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - name_servers = [ +19:58:12.137 STDOUT [eks] terraform_current:  - "ns-0.awsdns-us-gov-00.com.", +19:58:12.137 STDOUT [eks] terraform_current:  - "ns-1024.awsdns-us-gov-00.org.", +19:58:12.137 STDOUT [eks] terraform_current:  - "ns-1536.awsdns-us-gov-00.us.", +19:58:12.137 STDOUT [eks] terraform_current:  - "ns-512.awsdns-us-gov-00.net.", +19:58:12.137 STDOUT [eks] terraform_current:  ] -> null +19:58:12.137 STDOUT [eks] terraform_current:  - primary_name_server = "ns-0.awsdns-us-gov-00.com." -> null +19:58:12.137 STDOUT [eks] terraform_current:  - tags = { +19:58:12.137 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.137 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +19:58:12.137 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.137 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.137 STDOUT [eks] terraform_current:  } -> null +19:58:12.137 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.137 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.137 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" +19:58:12.137 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.137 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.137 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.137 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.137 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.137 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.137 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.137 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.137 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.137 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.137 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.137 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.137 STDOUT [eks] terraform_current:  } -> null +19:58:12.137 STDOUT [eks] terraform_current:  - zone_id = "Z0123131367CLDFLTDGZ4" -> null +19:58:12.137 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.137 STDOUT [eks] terraform_current:  - vpc { +19:58:12.137 STDOUT [eks] terraform_current:  - vpc_id = "vpc-06a2a192783bb40aa" -> null +19:58:12.137 STDOUT [eks] terraform_current:  - vpc_region = "us-gov-east-1" -> null +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  } +19:58:12.137 STDOUT [eks] terraform_current:  # aws_security_group.additional_eks_cluster_sg will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group" "additional_eks_cluster_sg" { +19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0fac44214371189c5" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - description = "Managed by Terraform" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - egress = [ +19:58:12.138 STDOUT [eks] terraform_current:  - { +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.138 STDOUT [eks] terraform_current:  - "0.0.0.0/0", +19:58:12.138 STDOUT [eks] terraform_current:  ] +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" +19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.138 STDOUT [eks] terraform_current:  - self = false +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  }, +19:58:12.138 STDOUT [eks] terraform_current:  ] -> null +19:58:12.138 STDOUT [eks] terraform_current:  - id = "sg-0fac44214371189c5" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - ingress = [ +19:58:12.138 STDOUT [eks] terraform_current:  - { +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.138 STDOUT [eks] terraform_current:  - "148.129.0.0/16", +19:58:12.138 STDOUT [eks] terraform_current:  - "172.16.0.0/12", +19:58:12.138 STDOUT [eks] terraform_current:  - "192.168.0.0/16", +19:58:12.138 STDOUT [eks] terraform_current:  - "10.0.0.0/8", +19:58:12.138 STDOUT [eks] terraform_current:  ] +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 443 +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.138 STDOUT [eks] terraform_current:  - self = false +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 443 +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  }, +19:58:12.138 STDOUT [eks] terraform_current:  - { +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" +19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.138 STDOUT [eks] terraform_current:  - "sg-0117da2c13b4caf21", +19:58:12.138 STDOUT [eks] terraform_current:  ] +19:58:12.138 STDOUT [eks] terraform_current:  - self = false +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  }, +19:58:12.138 STDOUT [eks] terraform_current:  ] -> null +19:58:12.138 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-cluster" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags = { +19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-cluster" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-cluster" +19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  } +19:58:12.138 STDOUT [eks] terraform_current:  # aws_security_group.all_worker_mgmt will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group" "all_worker_mgmt" { +19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0117da2c13b4caf21" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - description = "Managed by Terraform" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - egress = [ +19:58:12.138 STDOUT [eks] terraform_current:  - { +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.138 STDOUT [eks] terraform_current:  - "0.0.0.0/0", +19:58:12.138 STDOUT [eks] terraform_current:  ] +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" +19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.138 STDOUT [eks] terraform_current:  - self = false +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  }, +19:58:12.138 STDOUT [eks] terraform_current:  ] -> null +19:58:12.138 STDOUT [eks] terraform_current:  - id = "sg-0117da2c13b4caf21" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - ingress = [ +19:58:12.138 STDOUT [eks] terraform_current:  - { +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.138 STDOUT [eks] terraform_current:  - "10.129.32.0/19", +19:58:12.138 STDOUT [eks] terraform_current:  ] +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.138 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "-1" +19:58:12.138 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.138 STDOUT [eks] terraform_current:  - self = false +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 0 +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  }, +19:58:12.138 STDOUT [eks] terraform_current:  ] -> null +19:58:12.138 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-all-worker-mgmt" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags = { +19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.138 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-all-worker-mgmt" +19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.138 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.138 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.138 STDOUT [eks] terraform_current:  } +19:58:12.138 STDOUT [eks] terraform_current:  # aws_security_group_rule.allow_sidecar_injection will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "allow_sidecar_injection" { +19:58:12.138 STDOUT [eks] terraform_current:  - description = "Webhook container port, from Control Plane" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - from_port = 15017 -> null +19:58:12.138 STDOUT [eks] terraform_current:  - id = "sgrule-3033127033" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0dea60d34332ea498" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - to_port = 15017 -> null +19:58:12.138 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.138 STDOUT [eks] terraform_current:  } +19:58:12.138 STDOUT [eks] terraform_current:  # aws_vpc.vpc will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_vpc" "vpc" { +19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:vpc/vpc-06a2a192783bb40aa" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - assign_generated_ipv6_cidr_block = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - cidr_block = "192.168.0.0/24" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - default_network_acl_id = "acl-01ccefcdd28c53d21" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - default_route_table_id = "rtb-0ca3e7e5feb126598" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - default_security_group_id = "sg-0618fd50cdfb33d3c" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - dhcp_options_id = "dopt-0b1d01ed725ca4b4d" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - enable_dns_hostnames = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - enable_dns_support = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - enable_network_address_usage_metrics = false -> null +19:58:12.138 STDOUT [eks] terraform_current:  - id = "vpc-06a2a192783bb40aa" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - instance_tenancy = "default" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - ipv6_netmask_length = 0 -> null +19:58:12.138 STDOUT [eks] terraform_current:  - main_route_table_id = "rtb-0ca3e7e5feb126598" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags = { +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "vpc0-dummy" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.138 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.138 STDOUT [eks] terraform_current:  - "Name" = "vpc0-dummy" +19:58:12.138 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.138 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.138 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.138 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.138 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.138 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.138 STDOUT [eks] terraform_current:  } -> null +19:58:12.138 STDOUT [eks] terraform_current:  # (4 unchanged attributes hidden) +19:58:12.138 STDOUT [eks] terraform_current:  } +19:58:12.138 STDOUT [eks] terraform_current:  # null_resource.kube_config_create will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "null_resource" "kube_config_create" { +19:58:12.138 STDOUT [eks] terraform_current:  - id = "1982734664315419478" -> null +19:58:12.138 STDOUT [eks] terraform_current:  } +19:58:12.138 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role.this[0] will be destroyed +19:58:12.138 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.138 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.138 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.138 STDOUT [eks] terraform_current:  { +19:58:12.139 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.139 STDOUT [eks] terraform_current:  - { +19:58:12.139 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:58:12.139 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.139 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.139 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:58:12.139 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:amazon-cloudwatch:cloudwatch-agent" +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.139 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.139 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  }, +19:58:12.139 STDOUT [eks] terraform_current:  ] +19:58:12.139 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  ) -> null +19:58:12.139 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.139 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess", +19:58:12.139 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy", +19:58:12.139 STDOUT [eks] terraform_current:  ] -> null +19:58:12.139 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.139 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - tags = { +19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.139 STDOUT [eks] terraform_current:  } -> null +19:58:12.139 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.139 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.139 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.139 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.139 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.139 STDOUT [eks] terraform_current:  } -> null +19:58:12.139 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ4OAQYV5YC" -> null +19:58:12.139 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"] will be destroyed +19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { +19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AWSXrayWriteOnlyAccess" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  # module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"] will be destroyed +19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "amazon_cloudwatch_observability" { +19:58:12.139 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/CloudWatchAgentServerPolicy" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.139 STDOUT [eks] terraform_current:  } +19:58:12.139 STDOUT [eks] terraform_current:  # module.cluster.aws_cloudwatch_log_group.this[0] will be destroyed +19:58:12.139 STDOUT [eks] terraform_current:  - resource "aws_cloudwatch_log_group" "this" { +19:58:12.139 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:logs:us-gov-east-1:224384469011:log-group:/aws/eks/platform-eng-eks-mcm/cluster" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - id = "/aws/eks/platform-eng-eks-mcm/cluster" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - log_group_class = "STANDARD" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - name = "/aws/eks/platform-eng-eks-mcm/cluster" -> null +19:58:12.139 STDOUT [eks] terraform_current:  - retention_in_days = 90 -> null +19:58:12.139 STDOUT [eks] terraform_current:  - skip_destroy = false -> null +19:58:12.139 STDOUT [eks] terraform_current:  - tags = { +19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.139 STDOUT [eks] terraform_current:  - "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.139 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.139 STDOUT [eks] terraform_current:  } -> null +19:58:12.139 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.139 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.139 STDOUT [eks] terraform_current:  - "Name" = "/aws/eks/platform-eng-eks-mcm/cluster" +19:58:12.139 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.139 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.139 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.139 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.139 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.139 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.139 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.139 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.139 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.140 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,CostAllocation" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "CostAllocation" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "csvd:infrastructure" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,Environment" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "Environment" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "dev" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:created_by" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:created_by" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "terraform" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:tf_module_name" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:tf_module_name" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "tfmod-eks" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,boc:tf_module_version" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "boc:tf_module_version" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "0.1.0" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,cluster:size" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "cluster:size" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "min:2-max:10-desired:2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,eks-cluster-name" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "eks-cluster-name" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "platform-eng-eks-mcm" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_ec2_tag" "cluster_primary_security_group" { +19:58:12.140 STDOUT [eks] terraform_current:  - id = "sg-08e15e3b8fb3384d2,slim:schedule" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - key = "slim:schedule" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - resource_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - value = "8:00-17:00" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["cluster_creator"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { +19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/r-inf-terraform/44c8e4d1-1cb2-d879-3039-106077cdfece" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:59Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null +19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:59Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - tags = { +19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.140 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.140 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.140 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.140 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.140 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/r-inf-terraform/{{SessionName}}" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t1"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { +19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t1_bff436a09282202c/b6c8e4d1-1cab-d5cd-4664-174f19358e27" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null +19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - tags = { +19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.140 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.140 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.140 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.140 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.140 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.140 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.140 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t1_bff436a09282202c/{{SessionName}}" -> null +19:58:12.140 STDOUT [eks] terraform_current:  } +19:58:12.140 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t2"] will be destroyed +19:58:12.140 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { +19:58:12.140 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/76c8e4d1-1cad-fcc2-5484-f0828c9a8066" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null +19:58:12.140 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null +19:58:12.140 STDOUT [eks] terraform_current:  - tags = { +19:58:12.140 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.140 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.140 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.140 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.140 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.140 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.140 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa/{{SessionName}}" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t3"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8/00c8e4d1-1c5a-98f6-acdd-02759274b1bd" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:58Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:58Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8/{{SessionName}}" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_entry.this["inf-terraform-t4"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_entry" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - access_entry_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:access-entry/platform-eng-eks-mcm/role/224384469011/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06/0cc8e4d1-1c55-bd3c-fddf-976e9d46d5a2" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:18:57Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - kubernetes_groups = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:18:57Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.141 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "STANDARD" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - user_name = "arn:aws-us-gov:sts::224384469011:assumed-role/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06/{{SessionName}}" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.059 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.059 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { +19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.098 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.098 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { +19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.358 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.358 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { +19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.034 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.034 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { +19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_access_policy_association" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - associated_at = "2024-09-06 23:19:00.952 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06 23:19:00.952 +0000 UTC" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - access_scope { +19:58:12.141 STDOUT [eks] terraform_current:  - namespaces = [] -> null +19:58:12.141 STDOUT [eks] terraform_current:  - type = "cluster" -> null +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  } +19:58:12.141 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"] will be destroyed +19:58:12.141 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.141 STDOUT [eks] terraform_current:  - addon_name = "amazon-cloudwatch-observability" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - addon_version = "v2.0.1-eksbuild.1" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/amazon-cloudwatch-observability/2ac8e4d2-2c04-6704-27b0-a1bb60118d9d" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:amazon-cloudwatch-observability" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:51Z" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.141 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.141 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.141 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.141 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.141 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.141 STDOUT [eks] terraform_current:  } -> null +19:58:12.141 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.141 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.141 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.141 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.141 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.142 STDOUT [eks] terraform_current:  } -> null +19:58:12.142 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.142 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.142 STDOUT [eks] terraform_current:  } +19:58:12.142 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"] will be destroyed +19:58:12.142 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.142 STDOUT [eks] terraform_current:  - addon_name = "aws-ebs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - addon_version = "v1.34.0-eksbuild.1" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-ebs-csi-driver/62c8e4d2-2bef-0957-943e-07efc3b80681" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-ebs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:04Z" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - tags = { +19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.142 STDOUT [eks] terraform_current:  } -> null +19:58:12.142 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.142 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.142 STDOUT [eks] terraform_current:  } -> null +19:58:12.142 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.142 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.142 STDOUT [eks] terraform_current:  } +19:58:12.142 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["aws-efs-csi-driver"] will be destroyed +19:58:12.142 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.142 STDOUT [eks] terraform_current:  - addon_name = "aws-efs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - addon_version = "v2.0.7-eksbuild.1" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-efs-csi-driver/28c8e4d2-2bf4-26d6-f4f0-ccf8aace8809" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-efs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:00Z" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -> null +19:58:12.142 STDOUT [eks] terraform_current:  - tags = { +19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.142 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.142 STDOUT [eks] terraform_current:  } -> null +19:58:12.142 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.142 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.142 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.142 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.142 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.142 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.142 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.142 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.142 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.143 STDOUT [eks] terraform_current:  } +19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["coredns"] will be destroyed +19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "coredns" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.11.3-eksbuild.1" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/coredns/5ac8e4d2-2bfa-f4ad-ab07-4e665df2f85a" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:coredns" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:01Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.143 STDOUT [eks] terraform_current:  } +19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["eks-pod-identity-agent"] will be destroyed +19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "eks-pod-identity-agent" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.3.2-eksbuild.2" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/eks-pod-identity-agent/e0c8e4d2-2bf6-9e6b-b631-4771b0216ea6" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-pod-identity-agent" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:53Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.143 STDOUT [eks] terraform_current:  } +19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["kube-proxy"] will be destroyed +19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "kube-proxy" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.30.3-eksbuild.2" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/kube-proxy/d6c8e4d2-2bf2-1909-954c-94d27c6dac91" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:kube-proxy" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:56Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.143 STDOUT [eks] terraform_current:  } +19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["snapshot-controller"] will be destroyed +19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "snapshot-controller" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v8.0.0-eksbuild.1" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/snapshot-controller/56c8e4d2-2bfb-634a-35b4-2a9352ccba8f" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:snapshot-controller" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:03Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.143 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.143 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.143 STDOUT [eks] terraform_current:  } +19:58:12.143 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_addon.this["vpc-cni"] will be destroyed +19:58:12.143 STDOUT [eks] terraform_current:  - resource "aws_eks_addon" "this" { +19:58:12.143 STDOUT [eks] terraform_current:  - addon_name = "vpc-cni" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - addon_version = "v1.18.3-eksbuild.2" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/vpc-cni/b8c8e4d2-2bef-7cd0-25c0-8093ffbfd4b0" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:vpc-cni" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:54Z" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - preserve = true -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.143 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.143 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.143 STDOUT [eks] terraform_current:  } -> null +19:58:12.143 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.143 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.143 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.143 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.143 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.143 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.143 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.144 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_eks_cluster.this[0] will be destroyed +19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_eks_cluster" "this" { +19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - bootstrap_self_managed_addons = true -> null +19:58:12.144 STDOUT [eks] terraform_current:  - certificate_authority = [ +19:58:12.144 STDOUT [eks] terraform_current:  - { +19:58:12.144 STDOUT [eks] terraform_current:  - data = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCVENDQWUyZ0F3SUJBZ0lJUGFwVFk1dHo0TTh3RFFZSktvWklodmNOQVFFTEJRQXdGVEVUTUJFR0ExVUUKQXhNS2EzVmlaWEp1WlhSbGN6QWVGdzB5TkRBNU1EWXlNekE1TlRsYUZ3MHpOREE1TURReU16RTBOVGxhTUJVeApFekFSQmdOVkJBTVRDbXQxWW1WeWJtVjBaWE13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLCkFvSUJBUUMvWnp2ZUd3YXhKU3RQUWFZRzlqS0pXbkE5MVBTeFZYaFlWTzhjMjl0aktGWUI2RjhzVjg0SC9xUnoKOWFGTGVtNEpSYUQvQzV2aVRyOTBFWUVkMGJvQytqdHl2QUJUSFNzUVRqM3BYUWtxVTg0Z3dFVFZyWmpuUzBBYgpZbUdqYUh0ellkczhCNyt0SEZaYm9XelppL1JoeE1taTV3eTBKQzFyM0laT1NlUWQxNVYwQXlid3dTcU1pNTUrCmlDTm00aXc2d0prSUpNTlh1dGJxeFdvR1Zwa2FEUVBjTjd5dGR1eFVLcytLblBkYjU3NGRNT09FQTJNTWpwK0UKam84KzF6elJ2OHE5M2xyS1NSdFk2NjhKY2YrMGpHd3kwazNXZlpQdDVraDk5OVFlazBKc0RWZmU1TDZKV2E5ZwpRczBSaEg5REhkOVMrbDZMWWNLY08yWm1tekVOQWdNQkFBR2pXVEJYTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQCkJnTlZIUk1CQWY4RUJUQURBUUgvTUIwR0ExVWREZ1FXQkJSMDRkaUpsZUx4ZVhaWTFnYlVTK0dzSEx1amt6QVYKQmdOVkhSRUVEakFNZ2dwcmRXSmxjbTVsZEdWek1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQzdTTWQ0alAwcApIWXVzZXJWK3hHNGhoOE1hYVVacnJ6UytPcGpIMzBEbHYrTGxHeVo4U2V0L08xdGFSTGQzR2FRVTRGQkRFWGdICkliK2NWQzRsdG5IcVdnSkZpUDBCZElhNlZzRU9wQ0lUUXlGTWtOTG9wUlFiSkl0SjlGOEtXUjVZR2VQRUxUdVEKWlFGWERSNk1vUmkvclRyN0dzb1Z5NjFYSElrWTkwRC9ISkpPWEQzdHJQQTNWWGZyZ2gycGsrWVhibkhZVUlpaAo2N1JBOXpISjBHcllrQlV5ajZzTjIrejZtZHBXOFhBUzlvaHJQZFlYTU91ampqRzc2QTdtWmFZb29Rck45UEtJCndlci9kekVsK3FWdnhuUHlMd2NvRU5HVG1KUko3TWRaR04rZTVYZGpSQkFkWit0T3hPU01QNWRLUG9Hc3ZhOTMKb3RQTUZ4TktEV3hBCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" +19:58:12.144 STDOUT [eks] terraform_current:  }, +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - created_at = "2024-09-06 23:10:35.295 +0000 UTC" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - enabled_cluster_log_types = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "api", +19:58:12.144 STDOUT [eks] terraform_current:  - "audit", +19:58:12.144 STDOUT [eks] terraform_current:  - "authenticator", +19:58:12.144 STDOUT [eks] terraform_current:  - "controllerManager", +19:58:12.144 STDOUT [eks] terraform_current:  - "scheduler", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - endpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - identity = [ +19:58:12.144 STDOUT [eks] terraform_current:  - { +19:58:12.144 STDOUT [eks] terraform_current:  - oidc = [ +19:58:12.144 STDOUT [eks] terraform_current:  - { +19:58:12.144 STDOUT [eks] terraform_current:  - issuer = "https://oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:58:12.144 STDOUT [eks] terraform_current:  }, +19:58:12.144 STDOUT [eks] terraform_current:  ] +19:58:12.144 STDOUT [eks] terraform_current:  }, +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - platform_version = "eks.8" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - status = "ACTIVE" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  - version = "1.30" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - access_config { +19:58:12.144 STDOUT [eks] terraform_current:  - authentication_mode = "API_AND_CONFIG_MAP" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - bootstrap_cluster_creator_admin_permissions = false -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  - encryption_config { +19:58:12.144 STDOUT [eks] terraform_current:  - resources = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "secrets", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - provider { +19:58:12.144 STDOUT [eks] terraform_current:  - key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  - kubernetes_network_config { +19:58:12.144 STDOUT [eks] terraform_current:  - ip_family = "ipv4" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - service_ipv4_cidr = "172.20.0.0/16" -> null +19:58:12.144 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.144 STDOUT [eks] terraform_current:  - upgrade_policy { +19:58:12.144 STDOUT [eks] terraform_current:  - support_type = "EXTENDED" -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  - vpc_config { +19:58:12.144 STDOUT [eks] terraform_current:  - cluster_security_group_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - endpoint_private_access = true -> null +19:58:12.144 STDOUT [eks] terraform_current:  - endpoint_public_access = true -> null +19:58:12.144 STDOUT [eks] terraform_current:  - public_access_cidrs = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "0.0.0.0/0", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - security_group_ids = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - subnet_ids = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", +19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", +19:58:12.144 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_openid_connect_provider.oidc_provider[0] will be destroyed +19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_openid_connect_provider" "oidc_provider" { +19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - client_id_list = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "sts.amazonaws.com", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-eks-irsa" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-eks-irsa" +19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  - thumbprint_list = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "9e99a48a9960b14926bb7f3b02e22da2b0ab7280", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - url = "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_policy.cluster_encryption[0] will be destroyed +19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "cluster_encryption" { +19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null +19:58:12.144 STDOUT [eks] terraform_current:  - description = "Cluster encryption policy to allow cluster role to utilize CMK provided" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-ClusterEncryption" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.144 STDOUT [eks] terraform_current:  { +19:58:12.144 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.144 STDOUT [eks] terraform_current:  - { +19:58:12.144 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "kms:Encrypt", +19:58:12.144 STDOUT [eks] terraform_current:  - "kms:Decrypt", +19:58:12.144 STDOUT [eks] terraform_current:  - "kms:ListGrants", +19:58:12.144 STDOUT [eks] terraform_current:  - "kms:DescribeKey", +19:58:12.144 STDOUT [eks] terraform_current:  ] +19:58:12.144 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.144 STDOUT [eks] terraform_current:  - Resource = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" +19:58:12.144 STDOUT [eks] terraform_current:  }, +19:58:12.144 STDOUT [eks] terraform_current:  ] +19:58:12.144 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  ) -> null +19:58:12.144 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJVQJ4M3C2W" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.144 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.144 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.144 STDOUT [eks] terraform_current:  } -> null +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role.this[0] will be destroyed +19:58:12.144 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.144 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.144 STDOUT [eks] terraform_current:  { +19:58:12.144 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.144 STDOUT [eks] terraform_current:  - { +19:58:12.144 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRole" +19:58:12.144 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.144 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.144 STDOUT [eks] terraform_current:  - Service = "eks.amazonaws.com" +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  - Sid = "EKSClusterAssumeRole" +19:58:12.144 STDOUT [eks] terraform_current:  }, +19:58:12.144 STDOUT [eks] terraform_current:  ] +19:58:12.144 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.144 STDOUT [eks] terraform_current:  } +19:58:12.144 STDOUT [eks] terraform_current:  ) -> null +19:58:12.144 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:10:12Z" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.144 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e", +19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy", +19:58:12.144 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController", +19:58:12.144 STDOUT [eks] terraform_current:  ] -> null +19:58:12.144 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.144 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.144 STDOUT [eks] terraform_current:  - tags = { +19:58:12.144 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.144 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.144 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.144 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.144 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.144 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ6HHWK2XZX" -> null +19:58:12.145 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.145 STDOUT [eks] terraform_current:  - inline_policy { +19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.145 STDOUT [eks] terraform_current:  { +19:58:12.145 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "logs:CreateLogGroup", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - Effect = "Deny" +19:58:12.145 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  ) -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "cluster_encryption" { +19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { +19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSClusterPolicy" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { +19:58:12.145 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSVPCResourceController" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-cluster-20240906231012049800000004" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.cluster[0] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group" "cluster" { +19:58:12.145 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0ebcc111357300f20" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - description = "EKS cluster security group" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - egress = [] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - id = "sg-0ebcc111357300f20" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - ingress = [ +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node groups to cluster API" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0b4880f2bae65a949", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  ] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012411100000005" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-cluster-" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null +19:58:12.145 STDOUT [eks] terraform_current:  - tags = { +19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-cluster" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-cluster" +19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group.node[0] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group" "node" { +19:58:12.145 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0b4880f2bae65a949" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - description = "EKS node shared security group" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - egress = [ +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "0.0.0.0/0", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Allow all egress" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 0 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "-1" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 0 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  ] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - id = "sg-0b4880f2bae65a949" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - ingress = [ +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 4443/tcp webhook" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 4443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 4443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 6443/tcp webhook" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 6443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 6443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 8443/tcp webhook" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 8443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 8443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node 9443/tcp webhook" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 9443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 9443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node groups" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Cluster API to node kubelets" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 10250 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-0ebcc111357300f20", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 10250 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS UDP" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 53 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "udp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.145 STDOUT [eks] terraform_current:  - self = true +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 53 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 53 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.145 STDOUT [eks] terraform_current:  - self = true +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 53 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node to node ingress on ephemeral ports" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 80 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [] +19:58:12.145 STDOUT [eks] terraform_current:  - self = true +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 65535 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  - { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Webhook container port, from Control Plane" +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 15017 +19:58:12.145 STDOUT [eks] terraform_current:  - ipv6_cidr_blocks = [] +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" +19:58:12.145 STDOUT [eks] terraform_current:  - security_groups = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "sg-08e15e3b8fb3384d2", +19:58:12.145 STDOUT [eks] terraform_current:  ] +19:58:12.145 STDOUT [eks] terraform_current:  - self = false +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 15017 +19:58:12.145 STDOUT [eks] terraform_current:  }, +19:58:12.145 STDOUT [eks] terraform_current:  ] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-node-20240906231012432000000006" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - name_prefix = "platform-eng-eks-mcm-node-" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - owner_id = "224384469011" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - revoke_rules_on_delete = false -> null +19:58:12.145 STDOUT [eks] terraform_current:  - tags = { +19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-node" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.145 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.145 STDOUT [eks] terraform_current:  - "Name" = "platform-eng-eks-mcm-node" +19:58:12.145 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.145 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.145 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.145 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.145 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.145 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.145 STDOUT [eks] terraform_current:  - "kubernetes.io/cluster/platform-eng-eks-mcm" = "owned" +19:58:12.145 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.145 STDOUT [eks] terraform_current:  } -> null +19:58:12.145 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "cluster" { +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Node groups to cluster API" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 443 -> null +19:58:12.145 STDOUT [eks] terraform_current:  - id = "sgrule-2999123215" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-001d4aa53331ba106" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.145 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - to_port = 443 -> null +19:58:12.145 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.145 STDOUT [eks] terraform_current:  } +19:58:12.145 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["egress_all"] will be destroyed +19:58:12.145 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.145 STDOUT [eks] terraform_current:  - cidr_blocks = [ +19:58:12.145 STDOUT [eks] terraform_current:  - "0.0.0.0/0", +19:58:12.145 STDOUT [eks] terraform_current:  ] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - description = "Allow all egress" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - from_port = 0 -> null +19:58:12.145 STDOUT [eks] terraform_current:  - id = "sgrule-2399073099" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.145 STDOUT [eks] terraform_current:  - protocol = "-1" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.145 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-03b198488d4b5751c" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 0 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "egress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_443"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node groups" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1028926182" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-02bd8ee4f76b1dd52" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 4443/tcp webhook" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 4443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-3066614115" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0c9e44ecc24e15434" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 4443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 6443/tcp webhook" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 6443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-2139797237" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0771960c9c3e4bfbc" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 6443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 8443/tcp webhook" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 8443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1825999572" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-06aa306a2020ae0e1" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 8443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node 9443/tcp webhook" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 9443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-142063903" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0cedcadf2ab481871" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 9443 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Cluster API to node kubelets" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 10250 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-1630915307" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0929373661f73dd3f" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = false -> null +19:58:12.146 STDOUT [eks] terraform_current:  - source_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 10250 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node ingress on ephemeral ports" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 80 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-3683901971" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-09aa20b51ae07fb2b" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 65535 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 53 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-2908765754" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "tcp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-025828ae34e42f821" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 53 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_security_group_rule" "node" { +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Node to node CoreDNS UDP" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - from_port = 53 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "sgrule-155164117" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - prefix_list_ids = [] -> null +19:58:12.146 STDOUT [eks] terraform_current:  - protocol = "udp" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - security_group_rule_id = "sgr-0b7c2ef27754510d4" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - self = true -> null +19:58:12.146 STDOUT [eks] terraform_current:  - to_port = 53 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - type = "ingress" -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.cluster.time_sleep.this[0] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "time_sleep" "this" { +19:58:12.146 STDOUT [eks] terraform_current:  - create_duration = "30s" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "2024-09-06T23:19:27Z" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - triggers = { +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_certificate_authority_data" = "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" +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_endpoint" = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_name" = "platform-eng-eks-mcm" +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_service_cidr" = "172.20.0.0/16" +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster_version" = "1.30" +19:58:12.146 STDOUT [eks] terraform_current:  } -> null +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0] will be destroyed +19:58:12.146 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "ebs_csi" { +19:58:12.146 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null +19:58:12.146 STDOUT [eks] terraform_current:  - description = "Provides permissions to manage EBS volumes via the container storage interface driver" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - name = "AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_EBS_CSI_Policy-" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.146 STDOUT [eks] terraform_current:  { +19:58:12.146 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ModifyVolume", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:EnableFastSnapshotRestores", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DetachVolume", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeVolumesModifications", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeVolumes", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeTags", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeSnapshots", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeInstances", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:DescribeAvailabilityZones", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:CreateSnapshot", +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:AttachVolume", +19:58:12.146 STDOUT [eks] terraform_current:  ] +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateTags" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:CreateAction" = [ +19:58:12.146 STDOUT [eks] terraform_current:  - "CreateVolume", +19:58:12.146 STDOUT [eks] terraform_current:  - "CreateSnapshot", +19:58:12.146 STDOUT [eks] terraform_current:  ] +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = [ +19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", +19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:snapshot/*", +19:58:12.146 STDOUT [eks] terraform_current:  ] +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteTags" +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = [ +19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:volume/*", +19:58:12.146 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:ec2:*:*:snapshot/*", +19:58:12.146 STDOUT [eks] terraform_current:  ] +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/ebs.csi.aws.com/cluster" = "true" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/CSIVolumeName" = "*" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:CreateVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "aws:RequestTag/kubernetes.io/cluster/*" = "owned" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/CSIVolumeName" = "*" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/kubernetes.io/cluster/*" = "owned" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteVolume" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" = "*" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteSnapshot" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/CSIVolumeSnapshotName" = "*" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  - { +19:58:12.146 STDOUT [eks] terraform_current:  - Action = "ec2:DeleteSnapshot" +19:58:12.146 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.146 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.146 STDOUT [eks] terraform_current:  - "ec2:ResourceTag/ebs.csi.aws.com/cluster" = "true" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.146 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.146 STDOUT [eks] terraform_current:  }, +19:58:12.146 STDOUT [eks] terraform_current:  ] +19:58:12.146 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.146 STDOUT [eks] terraform_current:  } +19:58:12.146 STDOUT [eks] terraform_current:  ) -> null +19:58:12.146 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJWQRSSH3IA" -> null +19:58:12.146 STDOUT [eks] terraform_current:  - tags = { +19:58:12.146 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.146 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.146 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.146 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.146 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.146 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.146 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.146 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.146 STDOUT [eks] terraform_current:  } -> null +19:58:12.146 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.146 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.146 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role.this[0] will be destroyed +19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.147 STDOUT [eks] terraform_current:  { +19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:ebs-csi-controller-sa" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.147 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  ] +19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  ) -> null +19:58:12.147 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-ebs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.147 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002", +19:58:12.147 STDOUT [eks] terraform_current:  ] -> null +19:58:12.147 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.147 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-ebs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJSHP2YMKHZ" -> null +19:58:12.147 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  # module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0] will be destroyed +19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "ebs_csi" { +19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-ebs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0] will be destroyed +19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "efs_csi" { +19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null +19:58:12.147 STDOUT [eks] terraform_current:  - description = "Provides permissions to manage EFS volumes via the container storage interface driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - name = "AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_EFS_CSI_Policy-" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.147 STDOUT [eks] terraform_current:  { +19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeMountTargets", +19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeFileSystems", +19:58:12.147 STDOUT [eks] terraform_current:  - "elasticfilesystem:DescribeAccessPoints", +19:58:12.147 STDOUT [eks] terraform_current:  - "ec2:DescribeAvailabilityZones", +19:58:12.147 STDOUT [eks] terraform_current:  ] +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:CreateAccessPoint" +19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.147 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.147 STDOUT [eks] terraform_current:  - "aws:RequestTag/efs.csi.aws.com/cluster" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:TagResource" +19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.147 STDOUT [eks] terraform_current:  - StringLike = { +19:58:12.147 STDOUT [eks] terraform_current:  - "aws:RequestTag/efs.csi.aws.com/cluster" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = "elasticfilesystem:DeleteAccessPoint" +19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.147 STDOUT [eks] terraform_current:  - "aws:ResourceTag/efs.csi.aws.com/cluster" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  ] +19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  ) -> null +19:58:12.147 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJ75LS5DHRC" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.147 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role.this[0] will be destroyed +19:58:12.147 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.147 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.147 STDOUT [eks] terraform_current:  { +19:58:12.147 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.147 STDOUT [eks] terraform_current:  - { +19:58:12.147 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:58:12.147 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.147 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:58:12.147 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:efs-csi-controller-sa" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.147 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.147 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  }, +19:58:12.147 STDOUT [eks] terraform_current:  ] +19:58:12.147 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.147 STDOUT [eks] terraform_current:  } +19:58:12.147 STDOUT [eks] terraform_current:  ) -> null +19:58:12.147 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.147 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-efs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.147 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001", +19:58:12.147 STDOUT [eks] terraform_current:  ] -> null +19:58:12.147 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.147 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-efs-csi-driver" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.147 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.147 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.147 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.147 STDOUT [eks] terraform_current:  } -> null +19:58:12.147 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.147 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.147 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.147 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.147 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.147 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.147 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ5LM4S5YEZ" -> null +19:58:12.148 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "efs_csi" { +19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-efs-csi-driver" -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_policy" "vpc_cni" { +19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - attachment_count = 1 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - description = "Provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - id = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name = "AmazonEKS_CNI_Policy-20240906231012049100000003" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name_prefix = "AmazonEKS_CNI_Policy-" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.148 STDOUT [eks] terraform_current:  { +19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:UnassignPrivateIpAddresses", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:ModifyNetworkInterfaceAttribute", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DetachNetworkInterface", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeTags", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeSubnets", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeNetworkInterfaces", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeInstances", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DescribeInstanceTypes", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:DeleteNetworkInterface", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:CreateNetworkInterface", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:AttachNetworkInterface", +19:58:12.148 STDOUT [eks] terraform_current:  - "ec2:AssignPrivateIpAddresses", +19:58:12.148 STDOUT [eks] terraform_current:  ] +19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.148 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "IPV4" +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - Action = "ec2:CreateTags" +19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.148 STDOUT [eks] terraform_current:  - Resource = "arn:aws-us-gov:ec2:*:*:network-interface/*" +19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "CreateTags" +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  ] +19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  ) -> null +19:58:12.148 STDOUT [eks] terraform_current:  - policy_id = "ANPATIPS3JAJQSVZLLNUM" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role.this[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.148 STDOUT [eks] terraform_current:  { +19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRoleWithWebIdentity" +19:58:12.148 STDOUT [eks] terraform_current:  - Condition = { +19:58:12.148 STDOUT [eks] terraform_current:  - StringEquals = { +19:58:12.148 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:aud" = "sts.amazonaws.com" +19:58:12.148 STDOUT [eks] terraform_current:  - "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926:sub" = "system:serviceaccount:kube-system:aws-node" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.148 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.148 STDOUT [eks] terraform_current:  - Federated = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  ] +19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  ) -> null +19:58:12.148 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:18:58Z" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-vpc-cni" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003", +19:58:12.148 STDOUT [eks] terraform_current:  ] -> null +19:58:12.148 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-vpc-cni" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJQVAVLU2ER" -> null +19:58:12.148 STDOUT [eks] terraform_current:  # (3 unchanged attributes hidden) +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "vpc_cni" { +19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm-vpc-cni-20240906231859418300000013" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - role = "platform-eng-eks-mcm-vpc-cni" -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_eks_node_group" "this" { +19:58:12.148 STDOUT [eks] terraform_current:  - ami_type = "BOTTLEROCKET_x86_64" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:nodegroup/platform-eng-eks-mcm/eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017/9cc8e4d1-595a-8450-db56-2943ba7896ff" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - capacity_type = "ON_DEMAND" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - disk_size = 0 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - instance_types = [ +19:58:12.148 STDOUT [eks] terraform_current:  - "t3.xlarge", +19:58:12.148 STDOUT [eks] terraform_current:  ] -> null +19:58:12.148 STDOUT [eks] terraform_current:  - labels = {} -> null +19:58:12.148 STDOUT [eks] terraform_current:  - node_group_name = "eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - node_group_name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - node_role_arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - release_version = "1.21.1-82691b51" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - resources = [ +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - autoscaling_groups = [ +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - name = "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff" +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  ] +19:58:12.148 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  ] -> null +19:58:12.148 STDOUT [eks] terraform_current:  - status = "ACTIVE" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - subnet_ids = [ +19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", +19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", +19:58:12.148 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", +19:58:12.148 STDOUT [eks] terraform_current:  ] -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" +19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - version = "1.30" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - launch_template { +19:58:12.148 STDOUT [eks] terraform_current:  - id = "lt-0cab502ac2f52bb98" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name = "node_group-20240906231928384300000015" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - version = "1" -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  - scaling_config { +19:58:12.148 STDOUT [eks] terraform_current:  - desired_size = 2 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - max_size = 10 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - min_size = 2 -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  - timeouts {} +19:58:12.148 STDOUT [eks] terraform_current:  - update_config { +19:58:12.148 STDOUT [eks] terraform_current:  - max_unavailable = 0 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - max_unavailable_percentage = 33 -> null +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0] will be destroyed +19:58:12.148 STDOUT [eks] terraform_current:  - resource "aws_iam_role" "this" { +19:58:12.148 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - assume_role_policy = jsonencode( +19:58:12.148 STDOUT [eks] terraform_current:  { +19:58:12.148 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.148 STDOUT [eks] terraform_current:  - { +19:58:12.148 STDOUT [eks] terraform_current:  - Action = "sts:AssumeRole" +19:58:12.148 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.148 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.148 STDOUT [eks] terraform_current:  - Service = "ec2.amazonaws.com" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  - Sid = "EKSNodeAssumeRole" +19:58:12.148 STDOUT [eks] terraform_current:  }, +19:58:12.148 STDOUT [eks] terraform_current:  ] +19:58:12.148 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.148 STDOUT [eks] terraform_current:  } +19:58:12.148 STDOUT [eks] terraform_current:  ) -> null +19:58:12.148 STDOUT [eks] terraform_current:  - create_date = "2024-09-06T23:10:12Z" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - description = "EKS managed node group IAM role" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - force_detach_policies = true -> null +19:58:12.148 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - managed_policy_arns = [ +19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly", +19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy", +19:58:12.148 STDOUT [eks] terraform_current:  - "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy", +19:58:12.148 STDOUT [eks] terraform_current:  ] -> null +19:58:12.148 STDOUT [eks] terraform_current:  - max_session_duration = 3600 -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - name_prefix = "eks-platform-eng-eks-mcm-nodegroup-" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - path = "/" -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.148 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.148 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.148 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.148 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.148 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.148 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.148 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.148 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.148 STDOUT [eks] terraform_current:  } -> null +19:58:12.148 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJXVNH4QWBD" -> null +19:58:12.148 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKSWorkerNodePolicy" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_iam_role_policy_attachment" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - id = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:iam::aws:policy/AmazonEKS_CNI_Policy" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - role = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_launch_template" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:launch-template/lt-0cab502ac2f52bb98" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - default_version = 1 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - description = "Custom launch template for eks-platform-eng-eks-mcm-nodegroup EKS managed node group" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - disable_api_stop = false -> null +19:58:12.149 STDOUT [eks] terraform_current:  - disable_api_termination = false -> null +19:58:12.149 STDOUT [eks] terraform_current:  - id = "lt-0cab502ac2f52bb98" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - latest_version = 1 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - name = "node_group-20240906231928384300000015" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - name_prefix = "node_group-" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - security_group_names = [] -> null +19:58:12.149 STDOUT [eks] terraform_current:  - tags = { +19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.149 STDOUT [eks] terraform_current:  } -> null +19:58:12.149 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.149 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.149 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.149 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.149 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.149 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.149 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.149 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.149 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.149 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.149 STDOUT [eks] terraform_current:  } -> null +19:58:12.149 STDOUT [eks] terraform_current:  - update_default_version = true -> null +19:58:12.149 STDOUT [eks] terraform_current:  - vpc_security_group_ids = [ +19:58:12.149 STDOUT [eks] terraform_current:  - "sg-0b4880f2bae65a949", +19:58:12.149 STDOUT [eks] terraform_current:  ] -> null +19:58:12.149 STDOUT [eks] terraform_current:  # (8 unchanged attributes hidden) +19:58:12.149 STDOUT [eks] terraform_current:  - block_device_mappings { +19:58:12.149 STDOUT [eks] terraform_current:  - device_name = "/dev/xvda" -> null +19:58:12.149 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.149 STDOUT [eks] terraform_current:  - ebs { +19:58:12.149 STDOUT [eks] terraform_current:  - delete_on_termination = "true" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - encrypted = "true" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - iops = 0 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - kms_key_id = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/e0543b2b-c3f1-49a5-bfa7-87eec859be03" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - throughput = 0 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - volume_size = 100 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - volume_type = "gp3" -> null +19:58:12.149 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  - metadata_options { +19:58:12.149 STDOUT [eks] terraform_current:  - http_endpoint = "enabled" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - http_put_response_hop_limit = 2 -> null +19:58:12.149 STDOUT [eks] terraform_current:  - http_tokens = "required" -> null +19:58:12.149 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  - monitoring { +19:58:12.149 STDOUT [eks] terraform_current:  - enabled = true -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { +19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "instance" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - tags = { +19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.149 STDOUT [eks] terraform_current:  } -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { +19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "network-interface" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - tags = { +19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.149 STDOUT [eks] terraform_current:  } -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  - tag_specifications { +19:58:12.149 STDOUT [eks] terraform_current:  - resource_type = "volume" -> null +19:58:12.149 STDOUT [eks] [0mterraform_current:  - tags = { +19:58:12.149 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.149 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.149 STDOUT [eks] terraform_current:  - "Name" = "eks-platform-eng-eks-mcm-nodegroup" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.149 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.149 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.149 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.149 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.149 STDOUT [eks] terraform_current:  } -> null +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_alias.this["cluster"] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_kms_alias" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:alias/eks/platform-eng-eks-mcm" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - id = "alias/eks/platform-eng-eks-mcm" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - name = "alias/eks/platform-eng-eks-mcm" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - target_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - target_key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.149 STDOUT [eks] terraform_current:  # (1 unchanged attribute hidden) +19:58:12.149 STDOUT [eks] terraform_current:  } +19:58:12.149 STDOUT [eks] terraform_current:  # module.cluster.module.kms.aws_kms_key.this[0] will be destroyed +19:58:12.149 STDOUT [eks] terraform_current:  - resource "aws_kms_key" "this" { +19:58:12.149 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - bypass_policy_lockout_safety_check = false -> null +19:58:12.149 STDOUT [eks] terraform_current:  - customer_master_key_spec = "SYMMETRIC_DEFAULT" -> null +19:58:12.149 STDOUT [eks] terraform_current:  - description = "platform-eng-eks-mcm cluster encryption key" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - enable_key_rotation = true -> null +19:58:12.150 STDOUT [eks] terraform_current:  - id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - is_enabled = true -> null +19:58:12.150 STDOUT [eks] terraform_current:  - key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - key_usage = "ENCRYPT_DECRYPT" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - multi_region = false -> null +19:58:12.150 STDOUT [eks] terraform_current:  - policy = jsonencode( +19:58:12.150 STDOUT [eks] terraform_current:  { +19:58:12.150 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.150 STDOUT [eks] terraform_current:  - { +19:58:12.150 STDOUT [eks] terraform_current:  - Action = "kms:*" +19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "Default" +19:58:12.150 STDOUT [eks] terraform_current:  }, +19:58:12.150 STDOUT [eks] terraform_current:  - { +19:58:12.150 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Update*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:UntagResource", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:TagResource", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ScheduleKeyDeletion", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Revoke*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ReplicateKey", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Put*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:List*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ImportKeyMaterial", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Get*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Enable*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Disable*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Describe*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Delete*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Create*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:CancelKeyDeletion", +19:58:12.150 STDOUT [eks] terraform_current:  ] +19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "KeyAdministration" +19:58:12.150 STDOUT [eks] terraform_current:  }, +19:58:12.150 STDOUT [eks] terraform_current:  - { +19:58:12.150 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:ReEncrypt*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:GenerateDataKey*", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Encrypt", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:DescribeKey", +19:58:12.150 STDOUT [eks] terraform_current:  - "kms:Decrypt", +19:58:12.150 STDOUT [eks] terraform_current:  ] +19:58:12.150 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.150 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.150 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.150 STDOUT [eks] terraform_current:  - Sid = "KeyUsage" +19:58:12.150 STDOUT [eks] terraform_current:  }, +19:58:12.150 STDOUT [eks] terraform_current:  ] +19:58:12.150 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  ) -> null +19:58:12.150 STDOUT [eks] terraform_current:  - rotation_period_in_days = 365 -> null +19:58:12.150 STDOUT [eks] terraform_current:  - tags = { +19:58:12.150 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.150 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.150 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.150 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.150 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.150 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" +19:58:12.150 STDOUT [eks] terraform_current:  } -> null +19:58:12.150 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.150 STDOUT [eks] terraform_current:  - "CostAllocation" = "csvd:infrastructure" +19:58:12.150 STDOUT [eks] terraform_current:  - "Environment" = "dev" +19:58:12.150 STDOUT [eks] terraform_current:  - "Organization" = "census:ocio:csvd" +19:58:12.150 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.150 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.150 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.150 STDOUT [eks] terraform_current:  - "ProjectNumber" = "fs0000000078" +19:58:12.150 STDOUT [eks] terraform_current:  - "Terraform" = "true" +19:58:12.150 STDOUT [eks] terraform_current:  - "Terragrunt" = "true" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.150 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.150 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.150 STDOUT [eks] terraform_current:  - "created_by" = "matthew.c.morgan@census.gov" +19:58:12.150 STDOUT [eks] terraform_current:  - "created_for" = "matthew.c.morgan@census.gov" +19:58:12.150 STDOUT [eks] terraform_current:  - "created_reason" = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.150 STDOUT [eks] terraform_current:  - "eks-cluster-name" = "platform-eng-eks-mcm" +19:58:12.150 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.150 STDOUT [eks] terraform_current:  - "terraform-aws-modules" = "eks" +19:58:12.150 STDOUT [eks] terraform_current:  } -> null +19:58:12.150 STDOUT [eks] terraform_current:  # (2 unchanged attributes hidden) +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  # module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr will be destroyed +19:58:12.150 STDOUT [eks] terraform_current:  - resource "null_resource" "validate_cluster_service_cidr" { +19:58:12.150 STDOUT [eks] terraform_current:  - id = "4612407423035214643" -> null +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current: Plan: 0 to add, 0 to change, 81 to destroy. +19:58:12.150 STDOUT [eks] terraform_current:  +19:58:12.150 STDOUT [eks] terraform_current: Changes to Outputs: +19:58:12.150 STDOUT [eks] terraform_current:  - access_entries = { +19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t1 = { +19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] +19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { +19:58:12.150 STDOUT [eks] terraform_current:  - admin = { +19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { +19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t2 = { +19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] +19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { +19:58:12.150 STDOUT [eks] terraform_current:  - admin = { +19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { +19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t3 = { +19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] +19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { +19:58:12.150 STDOUT [eks] terraform_current:  - admin = { +19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { +19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - inf-terraform-t4 = { +19:58:12.150 STDOUT [eks] terraform_current:  - kubernetes_groups = [] +19:58:12.150 STDOUT [eks] terraform_current:  - policy_associations = { +19:58:12.150 STDOUT [eks] terraform_current:  - admin = { +19:58:12.150 STDOUT [eks] terraform_current:  - access_scope = { +19:58:12.150 STDOUT [eks] terraform_current:  - type = "cluster" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - policy_arn = "arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  - principal_arn = "arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06" +19:58:12.150 STDOUT [eks] terraform_current:  } +19:58:12.150 STDOUT [eks] terraform_current:  } -> null +19:58:12.150 STDOUT [eks] terraform_current:  - cloudwatch_log_group_arn = "arn:aws-us-gov:logs:us-gov-east-1:224384469011:log-group:/aws/eks/platform-eng-eks-mcm/cluster" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - cloudwatch_log_group_name = "/aws/eks/platform-eng-eks-mcm/cluster" -> null +19:58:12.150 STDOUT [eks] terraform_current:  - cluster_addons = { +19:58:12.150 STDOUT [eks] terraform_current:  - amazon-cloudwatch-observability = { +19:58:12.150 STDOUT [eks] terraform_current:  - addon_name = "amazon-cloudwatch-observability" +19:58:12.150 STDOUT [eks] terraform_current:  - addon_version = "v2.0.1-eksbuild.1" +19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/amazon-cloudwatch-observability/2ac8e4d2-2c04-6704-27b0-a1bb60118d9d" +19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" +19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:amazon-cloudwatch-observability" +19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:51Z" +19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cloudwatch-observability" +19:58:12.151 STDOUT [eks] terraform_current:  - tags = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.151 STDOUT [eks] terraform_current:  - create = null +19:58:12.151 STDOUT [eks] terraform_current:  - delete = null +19:58:12.151 STDOUT [eks] terraform_current:  - update = null +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - aws-ebs-csi-driver = { +19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "aws-ebs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v1.34.0-eksbuild.1" +19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-ebs-csi-driver/62c8e4d2-2bef-0957-943e-07efc3b80681" +19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-ebs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:04Z" +19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - tags = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.151 STDOUT [eks] terraform_current:  - create = null +19:58:12.151 STDOUT [eks] terraform_current:  - delete = null +19:58:12.151 STDOUT [eks] terraform_current:  - update = null +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - aws-efs-csi-driver = { +19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "aws-efs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v2.0.7-eksbuild.1" +19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/aws-efs-csi-driver/28c8e4d2-2bf4-26d6-f4f0-ccf8aace8809" +19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:aws-efs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:00Z" +19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" +19:58:12.151 STDOUT [eks] terraform_current:  - tags = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.151 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.151 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.151 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.151 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.151 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.151 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.151 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.151 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.151 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.151 STDOUT [eks] terraform_current:  - create = null +19:58:12.151 STDOUT [eks] terraform_current:  - delete = null +19:58:12.151 STDOUT [eks] terraform_current:  - update = null +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  } +19:58:12.151 STDOUT [eks] terraform_current:  - coredns = { +19:58:12.151 STDOUT [eks] terraform_current:  - addon_name = "coredns" +19:58:12.151 STDOUT [eks] terraform_current:  - addon_version = "v1.11.3-eksbuild.1" +19:58:12.151 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/coredns/5ac8e4d2-2bfa-f4ad-ab07-4e665df2f85a" +19:58:12.151 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.151 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.151 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.151 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:coredns" +19:58:12.151 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:01Z" +19:58:12.151 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.151 STDOUT [eks] terraform_current:  - service_account_role_arn = "" +19:58:12.151 STDOUT [eks] terraform_current:  - tags = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.152 STDOUT [eks] terraform_current:  - create = null +19:58:12.152 STDOUT [eks] terraform_current:  - delete = null +19:58:12.152 STDOUT [eks] terraform_current:  - update = null +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - eks-pod-identity-agent = { +19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "eks-pod-identity-agent" +19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v1.3.2-eksbuild.2" +19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/eks-pod-identity-agent/e0c8e4d2-2bf6-9e6b-b631-4771b0216ea6" +19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:eks-pod-identity-agent" +19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:53Z" +19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" +19:58:12.152 STDOUT [eks] terraform_current:  - tags = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.152 STDOUT [eks] terraform_current:  - create = null +19:58:12.152 STDOUT [eks] terraform_current:  - delete = null +19:58:12.152 STDOUT [eks] terraform_current:  - update = null +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - kube-proxy = { +19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "kube-proxy" +19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v1.30.3-eksbuild.2" +19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/kube-proxy/d6c8e4d2-2bf2-1909-954c-94d27c6dac91" +19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:kube-proxy" +19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:56Z" +19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" +19:58:12.152 STDOUT [eks] terraform_current:  - tags = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.152 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.152 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.152 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.152 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.152 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.152 STDOUT [eks] terraform_current:  - create = null +19:58:12.152 STDOUT [eks] terraform_current:  - delete = null +19:58:12.152 STDOUT [eks] terraform_current:  - update = null +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  } +19:58:12.152 STDOUT [eks] terraform_current:  - snapshot-controller = { +19:58:12.152 STDOUT [eks] terraform_current:  - addon_name = "snapshot-controller" +19:58:12.152 STDOUT [eks] terraform_current:  - addon_version = "v8.0.0-eksbuild.1" +19:58:12.152 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/snapshot-controller/56c8e4d2-2bfb-634a-35b4-2a9352ccba8f" +19:58:12.152 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.152 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.152 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:16Z" +19:58:12.152 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:snapshot-controller" +19:58:12.152 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:22:03Z" +19:58:12.152 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.152 STDOUT [eks] terraform_current:  - service_account_role_arn = "" +19:58:12.152 STDOUT [eks] terraform_current:  - tags = { +19:58:12.152 STDOUT [eks] terraform_current:  - CostAllocati +19:58:12.152 STDOUT [eks] terraform_current: on = "csvd:infrastructure" +19:58:12.152 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.152 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.153 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.153 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.153 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.153 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.153 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.153 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.153 STDOUT [eks] terraform_current:  - create = null +19:58:12.153 STDOUT [eks] terraform_current:  - delete = null +19:58:12.153 STDOUT [eks] terraform_current:  - update = null +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  - vpc-cni = { +19:58:12.153 STDOUT [eks] terraform_current:  - addon_name = "vpc-cni" +19:58:12.153 STDOUT [eks] terraform_current:  - addon_version = "v1.18.3-eksbuild.2" +19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:addon/platform-eng-eks-mcm/vpc-cni/b8c8e4d2-2bef-7cd0-25c0-8093ffbfd4b0" +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - configuration_values = "" +19:58:12.153 STDOUT [eks] terraform_current:  - created_at = "2024-09-06T23:21:17Z" +19:58:12.153 STDOUT [eks] terraform_current:  - id = "platform-eng-eks-mcm:vpc-cni" +19:58:12.153 STDOUT [eks] terraform_current:  - modified_at = "2024-09-06T23:21:54Z" +19:58:12.153 STDOUT [eks] terraform_current:  - preserve = true +19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts = null +19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts_on_create = "OVERWRITE" +19:58:12.153 STDOUT [eks] terraform_current:  - resolve_conflicts_on_update = "OVERWRITE" +19:58:12.153 STDOUT [eks] terraform_current:  - service_account_role_arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" +19:58:12.153 STDOUT [eks] terraform_current:  - tags = { +19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  - tags_all = { +19:58:12.153 STDOUT [eks] terraform_current:  - CostAllocation = "csvd:infrastructure" +19:58:12.153 STDOUT [eks] terraform_current:  - Environment = "dev" +19:58:12.153 STDOUT [eks] terraform_current:  - Organization = "census:ocio:csvd" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Identifier" = "fs0000000078:csvd_platformbaseline" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Name" = "csvd_platformbaseline" +19:58:12.153 STDOUT [eks] terraform_current:  - "Project Role" = "csvd_platformbaseline_mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - ProjectNumber = "fs0000000078" +19:58:12.153 STDOUT [eks] terraform_current:  - Terraform = "true" +19:58:12.153 STDOUT [eks] terraform_current:  - Terragrunt = "true" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:created_by" = "terraform" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_name" = "tfmod-eks" +19:58:12.153 STDOUT [eks] terraform_current:  - "boc:tf_module_version" = "0.1.0" +19:58:12.153 STDOUT [eks] terraform_current:  - "cluster:size" = "min:2-max:10-desired:2" +19:58:12.153 STDOUT [eks] terraform_current:  - created_by = "matthew.c.morgan@census.gov" +19:58:12.153 STDOUT [eks] terraform_current:  - created_for = "matthew.c.morgan@census.gov" +19:58:12.153 STDOUT [eks] terraform_current:  - created_reason = "Exploration of Terragrunt and Demonstration of CICD for Infrastructure" +19:58:12.153 STDOUT [eks] terraform_current:  - eks-cluster-name = "platform-eng-eks-mcm" +19:58:12.153 STDOUT [eks] terraform_current:  - "slim:schedule" = "8:00-17:00" +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  - timeouts = { +19:58:12.153 STDOUT [eks] terraform_current:  - create = null +19:58:12.153 STDOUT [eks] terraform_current:  - delete = null +19:58:12.153 STDOUT [eks] terraform_current:  - update = null +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  } -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:cluster/platform-eng-eks-mcm" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_certificate_authority_data = "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" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_endpoint = "https://D896BC3B83782F01D590ACB83BB75926.yl4.us-gov-east-1.eks.amazonaws.com" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_fqdn = "platform-eng-eks-mcm.dev.lab.csp2.census.gov" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_iam_role = { +19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" +19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-cluster-20240906231012049800000004" +19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ6HHWK2XZX" +19:58:12.153 STDOUT [eks] terraform_current:  } -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_identity_providers = {} -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_name = "platform-eng-eks-mcm" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_oidc_issuer_url = "https://oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_platform_version = "eks.8" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_primary_security_group_id = "sg-08e15e3b8fb3384d2" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_security_group_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0ebcc111357300f20" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_security_group_id = "sg-0ebcc111357300f20" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_status = "ACTIVE" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_tls_certificate_sha1_fingerprint = "9e99a48a9960b14926bb7f3b02e22da2b0ab7280" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - cluster_version = "1.30" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - ebs_csi_irsa_role = { +19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-ebs-csi-driver" +19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-ebs-csi-driver" +19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJSHP2YMKHZ" +19:58:12.153 STDOUT [eks] terraform_current:  } -> null +19:58:12.153 STDOUT [eks] terraform_current:  - efs_csi_irsa_role = { +19:58:12.153 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-efs-csi-driver" +19:58:12.153 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-efs-csi-driver" +19:58:12.153 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJ5LM4S5YEZ" +19:58:12.153 STDOUT [eks] terraform_current:  } -> null +19:58:12.153 STDOUT [eks] terraform_current:  - eks_managed_node_groups = { +19:58:12.153 STDOUT [eks] terraform_current:  - node_group = { +19:58:12.153 STDOUT [eks] terraform_current:  - autoscaling_group_schedule_arns = {} +19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_arn = "arn:aws-us-gov:iam::224384469011:role/eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" +19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_name = "eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007" +19:58:12.153 STDOUT [eks] terraform_current:  - iam_role_unique_id = "AROATIPS3JAJXVNH4QWBD" +19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:launch-template/lt-0cab502ac2f52bb98" +19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_id = "lt-0cab502ac2f52bb98" +19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_latest_version = 1 +19:58:12.153 STDOUT [eks] terraform_current:  - launch_template_name = "node_group-20240906231928384300000015" +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_arn = "arn:aws-us-gov:eks:us-gov-east-1:224384469011:nodegroup/platform-eng-eks-mcm/eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017/9cc8e4d1-595a-8450-db56-2943ba7896ff" +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_autoscaling_group_names = [ +19:58:12.153 STDOUT [eks] terraform_current:  - "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff", +19:58:12.153 STDOUT [eks] terraform_current:  ] +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_id = "platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017" +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_labels = {} +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_resources = [ +19:58:12.153 STDOUT [eks] terraform_current:  - { +19:58:12.153 STDOUT [eks] terraform_current:  - autoscaling_groups = [ +19:58:12.153 STDOUT [eks] terraform_current:  - { +19:58:12.153 STDOUT [eks] terraform_current:  - name = "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff" +19:58:12.153 STDOUT [eks] terraform_current:  }, +19:58:12.153 STDOUT [eks] terraform_current:  ] +19:58:12.153 STDOUT [eks] terraform_current:  - remote_access_security_group_id = "" +19:58:12.153 STDOUT [eks] terraform_current:  }, +19:58:12.153 STDOUT [eks] terraform_current:  ] +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_status = "ACTIVE" +19:58:12.153 STDOUT [eks] terraform_current:  - node_group_taints = [] +19:58:12.153 STDOUT [eks] terraform_current:  - platform = "bottlerocket" +19:58:12.153 STDOUT [eks] terraform_current:  } +19:58:12.153 STDOUT [eks] terraform_current:  } -> null +19:58:12.153 STDOUT [eks] terraform_current:  - eks_managed_node_groups_autoscaling_group_names = [ +19:58:12.153 STDOUT [eks] terraform_current:  - "eks-eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017-9cc8e4d1-595a-8450-db56-2943ba7896ff", +19:58:12.153 STDOUT [eks] terraform_current:  ] -> null +19:58:12.153 STDOUT [eks] terraform_current:  - fargate_profiles = {} -> null +19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_arn = "arn:aws-us-gov:kms:us-gov-east-1:224384469011:key/548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_id = "548a1f15-3b65-467e-b6cf-4e1aa13bb9fc" -> null +19:58:12.153 STDOUT [eks] terraform_current:  - kms_key_policy = jsonencode( +19:58:12.153 STDOUT [eks] terraform_current:  { +19:58:12.153 STDOUT [eks] terraform_current:  - Statement = [ +19:58:12.154 STDOUT [eks] terraform_current:  - { +19:58:12.154 STDOUT [eks] terraform_current:  - Action = "kms:*" +19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:root" +19:58:12.154 STDOUT [eks] terraform_current:  } +19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "Default" +19:58:12.154 STDOUT [eks] terraform_current:  }, +19:58:12.154 STDOUT [eks] terraform_current:  - { +19:58:12.154 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Update*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:UntagResource", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:TagResource", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ScheduleKeyDeletion", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Revoke*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ReplicateKey", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Put*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:List*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ImportKeyMaterial", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Get*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Enable*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Disable*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Describe*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Delete*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Create*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:CancelKeyDeletion", +19:58:12.154 STDOUT [eks] terraform_current:  ] +19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/r-inf-terraform" +19:58:12.154 STDOUT [eks] terraform_current:  } +19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "KeyAdministration" +19:58:12.154 STDOUT [eks] terraform_current:  }, +19:58:12.154 STDOUT [eks] terraform_current:  - { +19:58:12.154 STDOUT [eks] terraform_current:  - Action = [ +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:ReEncrypt*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:GenerateDataKey*", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Encrypt", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:DescribeKey", +19:58:12.154 STDOUT [eks] terraform_current:  - "kms:Decrypt", +19:58:12.154 STDOUT [eks] terraform_current:  ] +19:58:12.154 STDOUT [eks] terraform_current:  - Effect = "Allow" +19:58:12.154 STDOUT [eks] terraform_current:  - Principal = { +19:58:12.154 STDOUT [eks] terraform_current:  - AWS = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-cluster-20240906231012049800000004" +19:58:12.154 STDOUT [eks] terraform_current:  } +19:58:12.154 STDOUT [eks] terraform_current:  - Resource = "*" +19:58:12.154 STDOUT [eks] terraform_current:  - Sid = "KeyUsage" +19:58:12.154 STDOUT [eks] terraform_current:  }, +19:58:12.154 STDOUT [eks] terraform_current:  ] +19:58:12.154 STDOUT [eks] terraform_current:  - Version = "2012-10-17" +19:58:12.154 STDOUT [eks] terraform_current:  } +19:58:12.154 STDOUT [eks] terraform_current:  ) -> null +19:58:12.154 STDOUT [eks] terraform_current:  - module_name = "tfmod-eks" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - module_version = "0.1.0" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - node_group_name = "eks-platform-eng-eks-mcm-nodegroup" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - node_security_group_arn = "arn:aws-us-gov:ec2:us-gov-east-1:224384469011:security-group/sg-0b4880f2bae65a949" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - node_security_group_id = "sg-0b4880f2bae65a949" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - oidc_provider = "oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - oidc_provider_arn = "arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - security_group_all_worker_mgmt_id = "sg-0117da2c13b4caf21" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - self_managed_node_groups = {} -> null +19:58:12.154 STDOUT [eks] terraform_current:  - self_managed_node_groups_autoscaling_group_names = [] -> null +19:58:12.154 STDOUT [eks] terraform_current:  - subnets = [ +19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-02c2250b9ec2dd6a2", +19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-078b228071c609a50", +19:58:12.154 STDOUT [eks] terraform_current:  - "subnet-07a6339be3670fb41", +19:58:12.154 STDOUT [eks] terraform_current:  ] -> null +19:58:12.154 STDOUT [eks] terraform_current:  - vpc_cidr_block = "10.129.32.0/19" -> null +19:58:12.154 STDOUT [eks] terraform_current:  - vpc_cni_irsa_role = { +19:58:12.154 STDOUT [eks] terraform_current:  - arn = "arn:aws-us-gov:iam::224384469011:role/platform-eng-eks-mcm-vpc-cni" +19:58:12.154 STDOUT [eks] terraform_current:  - name = "platform-eng-eks-mcm-vpc-cni" +19:58:12.154 STDOUT [eks] terraform_current:  - unique_id = "AROATIPS3JAJQVAVLU2ER" +19:58:12.154 STDOUT [eks] terraform_current:  } -> null +19:58:12.154 STDOUT [eks] terraform_current:  - vpc_id = "vpc-0280f77b373744eaa" -> null +19:58:12.746 STDOUT [eks] terraform_current: null_resource.kube_config_create: Destroying... [id=1982734664315419478] +19:58:12.747 STDOUT [eks] terraform_current: null_resource.kube_config_create: Destruction complete after 0s +19:58:13.462 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destroying... [id=subnet-07a6339be3670fb41,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Destroying... [id=sg-08e15e3b8fb3384d2,CostAllocation] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Destroying... [id=platform-eng-eks-mcm:aws-efs-csi-driver] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Destroying... [id=platform-eng-eks-mcm:eks-pod-identity-agent] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Destroying... [id=platform-eng-eks-mcm:coredns] +19:58:13.462 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destroying... [id=subnet-078b228071c609a50,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:13.462 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Destroying... [id=sg-08e15e3b8fb3384d2,Environment] +19:58:13.462 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Destroying... [id=sgrule-3033127033] +19:58:13.663 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["Environment"]: Destruction complete after 1s +19:58:13.664 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Destroying... [id=platform-eng-eks-mcm-vpc-cni-20240906231859418300000013] +19:58:13.692 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-078b228071c609a50"]: Destruction complete after 1s +19:58:13.694 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:13.696 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-07a6339be3670fb41"]: Destruction complete after 1s +19:58:13.696 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:tf_module_version] +19:58:13.784 STDOUT [eks] terraform_current: aws_security_group_rule.allow_sidecar_injection: Destruction complete after 1s +19:58:13.785 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:13.787 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_version"]: Destruction complete after 0s +19:58:13.788 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:13.856 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["CostAllocation"]: Destruction complete after 1s +19:58:13.857 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:tf_module_name] +19:58:13.962 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:tf_module_name"]: Destruction complete after 0s +19:58:13.964 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Destroying... [id=platform-eng-eks-mcm#arn:aws-us-gov:iam::224384469011:role/r-inf-terraform#arn:aws-us-gov:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy] +19:58:14.021 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role_policy_attachment.vpc_cni[0]: Destruction complete after 0s +19:58:14.023 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Destroying... [id=platform-eng-eks-mcm:snapshot-controller] +19:58:14.131 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t4_admin"]: Destruction complete after 1s +19:58:14.133 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Destroying... [id=platform-eng-eks-mcm:kube-proxy] +19:58:14.234 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t3_admin"]: Destruction complete after 0s +19:58:14.235 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Destroying... [id=subnet-046047345c5af7fb1,kubernetes.io/role/internal-nlb] +19:58:14.314 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t1_admin"]: Destruction complete after 0s +19:58:14.315 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Destroying... [id=sg-08e15e3b8fb3384d2,boc:created_by] +19:58:14.365 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-046047345c5af7fb1"]: Destruction complete after 0s +19:58:14.366 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Destroying... [id=alias/eks/platform-eng-eks-mcm] +19:58:14.412 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["boc:created_by"]: Destruction complete after 0s +19:58:14.413 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Destroying... [id=sg-08e15e3b8fb3384d2,eks-cluster-name] +19:58:14.466 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_alias.this["cluster"]: Destruction complete after 0s +19:58:14.467 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Destroying... [id=sg-08e15e3b8fb3384d2,cluster:size] +19:58:14.509 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["eks-cluster-name"]: Destruction complete after 1s +19:58:14.511 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Destroying... [id=platform-eng-eks-mcm:vpc-cni] +19:58:14.517 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["cluster_creator_admin"]: Destruction complete after 1s +19:58:14.518 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Destroying... [id=sg-08e15e3b8fb3384d2,slim:schedule] +19:58:14.562 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["cluster:size"]: Destruction complete after 1s +19:58:14.563 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Destroying... [id=platform-eng-eks-mcm-ebs-csi-driver-20240906231859237400000010] +19:58:14.608 STDOUT [eks] terraform_current: module.cluster.aws_ec2_tag.cluster_primary_security_group["slim:schedule"]: Destruction complete after 0s +19:58:14.612 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Destroying... [id=sg-0fac44214371189c5] +19:58:14.627 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_policy_association.this["inf-terraform-t2_admin"]: Destruction complete after 1s +19:58:14.629 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-2024090623103435260000000f] +19:58:14.672 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]: Destruction complete after 0s +19:58:14.674 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Destroying... [id=subnet-01e04b945b2bfe1de,kubernetes.io/role/internal-nlb] +19:58:14.780 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.cluster_encryption[0]: Destruction complete after 0s +19:58:14.781 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859464700000014] +19:58:14.817 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-01e04b945b2bfe1de"]: Destruction complete after 0s +19:58:14.820 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Destroying... [id=Z0123131367CLDFLTDGZ4] +19:58:14.907 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["CloudWatchAgentServerPolicy"]: Destruction complete after 0s +19:58:14.909 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Destroying... [id=platform-eng-eks-mcm:aws-ebs-csi-driver] +19:58:14.953 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["eks-pod-identity-agent"]: Destruction complete after 2s +19:58:14.954 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability-20240906231859417100000012] +19:58:14.991 STDOUT [eks] terraform_current: aws_security_group.additional_eks_cluster_sg: Destruction complete after 0s +19:58:14.992 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Destroying... [id=platform-eng-eks-mcm-efs-csi-driver-20240906231859316700000011] +19:58:15.068 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role_policy_attachment.amazon_cloudwatch_observability["AWSXrayWriteOnlyAccess"]: Destruction complete after 0s +19:58:15.069 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destroying... [id=subnet-02c2250b9ec2dd6a2,kubernetes.io/cluster/platform-eng-eks-mcm] +19:58:15.105 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role_policy_attachment.efs_csi[0]: Destruction complete after 0s +19:58:15.106 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Destroying... [id=subnet-0e3786cf42e38af3d,kubernetes.io/role/internal-nlb] +19:58:15.217 STDOUT [eks] terraform_current: aws_ec2_tag.container_subnets["subnet-02c2250b9ec2dd6a2"]: Destruction complete after 0s +19:58:15.219 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_CNI_Policy-20240906231012049100000003] +19:58:15.246 STDOUT [eks] terraform_current: aws_ec2_tag.lb_subnets["subnet-0e3786cf42e38af3d"]: Destruction complete after 0s +19:58:15.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/r-inf-terraform] +19:58:15.477 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_policy.vpc_cni[0]: Destruction complete after 0s +19:58:15.478 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t1_bff436a09282202c] +19:58:16.002 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["cluster_creator"]: Destruction complete after 1s +19:58:16.004 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t4_74ab55c57070ea06] +19:58:16.196 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t1"]: Destruction complete after 1s +19:58:16.198 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t3_b200ae7af469cdc8] +19:58:16.551 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t4"]: Destruction complete after 1s +19:58:16.553 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Destroying... [id=platform-eng-eks-mcm:arn:aws-us-gov:iam::224384469011:role/aws-reserved/sso.amazonaws.com/us-gov-east-1/AWSReservedSSO_inf-admin-t2_f3912d726991bbfa] +19:58:16.642 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["kube-proxy"]: Destruction complete after 3s +19:58:16.644 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EBS_CSI_Policy-20240906231012048000000002] +19:58:16.725 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t3"]: Destruction complete after 1s +19:58:16.727 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/platform-eng-eks-mcm-cluster-ClusterEncryption2024090623103380160000000e] +19:58:16.912 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]: Destruction complete after 0s +19:58:16.915 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Destroying... [id=sg-0117da2c13b4caf21] +19:58:16.976 STDOUT [eks] terraform_current: module.cluster.aws_iam_policy.cluster_encryption[0]: Destruction complete after 0s +19:58:16.978 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:policy/AmazonEKS_EFS_CSI_Policy-20240906231012047900000001] +19:58:17.076 STDOUT [eks] terraform_current: module.cluster.aws_eks_access_entry.this["inf-terraform-t2"]: Destruction complete after 0s +19:58:17.247 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_policy.efs_csi[0]: Destruction complete after 0s +19:58:17.266 STDOUT [eks] terraform_current: aws_security_group.all_worker_mgmt: Destruction complete after 0s +19:58:17.709 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["coredns"]: Destruction complete after 5s +19:58:17.914 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-efs-csi-driver"]: Destruction complete after 5s +19:58:18.549 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["vpc-cni"]: Destruction complete after 4s +19:58:21.446 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["snapshot-controller"]: Destruction complete after 7s +19:58:22.252 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["aws-ebs-csi-driver"]: Destruction complete after 7s +19:58:23.462 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability, 10s elapsed] +19:58:24.820 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still destroying... [id=Z0123131367CLDFLTDGZ4, 10s elapsed] +19:58:33.463 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Still destroying... [id=platform-eng-eks-mcm:amazon-cloudwatch-observability, 20s elapsed] +19:58:34.821 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Still destroying... [id=Z0123131367CLDFLTDGZ4, 20s elapsed] +19:58:37.731 STDOUT [eks] terraform_current: module.cluster.aws_eks_addon.this["amazon-cloudwatch-observability"]: Destruction complete after 25s +19:58:38.035 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Destroying... [id=4612407423035214643] +19:58:38.037 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-ebs-csi-driver] +19:58:38.037 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-cloudwatch-observability] +19:58:38.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].module.user_data.null_resource.validate_cluster_service_cidr: Destruction complete after 0s +19:58:38.037 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-vpc-cni] +19:58:38.037 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-efs-csi-driver] +19:58:38.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Destroying... [id=platform-eng-eks-mcm:eks-platform-eng-eks-mcm-nodegroup-20240906231928648200000017] +19:58:38.571 STDOUT [eks] terraform_current: module.cloudwatch_observability_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s +19:58:38.574 STDOUT [eks] terraform_current: module.ebs_csi_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s +19:58:38.620 STDOUT [eks] terraform_current: module.efs_csi_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s +19:58:38.656 STDOUT [eks] terraform_current: module.vpc_cni_irsa_role.aws_iam_role.this[0]: Destruction complete after 1s +19:58:38.659 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Destroying... [id=arn:aws-us-gov:iam::224384469011:oidc-provider/oidc.eks.us-gov-east-1.amazonaws.com/id/D896BC3B83782F01D590ACB83BB75926] +19:58:38.789 STDOUT [eks] terraform_current: module.cluster.aws_iam_openid_connect_provider.oidc_provider[0]: Destruction complete after 0s +19:58:42.609 STDOUT [eks] terraform_current: aws_route53_zone.cluster_domain: Destruction complete after 28s +19:58:42.610 STDOUT [eks] terraform_current: aws_vpc.vpc: Destroying... [id=vpc-06a2a192783bb40aa] +19:58:43.077 STDOUT [eks] terraform_current: aws_vpc.vpc: Destruction complete after 0s +19:58:48.037 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 10s elapsed] +19:58:58.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 20s elapsed] +19:59:08.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 30s elapsed] +19:59:18.038 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 40s elapsed] +19:59:28.039 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 50s elapsed] +19:59:38.039 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m0s elapsed] +19:59:48.040 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m10s elapsed] +19:59:58.040 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m20s elapsed] +20:00:08.041 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m30s elapsed] +20:00:18.042 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m40s elapsed] +20:00:28.042 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 1m50s elapsed] +20:00:38.043 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m0s elapsed] +20:00:48.043 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m10s elapsed] +20:00:58.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m20s elapsed] +20:01:08.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m30s elapsed] +20:01:18.044 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m40s elapsed] +20:01:28.045 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 2m50s elapsed] +20:01:38.045 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m0s elapsed] +20:01:48.046 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m10s elapsed] +20:01:58.046 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m20s elapsed] +20:02:08.047 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m30s elapsed] +20:02:18.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m40s elapsed] +20:02:28.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 3m50s elapsed] +20:02:38.048 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m0s elapsed] +20:02:48.049 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m10s elapsed] +20:02:58.049 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m20s elapsed] +20:03:08.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m30s elapsed] +20:03:18.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m40s elapsed] +20:03:28.050 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 4m50s elapsed] +20:03:38.051 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m0s elapsed] +20:03:48.052 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m10s elapsed] +20:03:58.056 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m20s elapsed] +20:04:08.053 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m30s elapsed] +20:04:18.054 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m40s elapsed] +20:04:28.055 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 5m50s elapsed] +20:04:38.056 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m0s elapsed] +20:04:48.057 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m10s elapsed] +20:04:58.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m20s elapsed] +20:05:08.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m30s elapsed] +20:05:18.058 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m40s elapsed] +20:05:28.059 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 6m50s elapsed] +20:05:38.060 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m0s elapsed] +20:05:48.061 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m10s elapsed] +20:05:58.061 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m20s elapsed] +20:06:08.062 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m30s elapsed] +20:06:18.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m40s elapsed] +20:06:28.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 7m50s elapsed] +20:06:38.063 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m0s elapsed] +20:06:48.064 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m10s elapsed] +20:06:58.064 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Still destroying... [id=platform-eng-eks-mcm:eks-platform-eng-e...m-nodegroup-20240906231928648200000017, 8m20s elapsed] +20:07:00.662 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_eks_node_group.this[0]: Destruction complete after 8m23s +20:07:00.983 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Destroying... [id=lt-0cab502ac2f52bb98] +20:07:01.234 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_launch_template.this[0]: Destruction complete after 0s +20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328910000000b] +20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101329060000000c] +20:07:01.235 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007-2024090623101328450000000a] +20:07:01.236 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Destroying... [id=2024-09-06T23:19:27Z] +20:07:01.238 STDOUT [eks] terraform_current: module.cluster.time_sleep.this[0]: Destruction complete after 0s +20:07:01.243 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Destroying... [id=platform-eng-eks-mcm] +20:07:01.596 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]: Destruction complete after 1s +20:07:01.617 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]: Destruction complete after 1s +20:07:01.622 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]: Destruction complete after 1s +20:07:01.625 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Destroying... [id=eks-platform-eng-eks-mcm-nodegroup-20240906231012582900000007] +20:07:02.085 STDOUT [eks] terraform_current: module.cluster.module.eks_managed_node_group["node_group"].aws_iam_role.this[0]: Destruction complete after 0s +20:07:11.243 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 10s elapsed] +20:07:21.244 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 20s elapsed] +20:07:31.244 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 30s elapsed] +20:07:41.245 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 40s elapsed] +20:07:51.246 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 50s elapsed] +20:08:01.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m0s elapsed] +20:08:11.247 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m10s elapsed] +20:08:21.248 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m20s elapsed] +20:08:31.249 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m30s elapsed] +20:08:41.250 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Still destroying... [id=platform-eng-eks-mcm, 1m40s elapsed] +20:08:42.570 STDOUT [eks] terraform_current: module.cluster.aws_eks_cluster.this[0]: Destruction complete after 1m42s +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Destroying... [id=sgrule-142063903] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Destroying... [id=548a1f15-3b65-467e-b6cf-4e1aa13bb9fc] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Destroying... [id=sgrule-1028926182] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Destroying... [id=sgrule-155164117] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Destroying... [id=sgrule-1630915307] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Destroying... [id=sgrule-3683901971] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Destroying... [id=sgrule-2999123215] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Destroying... [id=sgrule-2139797237] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Destroying... [id=sgrule-1825999572] +20:08:42.873 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Destroying... [id=sgrule-3066614115] +20:08:43.026 STDOUT [eks] terraform_current: module.cluster.module.kms.aws_kms_key.this[0]: Destruction complete after 0s +20:08:43.027 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013126400000008] +20:08:43.227 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_4443_webhook"]: Destruction complete after 0s +20:08:43.228 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004-20240906231013127100000009] +20:08:43.231 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.cluster["ingress_nodes_443"]: Destruction complete after 0s +20:08:43.232 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Destroying... [id=sgrule-2399073099] +20:08:43.407 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]: Destruction complete after 0s +20:08:43.409 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Destroying... [id=/aws/eks/platform-eng-eks-mcm/cluster] +20:08:43.506 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_udp"]: Destruction complete after 1s +20:08:43.508 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Destroying... [id=sgrule-2908765754] +20:08:43.542 STDOUT [eks] terraform_current: module.cluster.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]: Destruction complete after 1s +20:08:43.544 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Destroying... [id=platform-eng-eks-mcm-cluster-20240906231012049800000004] +20:08:43.570 STDOUT [eks] terraform_current: module.cluster.aws_cloudwatch_log_group.this[0]: Destruction complete after 1s +20:08:43.777 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_nodes_ephemeral"]: Destruction complete after 1s +20:08:44.036 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_9443_webhook"]: Destruction complete after 1s +20:08:44.134 STDOUT [eks] terraform_current: module.cluster.aws_iam_role.this[0]: Destruction complete after 0s +20:08:44.296 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_443"]: Destruction complete after 1s +20:08:44.570 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_8443_webhook"]: Destruction complete after 2s +20:08:44.839 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_kubelet"]: Destruction complete after 2s +20:08:45.083 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_cluster_6443_webhook"]: Destruction complete after 2s +20:08:45.345 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["egress_all"]: Destruction complete after 2s +20:08:45.609 STDOUT [eks] terraform_current: module.cluster.aws_security_group_rule.node["ingress_self_coredns_tcp"]: Destruction complete after 2s +20:08:45.611 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Destroying... [id=sg-0ebcc111357300f20] +20:08:45.616 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Destroying... [id=sg-0b4880f2bae65a949] +20:08:45.993 STDOUT [eks] terraform_current: module.cluster.aws_security_group.cluster[0]: Destruction complete after 0s +20:08:55.617 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10s elapsed] +20:09:05.618 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 20s elapsed] +20:09:15.618 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 30s elapsed] +20:09:25.619 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 40s elapsed] +20:09:35.619 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 50s elapsed] +20:09:45.620 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m0s elapsed] +20:09:55.620 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m10s elapsed] +20:10:05.621 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m20s elapsed] +20:10:15.622 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m30s elapsed] +20:10:25.623 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m40s elapsed] +20:10:35.623 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 1m50s elapsed] +20:10:45.625 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m0s elapsed] +20:10:55.625 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m10s elapsed] +20:11:05.626 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m20s elapsed] +20:11:15.627 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m30s elapsed] +20:11:25.627 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m40s elapsed] +20:11:35.628 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 2m50s elapsed] +20:11:45.628 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m0s elapsed] +20:11:55.629 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m10s elapsed] +20:12:05.630 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m20s elapsed] +20:12:15.631 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m30s elapsed] +20:12:25.632 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m40s elapsed] +20:12:35.633 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 3m50s elapsed] +20:12:45.633 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m0s elapsed] +20:12:55.634 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m10s elapsed] +20:13:05.635 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m20s elapsed] +20:13:15.636 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m30s elapsed] +20:13:25.636 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m40s elapsed] +20:13:35.637 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 4m50s elapsed] +20:13:45.637 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m0s elapsed] +20:13:55.638 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m10s elapsed] +20:14:05.639 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m20s elapsed] +20:14:15.639 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m30s elapsed] +20:14:25.640 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m40s elapsed] +20:14:35.641 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 5m50s elapsed] +20:14:45.641 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m0s elapsed] +20:14:55.642 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m10s elapsed] +20:15:05.643 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m20s elapsed] +20:15:15.644 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m30s elapsed] +20:15:25.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m40s elapsed] +20:15:35.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 6m50s elapsed] +20:15:45.645 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m0s elapsed] +20:15:55.646 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m10s elapsed] +20:16:05.646 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m20s elapsed] +20:16:15.647 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m30s elapsed] +20:16:25.647 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m40s elapsed] +20:16:35.648 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 7m50s elapsed] +20:16:45.648 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m0s elapsed] +20:16:55.649 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m10s elapsed] +20:17:05.649 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m20s elapsed] +20:17:15.650 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m30s elapsed] +20:17:25.651 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m40s elapsed] +20:17:35.651 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 8m50s elapsed] +20:17:45.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m0s elapsed] +20:17:55.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m10s elapsed] +20:18:05.653 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m20s elapsed] +20:18:15.654 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m30s elapsed] +20:18:25.654 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m40s elapsed] +20:18:35.655 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 9m50s elapsed] +20:18:45.655 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10m0s elapsed] +20:18:55.656 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Still destroying... [id=sg-0b4880f2bae65a949, 10m10s elapsed] +20:19:02.680 STDOUT [eks] terraform_current: module.cluster.aws_security_group.node[0]: Destruction complete after 10m17s +20:19:03.221 STDOUT [eks] terraform_current:  +20:19:03.221 STDOUT [eks] terraform_current: Destroy complete! Resources: 81 destroyed. +20:19:03.221 STDOUT [eks] terraform_current:  diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/eks-cert-manager/terragrunt.hcl b/lab/us-gov-east-1/vpc/_mcmCluster/eks-cert-manager/terragrunt.hcl index e215316..bd7f869 100644 --- a/lab/us-gov-east-1/vpc/_mcmCluster/eks-cert-manager/terragrunt.hcl +++ b/lab/us-gov-east-1/vpc/_mcmCluster/eks-cert-manager/terragrunt.hcl @@ -13,9 +13,6 @@ terraform { dependency "eks" { config_path = "../eks" } -# dependency "eks-metrics-server" { -# config_path = "../eks-metrics-server" -# } inputs = { cluster_name = dependency.eks.inputs.cluster_name diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/eks-grafana/terragrunt.hcl b/lab/us-gov-east-1/vpc/_mcmCluster/eks-grafana/terragrunt.hcl index 2305837..58cf714 100644 --- a/lab/us-gov-east-1/vpc/_mcmCluster/eks-grafana/terragrunt.hcl +++ b/lab/us-gov-east-1/vpc/_mcmCluster/eks-grafana/terragrunt.hcl @@ -14,6 +14,11 @@ dependency "eks-config" { config_path = "../eks-config" } +dependency "eks-istio" { + config_path = "../eks-istio" + skip_outputs = true +} + dependency "eks-karpenter" { config_path = "../eks-karpenter" skip_outputs = true diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/eks-loki/terragrunt.hcl b/lab/us-gov-east-1/vpc/_mcmCluster/eks-loki/terragrunt.hcl index 128947d..c9fa6ba 100644 --- a/lab/us-gov-east-1/vpc/_mcmCluster/eks-loki/terragrunt.hcl +++ b/lab/us-gov-east-1/vpc/_mcmCluster/eks-loki/terragrunt.hcl @@ -14,8 +14,8 @@ dependency "eks" { config_path = "../eks" } -dependency "eks-karpenter" { - config_path = "../eks-karpenter" +dependency "eks-grafana" { + config_path = "../eks-grafana" skip_outputs = true } diff --git a/lab/us-gov-east-1/vpc/_mcmCluster/eks-prometheus/terragrunt.hcl b/lab/us-gov-east-1/vpc/_mcmCluster/eks-prometheus/terragrunt.hcl index 626f3ba..a8679ef 100644 --- a/lab/us-gov-east-1/vpc/_mcmCluster/eks-prometheus/terragrunt.hcl +++ b/lab/us-gov-east-1/vpc/_mcmCluster/eks-prometheus/terragrunt.hcl @@ -13,8 +13,8 @@ terraform { dependency "eks" { config_path = "../eks" } -dependency "eks-karpenter" { - config_path = "../eks-karpenter" +dependency "eks-grafana" { + config_path = "../eks-grafana" skip_outputs = true }